Solved

Creating Data Flow Diagram and Data Model Diagram

Posted on 2010-11-20
2
948 Views
Last Modified: 2012-05-10
Can some one please prepare me a quick data flow diagram  and upload based on the following

- Patient calls the hospital
Secretary or nurse triages the call and validate caller's information
- If Validation is correct, nurse/Secretary accesses the system
- If the call was about editing patient's information, secreatry edits and save information
- If it was about sending patient's information, secreatry contacts the physician for approval
- Secretary contacts the physician to get approval to send information to patient/family
- Once the approval is given, secretary faxes the information to the family
-End
0
Comment
Question by:joesack99
2 Comments
 
LVL 9

Accepted Solution

by:
TonyReba earned 500 total points
ID: 34180999
I dont think this site actually works like that, I sincerlydoubt someone can make that request, but you can try using this site and make it yourself.

http://www.visual-blast.com/online-tools/7-free-online-tools-for-creating-flow-charts-diagrams-floor-plans-and-more/
0
 
LVL 11

Expert Comment

by:SAMIR BHOGAYTA
ID: 34186637
Hello,


Download the Edraw Manager software from web and use it for creating dataflow diagram.
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question