X-Git-Url: http://jsfdemo.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_26.res;h=40370c0505d78ee4e088477ccf831eb2a3e92648;hb=c67f5808515bc6ef1f459a31ebacdfbd13596766;hp=ae42f75493525a2be774962f1fdf72b4a5e25c70;hpb=bfe528b216abd25cab78d8764a771f1abcc997ec;p=pazpar2-moved-to-github.git
diff --git a/test/test_limit_limitmap_26.res b/test/test_limit_limitmap_26.res
index ae42f75..40370c0 100644
--- a/test/test_limit_limitmap_26.res
+++ b/test/test_limit_limitmap_26.res
@@ -1,16 +1,57 @@
-OK
-Target-1
-ztest-db1
-1
-0
-1
-Client_Idle
-
-Target-2
-LOC-SOLR
-0
-0
-0
-Client_Error
-
\ No newline at end of file
+OK
+0
+4
+10
+0
+4
+
+
+Computer science & technology
+proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+1977
+Computer science & technology
+proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+1977
+XXXXXXXXXX
+57536
+content: title computer science technology
+
+
+
+The Computer Bible
+1973-1980
+Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+The Computer Bible
+1973-1980
+Hebrew and Greek; introductions in English
+Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+XXXXXXXXXX
+57536
+content: title the computer bible
+
+
+
+The use of passwords for controlled access to computer resources
+1977
+Wood, Helen M
+The use of passwords for controlled access to computer resources
+1977
+Wood, Helen M
+XXXXXXXXXX
+17260
+content: title the use of passwords for controlled access to computer resources author wood helen m
+
+
+
+Reconstruction tomography in diagnostic radiology and nuclear medicine
+proceedings of the workshop
+1977
+Reconstruction tomography in diagnostic radiology and nuclear medicine
+proceedings of the workshop
+1977
+XXXXXXXXXX
+0
+content: title reconstruction tomography in diagnostic radiology and nuclear medicine
+
+
\ No newline at end of file