Академический Документы
Профессиональный Документы
Культура Документы
Chapter - 1
INTRODUCTION
much more technologies which connects the people but the main thing is to keep the contacts of
the people. However, every mobile has their separate contact Address Book but now a days, the
chances of loss of mobiles are more, and there are many threat to the portable devices to keep
contact in mind and much more, to avoid these problems we can write the contacts in a diary but
writing in diary is not such sufficient because people cannot waste time on adding it and
or Address Book for the Windows Operating system. This is developed in order to keep the
contact details of the people connected with them mucmust be safe. The main intention behind
developing the Address Book is to overcome the threat of contact loss. This project gives us the
option to store the unlimited Contacts with all the details safely and securely.
The front end used for the Address Book is VB.NET. and back end used for this is MS.
Access database. the main intention of using Ms.Access database is to store the database in safe
manner and at the chances of the software uninstallation or something else we could access back
all our contacts without straining only if we know the user name and password.
The project of Address Book consists of front end as the VB.NET and back end as the
MS.Access database. The main reason is to choose this is because of its flexibility and code
reusability.
graphical user interface(GUI) development software, which works on the windows Up and
above. This software comes in three editions: learners, professional and enterprise edition. VB
What makes the VB different from almost from other programming tool is the ease with
which the interface can be developed. We initially draw the user interface, much like paint
diagram. In addition, when you have done drawing the interface, the command buttons,
textboxes, labels and etc… will be automatically recognize the user actions., such as a mouse
movements and button clicks. VB also comes with the containers like menu designing which is
both like popup and direct menus on a snap and toolbox and much more.
Only after you design the complete form the traditional programming process will starts.
This leads to the second step in building a VB applications: writing the code to activate the
interface you built in the step one. The point is, objects in VB will recognize events like mouse
clicks: how the objects are respond to them based on the code you write, you will almost always
need to write code in order to make controls respond to the events. This makes VB programming
Programs in conventional programming languages runs from the top – down. For older
programming languages, execution starts from the first line and moves with the flow of the
program to different parts as needed. A VB program works completely differently. The core of
VB program is a set of independent pieces of the code that are activated by, and so respond to,
only the events they have been told to recognize. This is a fundamental shift. Now instead of
designing a program to do what the programmer thinks should happen, the user is in control.
Much like programming code in VB that tells your program how to respond to events
such as mouse clicks occur in what VB calls event procedure or is used by an event procedure to
The third step is inevitable press of finding and fixing the errors. Not even god can help
you debug the semantic errors but VB surely helps you to debug errors by providing debugging
tools like ‘Run to Curser’, ’Break Points’, ‘stepping in and stepping out’ and etc.. . The
After a project is completed, it may need to install it on the machines that will run the
applications. To do this VB provides the package and deployment wizards that creates the setup
programs. Then the setup program can run to install the application and all of the files it requires
on each of the client machines. Or the applications can be installed on the internet servers so the
combines the relational Microsoft Jet Database Engine with a graphical user interface and
Microsoft Access stores data in its own format based on the Access Jet Database Engine.
It can also import or link directly to data stored in other applications and databases.
Software developers, data architects and power users can use Microsoft Access to
develop application software. Like other Microsoft Office applications, Access is supported
by Visual Basic for Applications (VBA), an object-based programming language that can
reference a variety of objects including DAO (Data Access Objects), ActiveX Data Objects, and
many other ActiveX components. Visual objects used in forms and reports expose their methods
and properties in the VBA programming environment, and VBA code modules may declare and
In addition to using its own database storage file, Microsoft Access also may be used as
the 'front-end' of a program while other products act as the 'back-end' tables, such as Microsoft
SQL Server and non-Microsoft products such as Oracle and Sybase. Multiple backend sources
can be used by a Microsoft Access Jet Database (ACCDB and MDB formats). Similarly, some
applications such as Visual Basic, ASP.NET, or Visual Studio .NET will use the Microsoft
Access database format for its tables and queries. Microsoft Access may also be part of a more
complex solution, where it may be integrated with other technologies such as Microsoft
Excel, Microsoft Outlook, Microsoft Word, Microsoft PowerPoint and ActiveX controls.
Access tables support a variety of standard field types, indices, and referential
integrity including cascading updates and deletes. Access also includes a query interface, forms
to display and enter data, and reports for printing. The underlying Jet database, which contains
Repetitive tasks can be automated through macros with point-and-click options. It is also
easy to place a database on a network and have multiple users share and update data without
overwriting each other's work. Data is locked at the record level which is significantly different
There are template databases within the program and for download from Microsoft's
website. These options are available upon starting Access and allow users to enhance a database
with predefined tables, queries, forms, reports, and macros. Database templates
support VBA code but Microsoft's templates do not include VBA code.
Definition Language (DDL). DDL statements are compiled into a set of tables, which are stored
manipulate such data. There are two types: Procedural DML’s, which require the user to specify
what the data is needed and how to get it. Non-Procedural DML which require the user to specify
Chapter 2
LITERATURE SURVEY
The software Address Book didn’t required much research or literature survey, because
the basic features are already present in every handset. but there is no any proper application
which is particularly build to keep the contacts securely and safely. The Gmail may be the best
security for all the contacts security but the chances of forgetting username or password is more.
Even if the device fails, there is no any alternatives to find it out rather than approaching a
security with the reusable database. Yes, the main intention of back end is to access the database
easily at the time of failures of software or at the time when the software is affected.
All the mobile contains their own Address Books, but not all the PC's contains the
address book, hence, there is no any advanced developed applications which can help the people
to withstand any types of the failures or bugs or something else. This leaded us for the
Chapter 3
SYSTEM ANALYSIS
also perform the similar functionality as our upcoming project. But, they don't have any facility
to withstand the system failures, they are just the project which can perform the addition display
The Existing windows applications are available for the windows operating environment,
but this is very useless because of its complexity, they directly stored in core databases which
The windows applications for contact management are present but they are useless
because of heavy -unneccery coding and low performance even for the small applications. The
one of major drawbacks of the existing projects is: the contacts cannot be retrieved after
hardware or software failures and we are moved to develop an application which can give
computer. Even if the computer fails or the hard disk corrupts for some reason, only the extracted
Our Address Book software is the software which are defined with the single module and
does contains only two user defined classes. The Address book is more efficient because of its
compact nature and compressed code. In this software, the care is taken not to loop itself more as
a result cause the performance degradation. This software is the best suited for the low level
Data reliability.
Data recovery.
technical Feasibility.
Economical Feasibility.
Operational Feasibility.
- Technical Feasibility:
This assessment is based on an outline design of system requirements, to determine
whether the company has the technical expertise to handle completion of the project. When
A brief description of the business to assess more possible factors which could affect the
study
The part of the business being examined
The human and economic factor
The possible solutions to the problem
In the part of technical feasibility, we has done analyzed the complete technical tasks to
be done. first, the technical architectural design has been done, such as the connection to
- Operational Feasibility:
Operational feasibility is the measure of how well a proposed system solves the
problems, and takes advantage of the opportunities identified during scope definition and how it
satisfies the requirements identified in the requirements analysis phase of system development.
The operational feasibility assessment focuses on the degree to which the proposed
development project fits in with the existing business environment and objectives with regard to
development schedule, delivery date, corporate culture and existing business processes.
To ensure success, desired operational outcomes must be imparted during design and
parameters are required to be considered at the early stages of design if desired operational
behaviors are to be realized. A system design and development requires appropriate and timely
application of engineering and management efforts to meet the previously mentioned parameters.
A system may serve its intended purpose most effectively when its technical and
operating characteristics are engineered into the design. Therefore, operational feasibility is a
critical aspect of systems engineering that needs to be an integral part of the early design phases.
in this project, mainly the operational feasibility is done by the interface of database with
the applications, this is the main problem and challenge on which all the Business software
depends.
Chapter 4
classical System Development Life Cycle Method (Waterfall Model). It is one of the oldest and
This process demands a systematic, sequential approach to software development that begins at
the system level and process through the analysis, design, coding, testing and maintenance level.
The step of the classical life cycle paradigm is very similar to the generic steps that are
applicable to all the software engineering paradigms. Modeled after the conventional engineering
We have chosen this Waterfall Model because we have collected all the requirements
earlier and those requirements are fixed for the project of Library management and hence there
is no such necessity of changing or altering the requirements, secondly this is the one of the
the time invested for the first two phases, 30–40% of the time to coding, and the rest dedicated to
testing and implementation. The actual project organization needs to be highly structured. Most
medium and large projects will include a detailed set of procedures and controls, which regulate
A further argument for the waterfall model is that it places emphasis on documentation
(such as requirements documents and design documents) as well as source code. In less
thoroughly designed and documented methodologies, knowledge is lost if team members leave
before the project is completed, and it may be difficult for a project to recover from the loss. If a
fully working design document is present (as is the intent of Big Design Up Front and the
waterfall model), new team members or even entirely new teams should be able to familiarise
In response to the perceived problems with the "pure" waterfall model, many modified
waterfall models have been introduced. These models may address some or all of the criticisms
These include the Rapid Development models that Steve McConnell calls "modified
waterfalls. Peter DeGrace's "sashimi model" (waterfall with overlapping phases), waterfall with
subprojects, and waterfall with risk reduction. Other software development model combinations
of Visual Basic. This environment is provided by the Visual Basic but the platform is depended
on the .NET framework, the .NET is the abbrevation of .network enabled text.
