X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_http_10.res;h=90fd4e3db71f087b54c34abd56bb0447d4350fa5;hb=refs%2Fheads%2Fbranch-1.4.4;hp=01d36f15b66b1fd550eea7fdba343b1c5fa2bc68;hpb=66a4b43079535dd50f228d136478646b8ef7c52e;p=pazpar2-moved-to-github.git diff --git a/test/test_http_10.res b/test/test_http_10.res index 01d36f1..90fd4e3 100644 --- a/test/test_http_10.res +++ b/test/test_http_10.res @@ -1,3 +1,4 @@ + OK 0 @@ -9,14 +10,11 @@ The Computer Bible 1973-1980 -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates The Computer Bible 1973-1980 -Hebrew and Greek; introductions in English -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +Hebrew and Greek; introductions in English +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates XXXXXXXXXX test-usersetting-2 data: YYYYYYYYY @@ -26,10 +24,7 @@ Computer science & technology proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 -1977 -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +1977 Computer science & technology proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 1977 @@ -43,14 +38,11 @@ Reconstruction tomography in diagnostic radiology and nuclear medicine proceedings of the workshop 1977 -Includes bibliographical references and index -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +Includes bibliographical references and index Reconstruction tomography in diagnostic radiology and nuclear medicine proceedings of the workshop 1977 -Includes bibliographical references and index +Includes bibliographical references and index XXXXXXXXXX test-usersetting-2 data: YYYYYYYYY @@ -60,10 +52,7 @@ The use of passwords for controlled access to computer resources 1977 -Wood, Helen M -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +Wood, Helen M The use of passwords for controlled access to computer resources 1977 Wood, Helen M @@ -77,14 +66,11 @@ Computer processing of dynamic images from an Anger scintillation camera the proceedings of a workshop 1974 -Includes bibliographical references and index -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +Includes bibliographical references and index Computer processing of dynamic images from an Anger scintillation camera the proceedings of a workshop 1974 -Includes bibliographical references and index +Includes bibliographical references and index XXXXXXXXXX test-usersetting-2 data: YYYYYYYYY @@ -96,16 +82,13 @@ a portfolio of thematic computer maps 1974 Mairs, John W -Scale of maps ca. 1:1,000,000 -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +Scale of maps ca. 1:1,000,000 The Puget Sound Region a portfolio of thematic computer maps 1974 Mairs, John W -Scale of maps ca. 1:1,000,000 -Bibliography: p. 4 +Scale of maps ca. 1:1,000,000 +Bibliography: p. 4 XXXXXXXXXX test-usersetting-2 data: YYYYYYYYY @@ -115,13 +98,10 @@ A plan for community college computer development 1971 -Cover title -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +Cover title A plan for community college computer development 1971 -Cover title +Cover title XXXXXXXXXX test-usersetting-2 data: YYYYYYYYY @@ -133,15 +113,12 @@ final report 1971 Englund, Carl R -"Contract DOT-UT-10003." -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY +"Contract DOT-UT-10003." Washington metropolitan area rail computer feasibility study; final report 1971 Englund, Carl R -"Contract DOT-UT-10003." +"Contract DOT-UT-10003." XXXXXXXXXX test-usersetting-2 data: YYYYYYYYY @@ -150,19 +127,13 @@ How to program a computer -Jack Collins -XXXXXXXXXX -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -test-usersetting-2 data: - YYYYYYYYY +Jack Collins How to program a computer Jack Collins XXXXXXXXXX test-usersetting-2 data: YYYYYYYYY - + How to program a computer Jack Collins XXXXXXXXXX