Create the child data flow diagram for Process 4, DELETE COMPUTER. The following table sum- marizes...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Create the child data flow diagram for Process 4, DELETE COMPUTER. The following table sum- marizes input, process, and output. Describe each process and data flow in the repository. When completed, zoom to 100 percent, move any data flow lines that are not aligned correctly, move the data flow labels for a professional-looking graph, and print the diagram. Process: Description: Input: Output: Process: Description: Input: Output: Process: Description: Input: Output: 4.1 KEY DELETE ID The computer ID is keyed interactively 1. DELETED COMPUTER ID 1. KEYED DELETE 4.2 OBTAIN COMPUTER RECORD COMPUTER MASTER record is read to ensure that it exists 1. KEYED DELETE (interface) 2. COMPUTER RECORD, from the COMPUTER MASTER data store 1. NOT FOUND ERROR (interface) 2. VALID COMPUTER RECORD 4.3 CONFIRM COMPUTER DELETION The computer information is displayed on the screen for operator confirmation or rejection 1. VALID COMPUTER RECORD 1. REJECTED DELETION (interface) 2. CONFIRMED DELETION Process: Description: Input: Output: 4.4 DELETE COMPUTER RECORD The computer record is logically (not physically) deleted from the COMPUTER MASTER data store by rewriting the record with an I for inac- tive in the Record Code field 1. CONFIRMED DELETION 1. DELETED COMPUTER, a double-headed arrow to the COMPUTER MASTER data store The exercises preceded by a www icon indicate value-added material is available from www.pearsonglobaleditions.com/kendall. Students can download a sample Microsoft Visio, Visible Analyst, Microsoft Project, or a Microsoft Access file that can be used to complete the exercises. Create the child data flow diagram for Process 4, DELETE COMPUTER. The following table sum- marizes input, process, and output. Describe each process and data flow in the repository. When completed, zoom to 100 percent, move any data flow lines that are not aligned correctly, move the data flow labels for a professional-looking graph, and print the diagram. Process: Description: Input: Output: Process: Description: Input: Output: Process: Description: Input: Output: 4.1 KEY DELETE ID The computer ID is keyed interactively 1. DELETED COMPUTER ID 1. KEYED DELETE 4.2 OBTAIN COMPUTER RECORD COMPUTER MASTER record is read to ensure that it exists 1. KEYED DELETE (interface) 2. COMPUTER RECORD, from the COMPUTER MASTER data store 1. NOT FOUND ERROR (interface) 2. VALID COMPUTER RECORD 4.3 CONFIRM COMPUTER DELETION The computer information is displayed on the screen for operator confirmation or rejection 1. VALID COMPUTER RECORD 1. REJECTED DELETION (interface) 2. CONFIRMED DELETION Process: Description: Input: Output: 4.4 DELETE COMPUTER RECORD The computer record is logically (not physically) deleted from the COMPUTER MASTER data store by rewriting the record with an I for inac- tive in the Record Code field 1. CONFIRMED DELETION 1. DELETED COMPUTER, a double-headed arrow to the COMPUTER MASTER data store The exercises preceded by a www icon indicate value-added material is available from www.pearsonglobaleditions.com/kendall. Students can download a sample Microsoft Visio, Visible Analyst, Microsoft Project, or a Microsoft Access file that can be used to complete the exercises.
Expert Answer:
Related Book For
Systems analysis and design
ISBN: 978-0136089162
8th Edition
Authors: kenneth e. kendall, julie e. kendall
Posted Date:
Students also viewed these databases questions
-
Specify the purpose of cache memory and elaborate. 2- why in early computer machines, there was no cache memory at all?
-
After the results of interviews, questionnaires, and prototyping are gathered and analyzed, Anna and Chip move to the next step, modeling the system. Their strategy is to create a layered set of data...
-
Create the explosion data flow diagram for process 4, DELETE COMPUTER. The following table summarizes input, process, and output. Describe each process and data flow in the repository. When...
-
Data set: Daily saturated fat intakes (in grams) of 20 people Construct a cumulative frequency distribution and an ogive for the data set using six classes. Then describe the location of the greatest...
-
Columbia Sportswear Company acquired a trademark that is helpful in distinguishing one of its new products. The trademark is renewable every 10 years at minimal cost. All evidence indicates that this...
-
Explain how the caloric values of foods are determined.
-
(a) Does it make sense to talk about a dielectric constant for a conductor? If so, what value does the constant have? (b) What is the breakdown threshold for a conductor?
-
Consignment Computations On May 3, 2010, Eisler Company consigned 80 freezers, costing $500 each, to Remmers Company. The cost of shipping the freezers amounted to $840 and was paid by Eisler...
-
In a high-profile criminal trial, the defendant alleges that their confession was coerced by law enforcement officers during interrogation. How might the court assess the admissibility of the...
-
Since 1970, Super Rise, Inc., has provided maintenance services for elevators. On January 1, 2024, Super Rise obtains a contract to maintain an elevator in a 90-story building in New York City for 10...
-
The Clausius-Clapeyron equation may be used to determine the boiling point of water, defined as that temperature at which saturation vapour pressure equals ambient pressure. Determine the boiling...
-
Why does the Fed pay such close attention to GDP if its mandate is to promote maximum employment while keeping prices stable?
-
What is Ignatian spirituality?
-
Why do you need to be so busy that you cant spend time getting to know people?
-
Who is Ignatius of Loyola?
-
Why do leaders engage in dark and destructive behaviors?
-
With Matlab: Problem #1 (20 points): Write a script in Matlab and save it as .m file with name HW16_1. The script will execute the following tasks: a) Let the mathematical function f(x) be defined...
-
6 (a) Briefly develop a mathematical model of the behaviour of a copper-twisted pair cable (b) Derive the magnetic energy from: w given that: K + w, where the - - k symbols have their usual meaning...
-
What systems concept did Richard and Harry ignore when tossing out the pink forms? What are the possible ramifications for systems analysts if general systems concepts are ignored? I dont know what...
-
What are two of the drawbacks to audio output?
-
The following is a code for one product in an extensive cosmetic line: L02002Z621289. L means that it is a lipstick, 0 means it was introduced without matching nail polish, 2002 is a sequence code...
-
Assume the same facts as in Problem I:9-53, except that Becky and Ken are not related and that under the terms of the loan Ken agrees to repay Becky the \($5,000\) plus interest (at a reasonable...
-
During 2023, Pam incurred the following casualty losses: All of the items were destroyed in the same casualty, which resulted from a federally declared disaster. Before considering the casualty...
-
During 2022, Becky loans her brother Ken \($5,000,\) which he intends to use to establish a small business. Because Ken has no other assets and needs cash to establish the business, the agreement...
Study smarter with the SolutionInn App