By T.anusha Under Guidance Of Mr.k.mahesh

  • Uploaded by: APPARI RAJESH
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View By T.anusha Under Guidance Of Mr.k.mahesh as PDF for free.

More details

  • Words: 7,328
  • Pages: 60
BY T.ANUSHA UNDER GUIDANCE OF Mr.K.MAHESH

Submitted to the school of computer an information sciences in partial fulfillment of the requirements for the degree of B.Sc (MSCS)

.

ST XAVIERS DEGREE COLLEGE PENDURTHI, VSP.

SCHOOL OF COMPUTER AND INFORMATION SCIENCE ADITYA DEGREE COLLEGE GOPALAPATNAM ,VSP-027

ENROLLMENT NO:

207170021

STUDY CENTER :

ST XAVIERS DEGREE COLLEGE

EMAIL-ID:

[email protected] 9290017603

NAME :

T.ANUSHA

TITLE OF THE PROJECT:

CIVIL SUPPLIERS

NAME OF THE COUNSELOR: SOFTWARE USED IN THE PROJECT: Prog. Environment : Microsoft Visual Basic 6.0 Database

SIGNATURE OF THE STUDENT

: Oracle 8i

SIGNATURE OF THE COUNSELOR

CERTIFICATE

This to certify that the project work entitled,”CIVIL SUPPLIERS for FAMILY details”, is done by student

T.ANUSHA

Enrollment no-207170021

ST XAVIERS DEGREE

COLLEGE, VISAKHAPATNAM ,using Visual Basic6.0 as front end and Oracle as back end towards partial fulfillment for the award of BACHELOR OF SCIENCE (B.Sc) by ANDHRA UNIVERSITY.

Lecturer in Computer Science

H.O.D.of Computer Science

ST XAVIERS DEGREE COLLEGE

ST XAVIERS DEGREE COLLEGE

PENDURTHI

PENDURTHI

ACKNOWLEDGEMENT I thank my project guide

Mr. K.MAHESH for his courteous

comments and guidance that enabled the successful completion of my project work . I thank our faculties at the Department particularly Mr.G.A.V.S.SASTRY and

Mr.K.MAHESH

for their kind

suggestions and guidance all through our project works at our Computer Lab.

A project of this kind and size would not have been possible to complete without the constant help and co-operation from my friends at the college . The constant support of our family members always added to our inspiration and boosted

our morale to do the project in time.

DECLARATION

I here by solemnly state that this project report entitled “AUTOMATION OF CIVIL SUPPLIERS” submitted by me is a genuine and bonafide work done by me and is not submitted to any

other university or any published any time

before. This project work is in partial fulfillment of the requirements for the award of BACHELOR OF SCIENCE by the ANDHRA

UNIVERSITY.

BATCH LIST 1.T.ANUSHA 2.T.MADHAVI LATHA

CONTENTS S.NO

DESCRIPTION

1

PREFACE

2

INTRODUCTION  INTRODUCTION TO ORGANIZATION  INTRODUCTION TO ENVIRNOMENT  HARDWARE SPECIFICATIONS  SOFTWARE SPECIFICATIONS  ABOUT WINDOWS 98  ABOUT DBMS

3

SYSTEM ANALAYSIS AND DESIGN  INPUT DESIGN  OUPUT DESIGN

4

INTRODUCTION TO FRONT END

5

INTORODUCTION TO BACK END

6

NORMALIZATION

7

DATABASE DESIGN CONCEPTUAL MODEL ENTITY-RELATION SHIP DIAGRAM DATA BASE ACTION DIAGRAM

8

9

USER MANUAL  A STUDY ON PROJECT  DATA DICTINARY  DATA FLOW DIAGRAMS  PROGRAM CODE  FORMS  REPORTS CONCLUSION

10

BIBLIOGRAPHY

ABSTRACT

In the present day scenario, technology is taking the lead role in influencing the normal human life. we all Know that technology leaps forward with unimaginable speeds .TO reach and update the current trends the world over especially in the field of technology is a challenging tasks as the members of this vast IT community. This project provides us to further enhance and develop our programming skill and social exposure .This project gives us an excellent opportunity to our creative and communicative skills.

INTRODUCTION

ADITYA DEGREE COLLEGE GOPALA PATNAM, is very well known and distinguished college

In industrial area .We have decided to go about

computerizing their operations.

We have decided to go about doing it module by module.

The

specification for the project is as given below. We are empowered to modify these specification if you feel that it should be modified but on every assumption and modification made in the specification .we are supposed to specify it in detail in the documentation as why specification modified .At the end of completion we Are supposed to provide with a detailed documentation of project.

Hardware Requirements:Processor

: Any PC with Microsoft Windows

Hard Disk

: Min 10 GB

RAM

: 128 MB

Monitor

: 14” color Monitor

Keyboard

: 101 keys Keyboard

Mouse

: 2-button mouse

Printer

: Optional

Multimedia

: Sound card with speakers(optional)

SOFTWARE REQUIREMENTS:-

Operating System : Microsoft Windows XP Prog. Environment : Microsoft Visual Basic 6.0 Database

: Oracle 8i

ODBC

: Microsoft ODBC 3.0

WINDOWS 98 An interface is a medium through which a user can interact with the system. They are two types of interfaces , namely , characters user interface and graphical user interface. Character user interface is the interface where the user interacts with the system through commands and Command prompt. For example : DOS , Older versions of UNIX. Windows 98 is Graphical User Interface which enable the user to interact with the system through Graphical Objects. Booting in Windows 98 : As soon as the system is switched on the message “ Starting Windows 98” is displayed in text mode for 2 or 3 seconds immediately a graphical screen with the logo of windows appears along with the process bar at the bottom finally the desktop appears with all icons and task bar the mouse pointer also gets initialized. This indicates the system files (IO.SYS , MSDOS.SYS and COMMAND.COM) and configuration files(WIN.INI , CONFIG.SYS , SYSTEM.INI and AUTOEXE.BAT). The desktop contains a mouse pointer and icons (icon is a Graphical objects which has some properties attached to it or applications . ) to the left .The icons are My Computers: It contains list of drives( local and network) , printers , control panel, Dial-up Networking, Scheduled tasks and Web folders. My Documents:

It contains list of files , which were created by the user. It also allows restoring and deleted files or folders. By default Recycle Bin is allocated 10% of disk space. The user according to his requirement can change this % Network Neighborhood: This folder contains a list of computers, which are connected to a network. It also allows sharing resources on the remote system. The taskbar contains 3 important areas they are 1)Start Menu: The start menu contains various options such as Programs , Documents , settings , Find , Help, Run and Shutdown. 2)Program area: This area contains tasks or tabs for all opened applications .A program can either be in a minimized mode or maximized mode. 3)System Tray: The System Tray is located at right bottom corner of the desktop . It contains systemminimized applications such as Volume Control , System Agent , Resource Meter , Modern Status , Microsoft Fax , New E-Mail , Printing Status, Ac Power Meter, Keyboard Language , System Time. The uses of Windows are :1)Innovative ,easy to use:Windows 98 is a graphical user Interface. The icons on the desktop are easy to remember and are related to the application. 2)Improved Reliability 3)Faster 4)Allows Web Integration

Introduction to DBMS A Data Base Management system consists of collection of interrelated data and a set of programs to access that data. The collection of data, usually referred to as the database, contains about one particular enterprise. The primary goal of DBMS is to provide an environment that is both convenient and efficient use in retrieving and storing database information. Components of DBMS: Database system involves four major components : 1)Data, 2) Hardware, 3) Software 4) Users Data: The data is known as collection of raw facts of information. The data stored in the system is partitioned into one or more data bases. Database then is a repository for stored data. In general, it is both integrated and shared. By integrated mean that the database may be thought of as unification of several otherwise distinct data files. Hardware : The hardware consists of secondary storage volumes-disks, drums etc. On which the data base resides ,together with the associated devices,control units,channels Software : The layer between the physical database and users of the system is the software, usually called the DBMS. The DBMS provides a view of the database that is elevated somewhat above the hardware level, and supports user operations that are expressed in terms of that higher level view.

Users: There are three different classes of users: 1) Application programmers 2) End users

3) Data base Administrator(DBA) Application programmers responsible for writing application programs that use the database. The end-user is accessing the database from the terminal. The DBA is responsible for all database operations. The functions of DBA are 1) Define the data structures 2) Grant authorization of data access 3) Define backup and recovery procedures 4) Provides security 5) Monitor system performance and response time. 6) Define the integrity specifications.

Advantages of RDBMS: The database approach offers a number of potential advantages compared to traditional file processing systems. Some of the specific advantages of DBMS approaches are

Controlled data Redundancy: In non database approach, same data will be stored in different files in an organization. In DBMS approach the data can be kept ins single place. Hence the redundancy can be controlled considerably in DBMS approach 2 ) Elimination of inconsistency: In non DBMS approach, same data will be stored in different files, suppose if we modify after a data item in one place, the change will not reflect automatically in other places. In DBMS approach, the data will be stored in one place and doesn’t permit the inconsistency. 3) Shared data: The DBMS approach allows the sharing of the data. Authorized internal and external users are granted permission to use the data base. DBMS also provides variety of user interfaces. 4) Data Independence: The separation of data descriptions (meta data) from the application programs that use the data is called data independence. Data independence is advantageous in DBMS approach as it allows change at one level of the data base without effecting other levels 5) Improved Integrity: Data integrity means that the data contained in the database is both accurate and consistent, Data integrity in DBMS is ensured as adequate checks can be incorporate. 6) Conflict resolution: Since the database is under the control of the DBA, the DBA can resolve any conflicts of various user. 7) Enforcement of standards: In DBMS approach, with full management support , the DBA can define and enforce standards among all the users of all organization. Standards can be defined for names, formats, reports.

8) Providing Back up and recovery: In the DBMS approach the facilities for backup and recovery. Will be provided. The back up and recovery procedures ensure the restoration of database in case of any sudden failures. Security: Data is most important to any organization. Some of the data of the organization is confidential also. DBMS approach provides security to the database. There are various restrictions will be provided in DBMS approach. DBMS provides different levels of security for various types of data, for various operations and for different users. The DBMS will enforce all these security measures through theDBA.

SYSTEM ANALYSIS AND DESIGN

System Development can generally be thought of as having two major components, System analysis and System Design. System analysis is the process of gathering and interpreting facts, diagnosing problem, and using the information to recommend improvements to the system. This is the job of the System Analyst. System Design is the process of planning new business system or one to replace or complement an existing system. But before this planning can be done, it is necessary to understand the old system and determine how computers can be used to make its operation more effective. In most business situation the activities are all closely related, usually inseparable, and even the order of the steps in these activities may be difficult to determine. Different parts of a project can be in various phases at the same time, with some components undergoing analysis while others are at advanced stages. It consists of the following activities: 1)

Project Request

2)

Preliminary Investigation

3)

Determination of System Requirements

4)

System Design

5)

Development of software

6)

System Testing

7)

Implementation and Evaluation

PROJECT REQUEST: The project proposal submitted by the user or the analysis to the project selection committee is a crucial element in launching the system study. Although the form of such is a request varies firm to firm, there is general agreement on the kind of information that should be provided. In the proposal, the requester identifies where assistance is needed and gives details.

PREMLIMINARY INVESTIGATION : Requests to receive assistance from information systems can be made for many reasons, in each case an employee or managers initiate the request. When that request is made the first activity, the preliminary investigation begins. This activity has three parts – Request Clarification, Feasibility study and Request approval DETERMINATION OF SYSTEM REQUIREMENTS At the heart of the system analysis is a detailed understanding of all important facts of the business are under investigation. Analysis working closely with employees and managers, must study the business process to answer these key questions:

What is being done? How is it being done? How frequently does it occur? How great is the volume of transaction or decisions? How well is the task being performed? Does a problem exists If a problem exists, how serious is it? If the problem exists, what is the underlying cause? To answer these questions system analysis talk to a variety of persons to gather details about the business process and their opinions of any thing happens as they do not their ideas for changing the process. PROPOSED SYSTEM: Design phase follows analysis of the system. Before starting the design we should have a model of proposed system. We have attempted to evolve a system, which will

be evaluated during implementation and testing phase, any feedback so acquired will be used to modify the system, which is being proposed. SYSTEM DESIGN: The design of an information system produces the details that state how a system will meet all requirements during that state how a system will meet all requirements during system analysis. System analysis begins designs the design process by identifying reports and other outputs the system will produce. This procedures tell to process the data produce output. There are several phases in the design process. LOGICAL DESIGN: System design is solution, a “how to “ approach compared to analysis, a “what is” orientation. It translates the system requirement in two ways of operation aliening them. The detailed specifications for the system were drawn on the basis of the user requirement data. The outputs, inputs and relationship between the variables are designed in this phase. SYSTEM TESTING: During system testing, the system is used experimentally to ensure that the software does not fail, i.e., that it will run according to its specification and in the way users expect. Special test data are input for processing and the results examined. A limited number of users may be allowed to use the system so, analysis can see whether that try to use it in unforeseen ways. It is preferable to discovery any surprises before the organization implement the system and depends on it. In case of access Control system, the system is tested experimentally by inserting the care in to the card readers and the access granted or denied message is shown on the screen.

IMPLEMENATION AND EVALUATION: Implementation is the process of having systems personnel checkout an new equipment into use, train users, install the new application, and construct any files of data needed to use it. System developers may choose to test the operation in only one areas of the firm, say, in one department or with only one or two persons.

OPERATIONAL EVALUATION: Assessment of the manner in which the system functions, including ease of use, response time, suitability of information formats, over all reliability and level of utilization. ORGANIZATIONAL IMPACT: Identification and measurement of benefits to the organization in such areas as financial concern(cost, revenue and profit) operational efficiency, and competitive impact including on internal and information flows. USER MANAGER ASSESSMENT: Evaluation of the attributes of senior and user manager within the organizations, as well as end-users.

INPUT DESIGN Input design is a part of overall system design. The main objective during the input design is as given below:

To produce a cost-effective method of input To achieve the highest possible level of accuracy To ensure that the input is acceptable and understood by the user Input stages: The main input stages can be listed as below: Data recording Data transcription Data conversion Data verification Data control Data Transmission Data validation Data correction INPUT TYPES: It is necessary to determine the various types of inputs. Inputs can be categorized as follows: External inputs, which are prime inputs for the system Internal inputs, which are user communications with the system Operational, which are computer department’s communications to the system. Interactive, which are inputs entered during a dialogue. INPUT MEDIA At this stage choice has to be made about the input media. To conclude about the input media. To conclude about the input media consideration has to be given to Types of inputs Flexibility of format Speed Accuracy Verification methods Rejection rates

Ease of correction Storage and handling requirements Security Ease to use Portability

OUTPUT DESIGN Outputs from a computer systems are required primarily to communicate the results of processing to users. They are also used to provide a permanent copy of the results for later consultation. The various types of outputs in general are: External Outputs, whose destination is outside the organization Internal Outputs, whose destination is with in organization and they are the user’s main interface with the computer Operational Outputs, whose use is purely with in the computer department Interface Outputs, which involve the user in communicating directly with the computer.

Output Definition: The outputs should be defined in terms of the following points: Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. For example, Will decimal points need to be inserted Should leading zeros be suppressed Output Media: In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations while deciding about media are: The suitability for the device to the particular application. The need for a hard copy The response time required The location of the users The software and hardware available The cost Keeping in view the above description the project is to have outputs mainly coming under the category of internal outputs. The main desired according to the requirement specifications are: The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the

outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies.

1. Introduction to the Visual Basic Language and Environment •

Visual Basic is a tool that allows you to develop Windows (Graphic User Interface GUI) applications. The applications have a familiar appearance to the user.



Visual Basic is event-driven; meaning code remains idle until called upon to respond to some event (button pressing, menu selection...). An event processor governs Visual Basic. Nothing happens until an event is detected. Once an event is detected, the code corresponding to that event (event procedure) is executed. Program control is then returned to the event processor. Event? Basic Code



Basic Code

Event processor Basic Code

Some Features of Visual Basic ⇒

Full set of objects - you 'draw' the application

Event Procedures

⇒ Lots of icons and pictures for your use ⇒ Response to mouse and keyboard actions ⇒ Clipboard and printer access ⇒ Full array of mathematical, string handling, and graphics functions ⇒ Can handle fixed and dynamic variable and control arrays ⇒ Sequential and random access file support ⇒ Useful debugger and error-handling facilities ⇒ Powerful database access tools ⇒ Package & Deployment Wizard makes distributing your applications simple ⇒ Faster compiler ⇒ New ActiveX data control object ⇒ Allows database integration with wide variety of applications ⇒ New data report designer ⇒ New Package & Deployment Wizard ⇒ Additional internet capabilities

Structure of a Visual Basic Application Project (.VBP, .MAK) Form 1 (.FRM)

Form 2 (.FRM)

Form 3 (.FRM)

Control

Control

Control

Control

Control

Control

Control

Control

Control

Module 1 (.BAS)

Application (Project) is made up of: ⇒ Forms - Windows that you create for user interface ⇒ Controls - Graphical features drawn on forms to allow user interaction (text boxes, labels, scroll bars, command buttons, etc.) (Forms and Controls are objects.) ⇒ Properties - Every characteristic of a form or control is specified by a property. Example properties include names, captions, size, color, position, and contents. Visual Basic applies default properties. You can change properties at design time or run time. ⇒ Methods - Built-in procedure that can be invoked to impart some action to a particular object. ⇒ Event Procedures - Code related to some object. This is the code that is executed when a certain event occurs. ⇒ General Procedures - Code not related to objects. This code must be invoked by the application. ⇒ Modules - Collection of general procedures, variable declarations, and constant definitions used by application. Steps in Developing Application •

There are three primary steps involved in building a Visual Basic application: 1. Draw the user interface 2. Assign properties to controls 3. Attach code to controls We’ll look at each step.

Drawing the User Interface and Setting Properties •

Visual Basic operates in three modes. ⇒ ⇒ ⇒

Design mode - used to build application Run mode - used to run the application Break mode - application halted and debugger is available

We focus here on the design mode. •

Six windows appear when you start Visual Basic. ⇒ The Main Window consists of the title bar, menu bar, and toolbar. The title bar indicates the project name, the current Visual Basic operating mode, and the current form. The menu bar has drop-down menus from which you control the operation of the Visual Basic environment. The toolbar has buttons that provide shortcuts to some of the menu options. The main window also shows the location of the current form relative to the upper left corner of the screen (measured in twips) and the width and length of the current form.

Code Editor Object Form position Stop Form Tasks Run Browser dimensions Pause Project Form Menu Layout Explorer Toolbox editor Save Propertie project New s window form Open project Add project

⇒ The Form Window is central to developing Visual Basic applications. It is where you draw your application.

⇒ The Toolbox is the selection menu for controls used in your application.

Pointer Label Frame

Picture Box Text Box Command Button

Check Box

Option Button

Combo Box

List Box

Horizontal Scroll Timer Directory List Box Shapes Image Box Object Linking

Vertical Scroll Bar Drive List Box File List Box Lines Data Tool

⇒ The Properties Window is used to establish initial property values for objects. The drop-down box at the top of the window lists all objects in the current form. Two views are available: Alphabetic and Categorized. Under this box are the available properties for the currently selected object.

⇒ The Form Layout Window shows where (upon program execution) your form will be displayed relative to your monitor’s screen:

⇒ The Project Window displays a list of all forms and modules making up your application. You can also obtain a view of the Form or Code windows (window containing the actual Basic coding) from the Project window.



As mentioned, the user interface is ‘drawn’ in the form window. There are two ways to place controls on a form:

1. Double-click the tool in the toolbox and it is created with a default size on the form. You can then move it or resize it. 2. Click the tool in the toolbox, then move the mouse pointer to the form window. The cursor changes to a crosshair. Place the crosshair at the upper left corner of where you want the control to be, press the left mouse button and hold it down while dragging the cursor toward the lower right corner. When you release the mouse button, the control is drawn. •

To move a control you have drawn, click the object in the form window and drag it to the new location. Release the mouse button.



To resize a control, click the object so that it is select and sizing handles appear. Use these handles to resize the object.

Click here to move object

Use sizing handles to resize object

OVER VIEW OF ORACLE 8I The oracle 8i is a state of the art information management environment. It is a respiratory for very large amount of data, and gives rapid access data. The oracle 8i allows for sharing of data between applications. The information is shared in one place and many systems. At first, the oracle 8i was available on sun solaris and windows NT. The oracle 7 server runs on dozens of different computers, supporting various configurations.

Databases and Information Management A database server is the key to solving the problems of information management. In general, a server must reliably manage a large amount of data in a multi-user environment so that many users can concurrently access the same data. All this must be accomplished while delivering high performance. A database server must also prevent unauthorized access and provide efficient solutions for failure recovery. The Oracle server provides efficient and effective solutions with the following features: client/server environments (distributed processing) large databases and space management many concurrent database users Connectibility High transaction processing performance High availability Controlled availability openness, industry standards

To take full advantage of a given computer system or network, Oracle allows processing to be split between the database server and the client application programs. The computer running the database management system handles all of the database server responsibilities while the workstations running the database application concentrate on the interpretation and display of data. Oracle supports the largest of databases, which can contain terabytes of data. To make efficient use of expensive hardware devices, Oracle allows full control of space usage. Oracle supports large numbers of concurrent users executing a variety of database applications operating on the same data. It minimizes data contention and guarantees data concurrency. Oracle software allows different types of computers and operating systems to share information across networks. Oracle maintains the preceding features with a high degree of overall system performance. Database users do not suffer from slow processing performance. At some sites, Oracle works 24 hours per day with no down time to limit database throughput. Normal system operations such as database backup and partial computer system failures do not interrupt database use. Oracle can selectively control the availability of data, at the database level and sub-database level. For example, an administrator can disallow use of a specific application so that the application's data can be reloaded, without affecting other applications. Oracle adheres to industry accepted standards for the data access language, operating systems, user interfaces, and network communication protocols.

It is an "open" system that protects a customer's investment. Oracle also supports the Simple Network Management Protocol (SNMP) standard for system management. This protocol allows administrators to manage heterogeneous systems with a single administration interface. manageable security To protect against unauthorized database access and use, Oracle provides fail-safe security features to limit and monitor data access. These features make it easy to manage even the most complex design for data access. database enforced Oracle enforces data integrity, "business rules" that dictate the standards for integrity acceptable data. This reduces the costs of coding and managing checks in many database applications. portability Oracle software works under different operating systems. Applications developed for Oracle can be ported to any operating system with little or no modification. compatibility Oracle software is compatible with industry standards, including most industry standard operating systems. Applications developed for Oracle can be used on virtually any system with little or no modification. distributed systems For networked, distributed environments, Oracle combines the data physically located on different computers into one logical database that can be accessed by all network users. Distributed systems have the same degree of user transparency and data consistency as non-distributed systems, yet receive the advantages of local database management.

replicated environments

Oracle also offers the heterogeneous option that allows users to access data on some non-Oracle databases transparently. Oracle software lets you replicate groups of tables and their supporting objects to multiple sites. Oracle supports replication of both data- and schema-level changes to these sites. Oracle's flexible replication technology supports basic primary site replication as well as advanced dynamic and shared-ownership models.

The following sections provide a comprehensive overview of the Oracle architecture. Each section describes a different part of the overall architecture.

The Oracle Server The Oracle server is an object-relational database management system that provides an open, comprehensive, and integrated approach to information management. An Oracle server consists of an Oracle database and an Oracle server instance. The following sections describe the relationship between the database and the instance. Structured Query Language (SQL) SQL (pronounced SEQUEL) is the programming language that defines and manipulates the database. SQL databases are relational databases; this means simply that data is stored in a set of simple relations. A database can have one or more tables. And each table has columns and rows.

A table that has an employee database, for example, might have a column called employee number and each row in that column would be an employee's employee number. You can define and manipulate data in a table with SQL commands. You use data definition language (DDL) commands to set up the data. DDL commands include commands for creating and altering databases and tables. You can update, delete, or retrieve data in a table with data manipulation commands (DML). DML commands include commands to alter and fetch data. The most common SQL command is the SELECT command, which allows you to retrieve data from the database. In addition to SQL commands, the Oracle server has a procedural language called PL/SQL. PL/SQL enables the programmer to program SQL statements. It allows you to control the flow of a SQL program, to use variables, and to write error-handling procedures. Database Structure An Oracle database has both a physical and a logical structure. Because the physical and logical server structure are separate, the physical storage of data can be managed without affecting the access to logical storage structures. Physical Database Structure

An Oracle database's physical structure is determined by the operating system files that constitute the database. Each Oracle database is made of three types of files: one or more datafiles, two or more redo log files, and one or more control files. The files of an Oracle database provide the actual physical storage for database information.

DATABASE NORMALIZATION The process of analyzing the data to be represented and breaking it down into separate tables in accordance with the principles of relational structure is called Normalization.

Need for Normalization: Normalization reduces redundancy. Redundancy is the unnecessary repletion of data. It can cause problems with storage and retrieval of data redundancy which in turn to inconsistency. Errors are more likely to occur when facts are repeated updating inserting, deleting, anomalies and modifying data may cause in corresponding changes in other relations.

Normal Forms: Normalization result in the formation of tables that satisfy certain specified constraints and represent certain normal forms. Normal forms are table structures with minimum redundancy.

UNNORMALIZED FORM: This is a relation, which satisfies all the properties of a relation.

FIRST NORMAL FORM: A relation R is in first normal form if and only if underlying domains contain atomic values only. In other words a relation is said to be in the normal form if it is already in unnormalized form and it has no repeating groups.

SECOND NORMAL FORM: A relation R is in first normal form if and only if it is first normal form and every non-key attributes is fully dependent on the primary key. In other words a relation is said to be in the second normal form if it is already in the first normal form and it has no partial dependency.

THIRD NORMAL FORM: A relation R is in first normal form if and only if it is second normal form and every non-key attributes is not transitively dependent on the Primary key. In other words a relation is said to be in the second normal form and it has no transitive dependency.

BOYCEE-CODD NORMAL FORM: A relation R is in B boyce-codd normal form (benf) if and only if every determinant is a candidate key. An attribute fully dependent on other attribute is a determinant.

FOURTH NORMAL FORM: A relation R is in first normal form if and only if whenever there exist a multivalued dependency is R, say a>>b, the attributes on other attributes is a determinant. In other words a relation is said to be in fourth normal form if it is already in the boycee-codd normal form and it has multivalued dependency.

FIFTH NORMAL FORM:

A relation R is in first normal form also called project-join normal form (pjnf) if and only if and only if the candidate keys of R imply every join dependency in R in other words a relation is said to in the fifth normal form if it is already in the fourth normal form and it has no partial dependency.

DATABASE DESIGN

DATABASE DESIGN CONCEPTUAL DESIGN: It is the process of designing Data base management system independent data model which gives a stable comprehensive view of the entire database. The basic input for this step is the set of relations of different reports(User views). The steps of designing conceptual data model can be summarized as given below. 1. Input the requirement specification in the form of relations 2. Apply normalization on each and every relation up to specified level of normal forms 3. Perform view integration 4. Construct a conceptual data model 5. Design a logical access map(LAM) for each user view Normalization is the process of functional dependency analysis which helps to split the relation of each user view into stable subgroups of data items. Each subgroup of fields is called as ‘file’. View integration is a process of merging the subgroups of data items of different user views which are having the same key field (S).For example, if normalization of different user views results in a total of say 20 different subgroups of data items, then the view integration will merge them on common key field(S) into say 12 subgroups of data items. Construction of conceptual data model means organizing the final set of files obtained through the view integration into a meaningful schema with relevant associations between different files in it. This is called as database management system independent data model/database. Logical access map gives kind of flowchart defined over the conceptual data model to access and manipulate it to print a given report/user view.

ENTITY RELATION SHIP DIAGRAM An entity relation ship diagram can express the overall logical structure of a database Graphically. The entity relation ship model is based on the perception of the real world as collection of basic objects called “entities” and relation ships among objects. An entity is an object that exists and is distinguishable from other objects. The Distinction is accomplished by associating with an entity a set of attributes, which Describe the object. A relation ship is an association among several entities. The Relation ship between two entity sets can be classified according to the number of Entities of another set. An E-R diagram consists the following components: • • • •

Rectangle- represent entity sets Ellipses – represents attributes Diamonds – represent relation ship among entity sets Line-link attributes to entity sets to relation ships.

DATA BASE ACTION DIAGRAM (DAD)

It is a kind of flow chart drawn to show a sequence of actions required to print a particular user view. This is usually drawn along with Logical Access Map (LAM), which shows the sequence of actions performed on the database to print a particular user view in abstract form where as Data Action Diagram (DAD) provides the same in detail. The symbols used in Data Action Diagram (DAD) are listed below. a) Simple action. b) Compound action. c) Control structures –which can be classified into four types as presented below. i. Sequence. ii. Selection. iii. Iteration. iv. Set relation ships.

Simple Action: An action is a step that is performed on one of the record in a file of the database. Simple action performed any one of the four basic actions namely Create, Read, Update and Delete unconditionally.

Compound Action: In compound action, each of the basic action is performed with some conditions.

Control Structures: The four types of control structures are presented below.

Sequence: A sequence is a set of actions performed one after another without any branching in between.

Selection: A selection is also a sequence which has branching in-between based on certain condition.

Iteration: Iteration is an example of representing a block of operations. In iteration, a set of actions will be repeated as long as a specified condition is satisfied.

Set Relation Ship: Set Relation Ship is an action involving two different files.

DATA BASE ACTION DIAGRAM (DAD) It is a kind of flow chart drawn to show a sequence of actions required to print a particular user view. This is usually drawn along with Logical Access Map (LAM),

which shows the sequence of actions performed on the database to print a particular user view in abstract form where as Data Action Diagram (DAD) provides the same in detail. The symbols used in Data Action Diagram (DAD) are listed below. b) Simple action. c) Compound action. d) Control structures –which can be classified into four types as presented below. i. Sequence. ii. Selection. iii. Iteration. iv. Set relation ships.

Simple Action: An action is a step that is performed on one of the record in a file of the database. Simple action performed any one of the four basic actions namely Create, Read, Update and Delete unconditionally.

Compound Action: In compound action, each of the basic action is performed with some conditions.

Control Structures: The four types of control structures are presented below.

Sequence: A sequence is a set of actions performed one after another without any branching in between.

Selection: A selection is also a sequence which has branching in-between based on certain condition.

Iteration: Iteration is an example of representing a block of operations. In iteration, a set of actions will be repeated as long as a specified condition is satisfied.

Set Relation Ship: Set Relation Ship is an action involving two different files.

1.INTRODUCTION The Civil supplies is under tremendous pressure maintaining their day to day work which is currently being done manually . They have decided to go about computerizing. They have decided on go about ding it module by module.

. You are empowered to modify the specs if you feel that it should be modified. But on every assure on and modification made in the spec you are supposed to specify it in detail in the documentation as why the spec was modified. At the end of completion you are supposed to provide with a detailed documentation on your project.

DESIGN DOCUMENTATION

Requirements DATA DICTIONARY Table name: RATION_CARD_MASTER FIELD Ration_card_no Name Purchase_code Doj Shopno Activenonactive Addr Income Adult Major Minor No_of_cyl

DATA TYPE Number Char Number Date Number Char Varchar2 Number Number Number Number Number

WIDTH 4 20 4 4 1 30 5 2 2

DECIMAL

CONSTRAINT Primary key

Primary key 2

2

Table name:Family_details Field Ration_card_no Nameofmemb Sex Age Relationship Photo

Datatype Number Char Char Number Char Bclob

Width 4 40 1 3 10

Decimal

Constraint Foreign key

Width 5

Decimal

Constraint

Table name: product_master Filed Sno Dateofpur Card num Pno Proddesc Unitprice Amount

Datatype Number Date Number Number Char Number Number

4 5 20 6 6

Primary key 2 2

CREATE TABLE RATIONCARDMASTER(RCNO RCNAME CHAR(20), PURCHASECODE NUMBER,

NUMBER PRIMARY KEY,

DOJ SHOPNO ACTIVENONACTIVE ADDR INCOME ADULT MAJOR MINOR NO_OF_CYL /

DATE, NUMBER, CHAR(1), VARCHAR2(30), NUMBER(5,2), NUMBER, NUMBER, NUMBER, NUMBER)

CREATE TABLE PRODUCTMASTER(SNO DATEOFPUR DATE, CARDNUM NUMBER, PNO NUMBER NOTNULL, PRODDESC CHAR(20), UNITPRICE NUMBER(6,2), AMOUNT NUMBER(6,2), QTY NUMBER) / CREATE TABLE FAMILYDETAILS(RCNO NUMBER REFERENCES RATIONCARDMASTER(RCNO), NAMEOFMEMBER CHAR(40), SEX CHAR(1), AGE NUMBER, RELATIONSHIP CHAR(10))

NUMBER,

PROGRAM CODE LOGIN FORM: Option Explicit Public LOGIN As Boolean Private Sub cmdCancel_Click() LOGIN = False Me.Hide End Sub Private Sub cmdOK_Click() If UserName.Text = "RATIONSHOP" Or Password.Text = "MAHESH" Then LOGIN = True frmmain.Visible = True Me.Hide Else MsgBox "Invalid Password, try again!", , "Login" UserName.SetFocus Me.Hide End If End Sub

FRMMAIN Private Sub Command1_Click() frmration.Show Me.Hide End Sub Private Sub Command2_Click() FRMTRANS.Show Me.Hide End Sub Private Sub Command3_Click() FRMREPORT.Show

Me.Hide End Sub Private Sub Command4_Click() End End Sub Private Sub Form_Load() Label3.Caption = Format(Date) Label5.Caption = Format(Time) End Sub FRMRATION Private Sub CMDADDNEW_Click() Adodc1.Recordset.AddNew End Sub Private Sub CMDDELETE_Click() Adodc1.Recordset.Delete MsgBox "RECORD DELETED" End Sub Private Sub CMDEXIT_Click() End End Sub Private Sub CMDFAMILYDETAILS_Click() IMGFORM.Show Me.Hide End Sub Private Sub CMDFIND_Click() Dim INDEX As Integer INDEX = InputBox("ENTER RATION CARD NO") Adodc1.Recordset.MoveFirst While Not Adodc1.Recordset.Fields.Item("CARDNUM") = INDEX Adodc1.Recordset.MoveNext If (Adodc1.Recordset.EOF) Then MsgBox "RECORD NOT FOUND"

End If Wend End Sub Private Sub CMDFIRST_Click() Adodc1.Recordset.MoveFirst End Sub Private Sub CMDGOTOMAIN_Click() frmmain.Show Me.Hide End Sub Private Sub CMDLAST_Click() Adodc1.Recordset.MoveLast End Sub Private Sub cmdnext_Click() Adodc1.Recordset.MoveNext End Sub Private Sub CMDPREVIOUS_Click() Adodc1.Recordset.MovePrevious End Sub Private Sub cmdsave_Click() Adodc1.Recordset.Save MsgBox "ONE RECORD SAVED" End Sub Private Sub CMDUPDATE_Click() Adodc1.Recordset.Update End Sub FRMREPORT

Private Sub Command1_Click() DataReport1.Show

End Sub Private Sub Command2_Click() DataReport2.Show End Sub Private Sub Command3_Click() frmmain.Show Me.Hide End Sub FRMTRANS Private Sub CMDADDNEW_Click() Adodc1.Recordset.AddNew End Sub Private Sub CMDDELETE_Click() Adodc1.Recordset.Delete MsgBox "RECORD DELETED" End Sub Private Sub CMDFIND_Click() Dim INDEX As Integer INDEX = InputBox("ENTER RATIONCARD NUMBER") Adodc1.Recordset.MoveFirst While Not Adodc1.Recordset.Fields.Item("CARDNUM") = INDEX Adodc1.Recordset.MoveNext If Adodc1.Recordset.EOF Then MsgBox "RECORD NOT FOUND" End If Wend End Sub Private Sub CMDFIRST_Click()

Adodc1.Recordset.MoveFirst End Sub Private Sub CMDLAST_Click() Adodc1.Recordset.MoveLast End Sub Private Sub CMDMAIN_Click() frmmain.Show Me.Hide End Sub Private Sub cmdnext_Click() Adodc1.Recordset.MoveNext End Sub Private Sub CMDPREVIOUS_Click() Adodc1.Recordset.MovePrevious End Sub Private Sub cmdsave_Click() Adodc1.Recordset.Save MsgBox "ONE RECORD SAVED" End Sub Private Sub CMDUPDATE_Click() Adodc1.Recordset.Update MsgBox "RECORD UPDATED" End Sub Private Sub Command1_Click() AMT.Text = Val(PRICE.Text) * Val(QTY.Text) End Sub Private Sub Command2_Click() Adodc1.Recordset.AddNew Image1.Picture = LoadPicture("") End Sub Private Sub Command3_Click() IMGFORM.PrintForm

End Sub Private Sub Command4_Click() Adodc1.RecordSource = Text1.Text Adodc1.Refresh End Sub IMGFORM

Private Sub cmdadd_Click() Adodc1.Recordset.AddNew End Sub Private Sub CMDDELETE_Click() Adodc1.Recordset.Delete MsgBox "record deleted" End Sub Private Sub CMDEXIT_Click() End End Sub Private Sub CMDFIRST_Click() Adodc1.Recordset.MoveFirst End Sub Private Sub CMDLAST_Click() Adodc1.Recordset.MoveLast End Sub Private Sub cmdnext_Click() Adodc1.Recordset.MoveNext End Sub Private Sub CMDPREVIOUS_Click() Adodc1.Recordset.MovePrevious End Sub

Private Sub cmdsave_Click() Adodc1.Recordset.Save MsgBox "one record saved" End Sub Private Sub CMDUPDATE_Click() Adodc1.Recordset.Update MsgBox "one record updated" End Sub Private Sub frmmain_Click() frmmain.ShowWhatsThis Me.Hide End Sub

CONCLUSION This project “AUTOMATION OF CIVIL SUPPLIERS “ is done for FAMILY DETAILS starting from registration of MEMBER to the issuing of RATION to the customer.

This process when done manually takes lot of time. So in order to overcome this problem this project has been developed. This saves a lot of time. In order to get the details in this manner it doesn’t take more than two minutes to get the details of employee. Just by giving employee code number we get all the details of the employee.

They can generate various reports based on employee code number and customer wise daily reports also. Finally they can inspect on income and gross salary of the employee and based on these details they will issue pink or white card to employee.

BIBLIOGRAPHY How to database Visual Basic 6.0 By Eric Winemiller Jasen T.Roff Bill Heyman and Ryan Groom Mastering Visual Basic 6.0 By Evangelos Petroutsis Oracle, Users Guide By SQL Corporation Inc. Software Engineering By Pankaj Galothe

Related Documents


More Documents from "lipika008"