Project Documentation
Project Documentation
Project Documentation
Project work submitted in partial fulfillment of the requirements for the award of
the degree B.Sc (IT) Information Technology
By
Project Guide
2010- 2011
Annamalai University
Directorate of Distance Education
Annamalai Nagar
Tamil Nadu – 608002
1
BONAFIDE CERTIFICATE
_________________
Mr. Rohit Sharma
Project Guide
_______________ _________________
Internal Examiner External Examiner
2
ACKNOWELDGEMENT
I would like to thank my guide Mr. Rohit Sharma for his encouragement and guidance,
which helped me in completing the project.
Thank you,
Isha Sharma
Enrollment No: 1700700270
3
Table of Contents
INTRODUCTION..............................................................................................................5
SYSTEM DESIGN.............................................................................................................7
TECHNICAL ANALYSIS.................................................................................................8
FEASIBILITY STUDY....................................................................................................16
SYSTEM IMPLEMENTATION......................................................................................28
MAINTENANCE.............................................................................................................33
PROJECT ESTIMATE.....................................................................................................38
SNAPSHOTS OF FORMS...............................................................................................43
SOURCE CODE...............................................................................................................66
4
INTRODUCTION
The business environment has change more in the last five years than it did over
the previous five decades. The pace of change continues to accelerate and
corporations and institutions around the world seek to revitalize, reinvent and resize in
an effort to position themselves for success in the 21st century. The business
environment has changed more in the last five years than it did over the previous five
decades. Additionally, future pressures are created by technology developments that
shorten many processes whether in production efficiencies the ability to respond to new
business of institutional needs and to judge market opportunities as they arise is crucial.
Successful companies today recognize that a high level of interaction and coordination
along the supply chain will be a key ingredient of their continued success. Enterprises
and institutions are continuously striving to improve themselves in the areas of quality,
time, increased satisfaction levels, performance and profitability. Tomorrow's winner will
be those enterprises and institution that can must effectively gather and quickly act
upon crucial information. Making informed decisions in this manner would enable
organizations to accomplish their growth and at the same time enable them to utilize the
information to competitive advantage.
Inventory control is all about the maintaining the records of customers, products
and bills of a shop in catchy way. In this project we have to login user name and
password, if our password is verified then we are allowed to enter into main menu. If our
password is not verified then access is not allowed. After verification it will display all
information about inventory in which we have customers record, various product
information, transactions, inventory report and information about user.
In customer record we have customer no., name of the customer telephone no.,
fax no., email and address of the customer. In this we can add, delete and save the
information about customers. We can visualize the previous and next customer
information.
5
In product record we have product name, availability of product and price on
which product is available. We can add, delete and count the quantity of product.
In transactions we have complete information about bills which include bill No.,
product name, quantity which remains in stock, price of product, quantity of product and
total amount of purchase. In inventory report we have all records of the product, which
include description, quantity and price of the product. We can add new user and new
user can use transactions.
6
SYSTEM DESIGN
“It is the process of developing such a program that performs different functions
required to be present in the system and link them together to give a complete system
that will perform the desired operations.”
After the system has been analysis, the design stage begins. In the design
phase, the structure of the design for the proposed system is finalized. Structure of files,
database, input, output processes and screens (interfaces) are decided. Correct
designing of the system is very crucial. If we have a wrong design we won’t be able to
get a correct desired system.
7
TECHNICAL ANALYSIS
SOFTWARE ANALYSIS: To freeze the software requirement for this specific system,
we analyze few existing systems available in the market & shops. The factors we
considered in analyzing the software are:
• The response time to execute the user request.
• Database communication with the front end.
• Multi user support from database side.
• Easy availability of software.
• Less development time.
• Easy up gradation.
• Attractive User Interface.
• Easy to validate the input fields.
• Less source code writing.
• Easy to learn the tools.
• Compatible with hardware.
• Easy to access the system resources.
• Security.
8
• CD ROM
TECHNOLOGY USED
(a) VISUAL BASIC: This software comes in a CD which is having an executable file
which installs the visual basic software on the computer, which is used to create the
front end of the software. It gives a designer the option to design an attractive front-end.
Even if the computer is not installed with the Visual Basic software, the executable files
can be created.
Visual Basic was derived from BASIC and enables the rapid application
development (RAD) of graphical user interface (GUI) applications, access to
databases using Data Access Objects DAO, Remote Data Objects RDO, or ActiveX
Data Objects ADO, and creation of ActiveX controls and objects. Scripting languages
such as VBA and VBScript are syntactically similar to Visual Basic, but perform
differently.
LANGUAGE FEATURES:
9
Like the BASIC programming language, Visual Basic was designed to be easy to
learn and use. The language not only allows programmers to create simple GUI
applications, but can also develop complex applications. Programming in VB is a
combination of visually arranging components or controls on a form, specifying
attributes and actions of those components, and writing additional lines of code for
more functionality. Since default attributes and actions are defined for the components,
a simple program can be created without the programmer having to write many lines of
code. Performance problems were experienced by earlier versions, but with faster
computers and native code compilation this has become less of an issue.
Although programs can be compiled into native code executables from version
5 onwards, they still require the presence of runtime libraries of approximately 1 MB in
size. This runtime is included by default in Windows 2000 and later, but for earlier
versions of Windows like 95/98/NT it must be distributed together with the executable.
Visual Basic can create executables (EXE files), ActiveX controls, DLL files, but
is primarily used to develop Windows applications and to interface web database
systems. Dialog boxes with less functionality can be used to provide pop-up capabilities.
Controls provide the basic functionality of the application, while programmers can insert
additional logic within the appropriate event handlers. For example, a drop-down
combination box will automatically display its list and allow the user to select any
element. An event handler is called when an item is selected, which can then execute
additional code created by the programmer to perform some action based on which
element was selected, such as populating a related list.
10
Alternatively, a Visual Basic component can have no user interface, and instead
provide ActiveX objects to other programs via Component Object Model (COM). This
allows for server-side processing or an add-in module.
The language is garbage collected using reference counting, has a large library
of utility objects, and has basic object oriented support. Since the more common
components are included in the default project template, the programmer seldom needs
to specify additional libraries. Unlike many other programming languages, Visual Basic
is generally not case sensitive, although it will transform keywords into a standard case
configuration and force the case of variable names to conform to the case of the entry
within the symbol table entry. String comparisons are case sensitive by default, but can
be made case insensitive if so desired.
The Visual Basic compiler is shared with other Visual Studio languages (C, C++),
but restrictions in the IDE do not allow the creation of some targets (Windows model
DLL's) and threading models.
Visual Basic has the following traits which differ from C-derived languages:
Boolean constant True has numeric value −1.[3] This is because the Boolean
data type is stored as a 16-bit signed integer. In this construct −1 evaluates to 16 binary
1s (the Boolean value True), and 0 as 16 0s (the Boolean value False). This is apparent
when performing a Not operation on a 16 bit signed integer value 0 which will return the
integer value −1, in other words True = Not False. This inherent functionality becomes
especially useful when performing logical operations on the individual bits of an integer
such as And, Or, Xor and Not. This definition of True is also consistent with BASIC
since the early 1970s Microsoft BASIC implementation and is also related to the
characteristics of CPU instructions at the time.
Logical and bitwise operators are unified. This is unlike some C-derived
languages (such as Perl), which have separate logical and bitwise operators. This again
is a traditional feature of BASIC.
Variable array base, Arrays are declared by specifying the upper and lower
bounds in a way similar to Pascal and FORTRAN. It is also possible to use the Option
11
Base statement to set the default lower bound. Use of the Option Base statement can
lead to confusion when reading Visual Basic code and is best avoided by always
explicitly specifying the lower bound of the array. This lower bound is not limited to 0 or
1, because it can also be set by declaration. In this way, both the lower and upper
bounds are programmable. In more subscript-limited languages, the lower bound of the
array is not variable. This uncommon trait does exist in Visual Basic .NET but not in
VBScript.
OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal BASIC in
the late 1970s.
Relatively strong integration with the Windows operating system and the
Component Object Model.
12
(b) MICROSOFT ACCESS: This software is bundled with the Microsoft office suit. It
can be used to create a backend. By this a simple table can be created and the format
of the table is stored to the location, which is assigned in the executable file.
Thus, the combination of the both the software make the project work in the
desired manner.
Access stores data in its own format based on the Access Jet Database Engine.
It can also import or link directly to data stored in other Access databases, Excel,
SharePoint lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any
ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and
PostgreSQL. Software developers and data architects can use it to develop application
software and non-programmer "power users" can use it to build simple applications. It
supports some object-oriented techniques but falls short of being a fully object-oriented
development tool.
The original concept of Access was for end users to be able to “access” data
from any source. Access offers the ability to import and export data to many formats
including Excel, Outlook, ASCII, dBase, Paradox, FoxPro, SQL Server, Oracle, ODBC,
etc. It also has the ability to link to data in its existing location and use it for viewing,
13
querying, editing, and reporting. This allows the existing data to change and the Access
platform to always use the latest data. It can even perform heterogeneous joins
between data sets stored across different platforms. Access is often used by people
downloading data from enterprise level databases for manipulation, analysis, and
reporting locally.
Microsoft Access offers parameterized queries. These queries and Access tables
can be referenced from other programs like VB6 and .NET through DAO or ADO. From
Microsoft Access, VBA can reference parameterized stored procedures via ADO.
SQL Express or MSDE (Microsoft SQL Server Desktop Engine) 2000, a scaled
down version of Microsoft SQL Server 2000, has been a free download for a decade
and may be used with Access as an alternative to the Jet Database Engine.
Microsoft Access is a file server based database. Unlike client server RDBMS,
Microsoft Access does not implement database triggers, stored procedures, or
transaction logging.
In ADP files (supported in Access 2000 and later), the database-related features
are geared more towards a client-server architecture with MSDE or Microsoft SQL
Server serving as the back-end instead of using the Jet Engine. Thus, it supports the
creation of nearly all objects in the underlying server (tables with constraints and
triggers, views, stored procedures and UDF-s). However, only forms, reports, macros
and modules are stored in the ADP file (the other objects are stored in the back-end
14
database). This centralization of queries and tables in the database server offers a more
restrictive environment which appeals to certain missions.
The advantage of an ADP is that it supports the direct creation and editing of
SQL Server tables, views, and stored procedures. The disadvantage compared to the
native Access database is the inability to keep temporary tables (the ADP cannot store
local tables) or link to data from other sources. By definition, this eliminates the ability to
query across different data sources. As a result of these limitations and improvements
to the native Access database, Microsoft is recommending the use of linked tables in
Access for getting to SQL Server data rather than ADPs.
15
FEASIBILITY STUDY
TECHNICAL FEASIBILITY:
OPERATIONAL FEASIBILITY:
LEGAL FEASIBILITY:
1. Labor Saving:
2. Storage Capacity:
3. Future Flexibility:
The system should be capable to adding more files in the event of future
Growths.
4. Instant Access:
16
COST AND BENEFIT ANALYSIS
1. Hardware Cost:
The project does not require special high performance system. Any system
having windows XP will serve the purpose. Thus no additional cost for hardware is
required.
2. Personnel Cost:
Cost incurred during the development of the program is one time cost and is
labeled development cost. Once the system id installed the cost of operating and
maintaining the system become recurring cost. This program doesn’t need specialized
person to operate; any one who can operate pc can operate this software.
3. Facility Cost:
4. Operating Cost:
Operating cost includes only stationery items and the ink of printer.
17
STRUCTURE OF DATABASE TABLES
This inventory system uses following Database Tables build in MS ACCESS. The
following is the layout of these tables:-
CUSTOMER TABLE
Login
18
Item Table
This table is to store the details of items i.e. unit, quantity, price and total amount
of the particular item.
Its layout is as follows:
Daybook Table
19
Stock Table
20
SYSTEMS LIFE CYCLE
Overview of SDLC:
Computer systems have become more complex and often (especially with the
advent of Service-Oriented Architecture) link multiple traditional systems potentially
supplied by different software vendors. To manage this level of complexity, a number of
system development life cycle (SDLC) models have been created: "waterfall,"
"fountain," "spiral," "build and fix," "rapid prototyping," "incremental," and "synchronize
and stabilize." Although the term SDLC can refer to various models, it typically denotes
a waterfall methodology.
21
Systems Development Phases:
Systems Development Life Cycle (SDLC) adheres to important phases that are
essential for developers, such as planning, analysis, design, and implementation,
and are explained in the section below. There are several Systems Development Life
Cycle Models in existence. The oldest model, that was originally regarded as "the
Systems Development Life Cycle" is the waterfall model: a sequence of stages in
which the output of each stage becomes the input for the next. These stages generally
follow the same basic steps but many different waterfall methodologies give the steps
different names and the number of steps seems to vary between 4 and 7. There is no
definitively correct Systems Development Life Cycle model, but the steps can be
characterized and divided in several steps
Model of the Systems Development Life Cycle with the Maintenance bubble highlighted.
22
Initiation/Planning:
To generate a high-level view of the intended project and determine the goals of
the project. The feasibility study is sometimes used to present the project to upper
management in an attempt to gain funding. Projects are typically evaluated in three
areas of feasibility: economical, operational, and technical. Furthermore, it is also used
as a reference to keep the project on track and to evaluate the progress of the MIS
team. The MIS is also a complement of those phases. This phase is also called the
analysis phase.
Design:
Build or Coding:
Testing:
The code is tested at various levels in software testing. Unit, system and user
acceptance testing are often performed. This is a grey area as many different opinions
23
exist as to what the stages of testing are and how much if any iteration occurs. Iteration
is not generally part of the waterfall model, but usually some occurs at this stage.
Types of testing:
The deployment of the system includes changes and enhancements before the
decommissioning or sunset of the system. Maintaining the system is an important
aspect of SDLC. As key personnel change positions in the organization, new changes
will be implemented, which will require system updates.
24
Systems Development Life Cycle Phases
Context Diagram:
A System Context Diagram (SCD) in software engineering and systems engineering are
diagrams that represent all external entities that may interact with a system.
System Context Diagram are diagrams used in systems design to represent all external
entities that may interact with a system. The objective of a system context diagram is to focus
attention on external factors and events that should be considered in developing a complete set
of system requirements and constraints.
System context diagram are related to Data Flow Diagram, and show the interactions
between a system and other actors with which the system is designed to interface. System
context diagrams can be helpful in understanding the context which the system will be part of.
25
Context diagrams are used early in a project to get agreement on the scope under investigation.
Context diagrams are typically included in a requirements document. These diagrams must be
read by all project stakeholders and thus should be written in plain language, so the
stakeholders can understand items within the document.
Registrations / Establishment
NOC / Public Hearing
26
Data Flow Diagram:
A data-flow diagram can also be used for the visualization of data processing
(structured design).
It is common practice to draw a context-level data flow diagram first which shows
the interaction between the system and outside entities. The DFD is designed to show
how a system is divided into smaller portions and to highlight the flow of data between
those parts. This context-level data-flow diagram is then "exploded" to show more detail
of the system being modeled.
Data-flow diagrams (DFDs) are one of the three essential perspectives of the
structured-systems analysis and design method SSADM. The sponsor of a project and
the end users will need to be briefed and consulted throughout all stages of a system's
evolution. With a data-flow diagram, users are able to visualize how the system will
operate, what the system will accomplish, and how the system will be implemented. The
old system's dataflow diagrams can be drawn up and compared with the new system's
data-flow diagrams to draw comparisons to implement a more efficient system. Data-
flow diagrams can be used to provide the end user with a physical idea of where the
data they input ultimately has an effect upon the structure of the whole system from
order to dispatch to report. How any system is developed can be determined through a
data-flow diagram. Developing a data-flow diagram helps in identifying the transaction
data in the data model.
27
SYSTEM IMPLEMENTATION
The following hardware and software is required for Visual Basic applications:
Microsoft Internet Explorer version 4.01 or later (version 4.01 Service Pack 1 or
later for DHTML application developers, and 4.x for end-users of these
applications).
• Enterprise Edition: typical installation 128 MB, full installation 147 MB.
28
Windows 98, Windows 98 Second Edition, Windows Millennium Edition
(Windows Me), Windows NT 4.0 with Service Pack 6 (SP6) or later,1 Windows
2000, or Windows XP or later.
RAM requirements for Access 2002 depend on the operating system used:
Microsoft Internet Explorer version 4.01 or later (version 4.01 Service Pack 1 or
later for DHTML application developers, and 4.x for end-users of these
applications).
Disk space requirements: Hard disk space requirements will vary depending on
configuration; custom installation choices may require more or less. Listed below
is the minimum hard disk requirement for Access:
An additional 115 MB is required on the hard disk where the operating system is
installed. Users without Windows XP, Windows 2000, Windows Me, or Office
2000 Service Release 1 (SR-1) require an extra 50 MB of hard disk space for
System Files Update.
Justification:
Like the BASIC programming language, Visual Basic was designed to be easy to
learn and use. The language not only allows programmers to create simple GUI
applications, but can also develop complex applications. Programming in VB is a
29
combination of visually arranging components or controls on a form, specifying
attributes and actions of those components, and writing additional lines of code for
more functionality. Since default attributes and actions are defined for the components,
a simple program can be created without the programmer having to write many lines of
code. Performance problems were experienced by earlier versions, but with faster
computers and native code compilation this has become less of an issue.
Although programs can be compiled into native code executables from version
5 onwards, they still require the presence of runtime libraries of approximately 1 MB in
size. This runtime is included by default in Windows 2000 and later, but for earlier
versions of Windows like 95/98/NT it must be distributed together with the executable.
Visual Basic can create executables (EXE files), ActiveX controls, DLL files, but
is primarily used to develop Windows applications and to interface web database
systems. Dialog boxes with less functionality can be used to provide pop-up capabilities.
Controls provide the basic functionality of the application, while programmers can insert
additional logic within the appropriate event handlers. For example, a drop-down
combination box will automatically display its list and allow the user to select any
element. An event handler is called when an item is selected, which can then execute
additional code created by the programmer to perform some action based on which
element was selected, such as populating a related list.
30
Alternatively, a Visual Basic component can have no user interface, and instead
provide ActiveX objects to other programs via Component Object Model (COM). This
allows for server-side processing or an add-in module.
The language is garbage collected using reference counting, has a large library
of utility objects, and has basic object oriented support. Since the more common
components are included in the default project template, the programmer seldom needs
to specify additional libraries. Unlike many other programming languages, Visual Basic
is generally not case sensitive, although it will transform keywords into a standard case
configuration and force the case of variable names to conform to the case of the entry
within the symbol table entry. String comparisons are case sensitive by default, but can
be made case insensitive if so desired.
The Visual Basic compiler is shared with other Visual Studio languages (C, C++),
but restrictions in the IDE do not allow the creation of some targets (Windows model
DLL's) and threading models.
31
PROCEDURE TO RUN THE SOFTWARE
The EXE file for the Hardware Inventory can be created and the software can be
made platform independent. The database is required to be copied on the
D:\INVENTORY folder namely ‘project1’ and the software is ready for use. The
corresponding tables are created and stored in MS Access namely ‘project1’.
32
MAINTENANCE
We can define maintenance as term used for the updating after program is in
use. It is said that program is written once and modified many times. The more we
perform maintenance, the more likely that the program will up-to-date and in use.
Backup and recovery procedures protect your database against data loss and
reconstruct the data, should loss occur. The reconstructing of data is achieved through
media recovery, which refers to the various operations involved in restoring, rolling
forward, and rolling back a backup of database files.
A backup is a copy of data. This copy can include important parts of the
database, such as the control file and datafiles. A backup is a safeguard against
unexpected data loss and application errors. If you lose the original data, then you can
reconstruct it by using a backup.
To backup database files including tables, Microsoft Access has an inbuilt utility
called “Back up Database”. Use this from the File Menu and backup the database.
You can restore an entire database, or you can selectively restore objects in a
database.
When you restore an entire database, you replace a database file that is damaged,
has data problems, or is missing altogether, with a backup of the entire database.
33
If the database file is missing, copy the backup to the location where the
database should be.
Important: If other databases or programs have links to objects in the database that
you are restoring, it is critical that you restore the database to the correct location. If
you do not, links to the database objects will not work and will have to be re-created,
such as by using the Linked Table Manager.
If the database file is damaged or has data problems, delete the damaged file
and then replace the damaged file with the backup.
To restore a database object, you import the object from the backup into the
database that contains (or is missing) the object that you want to restore. You can
restore more than one object at a time.
1. Open the database to which you want to restore an object.
34
8. If you want to restore more objects, repeat steps 6 and 7 until you have selected
all of the objects that you want to restore.
9. You may want to adjust the import options. In the Import Objects dialog box, click
the Options button to review these options before importing your objects.
10. After you finish selecting objects and setting options, click OK to restore the
objects.
SECURITY:
Database Security: The information in this topic applies only to a Microsoft Access
database (.mdb).
User Level Security is the most flexible and extensive method of implementing
security measures for your Microsoft Access database. You can set up security on your
database to require users to log on to get into the database or not.
Open the database that you want to help protect up security on your database to
require users to log on to get into the database or not.
2. On the Tools menu, click Security, and then click User-Level Security Wizard.
Follow the directions in the wizard dialog boxes.
2. For each table, query, form, report, and macro you want to be available to users,
grant the appropriate permissions to the Admin user account
35
3. Turn off the Logon dialog box.
Physically limit access to computers to only those who will not compromise
security.
ANTI VIRUS:
Antivirus software (or anti-virus) is computer software used to identify and
remove computer viruses, as well as many other types of harmful computer
software, collectively referred to as malware. While the first antivirus software
was designed exclusively to combat computer viruses, most modern antivirus
software can protect against a wide range of malware, including worms, rootkits,
and Trojans.
36
FUTURE SCOPE OF THE PROJECT
This project is currently designed and analyzed by considering all the aspects of
Inventory system and up to some extent limited to the requirement of a small shop
willing to maintain inventory, but can be easily upgraded for general purpose also. Any
shop having Inventory can use this project. This is not a big project, only provides data
maintenance, insertion, modification, deletion and useful list programmer can modify it.
The user is free to modify the database design according to his/her design
strategies keeping the rules and renormalizations in mind.
Limitations of Project
At this time, the application has been installed in the client mode ONLY. The
server-client setup can only be shown to be working once the State offices have a LAN
setup completed from their end. But the server-client architecture has been tested
thoroughly at the vendor office.
37
PROJECT ESTIMATE
Cost Estimation:
Sr. Software Engineer / 200 ( 2 working days * 8 hours Rs. 23 / - Rs. 4600 / -
Sr. Developer per day) – 5 weeks
Travel expenditure will be paid every week. Travel expenditure per person
cannot exceed Rs. 5000 / -
Benefit:
Since this is the first project with a Government subsidiary, training will be
provided to ten staff members (staff list will have to be submitted before the training
begins) at no extra cost in a week’s time. Six months of maintenance support is another
benefit that the association will have at no extra cost. This does not include
enhancement of the application. No engineer will be hosted at the site. The IT manager
can call the company who developed this application for them and log a problem case.
Problem case will be addressed in 24 hours.
After completion of six months maintenance support, it is up to the association if
they would like to continue the support. New SOW will have to be created and duly
signed by both parties if further support or enhancements is required by the association.
38
TESTING
Over its existence, computer software has continued to grow in complexity and
size. Every software product has a target audience. For example, the audience for video
game software is completely different from banking software. Therefore, when an
organization develops or otherwise invests in a software product, it presumably must
assess whether the software product will be acceptable to its end users, its target
audience, its purchasers, and other stakeholders. Software testing is the process of
attempting to make this assessment.
39
TESTING PRINCIPLES
All Tests should be traceable to customer requirements; the most severe defects from
the customer’s point of view are those that cause the program to fail to meet its requirements.
Tests should be planned long before testing begins. Testing should begin in the small modules
and progress towards testing the complete system as a whole.
STATISTICAL TESTING
DEFECT TESTING
In order to carry out Black Box testing we prepare a set of input data,
which may cause anomalous behavior. The selection of these test data is based
on previous experience of test engineers using domain knowledge to identify test
40
cases likely to reveal defects. When we conduct black box test on those data,
some error has revealed, which have been rectified properly.
Structural or white box testing allows the tester to analyze the code and
used knowledge about the structure of a component to derive test data.
TESTING PROCESS
1. UNIT TESTING
2. MODULE TESTING
3. SYSTEM TESTING
41
It is the system integration phase, where we have tested complete system in
accordance with database and all the modules. That is one module is validating the
other modules logics and flow of control.
1. VOLUME TEST:
2. STRESS TESTING:
The purpose of stress testing id to prove that the system does not malfunction
under peak loads. Unlike volume testing where time is not a factor, we subject the
system to a high volume of data over a short time period.
3. USABILITY:
The Usability test verifies that User Friendly nature of the system. This relates to
normal operation and error handling.
42
SNAPSHOTS OF FORMS
The EXE file for the Hardware Inventory is created and placed on desktop to
make the software platform independent. As the EXE file is run Login box is open with a
background window of Hardware Inventory Software. User must enter correct user id
and password to access the software. Login is very must essential to avoid the data
theft and access by unauthorized personnel. Thus password strength is too strong to
break. If user id or password is incorrect then a message is displayed “Incorrect User
name or password, keep trying”.
43
After matching the administrator’s user id and password, Main Screen of the
Hardware Inventory software is shown. On the Title Bar, title of the software “Hardware
Inventory” is shown on the left top most corner and on right top most corner there are
three buttons, first for minimize, second for maximize and third for closing the
application. Below the Title Bar, there is Menu Bar. There are different menus for
different purposes. If a user other than administrator logins then limited menus will be
shown to the user.
44
On the Menu Bar, the first menu is “Administrator”. Under this menu,
Administrative rights are given to Administrator such “Add User” for authorising that user
to handle transactions. Another is “Remove User i.e. in any case, if a user no longer
exits. Then there is change of password. Password needs to be changed on time to
time basis for security reasons. Next come “Log Out”. It is for current user to log out
from the application.
45
To add a user simply, click Add User under Administrator menu. A box name
“ADD NEW USER” will appear on the screen. Fill all the fields and click on Add User
button. User will be added with a message displayed on the screen “Congrates! You
have been added”.
46
To remove user, being no longer in company or transferred to another
department, simply select the user id from existing users and click on remove button.
User will be deleted from the list.
47
To change the password select the user of whom password need to be changed,
insert current and new passwords and then submit. Password would be changed.
Password must be changed periodically for security.
48
Under Customer’s Detail Menu, there are three options which are “Add” a new
customer, “Edit” details of existing customer, “View” list of existing customers.
49
In “Add Customer” form, there are required and optional fields i.e. Customer’s
Number, Name, Telephone number, Fax Number, E-mail, and Address. Enter the
required data in the form and then click on “SUBMIT”. Details of customer will be added
and form will become blank to add another customer other wise click on “CLOSE”
button to exit from the form.
50
To edit customer’s details, we have few command buttons in addition. We can
find customer by clicking on “FIND” button. Select the required customer data, click on
the “EDIT” button and do the changes. Even we can “DELETE” any record if that
customer is no longer a customer.
51
Here administrator can view all the customers.
52
Under “Transaction” menu, there are four submenus i.e. Purchase, Sales,
Purchase Return, Sale Return. So we can select what job we have to carry out.
53
On clicking the Purchase submenu, a form will appear on the screen. In this form
we enter the details regarding the purchases made such as date of purchase, what is
the Bill No. what is the item, its quantity and price and any freight charges etc.
54
Sales form is similar to purchase form but the only difference is that purchase
tells what are the items were purchased and sales tells what are the items were sold.
55
In Purchase return form, only one new text box is added for “Debit Note No.”
56
In sales return form, “Credit Note No.” is added.
57
Next menu is “Inventory Information”. Under this menu, there are two sub menus
i.e. Create Item and Edit Item.
58
Create Stock Item, in this form we can create or add new items in the inventory.
As shown in the picture, first name of the item and unit. Then for accountability of new
item, opening balance is maintained.
59
In the “Edit Stock Item”, record of item is updated. Such as if an item is sold or
purchased, its quantity and price unit and total amount can be changed.
60
To see the records of sales and purchases, either on daily basis or monthly basis
under “Display” menu, four submenus are created which are “Sales Register”,
“Purchase Register”, “ Day Book” and “Closing Book”.
61
It is the “Sales Register”. It gives details of all the items which were sold. On
selecting any of the record, we can which item was sold, its quantity, price, freight
charges and total cost of the item and the customer to whom it was sold and Bill No.
62
“Purchase Register” is similar to “Sales Register”. It gives details of all the
items which were purchased. On selecting any of the record, we can which item was
purchased, its quantity, price, freight charges and total cost of the item and the
customer from whom it was purchased and Bill No.
63
“Day Book” is for see the records of the particular day and even particular
customer.
64
Stock information is to view the items in the stock. If suppose mouse is not there
in the stock then it will show blank field the corresponding field in the quantity.
65
SOURCE CODE
MODULE 1: -
Option Explicit
Public con As New ADODB.connection
66
Dim TEMP As Boolean
TEMP = False
rs1.Update
rs1.MoveLast
End If
rs1.MoveNext
Wend
rs1.Update
End If
rs.MoveNext
Wend
Dim no As Long
Dim trans As Long
67
TEMP = False
While Not rs.EOF
rs1.Update
rs1.MoveNext
Wend
rs.CLOSE
rs1.CLOSE
rs2.CLOSE
End Function
68
MAIN SCREEN: -
Option Explicit
69
Private Sub exit_Click()
End
End Sub
70
Private Sub salereturn_Click()
Sales TR_TYPES = “SALE RETURN”
Sales.Show
End Sub
71
LOGIN: -
Option Explicit
Dim log As New ADODB.Recordset
Dim ed As Boolean
ed = False
log.MoveFirst
Else
MainScreen.lo.Enabled = True
MainScreen.CPass.Enabled = True
MainScreen.display.Enabled = False
MainScreen.inventory.Enabled = False
MainScreen.transactions.Enabled = True
MainScreen.custdetail.Enabled = False
MainScreen.Ad.Enabled = True
MainScreen.Ad.Caption = UCase(Trim$(Me.txtUserName.Text))
MainScreen.login.Enabled = False
MainScreen.Aduser.Enabled = False
72
MainScreen.Ruser.Enabled = False
ed = True
End If
MainScreen.lo.Enabled = True
Else
log.MoveNext
End If
Loop
If ed = False Then
MsgBox "Incorrect Password or User Name, Keep Trying"
txtUserName = ""
txtPassword = ""
Else
Unload Me
End If
End If
End Sub
73
ADD USER: -
Option Explicit
Dim rs As New ADODB.Recordset
74
Text2.SetFocus
End If
End If
End If
End If
End Sub
75
REMOVE USER: -
Option Explicit
Dim rs As New ADODB.Recordset
76
CHANGE PASSWORD: -
Option Explicit
Dim rs As New ADODB.Recordset
77
Text1.SetFocus
End If
End Sub
78
ADD CUSTOMER: -
Option Explicit
Dim rs As New ADODB.Recordset
Dim a As Integer
rs.AddNew
For a = 0 To 5
rs(a) = cust(a)
Next
rs.Update
cno
For a = 1 To 5
cust(a) = ""
Next
End If
cust(1).SetFocus
End Sub
79
cust(0).Text = 1
Else
rs.MoveLast
cust(0).Text = Val(rs(0)) + 1
rs.MoveFirst
End If
End Function
80
EDIT CUSTOMER: -
Option Explicit
Dim rs As New ADODB.Recordset
Dim a As Integer
81
cust(1).SetFocus
Else
If rs.EOF = False Then
For a = 0 To 5
rs(a) = cust(a)
Next
rs.Update
cust(1).Enabled = False
cust(2).Enabled = False
cust(3).Enabled = False
cust(4).Enabled = False
cust(5).Enabled = False
cust(0).Enabled = False
End If
End If
EDIT.Caption = "&Edit"
End If
End Sub
82
CLR
End If
End Sub
83
rs.MovePrevious
If rs.BOF = False Then
sh
Else
MsgBox " There is the first record"
FIRST_Click
End If
End If
End Sub
84
VIEW CUSTOMER: -
Option Explicit
85
PURCHASE AND PURCHASE RETURN FORM: -
Option Explicit
Dim rs As New ADODB.Recordset
Dim rs1 As New ADODB.Recordset
Dim rs2 As New ADODB.Recordset
86
rs1(1) = DOB
rs1(2) = inward(0)
rs1(3) = CUSTOMER
rs1(4) = TR_TYPE
rs1(5) = ITEM
rs1(7) = Val(inward(2))
rs1(6) = Val(inward(1))
rs1(8) = Val(inward(3))
rs1(9) = Val(inward(4))
rs1.Update
inward(0) = ""
inward(1) = ""
inward(2) = ""
inward(3) = ""
inward(4) = ""
inward(0).SetFocus
End Sub
DOB = Date
87
rs2.MoveNext
Wend
End If
If ITEM.ListCount > 0 Then
ITEM.ListIndex = 0
End If
If CUSTOMER.ListCount > 0 Then
CUSTOMER.ListIndex = 0
End If
End Sub
88
SALES AND SALES RETURN FORM: -
Option Explicit
Dim rs As New ADODB.Recordset
Dim rs1 As New ADODB.Recordset
Dim rs2 As New ADODB.Recordset
Dim rs3 As New ADODB.Recordset
Public TR_TYPE As String
Dim stk As Double
89
End If
outward(0).SetFocus
outward(0) = ""
outward(1) = ""
outward(2) = ""
outward(3) = ""
outward(4) = ""
End Sub
90
Unload Me
End Sub
Frame1.Caption = TR_TYPE
Me.Caption = TR_TYPE
91
ADD ITEM: -
Option Explicit
Dim rs As New ADODB.Recordset
Dim a As Integer
CLR:
For a = 0 To 4
STOCKITEM(a) = ""
Next
STOCKITEM(1) = "PCS."
End Sub
92
Private Sub Form_QueryUnload(Cancel As Integer, UnloadMode As Integer)
enabl
rs.CLOSE
End Sub
93
EDIT ITEM: -
Option Explicit
Dim rs As New ADODB.Recordset
Dim rs1 As New ADODB.Recordset
For a = 0 To 4
rs(a) = STOCKITEM(a)
Next
rs.Update
EDIT.Caption = "&EDIT"
94
For a = 0 To 4
STOCKITEM(a).Enabled = False
Next
End If
End Sub
95
Private Sub PREVIOUS_Click()
If rs.BOF = False Then
rs.MovePrevious
If (rs.BOF = False) Then
sho
Else
MsgBox "THIS IS FIRST RECORD"
FIRST_Click
End If
End If
End Sub
96
SALES REGISTER: -
Option Explicit
Dim rs As New ADODB.Recordset
Dim rs1 As New ADODB.Recordset
Adodc1.Recordset.MoveNext
Wend
TAMT.Caption = ("RS. " & tamount)
SAMT.Caption = ("RS. " & SAMOUNT)
FREIGHT.Caption = ("RS. " & fret)
QTY.Caption = quantity
Adodc1.Recordset.MoveFirst
End Sub
97
PURCHASE REGISTER: -
Option Explicit
Adodc1.Recordset.MoveNext
Wend
TAMT.Caption = ("RS. " & tamount)
PAMT.Caption = ("RS. " & pamount)
FREIGHT.Caption = ("RS. " & fret)
QTY.Caption = quantity
Adodc1.Recordset.MoveFirst
End Sub
98
DAY BOOK: -
Option Explicit
Dim a As Integer
Dim TEMP As Long
Dim CHK As Boolean
Dim validt As Boolean
Dim PREVIOUS As Integer
Dim rs As New ADODB.Recordset
Dim rs1 As New ADODB.Recordset
Dim rs3 As New ADODB.Recordset
Dim STRN As String
99
Private Sub data_LostFocus(Index As Integer)
data(7) = (Val(data(5)) * Val(data(4))) + Val(data(6))
validat
If validt = True Then
data(4) = PREVIOUS
data(Index).SetFocus
validt = False
End If
End Sub
100
Private Sub Form_Unload(Cancel As Integer)
Adodc1.Refresh
Adodc1.Recordset.CLOSE
enabl
End Sub
101
Private Sub Toolbar1_ButtonClick(ByVal Button As MSComctlLib.Button)
Select Case Button.Caption
Case "Find Date"
Command3_Click
Case "Close"
Command2_Click
End Select
End Sub
102
CLOSING STOCK: -
Option Explicit
103
BIBLIOGRAPHY & REFERENCES
104