Identifying a medicine

Assignment Help Basic Computer Science
Reference no: EM131108652

You will draw two diagrams:  a Context Diagram and a Level 0 Diagram detailing the following process.Note:The Context is a  "high-level" DFD.  Level 0 is the next level.  It "explodes" all the processes found in the Context. (Note:  In examining DFDs, some researchers use this schema:  Context>Level 0>Level 1...    But others use Context>Level 1>Level 2...)

A healthcare center in Baltimore employs seven doctors and two receptionists. Patients are registered with one doctor, but can arrange appointments with any available one. These appointments may subsequently be cancelled. Some appointments result in prescriptions, identifying a medicine to be taken.

 New patients are registered by a receptionist. When a patient is registered, he provides details such as name, date of birth, address and health insurance information. He then receives a unique patient number.

To book an appointment, a patient contacts a receptionist. The patient provides the patient ID number (or date of birth) and the receptionist provides a list of available times for appointments. The appointment is booked with the patient's doctor or if the patient's doctor is not available with any available doctor. The date and time of the appointment are confirmed.

Patients can cancel booked appointments by contacting a receptionist who will cancel appointments.

When a patient comes to the center, he checks-in first with a receptionist. The patient gives his number (or date of birth).

After the doctor visit, the doctor records the outcomes and details of prescriptions (if any) during the appointments. All prescriptions issued by doctors are recorded in the patient's record. If an additional appointment is needed, he visits the receptionist to schedule another appointment.

Reference no: EM131108652

Questions Cloud

Production of lollipops is one of fixed proportions : Assume that the production of lollipops is one of fixed proportions. To produce one case of lollipops, it takes 0.5 person-hours and 1 machine-hour. Assume that the hourly wage rate is $9, and the hourly rental rate is $25. Draw the expansion path fo..
Find the resonant frequency : Find the resonant frequency, the unloaded Q, and the loaded Q.
Critical thinking-writing considering psychopaths : Be sure to read Jennifer Kahn's article "Can You Call a 9-Year Old a Psychopath?" to answer these questions properly:
Determine the incremental operating cash inflows : Calculate the initial investment associated with replacement of the old machine by the new one. Determine the incremental operating cash inflows associated with the proposed replacement.
Identifying a medicine : A healthcare center in Baltimore employs seven doctors and two receptionists. Patients are registered with one doctor, but can arrange appointments with any available one. These appointments may subsequently be cancelled. Some appointments result ..
Which deregulation policies impacted the us economy : Discuss at least two (2) areas in which these deregulation policies impacted the U.S. economy overall and may have had roles in laying the foundation for the Great Recession of 2008. Provide a rationale for your response
You implement to assist katherine and her family : a. What strategies would you implement to assist Katherine and her family to settle into care? Include any actions you would carry out prior to Katherine starting as well as actions you may complete on her first day?
A temporary difference that will result in future taxable : A temporary difference that will result in future taxable amounts and, therefore, will usually give rise to a deferred income tax liability.
The millennium ecosystem assessment : Given the need to be good custodians of the environment as well as the need to work and earn a living, can “economic growth” and “sustainable development” co-exist? In responding to this question be sure to include the following: An explanation of “T..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Despite the growing number of security incident

Despite the growing number of security incidents, cybersecurity risks and threatsare still notoriously hard to quantify and estimate.

  Determine throughput for file transfer form one host-another

Assume Host A wishes to send the large file to Host B. Suppose no other traffic in network, Determine the throughput for the file transfer?

  What will happen if the supply voltage polarity is reversed

What will happen if the supply voltage polarity is reversed for the case of using a diode with PIV of 4.8V?

  What is the address space in each of the following systems

An address space has a total of 1024 addresses. How many bits are needed to represent an address?

  Impact of meals on world-ecological and economic perspective

Write about the impact that two (2) of your meals have on our world from an ecological and economic perspective.

  Perform the following hexadecimal computations

Perform the following hexadecimal computations (leave the result in hexadecimal).

  Determining the kernel-level threads

1. In a system with threads, is there one stack per thread or one stack per process when user-level threads are used? What about when kernel-level threads are used? Explain.

  Default settings on a wireless router

1. Which Internet access method can be affected by the number of people concurrently online in a neighborhood? 2. For which of these items should you always change the default settings on a wireless router?

  What is greenhouse effect

What is Greenhouse effect - We are legally, ethically,and socially required to green our IT products, applications, services, and practices - is this statement true? Why?

  Requirements for a banking application

Consider the following data requirements for a banking application.

  Write a client that prints out daily orders for truckers

Write a client that prints out daily orders for truckers, telling them how much and where to pick up and how much and where to drop off.

  Concept of cryptograms

How to create a java code with the concept of cryptograms? If the text is long then how to use the frequency of occurrence of each character?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd