X-Git-Url: http://jsfdemo.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_26.res;h=40370c0505d78ee4e088477ccf831eb2a3e92648;hb=c67f5808515bc6ef1f459a31ebacdfbd13596766;hp=ae42f75493525a2be774962f1fdf72b4a5e25c70;hpb=bfe528b216abd25cab78d8764a771f1abcc997ec;p=pazpar2-moved-to-github.git diff --git a/test/test_limit_limitmap_26.res b/test/test_limit_limitmap_26.res index ae42f75..40370c0 100644 --- a/test/test_limit_limitmap_26.res +++ b/test/test_limit_limitmap_26.res @@ -1,16 +1,57 @@ -OK -Target-1 -ztest-db1 -1 -0 -1 -Client_Idle - -Target-2 -LOC-SOLR -0 -0 -0 -Client_Error - \ No newline at end of file +OK +0 +4 +10 +0 +4 + + +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +XXXXXXXXXX +57536 +content: title computer science technology + + + +The Computer Bible +1973-1980 +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +The Computer Bible +1973-1980 +Hebrew and Greek; introductions in English +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +XXXXXXXXXX +57536 +content: title the computer bible + + + +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +XXXXXXXXXX +17260 +content: title the use of passwords for controlled access to computer resources author wood helen m + + + +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +XXXXXXXXXX +0 +content: title reconstruction tomography in diagnostic radiology and nuclear medicine + + \ No newline at end of file