Validate the information

Assignment Help Basic Computer Science
Reference no: EM13535599

Create a physical data flow child diagram for the following situation: The local PC Users Group holds meetings once a month with informative speakers, door prizes, and sessions for special interest groups. A laptop computer is taken to the meetings, and is used to add the names of new members to the group. The diagram represents an online process and is the child of process 1, ADD NEW

MEMBERS. The following tasks are included:

a. Key the new member information.

b. Validate the information. Errors are displayed on the screen.

c. When all the information is valid, a confirmation screen is displayed. The operator visually confirms that the data are correct and either accepts the transaction or cancels it.

d. Accepted transactions add new members to the MEMBERSHIP MASTER file, which is stored on the laptop hard drive.

e. Accepted transactions are written to a MEMBERSHIP JOURNAL file, which is stored on a second hard drive. 

Reference no: EM13535599

Questions Cloud

Describe the security implications of using these technology : Describe the security implications of using these technologies and how risk will be mitigated from a network hardware and software perspective.
Delete all takes tuples corresponding to any section of any : Delete all takes tuples corresponding to any section of any course with the word “database” as a part of the title; ignore case when matching the word with the title.
Which was carried on the year-end balance sheet : Finlon Upholstery Inc. uses a job-order costing system to collect manufacturing costs. The company's work-in-process on 31st December, 2001, consisted of one job (no. 2077), which was carried on the year-end balance sheet at $156,800. There was no en..
What is the possible solution to this situation : You can use a search engine, or start by visiting the Web sites of publications such as Forbes, Fortune Magazine, Business Week, or The Wall Street Journal,among others."
Validate the information : When all the information is valid, a confirmation screen is displayed. The operator visually confirms that the data are correct and either accepts the transaction or cancels it.
Find out the sample mean : Find out the sample mean. Suppose that the desirable value for this solution was specified to be 7.20. Do you think that the sample mean value computed here is close enough to the target value to accept the solution as conforming to target? describe ..
What real-world considerations absent in the problem : The mayor proposes financing the museum with a lump-sum tax of $24 and then opening the museum free to the public. How many times would each person visit? Calculate the benefit each person would get from the musuem, measured as consumer surplus minus..
Maximize its gross margin : Ajax Division desires to maximize its gross margin, should Ajax take on the new customer and drop its sales to Bradley for 2005, and why?
Explain the crystal lattice energy of an ionic solid : The crystal lattice energy of an ionic solid, XY, -1,331.0 kJ/mol. The total hydration energy for both X+ and Y- ions is -954.5 kJ. Determine the Enthalpy of solution of the solid.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Decreasing risk of malicious attacks in personal systems

Security budgets is devoted to decreasing risk of malicious attacks. What threats are you aware of when it comes to the personal systems and systems at job

  Why does segment sequence number remain unchanged

Why does the Segment Sequence Number remain unchanged (indicated by a horizontal line in the graphs) with every drop in the congestion window?

  Write a program to allow additional items and prices

Write a program to allow additional items and prices to be input by the user and added to the end of the Cowboy.txt. Include a method to terminate the process.

  In order to create a unique field in a table in a database

1. in order to create a unique field in a table in a database you need to define a .viewprimary keyhost keyjoin2.a in

  Describe private and hybrid cloud computing models

In the current age of "hyper-connectivity", cloud computing is becoming more widely used and new platforms are emerging on a regular basis. You are required to conduct a review and comparison of public, private and hybrid cloud computing models.

  How to make sure that written work is free of grammar

How do you make sure that written work is free of grammar and spelling errors? Write down tools or secrets do you use?

  Explain us supreme court-s reaction bribery of internal

Explain what was U.S. Supreme Court's reaction to case where business executive was found guilty of aiding and abetting in bribery of Internal Revenue Service Agent.

  Which machine has better mips

We are comparing the performance of two different microprocessors, M1 and M2

  What size of packet will result in the last bit

Given a transmission speed of T bits/second, a packet size of B bytes, a propagation speed of P m/s and a cable length of L meters, what size of packet will result in the last bit being transmitted just as the first bit of the packet arrives at th..

  Write a program that reads an integer

Write a program that reads an integer, n, and prints each of its digits from left to right, as an English word.

  What is ntp and what are clock strata

 What is UTC and why is it used and what is NTP and what are "clock strata"?

  Discuss and explain web browser vulnerabilities

Discuss and explain Web browser vulnerabilities. Include at least two different Web browsers in your discussion.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd