Automobile Management System Project Report
Automobile Management System Project Report
Automobile Management System Project Report
INTERNSHIP REPORT
ON
AUTOMOBILE MANAGEMENT SYSTEM
PROJECT
BY
KAMAL ACHARYA
(Tribhuvan University)
Date: 2022/05/25
1|Page
1. INTRODUCTION
The proposed project is developed to manage the automobile in the automobile dealer
company. The main module in this project is login, automobile management, customer
management, sales, complaints and reports. The first module is the login. The automobile
showroom owner should login to the project for usage. The username and password are verified
and if it is correct, next form opens. If the username and password are not correct, it shows the
error message.
When a customer search for a automobile, if the automobile is available, they will be
taken to a page that shows the details of the automobile including automobile name, automobile
ID, quantity, price etc. “Automobile Management System” is useful for maintaining
automobiles, customers effectively and hence helps for establishing good relation between
customer and automobile organization. It contains various customized modules for effectively
maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically.
When a new purchase is made, stock will be increased automatically. While selecting
automobiles for sale, the proposed software will automatically check for total number of
available stock of that particular item, if the total stock of that particular item is less than 5,
software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt
the user that the stock is not enough. Customers of this system can search for a automobile; can
purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can
be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing
system.
2|Page
1.2 DESCRIPTION OF MODULES
Login module
Registration module
Customer module
Automobile module
Sales module
Delivery module
Supplier module
Reports module
Login Module
It is used for logging in the automobile showroom management. It is used for verifying
the user. Once the user is authenticated, they can access the system.
Registration Module
New user can register in order to use the full features of this system. Normal users can
also access the proposed system but with limited features. Only the registered users can get
more priorities than the unregistered guest user. Once the guest users register to this system,
they can also get full access to this system.
Customer Module
It is used for adding new customers and for updating existing customers. It is used for
storing new customers as well as for updating the customer’s details. The module is very useful
to find the number of customers who paid bill. Some customers might not pay the bills on time.
Customer details can be easily searched, so it will be easy to find bill payment details.
It has a primary key field named customerno. The file is very useful for maintaining customers.
3|Page
Automobile Module
It is used for adding new automobiles and for viewing, editing and deleting existing
automobiles. It is used for searching items in this system. Here the admin have the privileges
to search items in this system. Automobile details are stored with their brand name. When a
particular brand is being liked by people, that particular brand will be purchased and kept in
stock with large quantity.
Sales Module
It is used for adding sales details to proposed system. Here the admin have privileges
to add details in automobile showroom management. Sales reports can be viewed overall as
well as date wise, month wise and year wise.
Delivery Module
It is used for storing details of new deliveries in the automobile showroom management.
Admin can perform operations like monitoring automobile stock details, customer order details
and delivery details. Delivery reports can be viewed overall as well as date wise, month wise
and year wise.
Supplier Module
It is used for maintaining supplier details like supplier ID, name, contact person and
address and phone number. Supplier or dealer can be cancelled when their items are not being
sold out. It is very essential in order to get good stock items for a company.
Reports Module
It is used for generating various reports like cash order report, credit order reports and
payment reports. Sales and delivery reports can be viewed date wise, month wise and year
wise. Reports can be viewed based on the user’s choice.
4|Page
1.3 SYSTEM SPECIFICATION
RAM : 32MB
Hard Disk : 5 GB
Monitor : 16 LG
5|Page
1.4 SOFTWARE FEATURES
Visual basic has evolved from the original BASIC language and now contains several
hundred statements, functions, and keywords, many of which relate directly to the Windows
Operating System includes,
Multitasking
Message driven architecture
Dynamic linking
CPU time slicing
Easier comprehension
User-friendliness
Faster application development
Introduction to Active-X technology
Internet features
Support OLE, which is a means of communication and gives application the power
to directly use and manipulate other windows application.
Data Environment Designer, which provides an interactive design time
environment for creating programs with runtime access to data.
