Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Software | 42 |
Databases | 42 |
Man Machine Systems | 42 |
Online Searching | 17 |
Online Systems | 17 |
Microcomputers | 14 |
Information Retrieval | 12 |
Search Strategies | 11 |
Information Systems | 9 |
Higher Education | 8 |
Computer System Design | 7 |
More ▼ |
Source
Author
Hawkins, Donald T. | 2 |
Levy, Louise R. | 2 |
Moline, Judi | 2 |
Tenopir, Carol | 2 |
Allen, Robert J. | 1 |
Arms, William Y | 1 |
Bader, Shelley A. | 1 |
Bearman, David, Ed. | 1 |
Beaubien, Denise M. | 1 |
Bolin, Robert L. | 1 |
Boss, Richard W. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Location
Egypt | 1 |
Mexico | 1 |
United Kingdom (England) | 1 |
United Kingdom (Northern… | 1 |
United Kingdom (Scotland) | 1 |
United Kingdom (Wales) | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Salas-Rueda, Ricardo-Adán – E-Learning and Digital Media, 2020
This quantitative research aims to analyze the impact of the WampServer application in Blended learning during the educational process of computing through data science, machine learning, and neural networks. WampServer is a free application that allows the creation of websites considering the use of the database. This research proposes the use of…
Descriptors: Computer Software, Blended Learning, Educational Technology, Technology Uses in Education
Custer, William L. – New Directions for Institutional Research, 2010
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Descriptors: Institutional Research, Databases, School Security, Computer Security
O'Leary, Mick – Online, 1988
Describes features and enhancements of the EasyNet end-user gateway software including the addition of more databanks, improved help for searchers, field searching, online help from humans, and scanning for database selection. Capabilities of the Common Command Language are discussed. Figures show a database scan, EasyNet commands, and a sample…
Descriptors: Computer Software, Databases, Man Machine Systems, Online Searching
Dunnewin, Larry – Database, 1986
Describes the uses of Lotus 1-2-3 (a spreadsheet-graphics-database program created by Lotus Development Corporation) and Symphony 1.1 (a refinement and expansion of Symphony 1.01 providing memory efficiency, speed, ease of use, greater file compatibility). Spreadsheet and graphics capabilities, the use of windows, database environment, and…
Descriptors: Computer Graphics, Computer Software, Databases, Display Systems
Urrows, Henry; Urrows, Elizabeth – Optical Information Systems, 1989
Review of encyclopedias and other databases available on CD-ROM focuses on the International Encyclopedia of Education (IEE). Problems with software and hardware are described, perspectives from the computer industry are presented, the commercial potential of CD-ROMs is discussed, and a list of sources is provided. (six references) (LRW)
Descriptors: Computer Software, Databases, Encyclopedias, Man Machine Systems
LaGuardia, Cheryl; Huber, Chuck – Library Journal, 1992
Discusses proposals for more standardized practices in CD-ROM development, sales, and distribution. Topics discussed include availability of trial copies; pricing policies; installation, including software, instructions, and compatibility; interface procedures; manuals; and vendor support services. A sidebar discusses proposals being addressed by…
Descriptors: Computer Software, Database Producers, Databases, Guides

Rybinski, Henryk; And Others – Information Processing and Management, 1985
Presents a concept of end-user query language with facilities for expressing relationships between objects kept in a database. The idea of nesting these features in typical document query language is shown. Examples of usage of these new facilities are included. (Author/MBR)
Descriptors: Computer Software, Databases, Diagrams, Information Retrieval
Boss, Richard W. – 1991
This digest describes and defines the various components of an expert system, e.g., a computerized tool designed to enhance the quality and availability of knowledge required by decision makers. It is noted that expert systems differ from conventional applications software in the following areas: (1) the existence of the expert systems shell, or…
Descriptors: Computer Software, Computer System Design, Databases, Expert Systems

Desmarais, Norman – Library Software Review, 1986
This discussion of three automated acquisitions systems--Bib-Base/Acq, The Book Trak Ordering System, and Card Datalog Acquisitions Module--covers searching and updating, editing, acquisitions functions and statistics, purchase orders and order file, budgeting and accounts maintenance, defining parameters, documentation, security, printing, and…
Descriptors: Computer Software, Databases, Information Systems, Library Acquisition
Hawkins, Donald T.; Levy, Louise R. – Online, 1986
Presents a product selection chart for 12 currently available gateways or front-end packages suitable for online searching. Information provided for each package includes producer, cost, type, location, information accessed, equipment required, operating system, and search capabilities. A 94-item bibliography to published literature on these…
Descriptors: Computer Software, Databases, Information Services, Information Systems
Clancey, William J. – 1983
This paper argues that an important design principle for building expert systems is to represent all control knowledge abstractly and separately from the domain knowledge upon which it operates. Abstract control knowledge is defined as the specifications of when and how a program is to carry out its operations, such as pursuing a goal, focusing,…
Descriptors: Artificial Intelligence, Clinical Diagnosis, Communicable Diseases, Computer Software
Levy, Louise R.; Hawkins, Donald T. – Online, 1986
This article analyzes the front end software marketplace and discusses some of the complex forces influencing it. Discussion covers intermediary market; end users (library customers, scientific and technical professionals, corporate business specialists, consumers); marketing strategies; a British front end development firm; competitive pressures;…
Descriptors: Computer Software, Databases, Information Retrieval, Information Scientists
Lundeen, Gerald; Tenopir, Carol – Online, 1985
Four information retrieval packages that run on single user microcomputers--CAIRS, INMAGIC, Sci-Mate, SIRE--are examined based on following criteria: storage requirements; hardware requirements; search features (Boolean logic, comparison searching, set building, truncation, and wild card characters); system output; security; system maintenance…
Descriptors: Computer Software, Databases, Display Systems, Evaluation Criteria

Joachim, Robert – Library Software Review, 1986
Describes file management package offering relatively sophisticated features: conversion of previously downloaded records from commercial database into local file; keyword searching on inverted keyword file; full-text searching on author, title, bibliographic source, abstract; sorting by author, title, bibliographic source, publication year;…
Descriptors: Computer Oriented Programs, Computer Software, Databases, Information Systems
Lukanuski, Mary – American Libraries, 1992
Describes the development of the WAIS (Wide Area Information Servers) protocol, a system that allows users access to personal, corporate, and commercial electronic information from one interface. The availability of WAIS on the Internet and the reactions of users are addressed. Several problems are considered, including funding, hardware…
Descriptors: Access to Information, Computer Networks, Computer Software, Databases