Modify the pseudocode and optimize

Assignment Help Computer Engineering
Reference no: EM1328178

Easy Credit evaluates the credit limit of people based on their income and past credit limits. Based on these inputs, calculations are performed to ascertain the credit worthiness of the customer. The following is a pseudocode that will help them automate the system of checking the credit worthiness and then printing out the results so that Easy Credit's manager can make a decision on the limit to be given to the customer:

start

read Customer_Name
perform Calculate_SafetyLevel()
perform Evaluate_History()
print Customer_Name
print 'Credit History of' Client_Name 'is' History
print 'Safety Level of' Client_Name 'is' Safety_Level

stop

Calculate_SafetyLevel()

read Customer_Income
if Customer_Income >= $5000

Safety_Level = Excellent

elseif Customer_Income >= $3000

Safety_Level = Good

elseif Customer_Income >= $1500

Safety_Level = Ok

endif

return

Evaluate_History()

read Customer_History

if Customer_History = Clean

History = Good

elseif Customer_History = Pending_Balance

History = OK

elseif Customer_History = Defaulted

History = Risky

endif

return

* Modify the pseudocode and optimize it.
*Provide valid reasons why the pseudocode is now more efficient.

Reference no: EM1328178

Questions Cloud

Ideas with swot analysis, managerial strategy and tactics : Ideas with SWOT analysis, Managerial Strategy and Tactics
Time value of money-amount which drawn from annuity : At the end of 1922, your great grandfather (g.g.f.) established a trust fund to be used in order to help a later generation of the family obtain a university education. Draw appropriate time-line(s) to demonstrate your calculations.
Explain erp systems vs. accounting packages : What do high-end ERP systems do that less expensive accounting packages cannot?
Describe the point elasticity of demand : Describe the point elasticity of demand with respect to advertisement
Modify the pseudocode and optimize : offer valid reasons why the pseudocode is now more efficient.
Explaining leader-follower relationship : In a leader-follower relationship, is it ever appropriate to change your behavior based on a person's gender or cultural background?
Regarding the sexual harassment : Is this a case of sexual harassment? If so, what type? What might the legal penalties be? What should Betty do?
Explain evaluation of music website : Explain Evaluation of Music Website and Describes how the "look and feel" differs for one Web sites for the music industry
Describe terms relevant to elasticity used in explanation : Elucidate your answer also describe terms relevant to elasticity used in your explanation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain what fields may be used as keys and indexes

select an information system in a health care organization that uses a database. The application can be simple or complex, but it must utilize a database that is part of an overall system to collect, store, process, and disseminate information.

  Can you suggest process for choosing appropriate data-mining

Consider on how you would know if a computer were thinking like a human.

  Explain protocol and network switching device

An area along the north wall of the coffee house has been set aside for the five computer stations, and since this is a very popular local hangout, it is expected that the computers, as well as wireless connections, would be in constant use. She i..

  Bit binary counter utilizing ltl.

State the three bit counter utilizing the LTL. The following are the properties we may wish to try and prove are valid given the specification of the three bit counter. Eventually the counter reaches 111.

  How to utilize data mining tools and techniques

How to utilize data mining tools and techniques

  Amazon kindle changed the number of print books

Has popularity of the Amazon Kindle changed number of print books Kindle users buy.

  Describe disparity between vulnerability, threat and control

Describe disparity between vulnerability, threat and control

  How might bpr be used in your organization

What is Business Process Reengineering (BPR)? Discuss how BPR might be used and describe the 'theoretical' results.

  What stack elements remain

suppose a stack-oriented processor that includes the stack operations PUSH and POP. Arithmetic operations automatically involve the top one or two stack elements. Begin with an empty stack.

  Implementing the transactions using sql

Write down the complete transaction utilizing the SQL. Write down the full transaction log

  Calculating the average of 50 numbers

Write down a program which calculates the average of up to 50 numbers input by the user and stored in an array. The program must use a class named Statistics and have an AddNumber method which stores numbers into an array.

  Addressing and naming model

Sketch a plan for development of the addressing and the naming model in an environment of following given scenario: Ten (10) departments in the 1,000-employee organization. Equal separation by geography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd