Structured decision making batch creating decision table

Assignment Help Basic Computer Science
Reference no: EM13889441 , Length: word count:500

Structured decision-making is required with respect to the batch update of the COMPUTER MASTER file in an organization, which can be described as follows. There are three types of updates: ADD, DELETE and CHANGE. The COMPUTER MASTER record must be read. If the transaction is an ADD and the master is not found, format and write the new COMPUTER MASTER record. Print a valid transaction line on an UPDATE REPORT. For a CHANGE or DELETE transaction, print a CHANGE ERROR LINE or a DELETE ERROR LINE if the COMPUTER MASTER record is not found. If the COMPUTER MASTER record is found, check the active code. If the record is inactive and the transaction is an ADD, format and rewrite the new COMPUTER MASTER record. Print a valid transaction line on an UPDATE REPORT.

For a CHANGE or DELETE TRANSACTION, print a CHANGE ERROR LINE or a DELETE ERROR LINE. For a DELETE transaction, if the COMPUTER MASTER record is found and the code is inactive, in addition to other rules, also select DELETE COMPUTER RECORD. If the COMPUTER MASTER record is active and the transaction is an ADD, print an ADD ERROR LINE. For a CHANGE transaction, format the changes and rewrite the COMPUTER MASTER record. Print the VALID TRANSACTION LINE. For a DELETE transaction, CHANGE COMPUTER RECORD and rewrite the COMPUTER MASTER record. Print the VALID TRANSACTION LINE.

1. Create a Decision Table for the above situation

2. Create a Decision Tree for the above situation

Additional information

The problem related to Computer Science and it describes about structured decision making required for making batch update and creating decision table and decision tree for a situation.

Word limit: 500

Reference no: EM13889441

Questions Cloud

The implementation of a shared memory : The implementation of a shared memory
Loss of tax benefits and loss of in-kind benefits : When means-tested benefits are combined with a progressive tax system there can be a serious problem with disincentives. A situation known as the ________. This is due to the loss of tax benefits and loss of in-kind benefits when income increases...
How much do you agree with the traditional view of gossip : The article states that the traditional and prevailing view of gossip in psychology has been regarded as an indirect form of aggression, "akin to teasing". How much do you agree with the traditional view of gossip in psychology
What are the main tools of time management for students : What are the main tools of time management for students, and what is each used for? At what time of day are students most inclined to waste time? What time of day is the best for studying complex topics?
Structured decision making batch creating decision table : The problem related to Computer Science and it describes about structured decision making required for making batch update and creating decision table and decision tree for a situation.
What concerns do authors say are raised by real-world use : What concerns do the authors say are raised by "real-world use" of ABC? According to the authors, what benefits have companies enjoyed from the use of ABC?
Explain the importance of user abilities and characteristics : Explain the importance of user abilities and characteristics in the usability of products.
What are benefits of abc that relate to financial services : What are some of the benefits of ABC that relate to the financial services industry? What are three things that the company's original costing method did not take into account?
Describe how host-based intrusion detection works : Describe how host-based intrusion detection works, briefly contrasting it with network-based intrusion detection. Explain three types of threats against which HIDS is particularly effective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Different types of switching used in data transmission

Compare or contrast the different types of switching used in data transmission. How many are there? What factors separate one from the other? Please elaborate.

  Risk assessment tools

Risk assessment tools.

  Explain the use of current technologies fight cyber crime

Explain to the university (in a whitepaper) the characteristics of high-tech crime also known as Internet, cyber, and computer crime. Explain the use of current technologies to both carry out and fight cyber crime.

  Line of developmental training and inspirational materials

The Becoming Company is a full service provider for a line of developmental training and inspirational materials including videos, music, and books called Drive Change.

  Write a boolean function

Write a boolean function is_even(), which takes an integer as an argument and returns true if the argument is an even number, and false otherwise.

  Telecommunications-networking operation

The textbook describes a mode of network operation called "infrastructure mode." However, that is not the only possible mode for networks. What is infrastructure mode, and what are the other possibilities? What are their advantages and disadvantag..

  Create the directory structure

The project team is ready to create the directory structure for the Web site. You are tasked with creating the directories and implementing the security mechanism. For this assignment, you need to create the following directory structure and p..

  Show that curve lies lies on intersection of the cylinders

show that the curve lies lies on the intersection of the cylinders y=[2(z+1)^2]/9 and x=[(z+1)^4]/81

  Explain the difference between form and report

Explain the difference between form and report

  What benefits does voip provide the corporate user

What benefits does VOIP provide the corporate user? What are some considerations when implementing VOIP?

  What roles do firewalls and proxy servers play in network

What roles do firewalls and proxy servers play in network security? What is the importance of maintaining security on a LAN? Provide examples to support your answer. What are the key security requirements of confidentiality, integrity and availabilit..

  Create a 64mb encrypted file system

Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the ash drive containing the encrypted le system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd