Structured decision making batch creating decision table

Assignment Help Basic Computer Science
Reference no: EM13889441 , Length: word count:500

Structured decision-making is required with respect to the batch update of the COMPUTER MASTER file in an organization, which can be described as follows. There are three types of updates: ADD, DELETE and CHANGE. The COMPUTER MASTER record must be read. If the transaction is an ADD and the master is not found, format and write the new COMPUTER MASTER record. Print a valid transaction line on an UPDATE REPORT. For a CHANGE or DELETE transaction, print a CHANGE ERROR LINE or a DELETE ERROR LINE if the COMPUTER MASTER record is not found. If the COMPUTER MASTER record is found, check the active code. If the record is inactive and the transaction is an ADD, format and rewrite the new COMPUTER MASTER record. Print a valid transaction line on an UPDATE REPORT.

For a CHANGE or DELETE TRANSACTION, print a CHANGE ERROR LINE or a DELETE ERROR LINE. For a DELETE transaction, if the COMPUTER MASTER record is found and the code is inactive, in addition to other rules, also select DELETE COMPUTER RECORD. If the COMPUTER MASTER record is active and the transaction is an ADD, print an ADD ERROR LINE. For a CHANGE transaction, format the changes and rewrite the COMPUTER MASTER record. Print the VALID TRANSACTION LINE. For a DELETE transaction, CHANGE COMPUTER RECORD and rewrite the COMPUTER MASTER record. Print the VALID TRANSACTION LINE.

1. Create a Decision Table for the above situation

2. Create a Decision Tree for the above situation

Additional information

The problem related to Computer Science and it describes about structured decision making required for making batch update and creating decision table and decision tree for a situation.

Word limit: 500

Reference no: EM13889441

Questions Cloud

The implementation of a shared memory : The implementation of a shared memory
Loss of tax benefits and loss of in-kind benefits : When means-tested benefits are combined with a progressive tax system there can be a serious problem with disincentives. A situation known as the ________. This is due to the loss of tax benefits and loss of in-kind benefits when income increases...
How much do you agree with the traditional view of gossip : The article states that the traditional and prevailing view of gossip in psychology has been regarded as an indirect form of aggression, "akin to teasing". How much do you agree with the traditional view of gossip in psychology
What are the main tools of time management for students : What are the main tools of time management for students, and what is each used for? At what time of day are students most inclined to waste time? What time of day is the best for studying complex topics?
Structured decision making batch creating decision table : The problem related to Computer Science and it describes about structured decision making required for making batch update and creating decision table and decision tree for a situation.
What concerns do authors say are raised by real-world use : What concerns do the authors say are raised by "real-world use" of ABC? According to the authors, what benefits have companies enjoyed from the use of ABC?
Explain the importance of user abilities and characteristics : Explain the importance of user abilities and characteristics in the usability of products.
What are benefits of abc that relate to financial services : What are some of the benefits of ABC that relate to the financial services industry? What are three things that the company's original costing method did not take into account?
Describe how host-based intrusion detection works : Describe how host-based intrusion detection works, briefly contrasting it with network-based intrusion detection. Explain three types of threats against which HIDS is particularly effective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find commercial web site show bleeding edge technology error

Visit the Internet and discover commercial Web sites which show each of the common errors listed below. Give links to those Websites in Microsoft Word document.

  Describe and explain denial of service

Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) network attacks

  What belief system or systems do the staff adhere to

What belief system or systems do the staff adhere to. What are some beliefs that can be improved on or changed to create a better work experience, while maintaining quality in services delivered

  Defend why technology is the best of the three

Submit a discussion in which you examine UBR, CBR and ABR technologies. Choose one of these as the preferred method for transmitting data when bit-rate and minimum quality of service are top priorities and defend why this technology is the best..

  Describe how and why information systems are used today

Explain the main factors that you should consider before deciding whether to buy a laptop or a tablet. Identify the key features of a laptop and a tablet. Next, discuss three (3) important characteristics of each that might influence your decision.

  Write files which do not reside at root or master directory

Provide the example of names of three files from own computer that do not reside at the root or master directory. For each file, list both therelative filename and its complete filename.

  Use double variable to represent the private data of class

Use double variable to represent the private data of the class. Provide a constructor that enables an object of this class to be initialized when it is declared.

  Draw the pipeline execution diagram for this code

Draw the pipeline execution diagram for this code, assuming full forwarding is used and the branch is determined in the EX stage. The pipeline always predicts branch taken.

  Error-detection in the data link layer

What techniques can be used for error-detection in the data link layer?

  Write a program that performs boolean expressions

Read in a month and determine the number of days in the month. If the month is February, prompt the user for a year and determine if the year is a leap year to output the correct number of days.

  Values for the items in the risk register

Recommend reasonable values for items in risk register for this asset and threat, and give justifications for your choices.

  The low and high integer in a range of integers

The low and high integer in a range of integers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd