top - download
⟦69d85da41⟧ Wang Wps File
Length: 1619 (0x653)
Types: Wang Wps File
Notes: Spelunked
Names: »~ORPHAN01.09«
Derivation
└─⟦f44f167f1⟧ Bits:30006019 8" Wang WCS floppy, CR 0458A
└─ ⟦this⟧ »~ORPHAN01.09«
WangText
d to", "replace", "delete" can be assigned to level II of IDL or can be used to create
another level of IDL. In addition, special consideration will be made for the possibility
of using the "free form" update capabilities. Use of stored commands o level II of
IDL could involve database manipulation on selected items or relations. Definition
of stored commands which involve database manipulation is to be approved by the Security
Administrator and the Data Base Administrator, before the commads can be executed.
Detailed analysis of each command and its uses must be completed during design review
and approved by the security accreditation authority before it can be implemented.
IDL provides for extreme flexibility; security procedures urtail flexibility. Hence,
analysis of command (specific ones) must be done on a case-by-case, data element-by-data
element basis. Close coordination with the security group must be a prime element
of the design phase to ensure accreditation.
I section 2.2.3 of the Technical Proposal is a description of Interactive Update
Facilities, which allows the user to update the database by means of preformatted
screen displays, which is easy to use and allows for a well-defined separation on
whic data may be updated by which user.
Q̲U̲E̲S̲T̲I̲O̲N̲ ̲2̲G̲-̲7̲
There is an execise label associated with this displayed or entered data.
Q̲U̲E̲S̲T̲I̲O̲N̲ ̲2̲H̲-̲1̲
SHAPE funded the development of the applications program
for CAMPS. The CAMPS software can be