Вы находитесь на странице: 1из 39

CHAPTER 1

THE PROBLEM AND ITS BACKGROUND

INTRODUCTION

Police are group of people whose job is to enforce laws, help with emergencies,

solve crimes and protect property. A persons who carries out this duty is known as a

police officer. They work out of a police station. They trained in first aid and rescue,

because police officer are often one of the first people to get to a place where any

programs or people need help. In some societies, in the late of 18th and 19th, these

developed within the context of maintaining the class system and the protection of private

property. A police service is empowered by a state to enforce the law, to protect people

and property and to prevent problems. They are representing the civil authority of

government and responsible for maintaining public order and safety. These functions are

known as policing and it often also entrusted with various licensing and regulatory

activities.

A Criminal record is a record that is used to keeps track on the criminal activities

of a certain person, it records information about the criminal and how long did he / she

will be jailed in the prison. A common criminal record is made out of paper and kept in a

file cabinet. There is also the computerized version of a criminal record which offers

accuracy of information and easy usage. Police personnel would have to log-in to see the

information of the criminals with the use of their offender number and moreover can be

changed by only the police higher ups. The recorded information will be

1
properly stored in a database that will ensure confidentiality of the information and easy

retrieval of specific information.

The first recording system was the manual criminal records. In this, the officers

are needed to manually write down the needed information in the specified spaces and are

sometimes permanent. It is said to be troublesome because it wastes time due to writing

the information manually and because you cannot make any kind of mistake so that the

information is reliable. It also uses paper thus, more and more papers will be used for the

criminal record and will be a great hazard to the environment. That is why the

computerized log-in system was developed. Some police stations have implemented a

type of this record system but most are still using a manual criminal record system that

takes up a lot of space and paper. This is what lead the researchers to come up with this

system that aims to aid the Police personnel to record information about the criminals,

including their lawsuit, their personal information, and the penalty for their crimes.

2
BACKGROUND OF THE STUDY

Criminals have been present for the past centuries and due to this, the police were

created in order to stop them. In the present times, Criminal activity is still rampant and

has actually increased due to the increase in both the population and poverty. Due to

these reasons, The police force now have an enormous amount of work to do which

would also mean their jobs would become more difficult, specifically in keeping up with

the recording of the new criminals that are introduced in a prison daily. Due to the need

of the recording of the information, The Criminal Record system was made.

Information about an offender is manually recorded by the police officer with the

use of a Criminal Record and in today’s modern society most of the things are now high-

tech due to the sudden advancement of technology. Due to this, Technology rapidly and

develops things that change the lives of people. It innovate things to make people’s lives

lenient and make their work less inconvenient. It is known that sometimes writing can be

an inconvenience especially when the person is in a hurry or if the information recorded

is deemed important, so the researchers came up with the idea to make a Digital Detainee

Record System. Because of these reasons, we decided to design a computerized system

that would assure confidentiality and safety of the data.

3
OBJECTIVES

The primary objective of this study is to develop and design a system that will

record the information regarding the criminals that is searchable with the use of their

offender number and is only available to police officers with the use of a log-in system. It

can also be edited by the police higher ups.

Specifically, the system will:

1. Help the police officers in recording the information about the criminal

2. Make the information easy to access with the use of a Search Bar

3. Ensured confidentiality and security of the information seen using a log-in system

that requires a password and username

4
STATEMENT OF PROBLEM

Due to the new laws that the president had approved, the number of Assailants

captured has risen to a humongous amount. Due to this sudden rise, the recording of the

personal information of the criminals has become more difficult because more criminals

captured mean more data to be recorded for the use of the government and lawyers.

The problems we aim to solve are as Follows:

1. There is a manual way of recording and searching data.

The current system that is being used in the recording of the data of the criminals

is still manual which means that recording and searching data takes too much time and

effort. It takes up too much time due to the fact that you have to write every letter in

recording and you have to flip a lot of pages just to find that specific piece of

information.

2. The record becomes more and more fragile due to the passing of time.

Due to the manual recording of data being made of paper, it can easily decompose

because of certain factors. This means that the paper records actually have a lifespan

unlike a digital record which could be stored for a long time. Also, because of the time

passing, the paper could also get to the point that it might crumble when you even touch

it.

3. There are many mistakes like writing due to human error.

Humans can cause frequent mistakes in recording data when compared to a

machine. This means that a record will most likely have frequent mistakes if it was in a

manual way while using a computer or technology would actually lessen the mistakes by

a great amount.

5
SIGNIFICANCE OF STUDY

This system will help police officers in recording and searching for information of

the Prisoners and can also ensure the authenticity and confidentiality of the Information.

This will also save up the time and space that might have been wasted in writing down

manually on a paper criminal record. It will make it easier for the police officers to look

up information and ensure them the confidentiality of specific information about a

Criminal. the Database can also be edited by Higher-ups of police officers.

This study will benefit the following:

 Police Officers. This system will help in reducing the time and effort in recording

and searching for the information of the criminals. It will also ensure safety,

security, and confidentiality of criminal information.

 Society. This system will help in ensuring the safety of our society. It helps to

know the record of all criminals to let the people know the capability of these

people when they are released from prison.

 Government. This system will benefit the government, since they can easily

track the identity of suspects, inmates, and criminals with the data collected of in

the system. This System also cuts the cost of the expenses used in buying paper

records.

 Lawyers. This system will benefit the lawyers, for they can use this data to win

against lawsuits, and defend the innocent using the data seen in the system.

 Institution. This system will help the proponents of the research by giving

valuable experience and knowledge for future proposals and programs.

6
SCOPE AND LIMITATIONS

The study focused more on creating a computer-based system that will serve as

the new recording system of the police force. The police personnel who would want to

access this information must first log-in with the use of a password and username in order

to access the database. The police personnel must type in the offender number in order to

find the information regarding the criminal. The police can edit the information regarding

the criminals with the use of another log-in system. The researchers will limit the group

to be used to only 10 inmates of a mock prison due to the fact that we cannot use real

prisoners for this program.

The study will be focused on the information regarding the following:

1. A search bar that is easy to see that can be used to find the information of a

criminal using the offender numbers

2. Personal Information about the criminal including their age, their story on why

they were detained, and the verdict chosen by the judge

3. A log in system that is used in order to verify if the person who wants to see the

information was given permission by the police force

4. An edit button exclusive to the police higher ups that will be used in order to

change information about the criminals

7
DEFINITION OF TERMS

Assailant. a person who has committed a crime.

Authenticity. the quality of being genuine

Confidentiality. the state of keeping or being kept secret or private

Database. is a data structure that stores organized information

Detained. keep (someone) in official custody, typically for questioning about a crime or

in politically sensitive situations.

Humongous. Huge or enormous

Institution. The people who initiated this Research

Lenient. permissive, merciful, or tolerant.

Offender number. Numbers given to prisoners by a prison

Verdict. a decision on a disputed issue in a civil or criminal case or an inquest

8
CHAPTER II

REVIEW OF RELATED LITERATURE AND STUDIES

RELATED LITERATURE

Foreign

According to people who studied at the University of Montreal, they said that

criminology is the study of criminal phenomenon, for them they can easily know or solve

and understand the crime, the victim and society’s reaction to crime. But in their

situation, they are aware in criminal phenomenon. They develop risks. (Baure,2014)

Devah Pager (2018) in her article said that over a 2 million individuals are being

released each year through criminal justice system. This article focuses on the

consequences that criminal records affect employment opportunities for the important

implications for racial disparities.

Criminal records have always been a problem for criminals who are getting their

background check. Sometimes their punishment gets heavier due to past records. Based

on the research the students have done we now have the knowledge on what the criminal

record affect on people especially the person with it. Its starts with your family, not only

will you bring down your last name but they will also feel the effects of your criminal

records, whether it is just embarrassment or something more serious, there will be a

fallout. Next are employment and especially the financial effects. Whether it was a big or

small crime it can have a huge effect in your career and especially your income with

it.(Matthew Lopez Law, 2016)

9
As per Mary Ritter (2017), Things have gotten easier in the last few years as

databases are stored on faster servers and maintained much better. The information is

accessed easier, making it easier for sites that disseminate this information to get it to the

person inquiring. Jesse Berger, JD (2010) says that in Electronic criminal records helps

the policemen in searching the lack industry guidelines and offers lower status common

name matching. The advantage to processing criminal records through electronic means

is simple and straightforward. (P.G. Robson &A.E. Bailey-Watts) concluded that using a

computer-based in sorting makes the work easier and faster. It sorts out things that are

under different magnifications and/or varying counting effort.

Computerized systems have been with us since the 80’s and have not slowed down

ever since. It has helped us in so many ways we cant even count them, we now rely on

them to save all our useful information without the use of pads that can take up space and

are hard to find when needed. Computerized systems have been helping us with tasks like

accounting for years, they are quick and easy to use and can be done without any effort

needed. They are also practical to use than a ballpoint pen and a yellow pad due to the

risk of losing them. They also give accurate results when given the variables to compute

it. They don’t take too long, they can give you all the information you want with the click

of a mouse. Since computers are more efficient than paper-based accounting, work will

be done faster and will not take up much time to do.(Romano, 2013)

10
RELATED STUDIES

Foreign

According to Stephen Slivinski(2018), the increase in licensing requirements and

the lack of uniformity of these requirements across occupations can have significant costs

to individuals with criminal records, society, and the economy, in the form of lost hours

of labor, the social cost of higher crime rates, and the lost potential of the individual.

These days we all rely on technology for almost everything we do in our lives.

Manual systems are one of these technology, this where we store most of our

information. But of course everything has its downfall and manual systems have them

too. First of all they’re not only slow and time consuming but they are very expensive

and can cost you a fortune to get one. Just because its expensive does not mean its

perfect, it is also prone to errors that can crash the system all together and some parts can

only be accessed on a limited time. So it may be practical to use a manual system but due

to how expensive and complex to use it the students would not recommend it.(Cerner

Innovation Inc., 2015)

11
CHAPTER III

RESEARCH DESIGN AND METHODOLOGY

This chapter includes research design, research methodology that the researchers

will be using and instrumentation. Design methodology, System Development and

implementation will also be discussed in this chapter.

RESEARCH METHODOLOGIES

The following research methodologies are used by the researchers for the

development of the system. The researchers will be using different methods of research to

gather the data needed to ensure its reliability and in order to gather the sufficient

information or data to complete the system.

LIBRARY METHOD

The researchers searched through the library in order to find the materials they

needed for this system.

INTERNET

The internet could give a wide coverage of information in just matter of few

clicks. The researchers browsed the internet in search of websites and online article

related to their system that will help broaden their knowledge about computerized clinic

log books. These are some websites that the researchers as references and to gather

information for their system.

12
INSTRUMENTATION

The research used different techniques in data gathering to increase the accuracy

of the information for the system. The instrument aided the researcher in the development

of the Digital Detainee Record System. The instrument used was primarily Interview.

Interview

The researchers conducted an interview to gathered more data. The researchers

interviewed the Police officer who was in charge of the recording of information.

Interviewing the Police Officer helped the researcher to Identify the disadvantages of

using a manual Criminal Record and made the researchers realize that the most

appropriate solution for this is a computerized Criminal Record. The one who was

questioned for our interview was Office PAT, Darwin S. Apuay.

Officer Darwin was asked the following Questions:

1. Do you still use a paper-based/Manual record or is it already fully computerized?

2. What are the common problems seen in a manual system?

3. What are the advantages of using a digital record when compared to a paper-based

one?