In visual basic 6.0 IDE is a Multiple Document Interface (MDI) format. In Multiple
Document Interface format, the windows associated with the project will stay within a single
container known as the parent. Code and form based windows will stay within the main
container form.
Standard EXE
Active EXE
ActiveX DLL
ActiveX Control
VB application wizard
Visual basic allows adopting more of a parallel approach, with independent sections of
code for each option that the user may select. This is known as Event Driven Programming.
Event Driven Programming is based on the Message Driven Architecture of windows. Visual
Basic programs are built around events. Events are various things that can happen in program.
In Event Driven application, the program statements are executed only when a particular event
calls specific parts of the code that is assigned to the event.
Microsoft visual data tools allow the ability to view and manipulate tables, views, stored
procedures, and database schemas on SQL server and Oracle systems. Visual Basic provides a
variety of options to access Remote Client/Server databases.
7|Page
ADO Object Model
Visual Basic supports ActiveX Data Objects Microsoft’s new, high level interface to
all kinds of data. ADO objects can be created at design- time using the updated Data
Environment Designer. ADO is an interface for both local and remote data access, remote and
disconnected record sets and hierarchical record sets. The ADO object model provides an easy-
to-use set of objects, properties, and methods for creating script that access data in databases.
ADO consists of seven objects, three of which are independent and four are dependent
objects. Independent objects can exist by themselves; dependent objects must exist in
connection with an independent object.
Parameter
Connection
Command
Record set
Error
Property
Field
8|Page
MS-ACCESS
Microsoft Access is a powerful database management system and the user can create
entire application that requires little or no programming. It supports GUI features and an entire
programming language, VBA (Visual Basic 6.0 for application). Access is easy enough to use
that in a short time beginners can manage their own data. In MS –Access, the database means
a collection of tables that hold data. It collectively stores all other object such as queries, forms
and reports that are used to implement the database management function effectively.
The MS-Access database can act as a back-end database for Visual Basic 6.0 as affront
end tool. MA Access supports the user with its powerful management functions. Beginners can
create their own database very simply with some mouse clicks. MS-Access database supports
so many data types when a user can incorporate data from other applications. A database
created in MS-Access can be accessed through Visual Basic 6.0 using data control.
Here database means a collection of related tables and a table means a collection of
number of records where a record means a collection of inter-related fields. It should be noted
that a field in an entity is used to describe straight. A single table can have any number of
indexed fields that can be used to locate records using an expression. This helps in filtering out
information according to specific criteria. A user can move inside a table very easily using the
navigator tools supported by the MS-Access database. A table can be accessed in a number of
ways like as a snapshot, dynast, etc.
9|Page
2. SYSTEM STUDY
All automobile details like available in the company are entered and managed in this
and managed. Price details and stock details of the automobiles are managed separately. The
customer details are entered to call the customer for further purchase of automobile. The
customer name, address and phone number details are managed separately. The details are
entered and edited by the administrator.
But everything is done manually. Most of the existing system is manual, so data
manipulations are not accurate and also processing time is slow. When the stock and
automobile count increases, manual manipulation of data becomes very difficult.
2.1.1 DRAWBACKS
Even though computerized system exists, there are various drawbacks. They are as
follows.
User cannot search automobiles fast when the number of automobiles increases.
Primary key fields should be used wherever necessary while designing in order to
manage database efficiently and for accessing information soon.
Stock management is not efficiently done. User can only know when the stock is
empty. Prior information about stock is not possible.
Takes much time for searching particular automobile details.
Difficult to maintain automobile details and employee details
Existing system is not accurate.
Even though some existing systems are computerized, there occur redundancy
problems due to duplication of entries.
If the automobile entries have duplicate values, it cannot be maintained properly
and accurately
10 | P a g e
2.2 PROPOSED SYSTEM
The proposed system is very useful for the employee and customers. It avoids the
overheads for the employee. They can minimize the working stress and can keep essential
documents related to the automobile and the passengers as a softcopy. The advantage of the
proposed system is the reduction in the cost of the office equipments and the transaction is
done quickly. Any employee can answer if any delivery for a particular customer in a particular
day is available or not.
The proposed project will allow the customers to perform certain activities like login
and searching for automobiles. Customers may open an account with the store if they wish
including a username and password. In login form users will be authenticated and it is also
possible to find whether they are customer or admin through their login information which was
entered. A customer must be logged in before searching for automobiles for purchase.
If a user attempts to login with incorrect details, they will be not be redirected to access
the application. When a customer search for a automobile, if the stock of the automobile is
available, they will be taken to a page that shows the details of the automobile including
automobile title, automobile ID, quantity, price etc in order for sale.
11 | P a g e
3. SYSTEM DESIGN AND DEVELOPMENT
A flat file database is a database designed around a single table. The flat file design puts
all database information in one table, or list, with fields to represent all parameters. A flat file
may contain many fields, often, with duplicate data that are prone to data corruption. If data
between two flat files have to be merged, it is needed to copy and PSMte relevant information
from one file to the other. There is no automation between flat files.
If two or more flat files that contain client addresses, it is required to manually modify
the address parameters in each file that contains that client’s information. Changing
information in one file has no bearing on other files. Flat files offer the functionality to store
information, manipulate fields, print or display formatted information and exchange
information with others, through email and over the Internet. Some flat files may be attached
to external files, such as text editors, to extend functionality and manage related information.
A relational database, on the other hand, incorporates multiple tables with methods for
the tables to work together. The relationships between table data can be collated, merged and
displayed in database forms. Most relational databases offer functionality to share data:
Across networks
Over the Internet
With laptops and other electronic devices, such as palm pilots
With other software systems
Designing flat file databases is simple and requires little design knowledge. Flat files
can be developed using just about any database engine. Flat files can be created in relational
database engines by not taking advantage of relational design concepts. Designing a relational
database takes more planning than flat file databases. With flat files, it is possible to add
information, as you deem necessary.
12 | P a g e
With relational databases, it is required to be careful to store data in tables such that the
relationships make sense. Building a relational database is dependent upon the ability to
establish a relational model. The model must fully describe how the data is organized, in terms
of data structure, integrity, querying, manipulation and storage. Relational databases allow
defining certain record fields, as keys or indexes, to perform search queries, join table records
and establish integrity constraints.
Search queries are faster and more accurate when based on indexed values. Table
records can be easily joined by the indexed values. Integrity constraints can be established to
ensure that table relationships are valid. If the project is able to establish a one-to-many
relationship in the data tables, relational database should be used because a flat file is not
sufficient to handle the data processing needs. Relational databases offer more robust reporting
with report generators that filter and display selected fields.
Relational databases offer the capability to building own reporting modules. Most
relational databases also offer the capability to import and export data from other software.
There are three primary relational database systems, proprietary, open source and embedded.
Proprietary relational databases require the use of proprietary development languages, often
times, to complement SQL. Microsoft Access, for example, combines Visual Basic with SQL.
Open source databases, such as MySQL, are distributed freely to encourage user development.
Embedded, relational databases are packaged as part of other software packages, such
as with tax-preparation software packages. The vendor supplies the database, and all
manipulation tools, to control the database structure. These databases are, often times,
accompanied with tools to provide audit trails of transactions. Proposed project uses relational
database files implementing SQL queries in MS Access. So 1 to many relationships can be
established between tables and the table data can be accessed soon even in the non-indexed
locations.
13 | P a g e
3.2 INPUT DESIGN
Input is any data or instructions entered into the memory of a computer. Two types of
input are data and instructions. Data is a collection of unorganized items that can include words,
numbers, pictures, sounds, and video. A computer processes data into information, which is
organized, meaningful, and useful. Instructions can be in the form of programs, commands, or
user responses.
A program is a series of instructions that tells a computer how to perform the tasks
necessary to process data into information. A command is an instruction given to a computer
program. A user response is an instruction you issue to the computer by responding to a
question posed by a computer program. Any hardware component that allows entering data,
programs, commands, and user responses into a computer is an input device. Inputs of
Automobile Management System are eid, ename, qualification, automobileid, brand, cusid,
cusname and salary.
Output design involves specifying how production of on-screen reports and paper based
reports will occur. Output may occur to database or file for storing information entered or also
for use by other systems. Output is data that has been processed into a useful form called
information. Four types of output are text, graphics, audio, and video. Text consists of
characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of
computer storage space) that are used to create words, sentences, and paragraphs.
14 | P a g e
3.4 DATABASE DESIGN
Ease of use
Control of data integrity
Control of redundancy
Control of security
Data independence (logical & physical)
Data storage protection
System performance
System functions
System compatibility
For achieving the abovementioned criteria’s we have to make use of various features
that are available with the RDBMS by enforcing integrity constrains, it is possible to ensure
data integrity and reduce data inconsistency to a great extent.
15 | P a g e
3.4.1 DATAFLOW DIAGRAM
A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change data throughout a system. It’s a structured analysis and design tool that
can be used for flowcharting in place of or in association with information. Oriented and
process oriented system flowcharts. Four basic symbols are used to construct data flow
diagrams. They are symbols that represent data source, data flows, and data transformations
and data storage. The points at which data are transformed are represented by enclosed figures,
usually circles, which are called nodes.
- Data Flow
- Process
- Storage
When analysts prepare the Data Flow Diagram, they specify the user needs at a level of
detail that virtually determines the information flow into and out of the system and the required
data resources.
16 | P a g e
The network is constructed by using a set of symbols that do not imply physical
implementations. The Data Flow Diagram reviews the current physical system, prepares input
and output specification, and specifies the implementation plan.
Process should be named and numbered for easy reference. Each name should be
representative of the process.
The destination of flow is from top to bottom and from left to right.
When a process is exploded in to lower level details they are numbered.
The names of data stores, sources and destinations are written in capital letters.
Level 0
Admin
Login Login
process
Automobile
management access
17 | P a g e
Level 1
Admin Login
Custome Supplier
Supplie
r r
18 | P a g e
Level 2
Admin Login
Custome Supplier
Supplie
r r
Customers
Product Product
Order Order
Sales and
Payment
payment
19 | P a g e
3.4.2 DATABASE TABLES
20 | P a g e
Table name : automobile
21 | P a g e
Table name : insurance
22 | P a g e
Table name : emp
23 | P a g e
Table name : loan
24 | P a g e
4. SYSTEM TESTING AND IMPLEMENTATION
The common view of testing held by users is that it is performed to prove that there are
no errors in a program. It is extremely difficult since designer cannot prove to be one hundred
percent accurate. Therefore, the most useful and practical approach is with the understanding
that testing is the process of executing a program with explicit intention of finding errors that
make the program fail.
Testing has its own cycle. The testing process begins with the product requirements
phase and from there parallels the entire development process. In other words, for each phase
of the development process there is an important testing activity. Successful testing requires a
methodical approach. It requires focusing on basic critical factors:
Planning
Project and process control
Risk management
Inspections
Measurement tools
Organization and professionalism
Test Plan
Before going for testing, first we have to decide upon the type of testing to be carried
out. The following factors are taken into consideration:
25 | P a g e
Black Box Testing
It is a software testing approach in which the tester doesn’t know the internal working
of the item being tested. For example in a Black box test, on software design the tester only
knows the input and the expected outputs. Tester doesn’t know how the program derives the
output. Tester doesn’t even imagine as to how, the coding is done. Tester need to know only
the specifications.
The test is unbiased because the designer and the tester is independent of each other
The tester needs no specific knowledge on any programming language
The test is done from the point of view of the user, not the designer.
The test can be designed as soon as the specifications are complete
The test can be redundant if the software designer has already run a test case.
The test can be difficult to design
Testing every possible input stream is unrealistic.
Unit Testing
Unit or module testing is the process of testing the individual components (subprograms
or procedures) of a program. The purpose is to discover discrepancies between the modules
interface specification and its actual behavior. In our system each module must be tested
independently for validation.
Integration Testing
26 | P a g e
System Maintenance
All system is dynamic and subjects to constantly changing requirements. Effort must
be devoted to adapting them and design must be flexible specified so that such changes can be
easily implemented. It activity is called system maintains. It includes improvement of system
functions and correction of errors. Back up of the entire database files are taken and stored in
secondary storage devices like magnetic tapes and disks so that it is possible to restore the
system at the earliest. If there is a break down or collapse, then the system giver provision to
restore database files, storing data in a separate secondary device leads to an effective and
efficient maintains of the system.
The master file has flags for maintains after for maintains. After the mentioned period,
the rejection suppliers, unused data in the files will be deleted in the master file. It method is
the increasing the memory to store the data. Software maintenance is a set of software
engineering activities that occur after software has been delivered for the customer and put into
operation. The success of the software and the project relies on the maintenance procedure
adopted. As with the venture of human, not a single one is perfect. The further modifications
are left to the followers. It is because the opinion or vision or a thing differs from individual to
individual. The maintenance is performed at regular intervals to keep the project safe and
reliable.
27 | P a g e
These changes have to be designed by the user before the change can be carried out.
Since requirement change request involves cost, user will be cautious while requesting the
software changes. The software will require continued support. The system maintenance means
the maintenance activities after and during the system development processes. It include
activities related to debugging the software after it goes live, changes acquired to meet changes
in user requirement.
Maintenance phase identifies if there are any changes required in the current system. If
the changes are identified, then an analysis is made to identify if the changes are really required.
Cost benefit analysis is away to find out if the change is really essential.
System Analysis
The term system is derived from the Greek word ‘systema’, which means of organized
relationship among functioning units of components. And the study of system concepts has
three basic implications:
Preliminary Analysis
Analysis is the detailed study of the various operations performed by a system and their
relationships within and outside the system. For the efficient and effective utilization of the
available resources, timing availability of accurate information is very important. Information
is the back bone of any organization. There for, it has to be made available all time to ensure
proper decision-making.
Information also has to be accurate, current, timely, relevant and usable. In other words,
an effective information system should be able to provide information to those in need of it, at
the time they need of it, at the time they need it and in the way they need it. The need for
managing data and retrieving information efficiently, lead to an extensive use of computers in
the business world.
28 | P a g e
The computers have convinced the management that computerized system is preferable
to the existing system; most organization has computerized their application areas using
traditional file processing concepts. The computerized system, by itself does not guarantee of
efficient information retrieval. The effectiveness of the system, to great deal, depends on the
way in which data is organized and managed. Way in which data is organized in the existing
system is not integrated, since there is no connection or integration between one module and
another on accomplishing the task.
System Security
Security is a critical stage in system development. Even candidate system must provide
built-in features for security and integrity of data. Without safe guards against unauthorized
access, fraud, embezzlement, fire and natural disaster, a system could be so vulnerable as to
threaten the survival of the organizations.
To do an adequate job on security, the risk, exposure, cost and specific measures such
as password should be analyzed to provide protection. In addition, back up of copies of
software and recovery restart procedures must be available when needed.
29 | P a g e
The amount of protection depends on the sensitivity of data, the reliability of the user
and the complexity of the system. The motive behind security is to keep the organization
running, protect data as an asset and seek management support for more installations.
After system security risk has been evaluated, the next step is to select security
measures. The measures are
Identification
Access Control
Audit Control
System Integrity
Identification
It is the scheme of identifying person to the system based on “Something you know”
such as a password or a picture badge, “Something you are” such as finger print or voice print
or “Something you have” such as credit card, key or special terminal.
Access Control
Controlling the access to the computer facility is secured through encoded cards or
similar devices. Encryption prevents intruders from accessing data by scrambling messages
across telephones to the destination.
Audit Control
Auditing must be supported at all levels of management. Audit control protects a system
from external security breaches and internal fraud or embezzlement. Various software
programs are available to help in audit function.
System Integrity
The line of different safeguards the functioning of hardware, software and physical
security and operating procedure. Proper back of hardware and software are extremely
important.
30 | P a g e
4.2 SYSTEM IMPLEMENTATION
System implementation is the important stage of project when the theoretical design is
tunes into practical system. The main stages in the implementation are as follows:
Planning
Training
System testing and
Changeover planning
Planning is the first task in the system implementation. Planning is deciding on the
method and the time scale to be adapted. At the time of implementation of any system people
from different departments and system analysis involve. They are confirmed to practical
problem of controlling various activities of people outside their own data processing
departments. The line manager controlled through an implementation co-ordinate committee.
The committee consists of ideas, Problems and complaints of user department. It must also
consider,
31 | P a g e
5. CONCLUSION
The system is completely menu driven and extremely user friendly since it is developed
in an efficient front end tool VB. Appropriate error messages are also provided too guide the
user in a proper and user friendly manner.
The project is fully fledged and user friendly, End users will be lightened in using it
software because it is easy to have bills and reports and mostly all contents to be entered are to
selected from combo box. It reduces the calculating efforts to be carried out by the staff.
32 | P a g e
6. SCOPE FOR FURTHER ENHANCEMENT
Further expansion of the system also can be done in future if needed. The application
can be enhanced in the future with the needs of the organization. The database and the
information can be updated to the latest forthcoming versions.
There are also possibilities for enhancing and further developing the project with
customized reports according to the latest information and needs of the company. Thus the
system can be altered in accordance with the future requirements and advancements. System
performance evaluation must be monitored not only to determine whether or not they perform
as plan but also to determine if they should have to meet changes in the information needed for
the company.
The performance of the system will be evaluated to determine whether system achieves
the results that are expected and whether the predicted benefits of the system are realized.
33 | P a g e
BIBLIOGRAPHY
REFERENCE BOOKS
REFERENCE WEBSITES
www.programmingworld.com
www.vbnetcode.com
www.w3schools.com
www.vbcode.com
www.vbdevelopplus.com
www.codepark.com
RESEARCHER REFERENCE
34 | P a g e
ElectroNIC ASIA Journal (2024): n. pag.
Acharya, Kamal. “ATTENDANCE MANAGEMENT SYSTEM.” International
Research Journal of Modernization in Engineering Technology and
Science (2023): n. pag.
35 | P a g e
Acharya, Kamal, Dairy Management System Project Report (December 20, 2020). Available at
SSRN: https://ssrn.com/abstract=4835231 or http://dx.doi.org/10.2139/ssrn.4835231
Acharya, Kamal, Electrical Shop Management System Project (December 10, 2019). Available at
SSRN: https://ssrn.com/abstract=4835238 or http://dx.doi.org/10.2139/ssrn.4835238
Acharya, Kamal, Online book store management system project report. (Febuary 10, 2020). Available
at SSRN: https://ssrn.com/abstract=4835277 or http://dx.doi.org/10.2139/ssrn.4835277
Acharya, Kamal, Paint shop management system project report. (January 10, 2019). Available at
SSRN: https://ssrn.com/abstract=4835441 or http://dx.doi.org/10.2139/ssrn.4835441
Acharya, Kamal, Supermarket billing system project report. (August 10, 2021). Available at
SSRN: https://ssrn.com/abstract=4835474 or http://dx.doi.org/10.2139/ssrn.4835474
Acharya, Kamal, Online texi booking system project report. (March 10, 2022). Available at
SSRN: https://ssrn.com/abstract=4837729 or http://dx.doi.org/10.2139/ssrn.4837729
Acharya, Kamal, Online car servicing system project report. (March 10, 2023). Available at
SSRN: https://ssrn.com/abstract=4837832 or http://dx.doi.org/10.2139/ssrn.4837832
Acharya, Kamal, School management system project report. (July 10, 2021). Available at
SSRN: https://ssrn.com/abstract=4837837 or http://dx.doi.org/10.2139/ssrn.4837837
Acharya, Kamal, Furniture Showroom Management System Project Report (March 21, 2021).
Available at SSRN: https://ssrn.com/abstract=4839422 or http://dx.doi.org/10.2139/ssrn.4839422
Acharya, Kamal, Online Vehicle Rental System Project Report (March 21, 2019). Available at
SSRN: https://ssrn.com/abstract=4839429 or http://dx.doi.org/10.2139/ssrn.4839429
36 | P a g e
APPENDIX
A. SAMPLE INPUT
Login form
37 | P a g e
Admin login
38 | P a g e
User login
39 | P a g e
Insurance form
40 | P a g e
Service form
41 | P a g e
Spare parts form
42 | P a g e
Employee details form
43 | P a g e
Customer details
44 | P a g e
Imported automobile details
45 | P a g e
Automobile import details
46 | P a g e
Booking form
47 | P a g e
Loan details
48 | P a g e
Loan payment details
49 | P a g e
Customer purchase form
50 | P a g e
B.SAMPLE OUTPUT
Splash form
51 | P a g e
On successful login
52 | P a g e
Admin welcome page
53 | P a g e
Facilities
54 | P a g e
Available facilities
55 | P a g e
Bikes
56 | P a g e
Specific bike
57 | P a g e
View bike color
58 | P a g e
Showroom details
59 | P a g e
C.SAMPLE CODING
Me.Hide
MDIenter1.Show
End Sub
Adodc1.Recordset.MoveFirst
Exit Sub
errmsg:
MsgBox Err.Description
End Sub
Adodc1.Recordset.MoveLast
End Sub
60 | P a g e
Adodc1.Recordset.MovePrevious
Exit Sub
errmsg:
End Sub
Adodc1.Recordset.MoveNext
Exit Sub
errmsg:
End Sub
Unload Me
End Sub
Text1.Text = ""
61 | P a g e
Text2.Text = ""
Text3.Text = ""
Text4.Text = ""
Text5.Text = ""
Text6.Text = ""
Text7.Text = ""
End Sub
Call enable
Adodc1.Refresh
If Adodc1.Recordset.RecordCount = 0 Then
a=1
Else
Adodc1.Recordset.MoveLast
a = Adodc1.Recordset.Fields(0) + 1
End If
Adodc1.Recordset.AddNew
Text1.Text = a
Text2.SetFocus
62 | P a g e
End Sub
Me.Hide
alldetails.Show
End Sub
Else
Adodc1.Recordset.Delete
Adodc1.Refresh
End If
End If
End Sub
63 | P a g e
Private Sub Command7_Click()
If a = vbOK Then
Adodc1.Recordset.Fields(3) = "MALE"
Else
Adodc1.Recordset.Fields(3) = "FEMALE"
End If
Adodc1.Recordset.Update
Adodc1.Refresh
Call disable
Else
Adodc1.Recordset.CancelUpdate
End If
'err1:
End Sub
64 | P a g e
Private Sub Command8_Click()
End Sub
Call enable
End Sub
DATE1 = Date
DTPicker1.SetFocus
End If
End Sub
65 | P a g e
Call disable
End Sub
End Sub
End Sub
End Sub
Call charvalid(KeyAscii)
End Sub
66 | P a g e
If Text1.Text = "" Then
End If
End Sub
Call charvalid(KeyAscii)
End Sub
End If
End Sub
Call emailvalid(KeyAscii)
End Sub
67 | P a g e
Private Sub Text13_LostFocus()
End If
End Sub
Call alphavalid(KeyAscii)
End Sub
End If
End Sub
Call charvalid(KeyAscii)
End Sub
68 | P a g e
If Text3.Text = "" Then
End If
End Sub
Call addressvalid(KeyAscii)
End Sub
End If
End Sub
Call alphavalid(KeyAscii)
End Sub
69 | P a g e
MsgBox "ENTER THE CITY ", vbCritical
End If
End Sub
Call charvalid(KeyAscii)
End Sub
End If
End Sub
Text2.Enabled = False
Text3.Enabled = False
Text4.Enabled = False
Text12.Enabled = False
Text13.Enabled = False
Text15.Enabled = False
70 | P a g e
Text16.Enabled = False
Option1.Enabled = False
Option2.Enabled = False
End Sub
Text2.Enabled = True
Text3.Enabled = True
Text4.Enabled = True
Text12.Enabled = True
Text13.Enabled = True
Text15.Enabled = True
Text16.Enabled = True
Option1.Enabled = True
Option2.Enabled = True
End Sub
Else
71 | P a g e
MsgBox " Please Enter date in format: 12.4.1990 ", vbCritical + vbOKOnly, "Warning"
KeyAscii = 0
End If
End Sub
Employee form
Call charvalid(KeyAscii)
End Sub
End If
End Sub
Me.Hide
72 | P a g e
MDIenter1.Show
End Sub
Adodc1.Recordset.MoveFirst
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
Exit Sub
errmsg:
MsgBox Err.Description
End Sub
Adodc1.Recordset.MoveLast
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
End Sub
Adodc1.Recordset.MovePrevious
73 | P a g e
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
Exit Sub
errmsg:
End Sub
Adodc1.Recordset.MoveNext
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
Exit Sub
errmsg:
End Sub
CommonDialog1.ShowOpen
file1 = CommonDialog1.FileName
Image1.Picture = LoadPicture(file1)
End Sub
74 | P a g e
Private Sub Command2_Click()
Text1.Text = ""
Text2.Text = ""
Combo1.Text = ""
'Text3.Text = ""
Text10.Text = ""
Text11.Text = ""
Text15.Text = ""
Text12.Text = ""
Text13.Text = ""
Text14.Text = ""
Option1.Value = False
Option2.Value = False
'Text5.Text = ""
'Text6.Text = ""
'Text4.Text = ""
'Text8.Text = ""
'Text7.Text = ""
'Text9.Text = ""
75 | P a g e
Text16.Text = ""
Image1.Picture = ""
End Sub
If a = vbOK Then
Adodc1.Recordset.Fields(12) = "MALE"
Else
Adodc1.Recordset.Fields(12) = "FEMALE"
End If
'smid = App.Path
76 | P a g e
'CON.Execute "INSERT INTO student_admission VALUES('" & file1 & "')"
Adodc1.Recordset.Fields(10) = file1
Adodc1.Recordset.Fields(2) = Combo1.Text
Adodc1.Recordset.Update
Adodc1.Refresh
Call disable
Else
Adodc1.Recordset.CancelUpdate
End If
'err1:
End Sub
End
End Sub
77 | P a g e
'Private Sub Command5_Click()
'sal = Val(Text3.Text)
'Case Else
'End Select
78 | P a g e
'sal = Val(Text4.Text)
'End Select
'End Sub
Else
79 | P a g e
ans = MsgBox("DO you want to delete the record", vbOKCancel + vbExclamation +
vbDefaultButton2, "DELETE")
Adodc1.Recordset.Delete
Adodc1.Refresh
End If
End If
End Sub
Call enable
Adodc1.Refresh
If Adodc1.Recordset.RecordCount = 0 Then
a=1
Else
Adodc1.Recordset.MoveLast
a = Adodc1.Recordset.Fields(0) + 1
End If
Text2.SetFocus
End Sub
80 | P a g e