The backend of this software which is called as ACCDB can be developed in the
environment of microsoft access software. this is the best database for the beginners. The ms
access database can be also work as the stand alone front end and back end, hence this is the best
application to define the back end. The ACCDB can be acced independently that’s why we can
recover it during the software or hardware failures. This will be much useful for the large
companies who has the necessary to access directly from the database and convery into hard
copy.
The application can be run on the environment of Windows xp and above with the
minimum of 0.5 gb of ram and 2GB of hard disk memory. The recommended processor is
starting from windows atom, hence we can say that this is supported for any low grade machine
CHAPTER - 5
SYSTEM DESIGN
Systems design is the process of defining the architecture, modules, interfaces,
and data for a system to satisfy specified requirements. Systems design could be seen as the
application of systems theory to product development. There is some overlap with the disciplines
The design of the hardware is developed by using manual connections. The connections
are done by using Arduino as the heart of the Project. In the present project we need the two
types of designs, they are hardware design and software design. At present, the project design is
High-level design (HLD) explains the architecture that would be used for developing a
software product. The architecture diagram provides an overview of an entire system, identifying
the main components that would be developed for the product and their interfaces. The HLD
uses possibly nontechnical to mildly technical terms that should be understandable to the
administrators of the system. In present project we sue two types of architecture, they are
by-step refinement process. This process can be used for designing data structures, required
software architecture, source code and ultimately, performance algorithms. Overall, the data
organization may be defined during requirement analysis and then refined during data design
only the part of security and provacy matters in this project. This project has to convert the
given input to access database format and when accessing it access as string. The application
itself converts while taking input or output but for some times we should declare and define these
The input is same as the output, hence no any logical calculations are done for the data
which are inputted to the contacts. This just converts the strings to input for the database and
when ever needed, it converts the database data into the string format then displays to the user.
CHAPTER - 6
CODING
The coding is the major, most important and error prone part of the project development,
here most of the expectations go wrong, many of changes to be done and much more. The
Simple algorithm for the Software and Source codes are defined as shown below:
Pseudocode:
The below table consists the simple and brief pseudocode which can be understand by the
normal users:
1) textbox1=username input
2) textbox2=password input
3) if (username!=database.Login.username or password!=database.login.password)
b) else
4) end if
1. if button_cliked= add
4. else
7. end if
8. end if
9. if button_clicked = Delete
12. delete(record)
13. else
15. end if
16. end if
20. update(record)
21. else
23. end if
24. end if
28. else
30. end if
31. end if
33. DatabaseTable.GridView.show=true
35. me.close()
Else
MsgBox("Invalid Login Try Agin", MsgBoxStyle.Critical, "Login")
End If
End Sub
_________________________________________________________________________________________
End If
Saveerr:
Exit Sub
End Sub
_________________________________________________________________________________________
TextBox6.Text = ""
ComboBox1.Text = ""
End Sub
_________________________________________________________________________________________
Private Sub Button7_Click_1(sender As Object, e As EventArgs) Handles Button7.Click
TabControl1.SelectedIndex = 1
End Sub
_________________________________________________________________________________________
Private Sub Button8_Click_1(sender As Object, e As EventArgs) Handles Button8.Click
TabControl1.SelectedIndex = 2
End Sub
_________________________________________________________________________________________
Private Sub Button6_Click_1(sender As Object, e As EventArgs) Handles Button6.Click
Login.Show()
Me.Close()
End Sub
_________________________________________________________________________________________
Private Sub Button9_Click(sender As Object, e As EventArgs) Handles Button9.Click
TabControl1.SelectedIndex = 0
End Sub
_________________________________________________________________________________________
Private Sub Button10_Click(sender As Object, e As EventArgs) Handles Button10.Click
MsgBox("Logged out successfully")
Login.Show()
Me.Close()
End Sub
_________________________________________________________________________________________
Private Sub Button11_Click(sender As Object, e As EventArgs) Handles Button11.Click
Login.Close()
Me.Close()
End Sub
_________________________________________________________________________________________
Private Sub Button14_Click(sender As Object, e As EventArgs) Handles Button14.Click
TabControl1.SelectedIndex = 0
End Sub
_________________________________________________________________________________________
Private Sub Button13_Click(sender As Object, e As EventArgs) Handles Button13.Click
Login.Show()
Me.Close()
End Sub
_________________________________________________________________________________________
Private Sub Button12_Click(sender As Object, e As EventArgs) Handles Button12.Click
Login.Close()
Me.Close()
End Sub
_________________________________________________________________________________________
Private Sub DataGridView1_CellContentClick(sender As Object, e As
DataGridViewCellEventArgs) Handles DataGridView1.CellContentClick
End Sub
_________________________________________________________________________________________
Private Sub Button1_Click_1(sender As Object, e As EventArgs) Handles Button1.Click
On Error GoTo ADDErr
If TextBox1.Text = "" Or TextBox2.Text = "" Or TextBox3.Text = "" Or
TextBox4.Text = "" Or TextBox5.Text = "" Or TextBox6.Text = "" Then
MsgBox("Please fill all the field details in form")
Else
End If
Blanking()
Else
MsgBox("please give the first name of the contact")
End If
End Sub
_________________________________________________________________________________________
Private Sub Button4_Click_1(sender As Object, e As EventArgs) Handles Button4.Click
Blanking()
MsgBox("Cleared")
End Sub
End Sub
_________________________________________________________________________________________
Private Sub TextBox3_Leave(sender As Object, e As EventArgs) Handles TextBox3.Leave
If Not IsNumeric(TextBox3.Text) Then
MsgBox("please enter proper age in numbers")
TextBox3.Text = ""
End If
End Sub
_________________________________________________________________________________________
Private Sub TextBox4_Leave(sender As Object, e As EventArgs) Handles TextBox4.Leave
If Not IsNumeric(TextBox4.Text) Then
MsgBox("please enter proper mobile number")
TextBox4.Text = ""
End If
End Sub
_________________________________________________________________________________________
Private Sub ComboBox1_SelectedIndexChanged(sender As Object, e As EventArgs) Handles
ComboBox1.SelectedIndexChanged
If IsNumeric(ComboBox1.Text) Then
MsgBox("please enter proper first name")
ComboBox1.Text = ""
End If
End Sub
End Class
CHAPTER - 7
TESTING
Software testing is a process of executing a program or application with the intent of
finding the software bugs. Software testing is an investigation conducted to provide stakeholders
with information about the quality of the software product or service under test. Software testing
can also provide an objective, independent view of the software to allow the business to
appreciate and understand the risks of software implementation. Test techniques include the
process of executing a program or application with the intent of finding software bugs (errors or
other defects), and verifying that the software product is fit for use.
The software testing can also be done during execution, this process is called Dynamic
Testing. We ahve chosen dynamic software testing because this is very much effective and
powerful to determine the bugs or errors by the new Programmers. The Software testing can be
Unit Testing
Integration Testing
System Testing
Unit testing is a software testing method by which individual units of source code, sets of
one or more computer program modules together with associated control data, usage procedures,
and operating procedures, are tested to determine whether they are fit for use.
in this project, the low level testing is done by testing the individual component modules
of the software, since all of the components of the software has been completed, we are moving
The Integration testing (sometimes called integration and testing, abbreviated I&T) is
the phase in software testing in which individual software modules are combined and tested as a
group. It occurs after unit testing and before System testing. Integration testing takes as its
input modules that have been unit tested, groups them in larger aggregates, applies tests defined
in an integration test plan to those aggregates, and delivers as its output the integrated system
In the integration testing, the component modules are combined with a central stage and
then executed, all the errors while interface between the one to another module were understood
and removed, now the only one test is remaining, and that is the System test to find out the
system to evaluate the system's compliance with its specified requirements. The system testing
includes the testing of Board compatibility, functionality, performance and much more.
In the system testing, we have given the first preference to the Board Diagnosis, this
board testing enabled us to solve the problem of inefficient power supply and caused the clean
The system testing can be defined in many ways, but the simple definition is the
validation suceeds when the system model suceeds when the system function is in the manner is
reasonally expected by the user. Validation testing gives us the final assurance that the system
meets all the functional, personal and behavioral and performance requirements.
The project was tested with all its modules dn ensured that there were no errors, it has
been seen that the system is working perfectly, to the satisfaction of the user meeting all the
After performing the system testing, the next step is applied to the system is output
testing of the proposed system. Since no system could be useful, if it does not produce the
required output in the specific format. User acceptance of the system is the key factor for the
CHAPTER - 8
SNAPSHOTS
CHAPTER - 9
CONCLUSION
The simple Address Book is a simple application which can keep contacts safe and
secure, this is the best application because this is the compact application with compressed code
which provides us the much performance and flexibility.The MS.ACCDB has made it still
efficient and powerful. The main feature of the software is if at any case any problem occurs in
software or operating system, we can retain our data by accessing the database directly.
This is the application with less weitage, hence it can be run on any platform of windows
ranging frm xp or lower application to windows 10 and windows server also. This contains one
of simplest user interface hence it is more userfriendly software than any other. The content of
this application can be both portable or non portable to enhance it's security.
. CHAPTER - 10
BILIOGRAPHY
www.codeproject.com
wwww.youtube.com
www.isntructables.com
www.sourceforge.net