Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

solve it in C language

You will build a system to manage patients' data in a hospital. The hospital
patient management system stores specific information in the form of health
record to keep track of the patients' data.
Your program should read the information from a file called
"patients.txt" that should be on the following format:
Patient Name#Gender#Date of admission#Date of birth
#Illness#Address (City)#Blood type
Example of data input: Abed Mukhles#M#2212019#01012000#Ear
Infection#Jenin#O+ Nadia A.
Ali#F#01102020#05101970#COVID-19#AlBireh#A-
create a Hash Table using the patients' data of the previous step (use names
as keys). The project should use open addressing methods for collision
resolution and implement the following functions on the hash table:
• Print hashed table (i.e., print the entire table to the screen including empty
spots).
• Print out table size.
• Print out the used hash function.
• Insert a new record into the hash table.
• Search for a specific patient.
• Delete a specific record.
• Save hash table back to file.
Transcribed Image Text:You will build a system to manage patients' data in a hospital. The hospital patient management system stores specific information in the form of health record to keep track of the patients' data. Your program should read the information from a file called "patients.txt" that should be on the following format: Patient Name#Gender#Date of admission#Date of birth #Illness#Address (City)#Blood type Example of data input: Abed Mukhles#M#2212019#01012000#Ear Infection#Jenin#O+ Nadia A. Ali#F#01102020#05101970#COVID-19#AlBireh#A- create a Hash Table using the patients' data of the previous step (use names as keys). The project should use open addressing methods for collision resolution and implement the following functions on the hash table: • Print hashed table (i.e., print the entire table to the screen including empty spots). • Print out table size. • Print out the used hash function. • Insert a new record into the hash table. • Search for a specific patient. • Delete a specific record. • Save hash table back to file.
Expert Solution
steps

Step by step

Solved in 3 steps with 2 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY