Solved

Creating Data Flow Diagram and Data Model Diagram

Posted on 2010-11-20
2
951 Views
Last Modified: 2012-05-10
Can some one please prepare me a quick data flow diagram  and upload based on the following

- Patient calls the hospital
Secretary or nurse triages the call and validate caller's information
- If Validation is correct, nurse/Secretary accesses the system
- If the call was about editing patient's information, secreatry edits and save information
- If it was about sending patient's information, secreatry contacts the physician for approval
- Secretary contacts the physician to get approval to send information to patient/family
- Once the approval is given, secretary faxes the information to the family
-End
0
Comment
Question by:joesack99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
TonyReba earned 500 total points
ID: 34180999
I dont think this site actually works like that, I sincerlydoubt someone can make that request, but you can try using this site and make it yourself.

http://www.visual-blast.com/online-tools/7-free-online-tools-for-creating-flow-charts-diagrams-floor-plans-and-more/
0
 
LVL 11

Expert Comment

by:SAMIR BHOGAYTA
ID: 34186637
Hello,


Download the Edraw Manager software from web and use it for creating dataflow diagram.
0

Featured Post

SuperAntiSpyware Licenses Discounted by 25% !

Exclusive offer to Experts Exchange Members!
Buy SuperAntiSpyware License(s) from us and save 25% on the regular purchase price.
- Includes Full SuperAntiSpyware Vendor Support Entitlements
- Your Subscription does not begin until you activate your license
- Buy for your friends

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question