
Note:
This
data
base
is
not
mean
t
to
b e
a
practical
application
but
rather
is
designed
to
illustrate
as
man
y
IMA
GE/QUER
Y
features
as
p ossible.
MODES
OF
A
CCESS
Eac
h
p erson
using
QUER
Y
to
access
a
data
base
m
ust
sp ecify
one
of
the
8
mo
des
of
access.
The
following
table
lists
the
capabilities
y
ou
will
ha
v
e
in
eac
h
mo
de.
MODE
CAP
ABILITIES
1
Find
(read),
replace,
add,
delete
en
tries
(QUER
Y
requests
IMA
GE
dynamically
lo
c
k
and
unlo
c
k
the
data
base
when
accessing
it)
2
Find
and
replace
en
tries
3*
or
4
Find,
replace,
add,
and
delete
en
tries
5
Find
en
tries
(QUER
Y
lo
c
ks
and
unlo
c
ks)
6,
7*,
or
8
Find
en
tries
*
Mo
des
3
and
7
give
y
ou
exclusiv
e
access
to
the
data
base.
All
other
mo
des
allo w
others
to
share
the
data
base.
A
data
base
can
only
b e
shared
in
certain
situations
or
en
vironmen
ts.
The
mo
de
y
ou
sp ecify
m
ust
b e
acceptable
for
the
en
vironmen
t
already
established
b
y
other
IMA
GE
and
QUER
Y
users
(if
an
y)
when
y
ou
op en
the
data
base.
Here
is
a
summary
of
the
acceptable
en
vironmen
ts:
m
ultiple
mo
de
1
and
mo
de
5
users
m
ultiple
mo
de
6
and
mo
de
2
users
m
ultiple
mo
de
6
users
and
one
mo
de
4
user
m
ultiple
mo
de
6
and
mo
de
8
users
one
mo
de
3
user
one
mo
de
7
user
Subsets
of
these
en
vironmen
ts
are
also
allo w
ed.
F
or
example,
there
may
b e
all
mo
de
6
users
or
all
mo
de
8
users.
There
may
also
b e
one
mo
de
1
user
or
all
mo
de
5
users
and
so
forth.
If
a
mo
de
3
or
mo
de
7
user
is
curren
tly
accessing
the
data
base
that
y
ou
w
an
t
to
access,
y
ou
m
ust
w
ait
un
til
that
user
either
terminates
their
IMA
GE
or
QUER
Y
session
or
accesses
a
dieren
t
data
base.
This
is
true
an
y
time
y
ou
try
to
access
a
data
base
with
a
mo
de
whic
h
is
incompatible
with
other
users
accessing
the
same
data
base.
Changing
y
our
mo
de
of
access
may
enable
y
ou
to
access
the
data
base.
When
deciding
whic
h
mo
de
to
use,
y
ou
should
consider
the
following:
If
y
ou
merely
w
an
t
to
nd
information
and
examine
or
rep ort
on
it,
y
ou
should
op en
the
data
base
with
a
nd
(read-only)
mo
de,
th
us
allo wing
other
users
as
m
uc
h
capabilit y
as
p ossible.
The
follo wing
table
gives
the
result
of
using
eac
h
read-only
mo
de.
1-8
INTRODUCING
QUERY/V
Summary of Contents for QUERY
Page 10: ......
Page 17: ...Figure 1 1 ORDERS Data Base Structure Figure 1 2 Sample Entry Values INTRODUCING QUERY V 1 7 ...
Page 20: ...Figure 1 3 IMAGE QUERY Environments 1 10 INTRODUCING QUERY V ...
Page 36: ......
Page 165: ...REPORT G1 GROUP TITLE 11 END QUERY V COMMANDS 3 129 ...
Page 199: ...XEQ TF TOTAL DUE 9 SPACE B2 SKIP A TF R0 70 E2 S PURCH DATE END QUERY V COMMANDS 3 163 ...
Page 200: ......
Page 244: ......
Page 278: ......
Page 279: ...G ASCII CHARACTER SET This appendix is not available in this edition ASCII CHARACTER SET G 1 ...
Page 280: ......