Creating pseudocode

Assignment Help Operating System
Reference no: EM1379798

Create pseudocode for the Citron Car rental policy given below:

Saving a cent on Citron Car Rental

Citron Car rental has 5 sizes of cars that are listed as A through E:

A Subcompact
B Compact
C Midsize
D Full-size
E Luxury

Standard transmission is available only for A, B, and C. Automatic transmission is available for all cars. If a customer reserves a subcompact (A) and finds on arriving that we don't have one, that customer gets a free upgrade to the next sized car, in this case a compact (B). Customers also get a free upgrade from their reserved car size if their company has an account with us. There's a discount for membership in any of the frequent flyer cubs run by cooperating airlines, too. When customers step up to the counter, they tell us what size car the reserved, and then we check to see if we have it in the lot ready to go. They usually bring up an discounts and we ask them if they want insurance and how long they will use the car. Then we calculate their rate and write out a slip for them to sign right there.

The owner has asked you to computerize the billing process for Citron so that customers can get their cars quickly and still be billed correctly. The owner wants to expand the ecommerce portion of his business by making it possible to reserve a car over the internet.

 

Reference no: EM1379798

Questions Cloud

Elucidate statements of violated section : In fact, Fungo contains as much AF88 as any or athlete's foot powder on market. Fungus Co. has filed suit against Next also CW on theory that above statements violated section.
Role of a database management system : Discuss the role of a database management system (DBMS) and what are its benefits and how does a relational database management system differ from a flat document?
Why is there no consideration for second agreement : All or terms remain same. Why is there no consideration for second agreement. State two ways which parties can circumvent this problem.
Explain how your recommendations will create synergy : Dell Computer has hired you directly out of a high quality MBA Program to join its integrated marketing communications team. You have been tasked with composing a synergistic mix of Web 2.0 technologies to promote flagging desktop sales.
Creating pseudocode : Create pseudocode for the Citron Car rental policy, Standard transmission is available only for A, B, and C. Automatic transmission is available for all cars.
Explain how each value impacts managerial responsibilities : Finally, briefly explain how each value (i.e., your own also alternative) impacts managerial responsibilities. For your response, include any value also alternative except for those in table of United States Values also Possible Alternatives.
What will be cumulative cost of project : Identify all of costs involved in project. Label costs either direct cost; project overhead costs or general also administrative overhead costs. Develop a time-phased budget for project. What will be cumulative cost of project.
Question about spreadsheet applications : As a result of your work on high school reunion assignment, you decide to learn more about MS. Excel and the several uses of spreadsheet applications.
Why skills are appropriate : List at least 3 professional skills that you can bring to table such as Professional competence, critical thinking, problem solving, communication, information retrieval also utilization, etc.

Reviews

Write a Review

Operating System Questions & Answers

  Direct mapped cache- word, block, tag

Think about a byte addressable computer with twenty-four bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes.

  Discuss drawbacks and benefits of specialization

IT administrators in small corporations must often execute various functions at same time like network administrator, database administrator, user consultant and others.

  Wireless internet security

Millions of American homes are prepared with wireless networks. Suppose if the network is not made secure, any nearby computer with a wireless card can use network.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Explain deadlock-avoidance system

What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?

  Mobile users and enterprise security

The Baypoint Group requires your help with a presentation for Academic Computing Services, a nationwide company that assists colleges and universities with technology issues.

  Explain the role of antennas in transmission

Explain the role of antennas in transmission of radio waves. Determine what type of antenna is typically used in a wireless LAN?

  Program to calculate numeric grades for a course

Create a program to calculate numeric grades for a course. The course records are in a document that will serve as the input document.

  Explanation of it networks

While there are difficult security concerns in any isolated computing environment, addition of a network in geographically distributed facilities.

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

  Expansion of network services

Assume you have been hired through your local library to help them setup a LAN to connect their three library sites.

  Procedure to manually remove the existing power supply

Explain the procedure necessary to properly install or replace the computer power supply in a computer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd