Create a flow chart or pseudocode for the given problem

Assignment Help Computer Engineering
Reference no: EM131851517

Problem

The Drive-Rite Insurance Company provides automobile insurance policies for drivers. Design a flow chart or pseudocode for the following:

a. A program that accepts insurance policy data, including a policy number; customer last name; customer first name; age; premium due month, day, and year; and number of driver accidents in the last three years. If an entered policy number is not between 1000 and 9999 inclusive, set the policy number to 0. If the month is not between 1 and 12 inclusive, or the day is not correct for the month (for example, not between 1 and 31 for January or 1 and 29 for February), set the month, day, and year to 0. Display the policy data after any revisions have been made.

b. A program that continuously accepts policy holders' data until a sentinel value has been entered, and displays the data for any policy holder over 35 years old.

c. A program that accepts policy holders' data and displays the data for any policy holder who is at least 21 years old.

d. A program that accepts policy holders' data and displays the data for any policy holder no more than 30 years old.

e. A program that accepts policy holders' data and displays the data for any policy holder whose premium is due no later than March 15 any year.

f. A program that accepts policy holders' data and displays the data for any policy holder whose premium is due up to and including January 1, 2012.

g. A program that accepts policy holders' data and displays the data for any policy holder whose premium is due by April 27, 2011.

h. A program that accepts policy holders' data and displays the data for any policy holder who has a policy number between 1000 and 4000 inclusive, whose policy comes due in April or May of any year, and who has had fewer than three accidents.

Reference no: EM131851517

Questions Cloud

What decisions would you make based on the data : What decisions would you make based on the data? What data do you think others might use that you would choose not to use?
Display each employee with a message : Display each employee with a message indicating whether the employee's production has increased over last year's production.
What key aspects will you add to your toolbox : How will the lessons from this term influence your individual perspective on yourself, organizational performance, models, and so forth?
What is the legal status of a contract made by a minor : What is the legal status of a contract made by a minor?
Create a flow chart or pseudocode for the given problem : The Drive-Rite Insurance Company provides automobile insurance policies for drivers. Create a flow chart or pseudocode for the given problem.
Discuss the idea that different proteges may need things : For each of the following three sports: baseball, basketball, and football, you are to brainstorm by listing and describing: how the players are interdepedent.
Design a flow chart or pseudocode for the given problem : Summerville Telephone Company charges 10 cents per minute for all calls outside customer's area code. Design a flow chart or pseudocode for the given problem.
Would you have handled the rollout at the second location : What were some lessons learned from this case study? Do you think this author should participate in similar projects in the future?
Develop a checklist of rules you can use to help you : Develop a checklist of rules you can use to help you determine whether a flow chart or pseudocode segment is structured.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many files will the server need to store

If the server instead sends the audio and video streams separately and has the client synchronize the streams, how many files will the server need to store?

  Identify industry where it would be appropriate for web page

Identify one industry or condition where it would be appropriate for a web page to play audio automatically. Justify your answer.

  Discuss security attacks on information systems occur

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system

  Evaluate the temperature of the plate

Write a computer program to evaluate the variation of temperature with time of thin square metal plates that are removed from an oven at a specified.

  List the eight degenerate two-level forms

List the eight degenerate two-level forms and show that they reduce to a single operation. Explain how the degenerate two-level forms can be used to extend the number of inputs to a gate.

  Create an nds or active directory tree structure

Create an NDS or Active Directory tree structure for one of the segment of the company at which you are employed.

  What is the name of the given test and how does it work

What is the name of this test and how does it work? Do you agree that it is a test of intelligence?

  Discuss why is is important,

Describe what are the pros & cons IS in your business, Discuss why IS is important

  What may be the penalty for which crimes

What may be the penalty for which crimes. Who should enforce these laws?

  Explain common uses for word processing applications

Explain common uses for word processing applications. Describe methods for inserting graphics, headers and footers, page numbers, and a table of contents.

  Explain the use of pipelining in computer architecture

Using your learning materials and your own research, you will outline the principles of pipelining and explain the use of pipelining in computer architecture.

  Create a useful model of supply chain operations which

explain the aspects regarding three crucial decisions to make regarding the creation and holding of inventory in a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd