Вы находитесь на странице: 1из 98

Sin e S o f t Educ a t i o n , Bat hi n d a Centr e Cod e 00 9 1 7

PROJECT REPORT ON

MARR A!E B"ER"E


A re# or t $u % & i t t e d in th e #arti a' fu'fi'' & e n t of th e re( u ir e & e n t $ for th e de ) r e e of

MASTER O* COMP"TER APP+ CAT ON


Of S ,, M MAN PA+ "N -ERS T., N/ A
S"BM TTE/ B.

POONAM Re ) 0 No01 1 2 0 3 0 0 7 4 5 6
Su % &i t t e d to1 7

/ire c t o r a t e of /i$t a n c e Educ a t i o n S ,, M MAN PA+ "N -ERS T. S.N/ CATE 8O"SE, MAN PA+ 37 9 10 4

ST"/ENT /EC+ARAT ON Poona& here%: dec'are that the #ro;ect re#ort entit'ed Su%&itted in #artia' fu'fi''&ent for the re(uire&ent for the de)ree of MASTER O* COMP"TER APP+ CAT ON To S ,, M7MAN PA+ "N -ERS T., N/ A i$ &: ori)ina' <or= and not $u%&itted for the a<ard of an: other de)ree, di#'o&a, fe''o<$hi#, or an: other $i&i'ar tit'e or #ri>e$0

P'ace1Bathinda /ate1

Na&e1Poona& Re)0 No011203007456

E?AM NER@S CERT * CATE0


The project report Of Poonam

MARR A!E B"ER"E


Is approved and is acceptable in quality and form. Internal Examiner Name Qualification esi!nation External Examiner Name Qualification esi!nation

"#I E $E%TI&I$'TE

This is to certify that the project report entitled

MARR A!E B"ER"E


(ubmitted for the partial fulfillment for the requirement for the de!ree of )'(TE% O& $O)P#TE% 'PP*I$'TION of (I++I),)'NIP'* #NI-E%(IT./ IN I' Poonam has 0or1ed under my supervision and !uidance and no part of this report has been submitted for the a0ard of any other de!ree/ diploma/ fello0ship/ or any other similar title or pri2es and that the 0or1 has not been published in any journal or )a!a2ine. $ertified

"uide name Qualification

N/E?
10 20 50 40 30 90 70 60 90 100 110 120 150 140 130 AC,NOA+E/!EMENT NTRO/"CTON TO PROJECT PRO/"CT /E* NAT ON ACCEPTANCE CR TER A S.STEM ANA.S S *EAS B + T. ST"/. 8AR/AARE B SO*TAARE REC" RMENTS TOO+S "SE/ *OR /E-E+OPMENT S.STEM /ES !N /ATA STR"CT"RE /ATA *+OA / A!RAM CO/E E** C ENC. CO/ N! O"TP"T *"T"R SCOPE B B B+ !RAP8.

ACKNOWLEDGEMENT
It is indeed a privilege as well as pleasant duty to express my gratitude to all those Who have made it possible for me to complete this training.It is my proud privilege to acknowledge with respectful gratitude the invaluable guidance extended to me by my esteemed guide RAJ !" #A$!A%&. I am thankful for his pains' taking supervision' timely suggestions and continuous constructive criticism during the course of this training. "is ever(helping nature and limitless patience were constant source of inspiration during this work. I am grateful to my guide for his guidance and suggestions rendered to me during the training period. I am sure that the time I have spent with him will be a constant source of inspiration for me in the days to come.

( Poonam )

NTRO/"CT ON TO PROJECT

NTRO/"CT ON TO PROJECT
)ur *ro+ect is basically concern with the marriage related concept in which we are basically talking about the concept of marriage buereu. ,arriage the willing boys and girls collect the #uereu is the organi-ation in which information regarding

their match making .#oys and girls have their matches #/ R/ & is a royal solution of all

according to their education' occupation and other family concern. )ur pro+ect titled ,ARRIA. problems we discussed earlier.

"SERS17
0here has we add users because unauthori-ed person has not successful to access our pro+ect. #ecause our pro+ect have many secrets records' which has do not show all person. If we want in person access the pro+ect that has allow our manager.

MATC8 MA, N!17


0his pro+ect records the daily boys and girls information along with the details related to their education' 1ualification' religion 'cast 'whether the boy or girl is manglik or not .0hrough which they get their suitable matchmaking regarding to their convenience.

RE! STRAT ON17


0his pro+ect have the registration records in which the daily entries of the desied login id'password 'date of creation' duration'date of expiry'petword etc occur. In which all the candidates fill their information regarding their professional as well as their domestic concern along with the details.

SEARC817

0his pro+ect provides phenomenal search options from every aspect. 0his may prove as the power of the pro+ect. ven a beginner can access the data as per re1uirements. #ecause it provides so many search criteria 2s like search on the behalf of the id 'name'dob'address'manglik'gender'religion'cast an1ualification etc...

PRODUCT DEFINITION
#efore developing software we keep following things in mind so that we can develop powerful and 1uality software.

PROBLEM STATEMENT
*roblem statement was to design a module3 0his will be user friendly. 0his will restrict the user from accessing other user4s data. 0"I! will help the user in viewing his data and privileges. 0his will help the administrator to handle all changes. In which further additions can be made without changing its design drastically. 0his would restrict the server traffic. Another problem was that the data should be accessed from the server and accordingly changes should be made on the data in the server only.

FUNCTIONS TO BE PROVIDED
0he various features that the proposed system will possess will be3 0he system will be user friendly and completely menu(driven so that users shall have no problem in using all the options provided. 0he system will be efficient and fast in response by careful programming. 0he system will be customi-ed according to the needs of the organi-ation.

It will provide overall security to database both from user as well as administrator side.

ACCEPTANCE CRITERIA
#efore designing5developing a new system' it is important to establish the acceptance criteria so that it can be evaluated according to these criteria. 0he performance re1uirements are3 User Friendly 0he designed system should be user friendly' understandable and easy to use so that even the novice user can easily learn to use the system. Fle!i"ili#y It should be flexible in nature to allow likely changes and alteration in the near future. Error $andlin% 0he system must give response to errors in clear and precise manner as soon as an error has occurred. In#e%ri#y 0he results produced by the system should be accurate and reliable. F&n'#ional and (er)orman'e s(e'i)i'a#ions specifications. 0he performance of the re1uired system should be good and should fulfill the re1uired functional

S*STEM ANAL*SIS
IDENTIFICATION OF NEED )ne must know what the problem is before it can be solved. 0he basis for a candidate system is recognition of a need for improving an information system or a procedure. Ideas for change may come from within the organi-ation( top management' the user' and the analyst. As an organi-ation changes its operations or faces advances in computers' some one with in the organi-ation may feel the need to update the existing application or improve the procedures. In our Institute ,anagement !ystem it is the Administration who has decided to upgrade the existing manual system to advanced technology called computeri-ed system. In Institute continuous efforts are going on to upgrade manual way of keeping of the records replacing it by computeri-ed system. We already have an Institute ,anagement !ystem that is being run manually. 6ifferent persons are assigned for different +obs' as one person is to maintain the en1uiry information' the other is busy with managing the details of library issue return and fine' the other is busy to maintain the fee information' the other is busy to maintain staff and their sub+ects and the other is to keep the information of internals. !o the basic problem faced with this system is if one wants to get admission for a course' one has to en1uire for new entries in one file and their class information in the different files. ,oreover' there is no proper security of files. /nauthori-ed user can access the files. 0here are more and more chances of error so the system should be able to check for the errors. Institute ,anagement !ystem needs automated en1uiry of 7ourses' !taff' Attendance and Internals progress' generating the fee bill' *resently Institute ,anagement !ystem is done manually. 0he shopping re1uires web(based package for the following reasons3 (

89 0he packages available in the market are not customi-ed to the needs of the organi-ation. :9 6ata is not available randomly. It is scattered in different files at different places. !o information regarding one order is searched within multiple files and hence the process is time consuming. ;9 0he manual system is dependent on the person who is handling and not system dependent. Its mean 0hat the person' who has created it' because it is created according to him' he can understand it skills and knowledge while in automated package anybody can handle it by having little knowledge about the software i.e. it is system dependent. <9 As human brain is prone to tiredness' the efficiency reduces as well as system is bounded to have more errors and does calculation mistakes. =9 *roper analysis cannot be done and various management reports are not available 1uickly because of data being scattered among different places. >9 0he ma+or drawback is illegal activities can be done by the members without having the clues. ?9 Redundancy is also one of the hindrances in manual system. As data is duplicated at many different places' modification at one places and not another will lead to an error. @9 %arge amount of paper work has to be managed and handled.

FEASIBILIT* STUD*
6epending upon the results of the initial investigation' the survey is expanded to a more detailed feasibility study. A feasibility study is a test of a system proposal according to its workability' impact on the organi-ation' ability to meet user4s needs and effective use of resources. It includes thee main 1uestions3 89 What are the user4s needs and how the candidate system does meet themA :9 What resources are available for given candidate systemA ;9 What are the likely impacts of the candidates system on the organi-ationA 0hree key considerations are involved in the feasibility analysis' section. TEC+NICAL FEASIBILIT* 0echnical feasibility concerns around the existing computer system Bhardware' software etc9 and to what extent it supports the proposed addition. In our case we have 8 server networked with the Intranet. "ere the administration re1uires minimum 8 computer with the Intranet connection to run this pro+ect. "ere each department re1uires minimum 8 computer to make the department as computeri-ed networked with the Intranet. !o we can say that there is no considerable burden on the store to make this pro+ect functional. As the administration is planning to computeri-e the entire en1uiry' admission and accounts facilities already have been allocated to do the same. !o here we have to simply utili-e the Intranet to manage the institute. $ow using this pro+ect can save large amount of money and time. conomical' technical' and operational. All of these are discussed one by one in the following

ECONOMICAL FEASIBILIT* conomic analysis is the most fre1uently used method for evaluating the effectiveness of the candidate system. ,ore commonly known as cost5benefit analysis' the procedure is to determine the benefits and savings that are expected from a candidate system. And compare them with costs. )ur pro+ect is economically feasible' as it does not put any extra burden on administration. Already Intranet terminals are available in the )ffice and all are networked together all are using ,!(Access database. 0here are only initial expenditures and after which our system can expand to any extent. After the implementation of this pro+ect a huge amount of manpower can be saved causing conversion of this manpower for the effective use in purchase. In the above discussion we noticed that the benefits are more than the costs. !o the pro+ect is also economically feasible. OPERATIONAL FEASIBILIT* *eople are inherently resistant to change. And computers are known to facilitate change. An estimate should be made of how strong reaction the user staff is likely to have towards the development of a computeri-ed system. 0he system should be simple to operate so that layman can also under stand what the system is' and how he can be benefited from the system. 0he pro+ect is operationally feasible as every care has been taken to make it easy to operate and more over while conducting preliminary investigations there was a strong reaction to open this type of system from user side also.

8AR/AARE AN/ SO*TAARE REC" REMENTS


C#.$et and !D%(! RC R Window(E*5 :FFF or "igher A C.A or !C.A .raphics Adapter A !erial *ointer ,ouse and Geyboard :F ..#. "ard 6isk or more :=> ,# RA, or more 8.<< Hloppy5 76(R), 6rive 8=& ,onitor *rinter

TOOLS USED FOR DEVELOPED PRO,ECT


0 NET *ra&e<or= D-B0NETE a$ *ront7End SC+ SerFer

INTRODUCTION TO VISUALBASIC-NET
Cisual !tudio .$ 0 is a complete set of development tools for building A!* Web applications' E,% Web services' desktop applications' and mobile applications. Cisual #asic .$ 0' Cisual 7II .$ 0' and Cisual 7J .$ 0 all use the same integrated development environment BI6 9' which allows them to share tools and facilitates in the creation of mixed(language solutions. In addition' these languages leverage the functionality of the .$ 0 Hramework' which provides access to key technologies that simplify the development of A!* Web applications and E,% Web services. Cisual #asic has been updated to include many new and improved language features that make it a powerful ob+ect(oriented programming language. 0hese features include inheritance' interfaces' and overloading' among others. Cisual #asic also now supports structured exception handling' and custom attributes. In addition' Cisual #asic supports for multithreading. ,ultithreading is the ability to assign individual tasks to separate processing threads. Cisual #asic .$ 0 has many new and improved language features K such as inheritance' interfaces' and overloading K that make it a powerful ob+ect(oriented programming language. As a Cisual #asic developer' you can now create multithreaded' scalable applications using explicit multithreading. )ther new language features in Cisual #asic .$ 0 include structured exception handling' custom attributes' and common language specification B7%!9 compliance. 0he 7%! is a set of rules that standardi-es such things as data types and how ob+ects are exposed and interoperate. Cisual #asic .$ 0 adds several features that

-isual

3asic

.NET supports such as

ma ny

ne0

or improve d overloa din!/

object, orient e d the OFerrid e $

lan!u a ! e

featur e s

inherita nc e /

1ey0ord/ interfac e s / share d me m b e r s / and construc t or s. 'lso include d structur e d exc e p tion handlin!/ dele! a t e s / and sever al ne0 data type s.

N8ER TANCE -isual 3asic .NET supports inheritanc e by allo0in! you to define class e s that serve as the basis for derived class e s . erived class e s inherit and can exte n d the propertie s and met ho d s of the bas e class. They can also override inherite d me th o d s 0ith ne0 imple m e n t a tion s. 'll class e s crea t e d 0ith -isual 3asic .NET are inherita ble by defa ult. 3eca us e the forms you desi!n are really class e s/ you can use inherita n c e to define ne0 forms bas e d on existin! ones. &or details/ see Inherita nc e .

E?CEPT ON 8AN/+ N! -isual 3asic .NET support s structur e d exc e p tion handling / usin! an enha n c e d version of the Tr:00 0Ca t c h 0 0 0 * i n a ' ' : synta x support e d by other lan!u a ! e s mod e r n such as $4 4 . structur e (tructur e d 5similar to exce ption Se' e c t handlin! Ca$ e combin e s a control or Ahi' e 6 0ith

exce ptions/ prote c t e d bloc1s of code/ and filters. (tructur e d exce p tion handlin! ma1 e s it easy to crea t e and maint ain pro!ra m s 0ith robust/ compr e h e n siv e error handlers. &or details/ se e Exception 7andlin!. O-ER+OA/ N! Overloading proce d u r e s is the ability to define propertie s/ met ho d s / or that have the sa m e na m e but use differe nt data type s.

Overloa d e d proce d u r e s allo0 you to provide as ma ny imple m e n t a tio n s as nec e s s a r y to handle differe nt 1inds of dat a/ 0hile !ivin! the appe a r a n c e

of a sin!le/ vers a tile proc e d ur e . &or details/ see Overloa d e d Propertie s and )ethods.

O-ERR / N! PROPERT ES AN/ MET8O/S The OFerrid e $ 1ey0ord allo0s derive d objects to override char a c t e ristics inherite d from pare nt objects. Overridd e n me m b e r s have the sa m e ar!u m e n t s as the me m b e r s inherite d from the bas e class/ but differe nt imple m e n t a tio n s . ' me m b e r 8 s ne0 imple m e n t a tion can call the ori!inal imple m e n t a tio n in the pare n t class by prec e din! the me m b e r na m e 0ith M: Ba$ e . &or details/ see Overridin! Propertie s and )ethods.

CONSTR"CTORS AN/ /ESTR"CTORS Constructors insta n c e s are proc e d ur e s that control initiali2ation of ne0 that free of a class. $onvers ely/ destructors are me th o d s

syste m resourc e s 0hen a class leave s scop e or is set to Nothi n ) 0 -isual 3asic .NET support s construc t or s and destruc tors usin! the Su% Ne < and Su% *ina'i> e proc e d ur e s . &or details/ see Object *ifetime9 7o0 Objects are $reat e d and /ATA T.PES -isual 3asic .NET introduc e s thre e ne0 data type s. The Char data type is an unsi!n e d :;, bit quantity use d to store #nicode chara c t e r s . It is equivale nt to the .NET &ram e 0 or1 S: $ t e & 0 Char data type. The Sh or t data type/ a si!ne d :;, bit inte! e r/ 0as na m e d nte ) e r in earlier versions of -isual 3asic. The /e ci & a ' data type is a <;, bit si!ne d inte! e r scaled by a variable po0er of :=. In earlier versions of -isual 3asic/ it 0as available only 0ithin a -arian t . &or details/ see NTER*ACES Interfac e s describe the prope rtie s and me th o d s &#' e & e n t $ of class e s / but unli1e class e s/ do not provide imple m e n t a tion s. The allo0s you to declar e interfac e s / 0hile the you 0rite code that puts the item s describe d nter f a c e stat e m e n t stat e m e n t lets into in the interfac e ata Types. estroy e d.

practic e. &or details/ se e Interfac e s in -isual 3asic .NET. /E+E!ATES Delegat e s > objects that can call the met ho d s of objects on your behalf > are som e ti m e s describe d as type, safe/ object, orient e d function pointers. .ou can use dele! a t e s handler me th o d to let proce d u r e s specify an event that runs 0hen an eve nt occurs. .ou can also use

dele! a t e s 0ith multithre a d e d applications. &or details/ see the 'ddres s Of Opera t or. S8ARE/ MEMBERS

ele!a t e s and

Share d m e m b e r s are propertie s/ proc e d ur e s / and fields that are share d by all insta n c e s of a class. (hare d dat a me m b e r s are useful 0hen multiple objects nee d to use inform a tion that is com m o n to all. (hare d class me th o d s can be used 0ithout first cre a tin! an object from a class. &or details/ see (hare d )emb e rs. RE*ERENCES Refere n c e s allo0 you to use objects define d in other ass e m blie s. In -isual 3asic .NET/ refere n c e s point to ass e m blie s inste a d of type libraries. &or details/ see %efere n c e s and the Imports (tat e m e n t . NAMESPACES Nam e s p a c e s preve n t na min! conflicts by or!a ni2in! class e s / interfac e s / and met ho d s into hierarc hie s. &or details/ see Name s p a c e s . ASSEMB+ ES Asse m blie s replac e and exte n d the cap a bilities of type libraries by/ describin! all the require d files for a particular comp o n e n t or application. 'n ass e m bly can contain one or more na m e s p a c e s . 'sse m blies. ATTR B"TES Attribut e s pro!ra m ena ble you to provide additional inform a tion about ele m e n t s . &or exa m pl e / you can use an attribut e to specify &or details/ se e

0hich met ho d s in a class should be expos e d 0hen the class is used as a ?)* @eb service. &or details/ see 'ttribut e s .

M"+T T8REA/ N! -isual 3asic .NET allo0s you to 0rite applications that can perform multiple tas1s indep e n d e n tly. ' tas1 that has the pote n tial of holdin! up other tas1s can exec ut e sep ar a t e from your on a sepa r a t e interfac e / thre a d/ a proc e s s multithre a din ! 1no0n as your multithrea ding . 3y causin! complicat e d tas1s to run on thre a d s that are user ma1 e s applications more respon sive to user input. &or details/ see )ultithre a d e d 'pplications.

NTRO/"CT ON TO MS7 ACCESS

3)( that

can

be use d

to store

and

ma nipula t e relat e d

lar!e

amou n t

of

inform a tion and )(,'$$E(( is a po0erful multi user auto m a t e resp e c tive tas1. ' collection of dat a purpos e . ata in acce s s is or!a ni2e d in the form of table s. @ithin a table records are arran ! e d accordin! to com m o n to refere n c e value 1no0n as Primary +ey or +ey &ield. 'ccess also ma nipula t e s index file or table. 'n index is extern al table of value that acc e s s maint ain to store the order of records. Index object thus provide efficient acc e s s to dat a. index. /ATABASE OBJECTS TAB+ES ata b a s e indexe s are just li1e boo1s and objects to particular topic or

' table is collection of data about a specific topic/ such as produc t or supplier. #sin! a sep ar a t e table for each topic me a n s that you store data only once/ 0hich ma1 e s your data b a s e more efficient and reduc e s dat a, entry errors. C"ER. .ou use querie s to vie0/ chan ! e and analy2 e in differe nt 0ays. .ou can also use the m as the sourc e of records for forms/ reports and data acc e s s pa! e s . *ORMS .ou crea t e the lin1 bet0 e e n the form and its reports sourc e by usin! !raphic al objects called controllers. The most com m o n type of control use d to display and enter data is a text box. )ost of the inform a tion REPORT ' report is an effective 0ay to pres e n t your data in printe d form a t bec a u s e you have control over the si2e and appe a r s of everythin! on report/ you can display the inform a tion the 0ay you 0ant to see it. )ost of inform a tion in a report com e s from an underlying tables' or !D% statements' which is the source of reports data. )ther information in report is stored in the report4s design. H A0/R ! )H ,!(A77 !! WI$6)W! #A! 6 A**%I7A0I)$ Access is a windows based application an therefore has an interface similar to windows $0. Lou can cut' copy' paste from any windows application to and form access. in a form com e from and underlyin! sourc e. Other inform a tion in the form is store d in form desi!n.

%AR. 6A0A ,A$A. , $0 7A*A7I0L Access maintains a single disk for database and all associated ob+ects. 0he maximum si-e of this can be of 8 ..#. Access allows a maximum of ;:'?>@ tables and ob+ects in the database. "owever' access can also supports ::= user at a a time #/I%0(I$ ! 7/RI0L !ingle access is a multi(user database security features are built into the 6#,!. Lou can enable database security at various levels. Lou can assign a password for loading access so that only authori-ed users can use it. Lou can encrypt a database to prevent un(authori-ed access.

"$in) SC+ SerFer 903 <ith SC+ SerFer 2000


If you have )icrosoftA (Q* (erverB version ;.C installed/ you can 1eep the (Q * (erver version ;.C installation and also install a default or named instance of (Q* (erver D===. No version up!radin! is involvedE ho0ever/ version s0itchin! can be used to move bet0een (Q* (erver version ;.C and (Q* (erver D===. In addition/ (Q* (erver D=== tools are used to control both (Q* (erver D=== and (Q* (erver version ;.C. Aarnin) 'fter (Q* (erver D=== is installed/ the (Q* (erver version ;.C Trace utility and other earlier tools are no lon!er available. To install (Q* (erver D=== alon!side (Q* (erver ;.C9

+eep your (Q* (erver ;.C confi!uration intact. Install (Q* (erver D===/ selectin! either a default or named instance in the n$tance Na&e dialo! box. (0itch versions from (Q* (erver ;.C to the default instance of (Q* (erver D===.

Note (0itchin! from (Q* (erver D=== bac1 to (Q* (erver ;.C is not recommended. The illustration sho0s an installation of (Q* (erver ;.C in a version s0itch confi!uration 0ith (Q* (erver D===.

Aor=in) <ith Three -er$ion$ of SC+ SerFer


0his topic describes two scenarios for working with !D% !erver version >.=' !D% !erver version ?.F' and !D% !erver :FFF. )ne example shows three versions installed at one time' with no version upgrades' but with a version switch between !D% !erver >.= and !D% !erver ?.F. 0he other involves upgrading to !D% !erver :FFF from !D% !erver ?.F' and then version switching between !D% !erver >.= and !D% !erver :FFF. In any of these situations' multiple named instances of !D% !erver :FFF can be installed as well. "owever' only two different versions of !D% !erver can run at one time' using version switching in one of two ways3

!witch between !D% !erver >.= and !D% !erver ?.F. !witch between !D% !erver >.= and !D% !erver :FFF.
Usin% Version S.i#'$in%

0o use version switching with !D% !erver >.= and !D% !erver ?.F' while at the same time running multiple instances of !D% !erver :FFF3

Geep the !D% !erver >.= configuration intact. Geep the !D% !erver ?.F configuration intact' with no version upgrade to !D% !erver :FFF. Install one or more named instances of !D% !erver :FFF.

0he illustration shows how named instances of !D% !erver :FFF and the existing installation of !D% !erver version ?.F can run at the same time. !D% !erver version >.= is available to be switched in as the default instance instead of !D% !erver ?.F.

0o use version switching with !D% !erver >.= and !D% !erver :FFF' after upgrading from !D% !erver version ?.F3

Geep the !D% !erver >.= configuration intact. "ave !D% !erver ?.F installed' but prepare to upgrade !D% !erver ?.F to !D% !erver :FFF.

Run !etup. When !D% !erver ?.F is detected' upgrade !D% !erver ?.F to the default instance of !D% !erver :FFF. B!elect the option to /pgrade in the E!is#in% Ins#alla#ion O(#ions dialog box' and leave the 6efault check box selected in the Ins#an'e Name dialog box.9 At this point' the installation of !D% !erver ?.F no longer existsM it is replaced by the default instance of !D% !erver :FFF.

0he illustration shows this configuration' along with three !D% !erver :FFF named instances.

DATA STRUCTURES

WELCOME SCREEN
(T'%T

@E*$O)E ($%EEN

)'IN &O%) 5) I &O%)6

(TOP

MAIN FORM
#(E% *O" IN &O%"OT (7O@ '** $7'N"E P'((@O% $*O(E '** E?IT )'T$7 )'+IN" *O" O#T ' )IN $%E'TE #(E% OPE%'TE &EE 3'$+ &EE 3'$+ (7O@ '** P'%T. ONE

P%O&I*E

LOG IN
ENTE% T7E #(E% N')E 'N P'((@O%

I(P*'. '** )EN#(

.E(

I& )

NO )EN#(

DISPLAY
I(P*'. 'T'

(E*E$T *O' 3#TTON

I(P*'. 'T' IN "%I

F;

SEARCH
(E'%$7

(E*E$T T7E &IE* (

(E*E$T T7E 'TE

I& %E$O% T7E%E NO %E$O% NOT &O#N

.E(

(7O@ IN "%I

)'IN &O%)

SAVE

FG

ENTE% T7E 'T' I& E?I(T( NO %E$O% I( ('-E

.E( E%%O% )E(('"E )'IN &O%)

DELETE
ENTE% T7E 'T'

I& E?I(T(

NO

NO %E$O% &O#N

.E( %E$O% I( E*ETE )'IN &O%)

MODIFY
FH I& %E$O% I( ENTE% T7E E?I(T( )O I&IE 'T' .E( NO NO %E$O% )'IN &O%) &O#N

F<

CODE EFFICIENC*
When we produce large programs' it often happens that extra code is left in the pro+ect. 0his extra code can be unused subs and functions' old variables' unnecessary constants' even 0ypes and read. !ince this code is not needed' it is also called dead code. 0he opposite of dead code is live code. Lou can trace the dead code and then remove. )ne needs to detect 1uestionable programming practices and code. Pro"lem 'a#e%ories *roblems fall into < categories3 8. Optimization. 0hese problems adversely affect the speed and si-e of the resulting program. :. Style. 0hese problems are related to the programming style. 0hey donNt necessarily lead to problems in the short run' but they often lead to confusion and further errors in the future. ;. Metrics is a sub(category of !tyle. Lou can set target values for different metrics and monitor to find out if some part of your program exceeds the limits. Read more about metrics in chapter <. <. Functionality. 0hese problems affect the run(time functionality of the program. 0he reason is often that somebody forgot to do somethingO )ne can create 1uick check filters and strict filters for giving code a final polish. 0he filters are3 nums. xtra code takes up disk space' slows down the program and it also makes it harder to

6ead code 6isable checking Hunctionality

7heck deadness only 6isable all problem checking Report problems affecting functionality only

I=

)ptimi-ations !trict !tyle

Report problems related to optimi-ation only Report all problems Report problems related to style issues only

In this *ro+ect no dead code' variable' procedure' module is available. *roblems were reported to the guide and with his help these all are solved. 7oding is done by keeping in mind the future reusability of it. 7omplexity is tried to be in reduced number. 7all trees are used here i.e. procedure 5 function call other procedure 5 function. OPTIMI/ATION OF CODE 6evelopment

that

are

considered

to

improve

the

systems

performance on the following areas 3( *hysical I5) ( data is read from and written into I5) devices. 0his can be a potential bottleneck. A well(configured system always runs NI5)( boundN ( the performance of the I5) dictates the overall performance.

,emory consumption of the database resources e.g. #uffers' etc. 7*/ consumption on the database and application servers $etwork communication ( not critical for little data volumes' becomes a bottleneck when large volumes are transferred. 0OOD

CLASSIC

10L

PRO0RAMMIN0

CODE2PRACTICES

0UIDELINES ARE Avoid dead(code Remove unnecessary code and redundant processing !pend time documenting and adopt good change control practices

!pend ade1uate time analy-ing business re1uirements' *rocess flows' data(structures and data(model

I:

Duality assurance is key3 plan and execute a good test plan and testing methodology xperience counts

0hese all points are kept in mind when the pro+ect was formulated. In order to keep the amount of data which is relevant to the 1uery the hit set small' always all known conditions in the W" R clause is specified Bwherever possible9. 0he database system is also potentially made to use a database index Bwherever possible9 for greater efficiency resulting in fewer loads on the database server and considerably less load on the network traffic as well. /sage of P)RP' P$)0P' in )pen !D% statements is checked appropriately. Wherever the maximum' minimum' sum and average value or the count of a database column is re1uired' list with aggregate functions are used instead of computing the aggregates within the program. 0he R6#,! is responsible for aggregated computations instead of transferring large amount of data to the application. )verall $etwork' Application(server and 6atabase load is also considerably less. VALIDATION C+EC3S !oftware validation is achieved through a series of black(box tests that demonstrate conformity with re1uirements. A test plan outlines the classes of tests to be conducted and a test procedure defines specific test cases that will be used to demonstrate conformity with re1uirements. After each validation test case has been conducted' one of two possible conditions exists3 B89 0he function or performance characteristics conform to specification and are accepted or B:9 a deviation from specification is uncovered and a deficiency list is created. CONFI0URATION REVIE4 An important element of the validation process is a configuration review. 0he intent of the review is to ensure that all elements of the
ID

software configuration have been properly developed' are cataloged' and have the necessary detail to bolster the support phase of the software life cycle. 0he configuration review' sometimes called an audit. ALP+A AND BETA TESTIN0 If software is developed as a product to be used by many customers' it is I impractical to perform formal acceptance test with each one. ,ost software product builders4 use a process called alpha and beta testing uncover errors that only the end(user seems able to find. A customer conducts the Alpha test at developer4s site. 0he software is used in a natural setting with the developer looking over the shoulder of the user and recording errors and usage problems. Alpha tests are conducted in a controlled environment. 0he #eta test is conducted at one or more customer sites by the end(user of the software. /nlike alpha testing' the developer is generally not present. 0herefore' the beta test is a live application of the software in an environment that cannot be controlled by the developer. 0he customer records all problems Breal or imagined9 that are encountered during beta tasting and reports these to the developer at regular intervals. As a result of problems reported during beta tests' software engineers make modifications and then prepare for release of the software product to the entire customer base.

IMPLEMENTATION AND MAINTENANCE


IMPLEMENTATION A crucial phase in the system life cycle is the successful implementation of the new system designed. Implementation includes all
IF

those activities that take place to convert from the old system to the new one. 0he new system may be completely new' replacing an existing manual or automated system or it may be ma+or modification to an existing system. In either case' proper implementation becomes necessary so that reliable system based on the re1uirements of the organi-ation can be provided. Im(lemen#a#ion in'l&des 0raining of personnel 7onversion procedures *ost(implementation review or evaluation TRAININ0 OF PERSONNEL 0he high 1uality training is an essential step in systems implementation. "ence to provide the training to personnel they have been provided user manuals. 0hey are asked to read it carefully and same thing try practically on computer. If they don4t understand any thing' can ask without any hesitation. 0hey are asked to enter the data' which is more fre1uently entered' and print the reports are fre1uently printed. /sers are told about those situations' which he must understand and he should able to handle it.

CONVERSION MET+OD 0he direct conversion method is applied. 0his method converts from old to the new system abruptly. 0he old system is used till a planned conversion day. 0he organi-ation relies fully on the new system. EVALUATION OR POST IMPLANTATION REVIE4

II

After the system is implemented and conversion is complete' a review is conducted to determine whether system is meeting expectations and where improvements are needed. A post implementation review measures the systems performance against pre(determined re1uirements. It determines how well the system continues to meet performance specifications. It also provides information to determine whether ma+or re( design or modification is re1uired. In evaluation system is checked against the pre(determined re1uirements. All the re1uirements have been fully attained. Where there was any mistake that had handled through system life cycle. *roblem is solved and checked against the original facts. REVIE4 PLAN Hor review a team is planned. 0he 0eam shall prepare a formal plan around the ob+ectives of the review. An overall plan covers the following areas3 ADMINISTRATOR PLAN Review area ob+ectives' operating costs' actual operating performance and benefits. PERSONNEL RE5UIREMENTS PLAN Review performance ob+ectives and training performance to data. +ARD4ARE PLAN Review performance specifications DOCUMENTATION REVIE4 PLAN Review the system development efforts. I- ADMINISTRATIVE PLAN (a) USER OB,ECTIVE 0his is an extremely crucial area since it may be possible that over a period of time the system does not meet
IC

the initial ob+ectives of the user or ob+ectives get changed as a result of changes in the overall ob+ectives of the organi-ation. 0he results of the evaluation are documented for future reference. (") OPERATIN0 COSTS AND BENEFITS /nder the administration plan' current budget designed manipulate costs and savings of the system will closely reviewed. II- PERSONNEL RE5UIREMENT PLAN Ba9 Bb9 *ersonnel old performance ob+ectives will be compared with current performance levels. 0raining performance through testing' conducting interviews and other data gathering techni1ues. III- +ARD4ARE PLAN Ba9 0he hardware of the new system will also review. #ut as we are using existing hardware which full fill the re1uirement of pro+ect. "ence the cost of hardware is not increased.

IV- DOCUMENTATION REVIE4 PLAN 0he reason for review plan is to evaluate the accuracy and completeness of the documentation compiled to date and to its conformity with documentation standards established earlier.

S*STEM MAINTENANCE

I;

0he last part of system development life cycle is system maintenance' which is actually the implementation of the post( implementation plan. "ence *rogrammers5 Analyst spend sufficient time for maintaining programs. "ence maintenance will cover a wide range of activities including correcting coding and design errors' updating documentation and test data and upgrading user support. ,any activities classified as maintenance actually fall under enhancements. "ence in maintenance of system enhancement also takes place. 0herefore in maintenance addition' modification' re(developing of code will take place to support changes in specification. TESTIN0 $o program or system design is perfectM the communication between the user and the designer is not always clear' and time is usually short. 0he result is errors and more errors. !o before implementing the system it should be first tested. It is tedious but necessary step in system development. 0here are various testing techni1ues which are discussed below with the information that how they are applied to present system. 0he testing of software is done module wise. "N T TEST N!1 It is techniqu e for testin! the chan ! e s ma d e in an existin! syste m . It is adopt e d to test the pro!ra m s for errors. Errors found in codin! and in lo!ic are fixed. Errors bet0 e e n intera c tion s of module s are remov e d. NTE!RAT ON TEST N!1 Inte!ra tion testin! is a syste m a tic techniqu e for construc tin! the pro!ra m structur e 0hile at the sa m e time conduc tin! tests to

IG

uncove r errors associat e d 0ith interfacin!. has be e n dictat e d by desi!n. STR N! TEST N!1

The objective is to

ta1e unit test e d compo n e n t s and build a pro!ra m structur e that

Pro!ra m s are invariably relate d to one anoth e r and intera c t in total syste m . Each pro!ra m is test e d to see 0eath e r it confirms the relat e d pro!ra m in the syste m . Each part of the syste m is test e d a!ains t the entire module 0ith both test and live dat a before 0hole syste m is rea dy to be test e d. S.STEM TEST N!1 (yste m testin! is desi!n e d to uncove r the 0ea1n e s s e s that 0ere found in earlier tests. &irst the pro!ra m s 0ere test e d a!ains t lo0 volum e of data. No0 incre a sin! the volum e of data chec1s all the pro!ra m s . This volum e is incre a s e d until the maxim u m level for each trans a c tion type is reac h e d .

"SER ACCEPTANCE TEST N!1 'n acc e p t a n c e test has the objective of sealin! the user on the validity and reliability of the syste m . syste mJs proce d ur e s oper a t e to syste m It verifies that the of this test is specifications and the

inte!rity of vital dat a is obtaine d. Perform a n c e

actu ally the userJs sho0. #sers are allo0e d to oper a t e the ne0 syste m . 'nd they are as1e d 0heth e r they are easy 0ith ne0 syste m as user acc e p t a n c e is comp ulsory for a successful system. 0he screen are tried to make very easy if user gives a good suggestion' which seems good. !creen is changed accordingly.
IH

R *)R0 0 !0I$.3 In report testing old system reports are compared with new system. 0he entire calculated figures are checked carefully. Where there is error found is marked. And sent to programmer for correction. )nce the problem is fixed' report is again sent to for checking. If it is found correct' then it is accepted else same step is repeated again. )ld system reports are continued till all the new system reports are not checked and found correct. )nce all the reports are ).G. 0he old system will be discontinued. !L!0 , ! 7/RI0L , A!/R ! 0he software is password protected. 0he user can enter to the admin part only via a password screen. And can exit only through same screen. 0he permission allows him more flexibility to keep his work secure for other user intervention. /nauthori-ed user get message. *A!!W)R6 I! WR)$.&. "ence nobody other then authori-ed user can enter in application.

I<

CO/ N! Public $lass CAN/ /ATES im con 's Ne0 S('C'ient0S('ConnectionDKdata sourceL.E initial catalo!LprofileEinte!rated securityLsspiKE Private (ub Button1GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button10C'ic= im /A 's Ne0 S('C'ient0S('/ataAda#terDK(E*E$T uid/p0d/pet0ord &%O) PE%(ON'*K, conE im /S 's Ne0 /ataSet /A0*i''D/S, KpKE )e0/ata!rid-ie<10/ataSource H /S )e0/ata!rid-ie<10/ataMe&%er H KpK End (ub Private (ub CAN/ /ATESG+oadD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles )y3ase0+oad End (ub End $lass

C=

Public $lass C8AN!EGPASSAOR/ im con 's Ne0 S('C'ient0S('ConnectionDKdata sourceL.E initial catalo!LprofileEinte!rated securityLsspiKE Private (ub Button1GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button10C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0O#enDE c&d0Co&&andTeIt H K#P 'TE PE%(ON'* (ET P@ LM$P @7E%E #I L8K B )e0" /0TeIt c&d0Para&eter$0AddAith-a'ueDKM$PK, )e0CP0TeItE End (ub Private (ub C8AN!EGPASSAOR/G+oadD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles )y3ase0+oad End (ub End $lass

C:

Public $lass CREATEG"SER im con 's Ne0 S('C'ient0S('ConnectionDKdata sourceL.E initial catalo!LprofileEinte!rated securityLsspiKE Private (ub !rou#BoI2GEnterD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles !rou#BoI20Enter End (ub Private (ub Button1GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button10C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0O#enDE c&d0Co&&andTeIt H KIN(E%T INTO $%E'TE#(E% -'*#E(5M#I /MP@ /MPET6K c&d0Para&eter$0AddAith-a'ueDKM#I K, )e0" /0TeItE c&d0Para&eter$0AddAith-a'ueDKMP@ K, )e0PA/0TeItE c&d0Para&eter$0AddAith-a'ueDKMPETK, )e0PET0TeItE c&d0EIecuteNonCuer:DE M$)BoIDK$%E'TEKE con0C'o$eDE End (ub Private (ub Button2GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button20C'ic= End End (ub Private (ub " /G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles " /0!ot*ocu$
CD

)e0" /0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub " /G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles " /0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0PA/0*ocu$DE End If End (ub Private (ub " /G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles " /0+o$t*ocu$ )e0" /0Bac=Co'or H Co'or0Ahite End (ub Private (ub " /GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles " /0TeItChan)ed End (ub Private (ub PA/G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles PA/0!ot*ocu$ )e0PA/0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub PA/G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles PA/0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0PET0*ocu$DE
CF

End If End (ub Private (ub PA/G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles PA/0+o$t*ocu$ )e0PA/0Bac=Co'or H Co'or0Ahite End (ub Private (ub PA/GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles PA/0TeItChan)ed End (ub End $lass

CI

Public $lass *EE/BAC, im con 's Ne0 S('C'ient0S('ConnectionDKdata sourceL.E initial catalo!LprofileEinte!rated securityLsspiKE Private (ub Button1GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button10C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0o#enDE c&d0Co&&andTeIt H KIN(E%T INTO &EE 3'$+5id/nam/place/sal/city/ser6 -'*#E(5Mid/Mnam/Mplace/Msal/Mcity/Mser6K c&d0Para&eter$0AddAith-a'ueDKMidK, )e0id0TeItE c&d0Para&eter$0AddAith-a'ueDKMnamK, )e0na&0TeItE c&d0Para&eter$0AddAith-a'ueDKMplaceK, )e0#'ace0TeItE c&d0Para&eter$0AddAith-a'ueDKMsalK, )e0$a'0TeItE c&d0Para&eter$0AddAith-a'ueDKMcityK, )e0cit:0TeItE c&d0Para&eter$0AddAith-a'ueDKMserK, )e0$er0TeItE c&d0EIecuteNonCuer:DE M$)BoIDKsavedKE con0c'o$eDE

End (ub Private (ub Button2GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button20C'ic= End M$)BoIDKE?ITKE End (ub
CC

Private (ub idG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles id0!ot*ocu$ )e0id0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub idG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles id0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0na&0*ocu$DE End If End (ub Private (ub idG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles id0+o$t*ocu$ )e0id0Bac=Co'or H Co'or0Ahite End (ub Private (ub idGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles id0TeItChan)ed End (ub Private (ub na&G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles na&0!ot*ocu$ )e0na&0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub na&G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles na&0,e:Pre$$
C;

If A$cDe0,e:CharE H 15 Then )e0#'ace0*ocu$DE End If End (ub Private (ub na&G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles na&0+o$t*ocu$ )e0na&0Bac=Co'or H Co'or0Ahite End (ub Private (ub na&GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles na&0TeItChan)ed End (ub Private (ub #'aceG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles #'ace0!ot*ocu$ )e0#'ace0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub #'aceG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles #'ace0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0$a'0*ocu$DE End If End (ub Private (ub #'aceG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles #'ace0+o$t*ocu$ )e0#'ace0Bac=Co'or H Co'or0Ahite
CG

End (ub Private (ub #'aceGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles #'ace0TeItChan)ed End (ub Private (ub $a'G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles $a'0!ot*ocu$ )e0$a'0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub $a'G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles $a'0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0cit:0*ocu$DE End If End (ub Private (ub $a'G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles $a'0+o$t*ocu$ )e0$a'0Bac=Co'or H Co'or0Ahite End (ub Private (ub $a'GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles $a'0TeItChan)ed End (ub

CH

Private (ub cit:G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles cit:0!ot*ocu$ )e0cit:0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub cit:G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles cit:0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0$er0*ocu$DE End If End (ub Private (ub cit:G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles cit:0+o$t*ocu$ )e0cit:0Bac=Co'or H Co'or0Ahite End (ub Private (ub cit:GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles cit:0TeItChan)ed End (ub End $lass Public $lass +O! im con 's Ne0 S('C'ient0S('ConnectionDKdata sourceL.Einitial catalo!L(E$#%IT.(.(Einte!rated securityLsspiKE Private (ub Button1GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button10C'ic= If )e0"0TeIt H K' )INK 'nd )e0P0TeIt H K' )INK Then M/ G*ORM0A/M NToo'Stri#Menu te&0Ena%'ed H True
C<

Exit (ub End If im (r: 's (trin! (r: H Kselect N from users 0here #I L8K B "0TeIt B K8 'N P@ L8K B P0TeIt B K8K im da 's Ne0 S('C'ient0S('/ataAda#terD(r:, conE im d$ 's Ne0 /ataSet da0*i''Dd$, KusersKE If d$0Ta%'e$DKusersKE0Ro<$0Count J 0 Then M$)BoIDKopen successKE co&&on0ena%'eDE Else M$)BoIDKplease fill correct informationKE End If End (ub Private (ub Button2GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button20C'ic= im R 's Inte!er M$)BoIDK O .O# &O%"OTOK, M$)BoISt:'e0.e$NoE If R H 9 Then End Else *OR!OT0S8OADE End If End (ub

;=

Private (ub +O! G+oadD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles )y3ase0+oad End (ub Private (ub "G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles "0!ot*ocu$ )e0"0Bac=Co'or H Co'or0Choco'ate End (ub Private (ub "G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles "0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0P0*ocu$DE End If End (ub Private (ub "G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles "0+o$t*ocu$ )e0"0Bac=Co'or H Co'or0Ahite End (ub Private (ub "GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles "0TeItChan)ed End (ub Private (ub PG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles P0,e:Pre$$
;:

End (ub Private (ub PGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles P0TeItChan)ed End (ub End $lass Public $lass PRO* +E im con 's Ne0 S('C'ient0S('ConnectionDKdata sourceL.E initial catalo!LprofileEinte!rated securityLsspiKE

Private (ub + GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles + 0C'ic= im #ath 's (trin! )e0O#en*i'e/ia'o)10Sho</ia'o)DE PAT8 H )e0O#en*i'e/ia'o)10*i'eNa&e )e0PAT80 &a)e H &a)e0*ro&*i'eDPAT8E End (ub Private (ub SGC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles S0C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0O#enDE

;D

c&d0Co&&andTeIt H KIN(E%T INTO PE%(ON'* -'*#E(5MI /MN')/M&N')/M O3/M' )P/M"EN /M%E*/MQ#*/M$'(TE6K c&d0Para&eter$0AddAith-a'ueDKMI K, )e0 /0TeItE c&d0Para&eter$0AddAith-a'ueDKMN')K, )e0NAM0TeItE c&d0Para&eter$0AddAith-a'ueDKM&N')K, )e0*NAM0TeItE c&d0Para&eter$0AddAith-a'ueDKM O3K, )e0/OB0-a'ue0ToShort/ateStrin)E c&d0Para&eter$0AddAith-a'ueDKM' K, )e0A//0TeItE c&d0Para&eter$0AddAith-a'ueDKM$IT.K, )e0C T.0TeItE c&d0Para&eter$0AddAith-a'ueDKM7TK, )e08T0TeItE c&d0Para&eter$0AddAith-a'ueDKM)N"K, )e0MN!0TeItE c&d0Para&eter$0AddAith-a'ueDKM$O)PK, )e0COMP0TeItE c&d0Para&eter$0AddAith-a'ueDKM"EN K, )e0!EN/0TeItE c&d0Para&eter$0AddAith-a'ueDKM%E*K, )e0RE+0TeItE c&d0Para&eter$0AddAith-a'ueDKMQ#*K, )e0C"+0TeItE c&d0Para&eter$0AddAith-a'ueDKM$'(TEK, )e0CASTE0TeItE c&d0EIecuteNonCuer:DE M$)BoIDKsavedKE con0C'o$eDE End (ub Private (ub NGC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles N0C'ic= )e0 /0TeIt H K K )e0NAM0TeIt H K K )e0*NAM0TeIt H K K )e0/OB0TeIt H K K )e0A//0TeIt H K K
;F

/M$IT./M7T/M)N"/M$O

)e0C T.0TeIt H K K )e08T0TeIt H K K )e0MN!0TeIt H K K )e0COMP0TeIt H K K )e0!EN/0TeIt H K K )e0RE+0TeIt H K K )e0C"+0TeIt H K K )e0CASTE0TeIt H K K End (ub Private (ub "GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles "0C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0O#enDE c&d0Co&&andTeIt H K#P 'TE PE%(ON'* (ET I LMI /N')LMN')/&N')LM&N')/ O3LM O3/' E*/Q#*LMQ#*/$'(TELM$'(TE6K c&d0Para&eter$0AddAith-a'ueDKMI K, )e0 /0TeItE c&d0Para&eter$0AddAith-a'ueDKMN')K, )e0NAM0TeItE c&d0Para&eter$0AddAith-a'ueDKM&N')K, )e0*NAM0TeItE c&d0Para&eter$0AddAith-a'ueDKM O3K, )e0/OB0-a'ue0ToShort/ateStrin)E c&d0Para&eter$0AddAith-a'ueDKM' K, )e0A//0TeItE c&d0Para&eter$0AddAith-a'ueDKM$IT.K, )e0C T.0TeItE c&d0Para&eter$0AddAith-a'ueDKM7TK, )e08T0TeItE c&d0Para&eter$0AddAith-a'ueDKM)N"K, )e0MN!0TeItE c&d0Para&eter$0AddAith-a'ueDKM$O)PK, )e0COMP0TeItE c&d0Para&eter$0AddAith-a'ueDKM"EN K, )e0!EN/0TeItE c&d0Para&eter$0AddAith-a'ueDKM%E*K, )e0RE+0TeItE
;I

LM'

/$IT.L

M$IT./7TLM7T/)N"LM)N"/$O)PLM$O)P/"EN LM"EN /%E*LM%

c&d0Para&eter$0AddAith-a'ueDKMQ#*K, )e0C"+0TeItE c&d0Para&eter$0AddAith-a'ueDKM$'(TEK, )e0CASTE0TeItE c&d0EIecuteNonCuer:DE M$)BoIDK#P 'TE KE con0C'o$eDE End (ub Private (ub /GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles /0C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0O#enDE c&d0Co&&andTeIt H Kdelete from personal 0here idLMidK c&d0Para&eter$0AddAith-a'ueDKMI K, )e0 /0TeItE c&d0EIecuteNonCuer:DE M$)BoIDKdeletedKE con0C'o$eDE End (ub

Private (ub Button1GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button10C'ic= im da 's Ne0 S('C'ient0S('/ataAda#terDKselect id/nam/fnam/add/city/ht/mn!/comp/!end/rel/qul/caste from personal 0here idLK B )e0 /0TeIt, conE im d$ 's Ne0 /ataSet da0*i''Dd$, KpersonalKE If d$0Ta%'e$DKpersonalKE0Ro<$0Count KJ 0 Then
;C

)e0 /0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDKI KE )e0NAM0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDKN')KE )e0*NAM0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK&N')KE )e0/OB0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK O3KE )e0A//0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK' )e08T0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK7TKE )e0MN!0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK)N"KE )e0COMP0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK$O)PKE )e0!EN/0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK"EN KE )e0RE+0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK%E*KE )e0C"+0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDKQ#*KE )e0CASTE0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK$'(TEKE Else M$)BoIDKNO %E$O% ( &O#N KE End If End (ub KE )e0C T.0TeIt H d$0Ta%'e$DKpersonalKE0Ro<$D0EDK$IT.KE

Private (ub Button2GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button20C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0O#enDE c&d0Co&&andTeIt H KIN(E%T INTO PE%(ON'*5PO3/$O)/('*/ E(/P*'$E/3#I(NE((/NO3/IN$O)E6 -'*#E(5MPO3/M$O)/M('*/M E(/MP*'$E/M3#I(NE((/MNO3/MIN$ O)E6K c&d0Para&eter$0AddAith-a'ueDKMPO3K, )e0JOB0TeItE
;;

c&d0Para&eter$0AddAith-a'ueDKM$O)K, )e0COM0TeItE c&d0Para&eter$0AddAith-a'ueDKM('*K, )e0SA+0TeItE c&d0Para&eter$0AddAith-a'ueDKM E(K, )e0/ES0TeItE c&d0Para&eter$0AddAith-a'ueDKMP*'$EK, )e0A//0TeItE c&d0Para&eter$0AddAith-a'ueDKM3#I(NE((K, )e0B" SNESS0TeItE c&d0Para&eter$0AddAith-a'ueDKMNO3K, )e0NOB0TeItE c&d0Para&eter$0AddAith-a'ueDKMIN$O)EK, )e0 NCOME0TeItE c&d0EIecuteNonCuer:DE M$)BoIDKsavedKE con0C'o$eDE End (ub Private (ub Button5GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button50C'ic= )e0JOB0TeIt H K K )e0COM0TeIt H K K )e0SA+0TeIt H K K )e0/ES0TeIt H K K )e0P+ACE0TeIt H K K )e0B" SNESS0TeIt H K K )e0NOB0TeIt H K K )e0 NCOME0TeIt H K K End (ub Private (ub Button4GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button40C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con
;G

con0O#enDE c&d0Co&&andTeIt H K#P 'TE PE%(ON'* (ET PO3LMPO3/$O)LM$O)/('*LM('*/ E(LM E(/P*'$ELMP*'$E/3#I( NE((LM3#I(NE((/NO3LMNO3/IN$O)ELMIN$O)E6K c&d0Para&eter$0AddAith-a'ueDKMPO3K, )e0JOB0TeItE c&d0Para&eter$0AddAith-a'ueDKM$O)K, )e0COM0TeItE c&d0Para&eter$0AddAith-a'ueDKM('*K, )e0SA+0TeItE c&d0Para&eter$0AddAith-a'ueDKM E(K, )e0/ES0TeItE c&d0Para&eter$0AddAith-a'ueDKMP*'$EK, )e0P+ACE0TeItE c&d0Para&eter$0AddAith-a'ueDKM3#I(NE((K, )e0B" SNESS0TeItE c&d0Para&eter$0AddAith-a'ueDKMNO3K, )e0NOB0TeItE c&d0Para&eter$0AddAith-a'ueDKMIN$O)EK, )e0 NCOME0TeItE c&d0EIecuteNonCuer:DE M$)BoIDK#P 'TE KE con0C'o$eDE End (ub Private (ub Button3GC'ic=D3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles Button30C'ic= im c&d 's Ne0 S('C'ient0S('Co&&and c&d0Connection H con con0O#enDE c&d0Co&&andTeIt H Kdelete from personal 0here PO3LMPO3/$O)LM$O)/('*LM('*/ E(LM E(/P*'$ELMP*'$E/3#I( NE((LM3#I(NE((/NO3LMNO3/IN$O)ELMIN$O)EK c&d0Para&eter$0AddAith-a'ueDKMPO3K, )e0JOB0TeItE c&d0Para&eter$0AddAith-a'ueDKM$O)K, )e0COM0TeItE c&d0Para&eter$0AddAith-a'ueDKM('*K, )e0SA+0TeItE c&d0Para&eter$0AddAith-a'ueDKM E(K, )e0/ES0TeItE c&d0Para&eter$0AddAith-a'ueDKMP*'$EK, )e0P+ACE0TeItE
;H

c&d0Para&eter$0AddAith-a'ueDKM3#I(NE((K, )e0B" SNESS0TeItE c&d0Para&eter$0AddAith-a'ueDKMNO3K, )e0NOB0TeItE c&d0Para&eter$0AddAith-a'ueDKMIN$O)EK, )e0 NCOME0TeItE c&d0EIecuteNonCuer:DE M$)BoIDK E*ETEKE con0C'o$eDE End (ub

Private (ub JGChec=edChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles J0Chec=edChan)ed If )e0J0Chec=ed H True Then JOB0Ena%'ed H True B" SNESS0Ena%'ed H &alse End If End (ub Private (ub BGChec=edChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles B0Chec=edChan)ed If )e0B0Chec=ed H True Then B" SNESS0Ena%'ed H True JOB0Ena%'ed H &alse End If End (ub Private (ub TeItBoI1GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles CASTE0TeItChan)ed End (ub
;<

Private (ub /G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles /0!ot*ocu$ )e0 /0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub /G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles /0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0NAM0*ocu$DE End If End (ub Private (ub /G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles /0+o$t*ocu$ )e0 /0Bac=Co'or H Co'or0Ahite End (ub

Private (ub /GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles /0TeItChan)ed End (ub Private (ub NAMG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles NAM0!ot*ocu$ )e0NAM0Bac=Co'or H Co'or0Chartreu$e End (ub

G=

Private (ub NAMG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles NAM0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0*NAM0*ocu$DE End If End (ub Private (ub NAMG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles NAM0+o$t*ocu$ )e0NAM0Bac=Co'or H Co'or0Ahite End (ub Private (ub NAMGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles NAM0TeItChan)ed

End (ub Private (ub *NAMG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles *NAM0!ot*ocu$ )e0*NAM0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub *NAMG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles *NAM0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0/OB0*ocu$DE
G:

End If End (ub Private (ub *NAMG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles *NAM0+o$t*ocu$ )e0*NAM0Bac=Co'or H Co'or0Ahite End (ub Private (ub *NAMGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles *NAM0TeItChan)ed End (ub Private (ub /OBG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles /OB0!ot*ocu$ )e0/OB0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub /OBG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles /OB0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0A//0*ocu$DE End If End (ub Private (ub /OBG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles /OB0+o$t*ocu$ )e0/OB0Bac=Co'or H Co'or0Ahite End (ub

GD

Private (ub /OBG-a'ueChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles /OB0-a'ueChan)ed End (ub Private (ub A//G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles A//0!ot*ocu$ )e0A//0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub A//G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles A//0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0C T.0*ocu$DE End If End (ub Private (ub A//G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles A//0+o$t*ocu$ )e0A//0Bac=Co'or H Co'or0Ahite End (ub Private (ub A//GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles A//0TeItChan)ed End (ub

GF

Private (ub C T.G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles C T.0!ot*ocu$ )e0C T.0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub C T.G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles C T.0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e08T0*ocu$DE End If End (ub Private (ub C T.G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles C T.0+o$t*ocu$ )e0C T.0Bac=Co'or H Co'or0Ahite End (ub Private (ub C T.GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles C T.0TeItChan)ed End (ub Private (ub 8TG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles 8T0!ot*ocu$ )e08T0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub 8TG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles 8T0,e:Pre$$ If A$cDe0,e:CharE H 15 Then
GI

)e0MN!0*ocu$DE End If End (ub Private (ub 8TG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles 8T0+o$t*ocu$ )e08T0Bac=Co'or H Co'or0Ahite End (ub Private (ub 8TGSe'ected ndeIChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles 8T0Se'ected ndeIChan)ed End (ub Private (ub MN!G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles MN!0!ot*ocu$ )e0MN!0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub MN!G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles MN!0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0COMP0Bac=Co'or H Co'or0Chartreu$e End If End (ub Private (ub MN!G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles MN!0+o$t*ocu$ )e0COMP0Bac=Co'or H Co'or0Ahite End (ub
GC

Private (ub MN!GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles MN!0TeItChan)ed End (ub Private (ub COMPG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles COMP0!ot*ocu$ )e0COMP0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub COMPG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles COMP0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0!EN/0*ocu$DE End If End (ub Private (ub COMPG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles COMP0+o$t*ocu$ )e0COMP0Bac=Co'or H Co'or0Ahite End (ub Private (ub COMPGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles COMP0TeItChan)ed End (ub Private (ub !EN/G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles !EN/0!ot*ocu$
G;

)e0!EN/0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub !EN/G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles !EN/0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0RE+0*ocu$DE End If End (ub Private (ub !EN/G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles !EN/0+o$t*ocu$ )e0!EN/0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub !EN/GSe'ected ndeIChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles !EN/0Se'ected ndeIChan)ed End (ub Private (ub RE+G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles RE+0!ot*ocu$ )e0RE+0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub RE+G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles RE+0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0C"+0*ocu$DE End If
GG

End (ub Private (ub RE+G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles RE+0+o$t*ocu$ )e0RE+0Bac=Co'or H Co'or0Ahite End (ub Private (ub RE+GSe'ected ndeIChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles RE+0Se'ected ndeIChan)ed End (ub Private (ub C"+G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles C"+0!ot*ocu$ )e0C"+0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub C"+G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles C"+0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0CASTE0*ocu$DE End If End (ub Private (ub C"+G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles C"+0+o$t*ocu$ )e0C"+0Bac=Co'or H Co'or0Ahite End (ub

GH

Private (ub C"+GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles C"+0TeItChan)ed End (ub Private (ub JOBG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles JOB0!ot*ocu$ )e0JOB0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub JOBG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles JOB0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0COM0*ocu$DE End If End (ub Private (ub JOBG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles JOB0+o$t*ocu$ )e0JOB0Bac=Co'or H Co'or0Ahite End (ub Private (ub JOBGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles JOB0TeItChan)ed End (ub Private (ub COMG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles COM0!ot*ocu$
G<

)e0COM0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub COMG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles COM0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0SA+0*ocu$DE End If End (ub Private (ub COMG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles COM0+o$t*ocu$ )e0COM0Bac=Co'or H Co'or0Ahite End (ub Private (ub COMGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles COM0TeItChan)ed End (ub Private (ub SA+G!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles SA+0!ot*ocu$ )e0SA+0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub SA+G,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles SA+0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0/ES0*ocu$DE
H=

End If End (ub Private (ub SA+G+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles SA+0+o$t*ocu$ )e0SA+0Bac=Co'or H Co'or0Ahite End (ub Private (ub SA+GTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles SA+0TeItChan)ed End (ub Private (ub /ESG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles /ES0!ot*ocu$ )e0/ES0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub /ESG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles /ES0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0P+ACE0*ocu$DE End If End (ub Private (ub /ESG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles /ES0+o$t*ocu$ )e0/ES0Bac=Co'or H Co'or0Ahite End (ub
H:

Private (ub /ESGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles /ES0TeItChan)ed End (ub Private (ub P+ACEG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles P+ACE0!ot*ocu$ )e0P+ACE0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub P+ACEG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles P+ACE0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0B" SNESS0*ocu$DE End If End (ub Private (ub P+ACEG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles P+ACE0+o$t*ocu$ )e0P+ACE0Bac=Co'or H Co'or0Ahite End (ub Private (ub P+ACEGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles P+ACE0TeItChan)ed End (ub Private (ub B" SNESSG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles B" SNESS0!ot*ocu$
HD

)e0B" SNESS0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub B" SNESSG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles B" SNESS0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0NOB0*ocu$DE End If End (ub Private (ub B" SNESSG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles B" SNESS0+o$t*ocu$ )e0B" SNESS0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub B" SNESSGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles B" SNESS0TeItChan)ed End (ub Private (ub NOBG!ot*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles NOB0!ot*ocu$ )e0NOB0Bac=Co'or H Co'or0Chartreu$e End (ub Private (ub NOBG,e:Pre$$D3y-al $ender 's Object, 3y-al e 's S:$te&0Aindo<$0*or&$0,e:Pre$$EFentAr)$E 7andles NOB0,e:Pre$$ If A$cDe0,e:CharE H 15 Then )e0 NCOME0*ocu$DE End If
HF

End (ub Private (ub NOBG+o$t*ocu$D3y-al $ender 's Object, 3y-al e 's S:$te&0EFentAr)$E 7andles NOB0+o$t*ocu$ )e0NOB0Bac=Co'or H Co'or0Ahite End (ub Private (ub NOBGTeItChan)edD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles NOB0TeItChan)ed End (ub Private (ub PRO* +EG+oadD3y-al $ender 's S:$te&0O%;ect, 3y-al e 's S:$te&0EFentAr)$E 7andles )y3ase0+oad End (ub End $lass

HI

OUTPUT SCREENS

HC

H;

HG

HH

H<

<=

<:

<D

<F

<I

<C

<;

<G

BIBLIO0RAP+* 8. !ystem Analysis and 6esign #L lias ,.Awad' .algotia *ublications. :. !oftware ngineering #y Roger !. *ressman' ,c.raw( "ill *ublications. ;. ,!(!D%! RC R M #*# *ublications <. ,astering in C#.$et #y #*# *ublications. =. Cisual#asic.$et *rogramming' #lack #ook.

<H

Вам также может понравиться