1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
2 years ago
14

Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that

uses stacks, queues, linked lists, and binary search tree (in addition you can use all what you need from what you have learned in this course).
Problem definition: The system should be able to keep the patient’s records, visits, appointments, diagnostics, treatments, observations, Physicians records, etc. It should allow you to

1. Add new patient

2. Add new physician record to a patient

3. Find patient by name

4. Find patient by birth date

5. Find the patients visit history

6. Display all patients

7. Print invoice that includes details of the visit and cost of each item done

8. Exit

Complete the code in C++, please do not make a code that does not follow the menu choices.

Menu code:

#include

using namespace::std;

class ERPHMS {
private:
int patient_records;
int visits;
int appointments;
int diagnostics;
int treatments;
int observation;
int physician_records;

public:
void add_patient();
void new_physician_history();
void find_patient_name();
void find_patient_birth();
void patient_history();
void patient_registered();
void display_invoice();
void exit();
};

int main()
{
ERPHMS check;
int choice;

cout << endl << "----------------------------------------------------------" << endl;
cout << "This is an Emergency Room Patients Health Managment system " << endl;
cout << "-----------------------------------------------------------" << endl;


cout << "1:Add new patient" << endl;
cout << "2:Add new physician record to a patient" << endl;
cout << "3:Find patient by name" << endl;
cout << "4:Find patient by birth date" << endl;
cout << "5:Find the patients visit history" << endl;
cout << "6:Display all patients" << endl;
cout << "7:Print invoice that includes details of the visit and cost of each item done" << endl;
cout << "8:Exit" << endl << endl;
cout << "Select an option: ";
cin >> choice;

switch (choice)
{
case 1:
check.add_patient();
break;
case 2:
check.new_physician_history();
case 3:
check.find_patient_name();
case 4:
check.find_patient_birth();
case 5:
check.patient_history();
case 6:
check.patient_registered();
case 7:
check.display_invoice();
case 8:
check.exit();
}
}
Computers and Technology
1 answer:
notka56 [123]2 years ago
3 0

Answer:

Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that uses stacks, queues, linked lists, and binary search tree ( in addition you can use all what you need from what you have learned in this course ) The system should be able to keep the patient’s records, visits, turns, diagnostics, treatments, observations, Physicians records, etc. It should allow you to

Explanation:

You might be interested in
What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys? Multiple
frosja888 [35]

Answer: Simple-locker

Explanation:Simple-locker is the program that works on the technique in which it automatically encrypts the data or files and then demand a certain ransom or money from the user for the decryption of that data. It works on the function to gain the ransom or incentive in the financial form.

The decryption can only be carried out in safe way when the victim has the key to decrypted data or file.

5 0
3 years ago
Which MUD configuration is the most difficult to maintain
mihalych1998 [28]
This may be considered particularly appropriate since, due to the room-based nature of traditionalMUDs<span>, ranged combat is typically </span>difficult<span> to implement, resulting in </span>most MUDs<span> equipping characters mainly with close-combat weapons.</span>
6 0
3 years ago
Read 2 more answers
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
((11111111-1011100) X (10100 / 10))- ( 110010000+ 1110011)
dsp73

Answer:

10089891099

Explanation:

?

3 0
3 years ago
In your own words! Give me an example of Digital Literacy? (50 words
iVinArrow [24]

Answer: See explanation

Explanation:

Digital literacy is when an individual can compose, find, and evaluate, a clear and composed information on digital platforms.

It involves possessing the skills that one need to live, and learn, through the use of digital platforms such as social media, mobile

Example of digits literacy is the use of search engines, understanding how web browser can be used or sending of emails. etc

3 0
3 years ago
Other questions:
  • One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o
    8·1 answer
  • if the president goes for vice president after his 2 term and the present president dies is the old president the president agai
    8·2 answers
  • Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up
    12·2 answers
  • A .jpg file is an example of which of the following file types
    15·2 answers
  • Draw the cache tables and the state of all bits within them. Suppose you have a 16 byte cache with 2 byte long cachelines that i
    6·1 answer
  • Given that the variables x and y have already been declared and assigned values, write an expression that evaluates to true if x
    15·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • Lazarus Consulting is a large computer consulting company in New York. Pete Lazarus, theà CEOà and founder, is well known for hi
    8·1 answer
  • (1) Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output
    11·1 answer
  • How do I find unwanted programs on my computer?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!