4. Would you rather use a paper based criminal record or a digital record? Why?

13
DESIGN METHODOLOGY

The researchers used specific software to complete the system. The Researchers

used Microsoft Visual Studio 2010 Ultimate as the system’s programming language and

Microsoft Access 2010 for the database. Microsoft Word 2010 was also used by the

researchers for the recording of the documents for this system along with the creation of

this research paper. Lastly, Windows 10 was used as the software operating system of the

computer.

SYSTEM DEVELOPMENT

The following are the requirements to implement the system and ensure the

highest quality of performance at any given time.

RESOURCE REQUIREMENTS

HARDWARE REQUIREMENTS

These are the following hardware specifications that will be used in presenting

this system.

 Monitor

 Standard keyboard

 Computer mouse

 InkJet Printer

 Hard Disk – at least 1 terabyte of data

 RAM – 16.00 GB

14
 Processor – Intel® Core™ i5-4210U CPU @ 1.70Ghz 2.40GHz

SOFTWARE REQUIREMENTS

The following software will be used for developing the system.

 Microsoft Visual Studio 2010 Ultimate

 Microsoft Access 2010

 Microsoft Word 2010

 Windows 10

 Adobe Photoshop

SYSTEM IMPLEMENTATION

The system will be implemented by installing a computerized Criminal Record in

a mock prison. The Police Officers could view and access the Criminals’ profile. To

make searching easier, the researchers will also be installing a working search bar. Lastly,

the system will have a log-in window, to view and edit the database. The only people

which are allowed to edit the database are a select few people who have higher rankings.

This is to ensure the safety and confidentiality of the information regarding the criminals.

15
CHAPTER IV

PRESENTATION AND ANALYSIS OF DATA

This chapter includes System Description that contains information defining the

characteristics of the operating environment controlled by the system the researchers

have programmed. Also, the System Objectives which have a specific result that the

system aims to achieve within a time frame and with available resources. In addition, we

will see the basic tools that underlie all planning and strategic activities. The function of

the system is also included in this chapter it will state the purpose of this system.

SYSTEM DESCRIPTION

Our system is entitled Digital Detainee Record System. This system will benefit Police

Officers, Lawyers, and even the Community.

Police Officers are able to view the information regarding the criminal which

include their basic information, story, and verdict. The higher-ups of the Police Hierarchy

are also able to easily modify the information seen in the database.

There is a log-in window, for just viewing the information that are exclusive for

officers and for the higher-ups, an edit button which lets them have the ability to modify

the information seen in the database

16
There is a search bar in the program that can be used in order to easily locate the

criminals with the use of their offender numbers.

The system is a computerized Criminal Record that Officers can use to view the

information regarding the criminal. To ensure the safety and confidentiality of the

information regarding the criminals, there will be 1 log-in system that would be installed

to access the information regarding the criminal and to modify and edit the information

about these criminals. The policemen are required to type their username and password in

the given textboxes in order to access the information. After that, they can use the search

bar in searching for a specific criminal with the use of their Offender numbers. When

typed in the search bar, information regarding the criminal like his age, sex, history, and

verdict will be shown on screen. The said information will be enclosed in the database.

The information regarding these criminals will be editable but it is exclusive to only the

higher ups. Other Special features are a clear button to clear the information on the

current form, a back button to go back to the previous form, and an Update button that

saves the current state of the database.

SYSTEM OBJECTIVE

The system’s objective is to ensure the safety and confidentiality of the

information regarding the criminals of a prison with the use of log-in systems. Another

Objective is to also minimize the time and effort in recording the information of the

criminals. This system also aims to make searching the information of the criminals

easier with the use of a search bar.

17
FUNCTIONAL SPECIFICATIONS

ADD– Adds a new space for new criminal information.

BACK – This button will return the current form to the previous form

CLEAR SEARCH – This button will remove or delete all the information typed in the

form

DELETE– Deletes all of the information of one criminal and saves

EDIT – Enables the Table for editing.

LOG-IN – This will allow access to open the form for the criminal record if the password

is correct. It will also display a message box containing: “log-in successful” if the correct

password and username is typed and “incorrect password please try again” if the

password and/or username is wrong.

POLICE HIGHER-UP LOGIN – This button will show a log-in form for editing the

information in the criminal record

POLICE OFFICER LOGIN – This button will show a log-in form for viewing the

criminal record.

SEARCH BAR – This button will be used in order to look up information regarding the

criminal with the use of their offender numbers

UPDATE – Saves the current state of the database.

18
CHAPTER V

Summary, Conclusions and Recommendations

This chapter includes the summary of the program and research, conclusions that

can be stated based on the findings seen in the program and in the interview, and

recommendations that were made by the Panelists in hopes to improve on the program

and fix any mistakes seen in the design and codes of the program.

Summary

The program that was designed is entitled the Digital Detainee Record System in

which its main function is to let the officers and higher-ups of a specific prison access the

personal data of Detainees that is safely kept in a database. The program and research

were constructed using Microsoft Access, Microsoft Visual Studio, Microsoft Word, And

Adobe Photoshop. In order to access this system, you would need an username and

password that was already in the program and due to this

1. The program assured that the information kept in the database is secure with the use of

a log in system.

2. The information in the database can be edited by the higher-ups and can be viewed by

normal police officers.

3. The Update button is functioning properly along with the button that enables the

editing

4. The Search bar functioning in which it can be used in searching for specific criminals

with the use of their Criminal numbers.

19
Recommendations

1. Change the colors of the buttons into a much lighter shade so that it will be easily seen

by the users.

2. Remove the ID (1, 2, 3, 4…) and put the criminal numbers in the first row of the data

table.

3. Arrange the buttons in an orderly fashion or put it in places that it could be easily seen.

20
APPENDICES

21
INTERVIEW

Researcher Darren Cerado interviewing Darwin S. Apuay

22
SYSTEM FLOW

23
24
25
DATAFLOW DIAGRAM

26
SCREEN LAYOUT

Start- Up Form

Log-in Form

27
Interface Form

Basic Criminal Information Form

28
Story and Verdict of the Criminal Form

29
CODES:

START UP FORM:

________________________________________________________________________
Public Class Startup

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button1.Click
login.Show()
Button1.Visible = False
Button2.Visible = False
MessageBox.Show("Please Log-in to access the program", "Log-in First!",
MessageBoxButtons.OK, MessageBoxIcon.Hand)
End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button2.Click
End
End Sub

Private Sub Startup_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load

End Sub
End Class

LOG-IN FORM:
________________________________________________________________________

Public Class login

Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button3.Click
Me.Hide()
Startup.Button1.Visible = True
Startup.Button2.Visible = True

End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button2.Click
If txtuser.Text = "PSDalisayC" And txtpass.Text = "PhilNat" Then

Inter.Show()
Me.Hide()
Verdict.BtnEdit.Enabled = True
InfoPic.BtnEdit.Enabled = True
MessageBox.Show("Choose the information that you want to see",
"Welcome to the Digital Detainee Interface", MessageBoxButtons.OK,
MessageBoxIcon.None)

30
ElseIf txtuser.Text = "PGAlbayalde" And txtpass.Text = "PhilNat" Then

Inter.Show()
Me.Hide()
Verdict.BtnEdit.Enabled = True
InfoPic.BtnEdit.Enabled = True
MessageBox.Show("Choose the information that you want to see",
"Welcome to the Digital Detainee Interface", MessageBoxButtons.OK,
MessageBoxIcon.None)
Else

MessageBox.Show("The Username/Password you entered is incorrect.",


"Authentication Error",
MessageBoxButtons.OK, MessageBoxIcon.Error)

End If
End Sub

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button1.Click
If txtuser.Text = "PabalinasR" And txtpass.Text = "12345" Then

Inter.Show()
Me.Hide()
MessageBox.Show("Choose the information that you want to see",
"Welcome to the Digital Detainee Interface", MessageBoxButtons.OK,
MessageBoxIcon.None)
ElseIf txtuser.Text = "EranaJ" And txtpass.Text = "12345" Then

Inter.Show()
Me.Hide()
MessageBox.Show("Choose the information that you want to see",
"Welcome to the Digital Detainee Interface", MessageBoxButtons.OK,
MessageBoxIcon.None)
ElseIf txtuser.Text = "TriaM" And txtpass.Text = "12345" Then
MessageBox.Show("Choose the information that you want to see",
"Welcome to the Digital Detainee Interface", MessageBoxButtons.OK,
MessageBoxIcon.None)
Inter.Show()
Me.Hide()
ElseIf txtuser.Text = "AnnibanC" And txtpass.Text = "12345" Then
MessageBox.Show("Choose the information that you want to see",
"Welcome to the Digital Detainee Interface", MessageBoxButtons.OK,
MessageBoxIcon.None)
Inter.Show()
Me.Hide()
ElseIf txtuser.Text = "TabdiG" And txtpass.Text = "12345" Then
MessageBox.Show("Choose the information that you want to see",
"Welcome to the Digital Detainee Interface", MessageBoxButtons.OK,
MessageBoxIcon.None)
Inter.Show()
Me.Hide()

Else
MessageBox.Show("The Username/Password you entered is incorrect.",
"Authentication Error",
MessageBoxButtons.OK, MessageBoxIcon.Error)
End If

31
End Sub

Private Sub BtnClose_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnClose.Click
End
End Sub

Private Sub login_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load

End Sub
End Class

INTERFACE FORM:
________________________________________________________________________
Public Class Inter

Private Sub BtnInfo_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnInfo.Click
InfoPic.Show()
Me.Hide()

End Sub

Private Sub BtnBack_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnBack.Click
Me.Hide()
login.Show()
End Sub

Private Sub BtnVerdict_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnVerdict.Click
Me.Hide()
Verdict.Show()
End Sub

Private Sub BtnClose_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnClose.Click
End
End Sub

Private Sub Inter_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load
MessageBox.Show("You have successfully logged in!", "Log-in Successful!",
MessageBoxButtons.OK, MessageBoxIcon.None)

End Sub

32
End Class

CRIMINAL INFORMATION FORM:


________________________________________________________________________
Public Class InfoPic

Private Sub BtnBack_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnBack.Click
Me.Hide()
Inter.Show()
End Sub

Private Sub Button6_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button6.Click
Me.Validate()
Me.TableCriminfoPicBindingSource.AddNew()
End Sub

Private Sub Button5_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button5.Click
Me.Validate()
Me.TableCriminfoPicBindingSource.MoveNext()
End Sub

Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button3.Click
Me.Validate()
Me.TableCriminfoPicBindingSource.MovePrevious()
End Sub

Private Sub TableCriminfoPicBindingNavigatorSaveItem_Click(ByVal sender As


System.Object, ByVal e As System.EventArgs)
Me.Validate()
Me.TableCriminfoPicBindingSource.EndEdit()
Me.TableAdapterManager.UpdateAll(Me.CriminalInfoDatabaseDataSet)

End Sub

Private Sub InfoPic_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load
'TODO: This line of code loads data into the
'CriminalInfoDatabaseDataSet.TableCriminfoPic' table. You can move, or remove it,
as needed.

Me.TableCriminfoPicTableAdapter.Fill(Me.CriminalInfoDatabaseDataSet.TableCriminfoP
ic)
'TODO: This line of code loads data into the
'CriminalInfoDatabaseDataSet.TableCriminfoPic' table. You can move, or remove it,
as needed.

33
Me.TableCriminfoPicTableAdapter.Fill(Me.CriminalInfoDatabaseDataSet.TableCriminfoP
ic)

MessageBox.Show("This contains personal information of the criminal.",


"Welcome to the Criminal Information Form", MessageBoxButtons.OK,
MessageBoxIcon.None)
End Sub

Private Sub Button4_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button4.Click
Me.Validate()
Me.TableCriminfoPicBindingSource.AddNew()

Me.TableCriminfoPicTableAdapter.Update(CriminalInfoDatabaseDataSet.TableCriminfoPi
c)
End Sub

Private Sub BtnEdit_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnEdit.Click
TableCriminfoPicDataGridView.AllowUserToAddRows = True
TableCriminfoPicDataGridView.AllowUserToDeleteRows = True
TableCriminfoPicDataGridView.AllowUserToOrderColumns = True
TableCriminfoPicDataGridView.AllowUserToResizeRows = True
TableCriminfoPicDataGridView.ReadOnly = False
Button4.Visible = True
Button6.Visible = True
Button7.Visible = True
BtnEnd.Enabled = True

End Sub

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button1.Click
If TextBox1.Text = "" Then
MessageBox.Show("Please write something on the search bar", "Error",
MessageBoxButtons.OK, MessageBoxIcon.Error)
Else
TableCriminfoPicDataGridView.DataSource =
Me.CriminalInfoDatabaseDataSet.TableCriminfoPic.Select("CriminalNumber =" &
TextBox1.Text)
End If

End Sub

Private Sub Button7_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button7.Click
TableCriminfoPicBindingSource.RemoveCurrent()
End Sub

Private Sub BtnEnd_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnEnd.Click
TableCriminfoPicDataGridView.AllowUserToAddRows = False
TableCriminfoPicDataGridView.AllowUserToDeleteRows = False
TableCriminfoPicDataGridView.AllowUserToOrderColumns = False
TableCriminfoPicDataGridView.AllowUserToResizeRows = False
TableCriminfoPicDataGridView.ReadOnly = True

34
Button4.Visible = False
Button6.Visible = False
Button7.Visible = False
BtnEnd.Enabled = False
End Sub

Private Sub Button8_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnClose.Click
End
End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button2.Click
TableCriminfoPicDataGridView.DataSource =
Me.CriminalInfoDatabaseDataSet.TableCriminfoPic
TextBox1.Text = ""
End Sub

Private Sub TableCriminfoPicBindingNavigatorSaveItem_Click_1(ByVal sender As


System.Object, ByVal e As System.EventArgs)
Me.Validate()
Me.TableCriminfoPicBindingSource.EndEdit()
Me.TableAdapterManager.UpdateAll(Me.CriminalInfoDatabaseDataSet)

End Sub

Private Sub TableCriminfoPicDataGridView_CellContentClick(ByVal sender As


System.Object, ByVal e As System.Windows.Forms.DataGridViewCellEventArgs) Handles
TableCriminfoPicDataGridView.CellContentClick

End Sub
End Class
CRIMINAL VERDICT FORM:
________________________________________________________________________
Public Class Verdict

Private Sub BtnBack_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnBack.Click
Me.Hide()
Inter.Show()
End Sub

Private Sub TableCrimStoryBindingNavigatorSaveItem_Click(ByVal sender As


System.Object, ByVal e As System.EventArgs)
Me.Validate()
Me.TableCrimStoryBindingSource.EndEdit()
Me.TableAdapterManager.UpdateAll(Me.CriminalInfoDatabaseDataSet)

End Sub

Private Sub Verdict_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load
'TODO: This line of code loads data into the
'CriminalInfoDatabaseDataSet.TableCriminfoPic' table. You can move, or remove it,
as needed.

35
Me.TableCrimStoryTableAdapter.Fill(Me.CriminalInfoDatabaseDataSet.TableCrimStory)
'TODO: This line of code loads data into the
'CriminalInfoDatabaseDataSet.TableCrimStory' table. You can move, or remove it, as
needed.

Me.TableCrimStoryTableAdapter.Fill(Me.CriminalInfoDatabaseDataSet.TableCrimStory)
'TODO: This line of code loads data into the
'CriminalInfoDatabaseDataSet.TableCrimStory' table. You can move, or remove it, as
needed.

Me.TableCrimStoryTableAdapter.Fill(Me.CriminalInfoDatabaseDataSet.TableCrimStory)

MessageBox.Show("This contains information regarding the crime and its


verdict.", "Welcome to the Criminal Story Form", MessageBoxButtons.OK,
MessageBoxIcon.None)
End Sub

Private Sub BtnEdit_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnEdit.Click
TableCrimStoryDataGridView.AllowUserToAddRows = True
TableCrimStoryDataGridView.AllowUserToDeleteRows = True
TableCrimStoryDataGridView.AllowUserToOrderColumns = True
TableCrimStoryDataGridView.AllowUserToResizeRows = True
TableCrimStoryDataGridView.ReadOnly = False
Button4.Visible = True
Button6.Visible = True
Button7.Visible = True
BtnEnd.Enabled = True

End Sub

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button1.Click
If TextBox1.Text = "" Then
MessageBox.Show("Please write something on the search bar", "Error",
MessageBoxButtons.OK, MessageBoxIcon.Error)
Else
TableCrimStoryDataGridView.DataSource =
Me.CriminalInfoDatabaseDataSet.TableCrimStory.Select("CriminalNumber =" &
TextBox1.Text)
End If
End Sub

Private Sub Button7_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button7.Click
TableCrimStoryBindingSource.RemoveCurrent()
End Sub

Private Sub Button6_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button6.Click
Me.Validate()
Me.TableCrimStoryBindingSource.AddNew()
End Sub

Private Sub Button5_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button5.Click

36
Me.Validate()
Me.TableCrimStoryBindingSource.MoveNext()
End Sub

Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button3.Click
Me.Validate()
Me.TableCrimStoryBindingSource.MoveNext()
End Sub

Private Sub Button4_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button4.Click
Me.Validate()
Me.TableCrimStoryBindingSource.AddNew()

Me.TableCrimStoryTableAdapter.Update(CriminalInfoDatabaseDataSet.TableCrimStory)
End Sub

Private Sub BtnEnd_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnEnd.Click
TableCrimStoryDataGridView.AllowUserToAddRows = False
TableCrimStoryDataGridView.AllowUserToDeleteRows = False
TableCrimStoryDataGridView.AllowUserToOrderColumns = False
TableCrimStoryDataGridView.AllowUserToResizeRows = False
TableCrimStoryDataGridView.ReadOnly = True
Button4.Visible = False
Button6.Visible = False
Button7.Visible = False
BtnEnd.Enabled = False
End Sub

Private Sub BtnClose_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles BtnClose.Click
End
End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button2.Click
TextBox1.Text = ""
TableCrimStoryDataGridView.DataSource =
Me.CriminalInfoDatabaseDataSet.TableCrimStory
End Sub

Private Sub TableCrimStoryBindingNavigatorSaveItem_Click_1(ByVal sender As


System.Object, ByVal e As System.EventArgs)
Me.Validate()
Me.TableCrimStoryBindingSource.EndEdit()
Me.TableAdapterManager.UpdateAll(Me.CriminalInfoDatabaseDataSet)

End Sub

End Class

37
DATABASE:

38
BIBLIOGRAPHY

Agustin,Mark H. (2016).Chapter II. REVIEW OF RELATED LITERATURE AND

STUDIES Retrieved from: https://thesisbook.readthedocs.io/en/latest/Chapter%20II.html

Robson, Bailey Watts (February 24 2007). A computer-based system for recording and
sorting phytoplankton count data. Retrieved From:
https://www.tandfonline.com/doi/abs/10.1080/00071618700650321

Berger, Jesse JD. (September 3 2010). The Pro’s and Con’s of Electronic Criminal
Records Processing. Retrieved From:

https://cdn.ymaws.com/www.southpalmbeachbar.org/resource/resmgr/imported/The%20
Pros%20and%20Cons%20of%20Criminal%20Records%20Processing.pdf

Romano, Carmelo (N.D). 9 Advantages of computerized Accounting. Retrieved from:

http://www.cleveraccounting.com/9-advantages-computerized-accounting

Zaleski, John (2015). Medical Information Interface and Communication System.


Retrieved From:https://patents.google.com/patent/US20060173246A1/en

39

Вам также может понравиться