0% found this document useful (0 votes)
89 views68 pages

E-Billing System

Uploaded by

Shivraj Cyber
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views68 pages

E-Billing System

Uploaded by

Shivraj Cyber
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 68

1.

Introduction

1.1. Overview of Proposed System

1.1.1 Existing System:

The client uses MS Excel, and maintains their product list, customer list, and prints the

invoice, however it is not possible them to share the data from multiple system in multi

user environment, there is lot of duplicate work, and chance of mistake. When the product

price are changed they need to update each and every excel file. There is no option to find

and print previous saved invoice. There is no security; any body can access any report and

sensitive data, also no reports to find out the sales volume, stock list, and summary report.

Many Supermarkets use this type of billing system for a decade. It is

also improved many times according to requirements of sellers and customers. It

does the same work that is calculating the bill, gives it to the customer and maintain

proper database. They are accurate in calculation and printing, they also generate

records.

A new concept is also added in the billing system is that they also maintain

relationships with the customers who purchase more products from the store

regularly. System also concerns their requirements and gives them more commission.

It also shows the overall profit and profit on a particular product and give repots

which items are required and which have cross their expiry date.

1
1.1.2 Proposed System:

This E-Billing and invoicing system is used to overcome the entire problem which they

are facing currently, and making complete atomization of manual billing and invoicing

system

Super Market Billing System

The project is on Supermarket Billing. Supermarket is the place where customers

come to purchase their daily using products and pay for that. So there is a need to

calculate how many products are sold and to generate the bill for the customer. To

make software fast in processing, with good user interface so that user can change it

and it should be used for a long time without error and maintenance. To reduce the

bottlenecks of the existing system there is a need to develop a new system. The new

system should concern the requirements of the customer and the sellers. It has the

following qualities:

1. Reduction in processing cost.

2. Error reduction.

3. Automatic posting.

4. Improve reporting.

5. Automatic production of the documents and Reports.

6. Faster response time.

7. Ability to meet user requirements.

8. Flexibility.

2
9. Reduced dependency.

10. Improves resource uses.

11. Reduction in use of the paper.

12. Reduction in Man Power.

Proposed system has these qualities including the qualities of the existing system.

WORK FLOW

Work in the Supermarket will be done in the following way:


1. The product will come in the store.

2. Data entry operator will enter the information of the product in database.

3. The Administrator will enter the taxes and commissions for each product.

4. The customer will come and take the basket with him/her and choose the

product and took it to the counter.

5. The bill calculating operator will check the products with the bar code detecting

machine then it will match with product-id then it will show its information

and price and the bill will be calculated and total payment will show.

· Customer will pay for the products.

All the products will be packed and delivered to the customer.

One of the most difficult tasks of system analysis is developing a clear, in-depth
understanding of the problem being investigated, without which it becomes impossible to
specify the requirements for a new project with any accuracy. Several questions should
be posed for this. Some of those may be:
 What is the problem?
 How complex is it?
 What are its likely causes?
3
 Why is it important that the problem be solved?
 What are possible solutions to the problem?
 What types of benefits can be expected once the problem is solved?

It takes considerable skill to determine the true cause of a system problem. A systems
analyst might begin to define the problem by determining if the problem can be classified
ac-cording to one or more common types of systems problems. With knowledge of the
common types of systems problems, the analyst can diagnose a problem by examining its
characteristics.
Organizations usually face problems or have opportunity due to the following facts:
 A new product or plant or branch
 A new market or new process
 Failure of an existing system
 Inefficiency of an existing system
 Structural error in the existing system etc

For identifying problems/opportunities, we scan the following:


 The performance of the system
 The information being supplied and its form
 The economy of processing
 The control of the information processing
 The efficiency of the existing system
 The security of the data and software
 The security of the equipment and personnel etc

After identification of the problem, it is defined and a general direction or method for
solving this problem is also determined. The management establishes the term of
reference as well as the resources to be provided for the project. System development is
an iterative process and the first identifiable stage of it is problem definition, whose final
output is terms of reference.
Careful analysis of this system suggests a number of different problems:

4
1. Problem of reliability: Current system is not reliable. It seems to vary in quality
and result from one month to the next. Some items it gives good output, but
sometimes the output is worst.
2. Problem of accuracy: There are too many mistakes in reports and calculations.
3. Problem of timeliness: In the current system the reports and output produced is
mostly late and in most of the cases it is useless because it is not on time.
4. Problem of validity: The output and reports mostly contains misleading
information. The transactions and calculations are sometimes not valid.
5. Problem of economy: The current system is very costly. We have to spend lots of
money in manual filing, calculations and remembering the information, but still
not get the desired results.
6. Problem of capacity: The current system is suffering from problem of capacity
also. The workload is too much. Few peoples cannot handle all the working.

2-FEASIBILITY STUDY
5
“Feasibility Study” is a test of the system according to its workability,

impact of the organization, ability to meet user needs and effective use of the

resources.

We can test our system by different type of the feasibilities. There are 5

types of the feasibilities which are discussed here. These are as follows:

1. Technical Feasibility:

A study of resource availability that may affect the ability to achieve an

acceptable system. This evaluation determines whether the technology needed for the

proposed system is available or not. This system can be made in any language that

support good user interface and easy database handling.

Technical needs may include:

Front-End Selection: Front-End means a language that is used for user interface

designing and coding. Front-End should have following qualities:

 It must have a graphical user interface that assist employees that are not

· from some IT background.

· Scalability and Extensibility

· Robustness

· According to the organization requirements and culture.

· Must provide excellent reporting features with good printing support.

· Platform independent.

· Easy to deploy and maintain.


6
· Event driven programming.

· Front-End must support some popular Back-End like MS Access, SQL Server

and oracle.

According to the above stated features we selected Visual C#.Net as Front–End

for developing our project. Visual C#.Net is used in Microsoft Visual Studio.Net

2003. Back-End Selection: Back-End means a language that is used for database

management. Back-End should have following qualities:

· Multiple user support.

· Provide inherent feature for security.

· Efficient data retrieval and maintenance.

· Stored procedures.

· Popularity.

· Operating System compatible.

· Easy to install.

· Various drivers must be available.

· Efficient data handling.

· Easy to implement with Front-End.

According to the above stated features we selected Oracle as Back–End for

developing our project. We will use Oracle 8i specifically because it has more feature

features then other later versions and it is easy to make and maintain database. It is

also easy to implement Oracle 8i with Visual C#.Net in Microsoft Visual Studio.Net

2003.
7
2. Economic Feasibility:

In this we consider following costs:

· The cost to conduct a full system investigation.

 The cost of hardware and software for class of application being considered.

· The benefit in the form of the reduced cost.

· Our system has a lot of features at a minimum cost so it is feasible to

implement and itwill be very much beneficial to the sellers in the reduced

cost.

It’s software and hardware cost is also low then the existing system.

3. Operational Feasibility:

In this feasibility we consider following points:

· What changes will be brought with the system.

· What new skills will be required? Do the existing staff members have these

skills? If not, can they be trained in due course of time?

In the new system we made some major changes for the staff members so that they

have to be trained to use the newly added facilities. These major changes are possible

and give a new era in the Supermarket in production and sales management.

www.final-yearprojects.co.cc | www.troubleshoot4free.com/fyp/

4. Schedule Feasibility:

8
Time evaluation is most important consideration in development of the

project. So the project is concerned should be completed with fixed in scheduled

time as far as company is concerned. New system is not so much big so it is easy

to make in few days.

5. Behavioral Feasibility:

People are inherently resisted to change and a computer means “change is the

only certainty”. An estimate should be made of how strong a reaction the user staff

in going to have towards development of new system. Thus special efforts can be

made to educate and train the staff.

9
3-System Analysis

The following preliminary lists are based on initial interviews

3.1 Business Requirements:


The business goal for the application is to support an increase the productivity and

complete automation of existing manual bill and invoice generation process. Business

requirements are discussed in the Scope section, with the following additional detail:

· Sales representatives need a method to store and access sales opportunity data,

and when a sale is generated, convert some or all of the information into a sales

order without re-entering information.

· Each sales representative should receive customer and sales data pertinent only to

them.

· The accountant should be able to enter or update product information

in one interface only, with all necessary product information being

received by sales staff.

· Manager must receive his or her customer and appointment data plus

detailed and rollup information for each sales representative on his or her

team.

· The application should support the capability to use multi user environment.

· The MIS Executive should able to generate all type of reports as and

when required by the management.


The sales staff wants to improve their current ability to analyze their customers. In

particular, they want to focus on identifying their best customers and building long-term

relationships within that base. To enable them to accomplish this goal, they want to

extract meaningful data that easily answers the following questions:

· What are the early warning signs of problems?

· Who are my best customers across product lines?

· With whom do I focus my efforts for building a long-term relationship?

· What are my customers' issues as groups?


· Geographically, where are my best customers?
· What products are my customers buying and at what rate?

3.2 User Requirements:

User requirements are categorized by user type.

Sales Staff (Representatives and Managers)

· View the data in various ways, for example:

o Customers who are the top buyers of specific items

o Best customers based on criteria to be determined

o Best customers based on geographical analysis

o Drops in a customer's sales

· Store multilingual and multiregional information in the database rather than

relying on the sales staff to translate the information


· Identify which product prices have been modified, especially on current

orders in progress

· Use opportunity rules, which are statements that help the sales
representative convert an opportunity into a sale
· Add third-party data sources and financial evaluation tools
· Identify where promotions and programs would be the most beneficial
· Apply discounts to customer orders:
o Sales representatives can offer discounts up to 15 percent, or up
to 20 percent with authorization.
o Sales managers can offer discounts up to 20 percent
· Enable capture, analysis, and sharing of data about a customer
across the company
· Use forecasts to establish sales goals

· Allow all staff to view all contacts, but allow each contact to be assigned to

a sales representative

Accountant

· Update product details, including price, photo, and description

· Add, delete, and update product specifications

· Generate stock reports and check the availability, order the item as and

when needed.

MIS Executive

· Generate Reports as per requirement.


· Share the data, and convert reports to different format like Text, CSV.
3.3 Operational Requirements:

The following requirements provide a high-level view of how the system will run:

· Processor usage should not exceed 80 percent during concurrent uses.


· Backups will occur incrementally throughout the day.
· A full weekly backup is required to WORM drives.
· Ensure that information is easy to access either, and meaningful for
the sales representative and the company.
· Minimize the technical knowledge that sales and marketing staff need to
access the data, generate ad hoc queries, track promotions, and view
customer segmentation information.
· Any change to information must be reflected immediately, and the
changes must be propagated to the search engine so that employees that
perform searches see this new information.
· The application should work with the existing communications and
networking infrastructure.
· The application should deploy with a minimum of additional
operational processes, manual or otherwise.

3.4 System Requirements:

These are additional constraints from a system perspective:

· Previous data of customer, product details must be imported in the new system.
· The administrator must be able to monitor everything from the IT department.
· The information must be accessible by everyone in the company as per the
rights specify.

Success Criteria
To determine the success of this project, the following metrics can be quantified
and used to analyze success factors.

Sales Automation

· Problem customer identification. Ability to identify top 10 developing


problem customers by sales representative.
· Identification of best customers across product lines and regions. All
customers can be sorted by the factors (to be determined) that rank them
qualitatively. Variable sorts and rankings can be chosen by the sales
representative.
· Identification of issues across groups. All customers can be sorted by the
issues (to be determined) within group categories that can be updated.
Variable sorts and rankings can be chosen by the sales representative or
other user.
· Analysis of quantities and rates of products. Products can be sorted by
the quantity and dates sold. Variable sorts and rankings can be chosen
by the user.

3.5 Software and Hardware Requirement:


General Requirement for Server/Client:

Type Software Hardware


Work Station/ Node 1. Windows XP 1. P-4
2. VB Run time 2. RAM -256 MB
3. MS Office

Database Server 1.Win2000 Advance Server 1.P-4


2.RAM- 2GB
3.Hard Disk-160GB
4.RAID
Application Server 1.Win 2000 Advance Server 1.P-4
2.RAM- 1GB
3.Hard Disk-40GB
Development Tools and Technologies

Front End

1. Java

Why Java?

Java is built on the Windows Server System to take major advantage of the
OS and which comes with a host of different servers which allows for
building, deploying, managing and maintaining Windows Based solutions.
The Windows Server System is designed with performance as priority and
it provides scalability, reliability.

The advantage of Java includes


· Rapid Application Development (RAD) Support.
· Powerful Windows-based Applications
· Simplified Deployment
· Powerful, Flexible, Simplified Data Access
· Improved Coding
· Direct Access to the OS Platform
· Object-Oriented Constructs
· COM Interoperability

Back End
6. MS Access
Why MS Access?
MS Access is desktop RDMS support small application with all
features like relational query, different data types, joins, and query.
Includes
· Easy to use and easy to deployment.
· Integration with Windows OS
· Scalability
· Import and Export of data in all major database system.
· Centralized Management
· Reliability
· Automating tasks
4-System Design

A computer procedure is a series of operations designed to manipulate data to

produce outputs from a computer system. The procedure may be a single program or a

series of programs. The detail design of the computer procedure follows acceptance by

management of an outline design proposal. The aim now is to design procedures at

lower levels of detail, which will define the detailed steps to be taken to produce the

specified computer output. When complete, these procedure definitions together with

data specifications are organized for programmers from which the required programs

can be written.

Design Tools:

Various tools are being used by system analysis to specify computer procedures.

Not all of them are used here to design this project. Some of the important tools that

have been made use of are:

3. Entity relationship Diagram.


4. Input design.
5. Output Design.
6. Database Design.

Input design:

Input design is a part of overall system design, which requires very careful

attention. Often the collection of input data is the most expensive process of the

system. In terms of both the equipment used and the number of people involved, it is
the point of most contact for the users with the computer system; and it is prone to

error. If data going into the system is incorrect, then the processing and output will

magnify their errors.

One of the early activities of input design is to determine the nature of the input

data.

This is done partially in logical system design but it now needs to be made more

explicit.

Output design:

The specification of user requirements is the starting point for the appraisal and

the detailed physical design must be done in the light of this and with continuing user

involvement. The normal procedure is to design the outputs in detail first and then to

work back to the inputs. The outputs can be in the form of operational documents,

lengthy reports, and replies to queries or summarizing graphs.

Outputs from computer systems are required primarily to provide a permanent

copy of the results for later consultation. Any data item not yet defined must be

identified and recorded before output design can proceed. There is often a need at

output to provide totals at various levels. It is not always desirable to print or display

data as it is held on a computer. The system analyst must ensure whether the form in

which it is stored in the system is suitable for the output.

In proposed system the users have been provided with many outputs in the form of

messages and alerts so as to help the user enter the correct data
Architectural Design

Architectural design represents the structure of data and program components

that are required to build a computer based system. It considers the architectural style

that a system will take, the structure and properties of the component that constitute the

system, and the inter relationships that occur among all architectural components of a

system.

Although a software engineer can design both data and architecture, the job is

often allocated to specialists when large, complex systems are to be built. A database

or a data warehouse designer creates the data architecture of a system. The system

architect selects an appropriate architectural style for the requirements derived during

system engineering and software requirements analysis.

Architectural design begins with data design and then proceeds to the derivation

of one or more representations of the architectural structural of the system. Alternative

architectural style or patterns are analyzed to derive the structure that is best suited to

customer requirements and quality attributes. Once an alternative has been selected,

the architecture is elaborated using an architectural design method.

appropriate architectural style for the requirements derived during system

engineering and software requirements analysis.

Architectural design begins with data design and then proceeds to the derivation

of one or more representations of the architectural structural of the system. Alternative

architectural style or patterns are analyzed to derive the structure that is best suited to
customer requirements and quality attributes. Once an alternative has been selected,

the architecture is elaborated using an architectural design method.

& An architectural model encompassing data architecture and program structure

is created during architectural design. In addition, component properties and

relationships are described.

3.1 UML Diagrams

3.1.1 Class Diagrams


3.1.2 Activity Diagrams
3.1.3 Sequence Diagrams
3.1.4 Data Flow Diagrams
3.2 Data Dictionary

Table : product_master

Owner: dbo
Destination DB name: ebill
Number of columns: 5
Number of indexes: 2
Number of foreign keys: 0
Extended attributes:
OnFileGroup PRIMARY
Clustered PK Yes

Columns Data type Allow NULLs Value/ran


ge
Sno Int Not allowed
ProdType nvarchar(60) Not allowed
ProdSubType nvarchar(60) Not allowed
Rate Int Not allowed
isactive nvarchar(30) Not allowed

Indexes Type Columns


PK_ProductMaster_sno clustered, unique, sno
primary key located on
PRIMARY
Table : bill
Owner:dbo
Destination DB name: ebill
Number of columns: 15
Number of indexes: 3
Number of foreign keys: 0
Extended attributes:
OnFileGroup PRIMARY
Clustered PK Yes
Columns Data type Allow Value/ran
NULLs ge

sno Int Not allowed


invoiceno nvarchar(60) Not allowed
canme nvarchar(60) Not allowed
Invoice_date Datetime Not allowed
location nvarchar(60) Not allowed
chalan_no Int Not allowed
customer_name nvarchar(100) Not allowed
Customer_address1 nvarchar(100) Not allowed
Customer_address2 nvarchar(100) Allowed
Total_amt Int Not allowed
discount Int Not allowed
Amt_words nvarchar(100) Not allowed
Paid_type nvarchar(60) Not allowed
Cheque_no nvarchar(60) Allowed
Entry_date Datetime Not allowed

Indexes Type Columns


PK_Bill_SNO clustered, unique, sno
primary key located on
PRIMARY
IX_bill_cname nonclustered located on cname
PRIMARY
IX_bill_invoiceno nonclustered, unique invoiceno
located on PRIMARY

Table : bill_details
Owner: dbo
Destination DB name: ebill
Number of columns: 6
Number of indexes: 3
Number of foreign keys: 2
Extended attributes:
OnFileGroup PRIMARY
Clustered PK Yes
Columns Data type Allow Value/ran

NULLs ge
sno Int Not allowed
Bill_sno Int Not allowed
Prod_sno nvarchar(60) Not allowed
qty Datetime Not allowed
rate nvarchar(60) Not allowed
amt Int Not allowed

Indexes Type Columns


PK_Bill_details_SNO clustered, unique, sno
primary key located on
PRIMARY
IX_bill_details_bill_sno nonclustered located on Bill_sno
PRIMARY
IX_bill_deatils_prod_sno nonclustered, unique Prod_sno
located on PRIMARY

Table : Company_master

Owner: dbo
Destination DB name: ebill
Number of columns: 7
Number of indexes: 2
Number of foreign keys: 0
Extended attributes:
OnFileGroup PRIMARY
Clustered PK Yes

Columns Data type Allow Value/ran


NULLs Ge
Company_name nvarchar(60) Not allowed
Address1 nvarchar(100) Not allowed
Address2 nvarchar(100) Allowed
city nvarchar(60) Not allowed
pin Int Not allowed
telephone nvarchar(60) Not allowed
vatno nvarchar(60) Not allowed

Indexes Type Columns


PK_comapny_master_company clustered, unique, Comapnay_nam
_name primary key located on e
PRIMARY
IX_ comapny_master_pin nonclustered located on pin
PRIMARY

Table : user_master

Owner: dbo
Destination DB name: ebill
Number of columns: 3
Number of indexes: 2
Number of foreign keys: 0
Extended attributes:
OnFileGroup PRIMARY
Clustered PK Yes

Columns Data type Allow Value/ran


NULLs ge
user_name nvarchar(60) Not allowed
User_password nvarchar(60) Not allowed
User_type nvarchar(60) Allowed

Indexes Type Columns


PK_user_master_user_name clustered, unique, user_name
primary key located on
PRIMARY
IX_ user_master_user_type nonclustered located on User_type
PRIMARY
5-Coding

Coding:

importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
class login implements ActionListener
{
JFramefr;
JLabel l1,l2,l3,l4,l5,limg;
JPanel panel;
Choice chrt;
JButton b1,b2;
JTextField t1,t2,t3;
JPasswordFieldpf;
ImageIconig,fimg;
public static void main(String[] args)
{
new login();
}
public login()
{
fr = new JFrame("Login MSM");
fr.setLayout(null);
fimg = new ImageIcon("c:\\stdmgtsys\\images\\student.png");
fr.setIconImage(fimg.getImage());
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\login\\login22.jpg"));
fr.setContentPane(limg);
l1 = new JLabel("User Name");
l2 = new JLabel("Password");
l1.setForeground(Color.white);
l2.setForeground(Color.white);
ig = new ImageIcon("c:\\stdmgtsys\\images\\student.png");
l5 = new JLabel(ig);
l1.setBounds(130,180,80,30);
l2.setBounds(130,220,100,30);
l5.setBounds(5,5,150,150);
fr.add(l1);
fr.add(l2);
fr.add(l5);
chrt=new Choice();
chrt.setBounds(215,180,150,30);
chrt.addItem("Admin");
chrt.addItem("Student");
fr.add(chrt);
pf = new JPasswordField();
pf.setBounds(215,220,150,30);
fr.add(pf);
b1 = new JButton("Login");
b1.setBounds(155,285,80,35);
b1.setBackground(Color.white);
b1.setForeground(Color.black);
b1.addActionListener(this);
fr.add(b1);
b2 = new JButton("Cancel");
b2.setBounds(260,285,80,35);
b2.setBackground(Color.white);
b2.setForeground(Color.black);
b2.addActionListener(this);
fr.add(b2);
Dimension screenSize = Toolkit.getDefaultToolkit().getScreenSize();
int height = screenSize.height;
int width = screenSize.width;
fr.setUndecorated(true);
//fr.getRootPane().setWindowDecorationStyle(JRootPane.PLAIN_DIALOG);
//fr.getContentPane().add(new JPanel());
fr.setResizable(false);
fr.setBounds((width-500)/2,(height-500)/2,500,500);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
String user,pass;
user=chrt.getSelectedItem();
pass=pf.getText();
if(pass.equals("student") &&user.equals("Student") )
{
newsearchlogin();
//setvisible(false);
fr.dispose();
}
if(pass.equals("Admin") &&user.equals("Admin") )
{
newawelcome();
//setvisible(false);
fr.dispose();
}
/*else{
JOptionPane.showMessageDialog(null,"Invaild User name and
password");
pf.setText("");
}*/
}
if(ae.getSource()==b2)
{
fr.dispose();
}
}
}
//***********************//

importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
importjava.sql.*;
classsearchlogin implements ActionListener
{
public static String sid;
JFramefr;
JLabel l1,limg;
JButton b1,b2;
publicsearchlogin()
{
fr = new JFrame("SEARCH RECORDS");
fr.getContentPane().setBackground(Color.pink);
fr.setSize(400,300);
fr.setLayout(null);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\login\\login1.jpg"));
fr.setContentPane(limg);
l1 = new JLabel("ARE YOU REGISTERED USER ?");
l1.setFont(new Font("comic sans ms",Font.BOLD,22));
l1.setForeground(Color.blue);
l1.setBounds(30,90,350,30);
fr.add(l1);
b1 = new JButton("YES");
b1.setBounds(90,180,100,30);
b1.addActionListener(this);
b2 = new JButton("NO");
b2.setBounds(200,180,100,30);
b2.addActionListener(this);
fr.add(b1);
fr.add(b2);
Dimension screen = Toolkit.getDefaultToolkit().getScreenSize();
fr.setLocation((screen.width - 500)/2,((screen.height-350)/2));
fr.setUndecorated(true);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
newuserlogin();
fr.dispose();
}
if(ae.getSource()==b2)
{
new register();
fr.dispose();
}
}
public static void main(String args[])
{
newsearchlogin();
}
}
//*********************************//
importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
classawelcome implements ActionListener
{
JFramefr;
JLabel l1,limg,l2,l3;
JButton b1,b2;
publicawelcome()
{
fr = new JFrame();
//fr.getContentPane().setBackground(Color.pink);
fr.setSize(400,300);
fr.setLayout(null);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\smile2.jpg"));
fr.setContentPane(limg);
l1 = new JLabel(" WELCOME ");
l1.setFont(new Font("comic sans ms",Font.BOLD,30));
l1.setForeground(Color.yellow);
l1.setBounds(110,130,250,40);
fr.add(l1);
b1 = new JButton(" OK ");
b1.setBounds(150,230,100,30);
b1.setBackground(Color.yellow);
b1.addActionListener(this);
fr.add(b1);
Dimension screen = Toolkit.getDefaultToolkit().getScreenSize();
fr.setLocation((screen.width - 500)/2,((screen.height-350)/2));
fr.setUndecorated(true);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
newmainform();
fr.dispose();
}
}
public static void main(String args[])
{
newawelcome();
}
}
//********************************************//
importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
importjava.sql.*;
classuserlogin implements ActionListener
{
Connection con = null;
Statement stmt = null;
ResultSetrs = null;
JFramefr;
JLabel l1,limg,l2,l3;
JTextField t1,t2;
JPasswordField t3;
JButton b1,b2;
static String name;
publicuserlogin()
{
fr = new JFrame("REGISTER USER LOGIN");
fr.getContentPane().setBackground(Color.pink);
fr.setSize(400,300);
fr.setLayout(null);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\login\\login1.jpg"));
fr.setContentPane(limg);
t1 = new JTextField();
t1.setBounds(200,70,150,30);
l1 = new JLabel("USER NAME ");
l1.setFont(new Font("comic sans ms",Font.BOLD,18));
l1.setForeground(Color.blue);
l1.setBounds(40,70,150,30);
fr.add(l1);
l2 = new JLabel("Enter ID ");
l2.setFont(new Font("comic sans ms",Font.BOLD,18));
l2.setForeground(Color.blue);
l2.setBounds(40,120,150,30);
fr.add(l2);
t2 = new JTextField();
t2.setBounds(200,120,150,30);
fr.add(t2);
l3 = new JLabel("PASSWORD ");
l3.setFont(new Font("comic sans ms",Font.BOLD,18));
l3.setForeground(Color.blue);
l3.setBounds(40,170,150,30);
fr.add(l3);
t3 = new JPasswordField();
t3.setBounds(200,170,150,30);
fr.add(t3);
b1 = new JButton("LOGIN");
b1.setBounds(90,230,100,30);
b1.addActionListener(this);
b2 = new JButton("CANCLE");
b2.setBounds(200,230,100,30);
b2.addActionListener(this);
fr.add(b1);
fr.add(t1);
fr.add(b2);
Dimension screen = Toolkit.getDefaultToolkit().getScreenSize();
fr.setLocation((screen.width - 500)/2,((screen.height-350)/2));
fr.setUndecorated(true);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
String s1 = t2.getText();
String s2 = t1.getText();
String s3 = t3.getText();
String s4,s5;
name = s2;
try
{
makeconnection();
stmt = con.createStatement();
rs = stmt.executeQuery("select Name,Password1 from record where
id="+s1);
rs.next();
s4 = rs.getString("Name");
s5 = rs.getString("Password1");
if(s4.equals(s2) && s5.equals(s3))
{
newswelcome();
//new mainform();
fr.dispose();
}
con.close();
}
catch(Exception e)
{
System.out.println("error"+e);
}
}
if(ae.getSource()==b2)
{
//new mainform();
fr.dispose();
}
}
public void makeconnection()
{
try
{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con = DriverManager.getConnection("JDBC:ODBC:Driver={Microsoft Access Driver (*.mdb,
*.accdb)};DBQ=c:\\stdmgtsys\\source code\\database\\login.accdb");
System.out.println("Connection established...");
}
catch(Exception e)
{
System.out.println("Connection not established...");
}
}
public static void main(String args[])
{
newuserlogin();
}
}
//********************************************//
importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
classswelcome extends userlogin implements ActionListener
{
JFramefr;
JLabel l1,limg,l2,l3;
JButton b1,b2;
publicswelcome()
{
fr = new JFrame();
fr.getContentPane().setBackground(Color.yellow);
fr.setSize(400,300);
fr.setLayout(null);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\smile1.jpg"));
fr.setContentPane(limg);
l1 = new JLabel(" WELCOME ");
l1.setFont(new Font("comic sans ms",Font.BOLD,30));
l1.setForeground(Color.black);
l1.setBounds(110,130,250,40);
fr.add(l1);
l2 = new JLabel( name );
l2.setFont(new Font("comic sans ms",Font.BOLD,20));
l2.setForeground(Color.red);
l2.setBounds(160,180,250,30);
fr.add(l2);
b1 = new JButton(" OK ");
b1.setBounds(150,230,100,30);
b1.setBackground(Color.yellow);
b1.addActionListener(this);
fr.add(b1);
Dimension screen = Toolkit.getDefaultToolkit().getScreenSize();
fr.setLocation((screen.width - 500)/2,((screen.height-350)/2));
fr.setUndecorated(true);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
newmainform();
fr.dispose();
}
}
public static void main(String args[])
{
newswelcome();
}
}
//**********************************************//
importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
importjava.sql.*;
class register implements ActionListener
{
public static String sid;
JFramefr;
JLabel l1,limg,l2;
JTextField t1,t2,t3;
JButton b1,b2;
public register()
{
fr = new JFrame("REGISTER NEW USER LOGIN");
fr.getContentPane().setBackground(Color.pink);
fr.setSize(400,300);
fr.setLayout(null);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\login\\login1.jpg"));
fr.setContentPane(limg);
l1 = new JLabel("DO YOU WANT TO CREATE NEW");
l2 = new JLabel(" REGISTRATION ? ");
l1.setFont(new Font("comic sans ms",Font.BOLD,18));
l1.setForeground(Color.blue);
l1.setBounds(40,100,350,30);
fr.add(l1);
l2.setFont(new Font("comic sans ms",Font.BOLD,18));
l2.setForeground(Color.blue);
l2.setBounds(40,140,350,30);
fr.add(l2);
b1 = new JButton("YES");
b1.setBounds(90,205,100,30);
b1.addActionListener(this);
b2 = new JButton("NO");
b2.setBounds(200,205,100,30);
b2.addActionListener(this);

fr.add(b1);
fr.add(b2);
Dimension screen = Toolkit.getDefaultToolkit().getScreenSize();
fr.setLocation((screen.width - 500)/2,((screen.height-350)/2));
fr.setUndecorated(true);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
newloginregister();
fr.dispose();
}
if(ae.getSource()==b2)
{
newsearchlogin();
fr.setVisible(false);
}
}
public static void main(String args[])
{
new register();
}
}
//************************************************//
importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
importjava.sql.*;
classloginregister implements ActionListener
{
Connection con = null;
Statement stmt = null;
ResultSetrs = null;
String str[]={"Student
ID","UserName","Father'sName","Class/Branch","ContactNo","Date Of
Birth","Emailid","Password","Retype Password"};
JFramefr;
JLabellb[],limg;
JTextFieldtxt1[];
JPasswordField t1,t2;
staticint y1=130,y2=130,y3=100;
JButton b1,b2,b3;
JLabel l1;
publicloginregister()
{
fr = new JFrame("NEW USER REGISTRATION");
//fr.getContentPane().setBackground(Color.pink);
fr.setSize(1366,768);
fr.setLayout(null);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\wood9.jpg"));
fr.setContentPane(limg);
lb = new JLabel[str.length];
for(int i=0 ; i<9 ; i++)
{
lb[i] = new JLabel(str[i]);
lb[i].setBounds(150,y1,160,30);
lb[i].setForeground(Color.red);
y1=y1+50;
fr.add(lb[i]);
lb[i].setFont(new Font("lucida console",Font.BOLD,18));
}
txt1 = new JTextField[7];
for(int i=0 ; i<7 ; i++)
{
txt1[i] = new JTextField();
txt1[i].setBounds(340,y2,180,30);
y2=y2+50;
fr.add(txt1[i]);
txt1[i].setFont(new Font("lucida console",Font.BOLD,16));
}
t1 = new JPasswordField();
t1.setBounds(340,y2,180,30);
y2=y2+50;
fr.add(t1);
t2 = new JPasswordField();
t2.setBounds(340,y2,180,30);
y2=y2+50;
fr.add(t2);
b1 = new JButton("SUBMIT");
b1.setBounds(305,630,105,30);
b1.addActionListener(this);
fr.add(b1);
b2 = new JButton("Login");
b2.setBounds(420,630,105,30);
b2.addActionListener(this);
fr.add(b2);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
String s1 = txt1[0].getText();
String s2 = txt1[1].getText();
String s3 = txt1[2].getText();
String s4 = txt1[3].getText();
String s5 = txt1[4].getText();
String s6 = txt1[5].getText();
String s7 = txt1[6].getText();
String s8 = t1.getText();
String s9 = t2.getText();
String s10;
/*try
{
makeconnection1();
stmt = con.createStatement();
rs = stmt.executeQuery("select name from record where id="+s1);
rs.next();
System.out.println(rs.getString("name"));
con.close();
}
catch(Exception e)
{
System.out.println("error"+e);
}*/
try
{
makeconnection();
if(s8.equals(s9))
{
stmt = con.createStatement();
System.out.println("i m here");
String str ="insert into record values(" + s1 + ",'" + s2 + "','" + s3 +"','" +
s4 + "','" + s5 + "','" + s6 + "','" + s7 + "','" + s8 + "','" + s9 + "')";
System.out.println("i m here"+str);
stmt.executeUpdate(str);
System.out.println("i m here");
newSuccessDialog();
}
else
{
JOptionPane.showMessageDialog(null, "Please re enter
Password", "Done!",
JOptionPane.INFORMATION_MESSAGE);
}
con.close();
}
catch(Exception e)
{
System.out.println("Error in Inserting Record...."+e);
}
}
if(ae.getSource()==b2)
{
newuserlogin();
fr.dispose();
}
}
public void makeconnection()
{
try
{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con = DriverManager.getConnection("JDBC:ODBC:Driver={Microsoft Access Driver (*.mdb,
*.accdb)};DBQ=c:\\stdmgtsys\\source code\\database\\login.accdb");
System.out.println("Connection established...");
}
catch(Exception e)
{
System.out.println("Connection not established...");
}
}
/*public void makeconnection1()
{
try
{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con = DriverManager.getConnection("JDBC:ODBC:Driver={Microsoft Access Driver (*.mdb,
*.accdb)};DBQ=c:\\stdmgtsys\\source code\\database\\student.accdb");
System.out.println("Connection established...");
}
catch(Exception e)
{
System.out.println("Connection not established...");
}
}*/
public static void main(String args[])
{
newloginregister();
}
}
//************************************************//
importjavax.swing.JFrame;
importjavax.swing.JOptionPane;
public class SuccessDialog
{
SuccessDialog()
{
String message = "Data added successfully!";
JOptionPane.showMessageDialog(new JFrame(), message, "Done!",
JOptionPane.INFORMATION_MESSAGE);
}
public static void main(String argv[])
{
newSuccessDialog();
}
}
//************************************************//
importjava.awt.*;
importjava.awt.event.*;
importjavax.swing.*;
importjava.sql.*;
classsearchlogin implements ActionListener
{
public static String sid;
JFramefr;
JLabel l1,limg;
JButton b1,b2;
publicsearchlogin()
{
fr = new JFrame("SEARCH RECORDS");
fr.getContentPane().setBackground(Color.pink);
fr.setSize(400,300);
fr.setLayout(null);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\login\\login1.jpg"));
fr.setContentPane(limg);
l1 = new JLabel("ARE YOU REGISTERED USER ?");
l1.setFont(new Font("comic sans ms",Font.BOLD,22));
l1.setForeground(Color.blue);
l1.setBounds(30,90,350,30);
fr.add(l1);
b1 = new JButton("YES");
b1.setBounds(90,180,100,30);
b1.addActionListener(this);
b2 = new JButton("NO");
b2.setBounds(200,180,100,30);
b2.addActionListener(this);
fr.add(b1);
fr.add(b2);
Dimension screen = Toolkit.getDefaultToolkit().getScreenSize();
fr.setLocation((screen.width - 500)/2,((screen.height-350)/2));
fr.setUndecorated(true);
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
}
public void actionPerformed(ActionEventae)
{
if(ae.getSource()==b1)
{
newuserlogin();
fr.dispose();
}
if(ae.getSource()==b2)
{
new register();
fr.dispose();
}
}
public static void main(String args[])
{
newsearchlogin();
}
}
//***************************************************//
importjava.awt.*;
importjavax.swing.*;
importjava.awt.event.*;
classmainform extends Thread implements ActionListener
{
//Thread th;
JFramefr;
JMenuBarmb;
JMenu op;
JMenuItemar,dr,sr,mr,dsr,ext,fee,mar;
JPopupMenu pm;
JMenu op1,op2;
JMenuItem ar1,dr1,sr1,mr1,dsr1,ext1,m1,m2,m3,m4,m5,m6;
ImageIcon fimg,img1,img2,img3,img4,img5,img6;
JLabel limg,limg1,l1;
JToolBartoolBar;
JButton btn1,btn2,btn3,btn4,btn5,btn6;
intwidth,height;
staticintfx=1,fy=50,x=10,z=0;
publicmainform()
{
fr = new JFrame("Student Management System Ver(1.0)");
fr.setBackground(Color.black);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\student.jpg"));
fr.setContentPane(limg);
String str="Student Management System";
l1 = new JLabel(str);
l1.setVisible(true);
l1.setFont(new Font("Times New Roman",Font.BOLD,80));
l1.setForeground(Color.red);
l1.setBounds(fx,fy,1050,85);
fr.add(l1);
if(z==0)
{
start();
z=1;
}
Dimension screenSize = Toolkit.getDefaultToolkit().getScreenSize();
height = screenSize.height;
width = screenSize.width;
fr.setBounds(0,0,width,height);
mb = new JMenuBar();
mb.setBackground(Color.red);
op = new JMenu("Operations");
op.setFont(new Font("comic sans ms",Font.BOLD,18));
op.setMnemonic('O');
img1 = new ImageIcon("c:/stdmgtsys/images/save.png");
ar = new JMenuItem(" Insert Record");
ar.setIcon(img1);
ar.setFont(new Font("comic sans ms",Font.BOLD,18));
ar.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_I, Event.CTRL_MASK));
ar.setMnemonic((int)'I');
ar.addActionListener(this);
img2 = new ImageIcon("c:/stdmgtsys/images/delete.png");
dr = new JMenuItem(" Remove Record");
dr.setIcon(img2);
dr.setFont(new Font("comic sans ms",Font.BOLD,18));
dr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_R,Event.CTRL_MASK));
dr.setMnemonic((int)'R');
dr.addActionListener(this);
img3 = new ImageIcon("c:/stdmgtsys/images/search3.png");
sr = new JMenuItem(" Search Record");
sr.setIcon(img3);
sr.setFont(new Font("comic sans ms",Font.BOLD,18));
sr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_S,Event.CTRL_MASK));
sr.setMnemonic((int)'S');
sr.addActionListener(this);
img4 = new ImageIcon("c:/stdmgtsys/images/modify1.png");
mr = new JMenuItem(" Modify Record");
mr.setIcon(img4);
mr.setFont(new Font("comic sans ms",Font.BOLD,18));
mr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_M,Event.CTRL_MASK));
mr.setMnemonic((int)'M');
img5 = new ImageIcon("c:/stdmgtsys/images/monitor2.png");
dsr = new JMenuItem(" Marks Record ");
dsr.setIcon(img5);
dsr.setFont(new Font("comic sans ms",Font.BOLD,18));
dsr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_D,Event.CTRL_MASK));
dsr.setMnemonic((int)'D');
img6 = new ImageIcon("c:/stdmgtsys/images/close.png");
ext = new JMenuItem(" Quit SMS ");
ext.setIcon(img6);
ext.setFont(new Font("comic sans ms",Font.BOLD,18));
ext.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_Q,Event.CTRL_MASK));
ext.setMnemonic((int)'Q');
op.add(ar);
op.addSeparator();
op.add(dr);
op.addSeparator();
op.add(sr);
op.addSeparator();
op.add(mr);
op.addSeparator();
op.add(dsr);
op.addSeparator();
op.add(ext);
mb.add(op);
fr.setJMenuBar(mb);
pm = new JPopupMenu();
op1 = new JMenu("Operations ");
op1.setFont(new Font("comic sans ms",Font.BOLD,14));
ar1 = new JMenuItem(" Add New Record");
ar1.setIcon(img1);
ar1.setFont(new Font("comic sans ms",Font.BOLD,14));
dr1 = new JMenuItem(" Remove Record");
dr1.setIcon(img2);
dr1.setFont(new Font("comic sans ms",Font.BOLD,14));
sr1 = new JMenuItem(" Search Record");
sr1.setIcon(img3);
sr1.setFont(new Font("comic sans ms",Font.BOLD,14));
mr1 = new JMenuItem(" Modify Record");
mr1.setIcon(img4);
mr1.setFont(new Font("comic sans ms",Font.BOLD,14));
dsr1 = new JMenuItem(" Marks Record ");
dsr1.setIcon(img5);
dsr1.setFont(new Font("comic sans ms",Font.BOLD,14));
ext1 = new JMenuItem(" Exit ");
ext1.setIcon(img6);
ext1.setFont(new Font("comic sans ms",Font.BOLD,14));
ar1.addActionListener(this);
dr1.addActionListener(this);
sr1.addActionListener(this);
mr1.addActionListener(this);
dsr1.addActionListener(this);
ext1.addActionListener(this);
op1.add(ar1);
op1.add(dr1);
op1.add(sr1);
op1.add(mr1);
op1.add(dsr1);
op1.add(ext1);
op2 = new JMenu("Change Background ");
op2.setFont(new Font("comic sans ms",Font.BOLD,14));
m1 = new JMenuItem(" Cobra Skin");
m2 = new JMenuItem(" Green Latern");
m3 = new JMenuItem(" Sun Set");
m4 = new JMenuItem(" Texture");
m5 = new JMenuItem(" Greynite");
m6 = new JMenuItem(" Set Default");
m1.setFont(new Font("comic sans ms",Font.BOLD,14));
m2.setFont(new Font("comic sans ms",Font.BOLD,14));
m3.setFont(new Font("comic sans ms",Font.BOLD,14));
m4.setFont(new Font("comic sans ms",Font.BOLD,14));
m5.setFont(new Font("comic sans ms",Font.BOLD,14));
m6.setFont(new Font("comic sans ms",Font.BOLD,14));
m1.addActionListener(this);
m2.addActionListener(this);
m3.addActionListener(this);
m4.addActionListener(this);
m5.addActionListener(this);
m6.addActionListener(this);
op2.add(m1);
op2.add(m2);
op2.add(m3);
op2.add(m4);
op2.add(m5);
op2.add(m6);
pm.add(op1);
pm.add(op2);
//fr.setUndecorated(true);
btn1 = new JButton(img1);
btn2 = new JButton(img2);
btn3 = new JButton(img3);
btn4 = new JButton(img4);
btn5 = new JButton(img5);
btn6 = new JButton(img6);
btn1.setToolTipText("Registration");
btn2.setToolTipText("Remove Record");
btn3.setToolTipText("Search Record");
btn4.setToolTipText("Modify Record");
btn5.setToolTipText("Marks Record");
btn6.setToolTipText(" Exit ");
btn1.addActionListener(this);
btn2.addActionListener(this);
btn3.addActionListener(this);
btn4.addActionListener(this);
btn5.addActionListener(this);
btn6.addActionListener(this);
toolBar = new JToolBar();
toolBar.setBackground(Color.pink);
addtool();
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
fr.addMouseListener (new MouseAdapter () {
public void mousePressed (MouseEvent me) { checkMouseTrigger (me); }
public void mouseReleased (MouseEvent me) { checkMouseTrigger (me); }
private void checkMouseTrigger (MouseEvent me) {
if (me.isPopupTrigger ())
pm.show (me.getComponent (), me.getX (), me.getY ());
}
}
);
}
public void actionPerformed(ActionEventae)
{
if((ae.getSource()==ar) || (ae.getSource()== btn1) || (ae.getSource()== ar1))
{
fr.setTitle("Student Management System [Insert Record]");
fr.setEnabled(false);
newaddrecord();
}
if((ae.getSource()==dr) || (ae.getSource()== btn2) || (ae.getSource()== dr1))
{
fr.setTitle("Student Management System [Remove Record]");
fr.setEnabled(false);
newdeleterecord();
}
if((ae.getSource()==sr) || (ae.getSource()== btn3) || (ae.getSource()== sr1))
{
fr.setTitle("Student Management System [Search Record]");
fr.setEnabled(false);
new search();
}
if((ae.getSource()==mr) || (ae.getSource()== btn4) || (ae.getSource()== mr1))
{
fr.setTitle("Student Management System [Modify Record]");
fr.setEnabled(false);
newsearchmodify();
}
if((ae.getSource()==dsr) || (ae.getSource()== btn5) || (ae.getSource()== dsr1))
{
fr.setTitle("Student Management System [Marks Record]");
fr.setEnabled(false);
newsearchmarks();
}
if((ae.getSource()==ext) || (ae.getSource()== btn6) || (ae.getSource()== ext1))
{
//fr.setTitle("Student Management System [Marks Record]");
//fr.setEnabled(false);
fr.dispose();
new login();
}
if(ae.getSource()==m1)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\wood2.jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m2)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\wood3.jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m3)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\img..jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m4)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\img.png"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m5)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\sm.jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m6)
{
fr.setContentPane(limg);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
}

public void addtool()


{
toolBar.add (btn1);
toolBar.addSeparator ();
toolBar.add (btn2);
toolBar.addSeparator ();
toolBar.add (btn3);
toolBar.addSeparator ();
toolBar.add (btn4);
toolBar.addSeparator ();
toolBar.add (btn5);
toolBar.addSeparator ();
toolBar.add (btn6);
toolBar.setBounds(0,0,width,50);
fr.add(toolBar);
}
public void run()
{
while(true)
{
try
{
sleep(80);
}
catch(Exception e)
{
}
fx = fx + x;
l1.setBounds(fx,fy,1050,85);
if(fx<= 1366)
{
x = x * +1;
}
if(fx> 1366)
{
fx = 0;
}
}
}
public static void main(String args[])
{
newmainform();
}
}
//*****************************************//

//***************************************************//
importjava.awt.*;
importjavax.swing.*;
importjava.awt.event.*;
classmainform extends Thread implements ActionListener
{
//Thread th;
JFramefr;
JMenuBarmb;
JMenu op;
JMenuItemar,dr,sr,mr,dsr,ext,fee,mar;
JPopupMenu pm;
JMenu op1,op2;
JMenuItem ar1,dr1,sr1,mr1,dsr1,ext1,m1,m2,m3,m4,m5,m6;
ImageIcon fimg,img1,img2,img3,img4,img5,img6;
JLabel limg,limg1,l1;
JToolBartoolBar;
JButton btn1,btn2,btn3,btn4,btn5,btn6;
intwidth,height;
staticintfx=1,fy=50,x=10,z=0;
publicmainform()
{
fr = new JFrame("Student Management System Ver(1.0)");
fr.setBackground(Color.black);
limg = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\student.jpg"));
fr.setContentPane(limg);
String str="Student Management System";
l1 = new JLabel(str);
l1.setVisible(true);
l1.setFont(new Font("Times New Roman",Font.BOLD,80));
l1.setForeground(Color.red);
l1.setBounds(fx,fy,1050,85);
fr.add(l1);
if(z==0)
{
start();
z=1;
}
Dimension screenSize = Toolkit.getDefaultToolkit().getScreenSize();
height = screenSize.height;
width = screenSize.width;
fr.setBounds(0,0,width,height);
mb = new JMenuBar();
mb.setBackground(Color.red);
op = new JMenu("Operations");
op.setFont(new Font("comic sans ms",Font.BOLD,18));
op.setMnemonic('O');
img1 = new ImageIcon("c:/stdmgtsys/images/save.png");
ar = new JMenuItem(" Insert Record");
ar.setIcon(img1);
ar.setFont(new Font("comic sans ms",Font.BOLD,18));
ar.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_I, Event.CTRL_MASK));
ar.setMnemonic((int)'I');
ar.addActionListener(this);
img2 = new ImageIcon("c:/stdmgtsys/images/delete.png");
dr = new JMenuItem(" Remove Record");
dr.setIcon(img2);
dr.setFont(new Font("comic sans ms",Font.BOLD,18));
dr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_R,Event.CTRL_MASK));
dr.setMnemonic((int)'R');
dr.addActionListener(this);
img3 = new ImageIcon("c:/stdmgtsys/images/search3.png");
sr = new JMenuItem(" Search Record");
sr.setIcon(img3);
sr.setFont(new Font("comic sans ms",Font.BOLD,18));
sr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_S,Event.CTRL_MASK));
sr.setMnemonic((int)'S');
sr.addActionListener(this);
img4 = new ImageIcon("c:/stdmgtsys/images/modify1.png");
mr = new JMenuItem(" Modify Record");
mr.setIcon(img4);
mr.setFont(new Font("comic sans ms",Font.BOLD,18));
mr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_M,Event.CTRL_MASK));
mr.setMnemonic((int)'M');
img5 = new ImageIcon("c:/stdmgtsys/images/monitor2.png");
dsr = new JMenuItem(" Marks Record ");
dsr.setIcon(img5);
dsr.setFont(new Font("comic sans ms",Font.BOLD,18));
dsr.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_D,Event.CTRL_MASK));
dsr.setMnemonic((int)'D');
img6 = new ImageIcon("c:/stdmgtsys/images/close.png");
ext = new JMenuItem(" Quit SMS ");
ext.setIcon(img6);
ext.setFont(new Font("comic sans ms",Font.BOLD,18));
ext.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_Q,Event.CTRL_MASK));
ext.setMnemonic((int)'Q');
op.add(ar);
op.addSeparator();
op.add(dr);
op.addSeparator();
op.add(sr);
op.addSeparator();
op.add(mr);
op.addSeparator();
op.add(dsr);
op.addSeparator();
op.add(ext);
mb.add(op);
fr.setJMenuBar(mb);
pm = new JPopupMenu();
op1 = new JMenu("Operations ");
op1.setFont(new Font("comic sans ms",Font.BOLD,14));
ar1 = new JMenuItem(" Add New Record");
ar1.setIcon(img1);
ar1.setFont(new Font("comic sans ms",Font.BOLD,14));
dr1 = new JMenuItem(" Remove Record");
dr1.setIcon(img2);
dr1.setFont(new Font("comic sans ms",Font.BOLD,14));
sr1 = new JMenuItem(" Search Record");
sr1.setIcon(img3);
sr1.setFont(new Font("comic sans ms",Font.BOLD,14));
mr1 = new JMenuItem(" Modify Record");
mr1.setIcon(img4);
mr1.setFont(new Font("comic sans ms",Font.BOLD,14));
dsr1 = new JMenuItem(" Marks Record ");
dsr1.setIcon(img5);
dsr1.setFont(new Font("comic sans ms",Font.BOLD,14));
ext1 = new JMenuItem(" Exit ");
ext1.setIcon(img6);
ext1.setFont(new Font("comic sans ms",Font.BOLD,14));
ar1.addActionListener(this);
dr1.addActionListener(this);
sr1.addActionListener(this);
mr1.addActionListener(this);
dsr1.addActionListener(this);
ext1.addActionListener(this);
op1.add(ar1);
op1.add(dr1);
op1.add(sr1);
op1.add(mr1);
op1.add(dsr1);
op1.add(ext1);
op2 = new JMenu("Change Background ");
op2.setFont(new Font("comic sans ms",Font.BOLD,14));
m1 = new JMenuItem(" Cobra Skin");
m2 = new JMenuItem(" Green Latern");
m3 = new JMenuItem(" Sun Set");
m4 = new JMenuItem(" Texture");
m5 = new JMenuItem(" Greynite");
m6 = new JMenuItem(" Set Default");
m1.setFont(new Font("comic sans ms",Font.BOLD,14));
m2.setFont(new Font("comic sans ms",Font.BOLD,14));
m3.setFont(new Font("comic sans ms",Font.BOLD,14));
m4.setFont(new Font("comic sans ms",Font.BOLD,14));
m5.setFont(new Font("comic sans ms",Font.BOLD,14));
m6.setFont(new Font("comic sans ms",Font.BOLD,14));
m1.addActionListener(this);
m2.addActionListener(this);
m3.addActionListener(this);
m4.addActionListener(this);
m5.addActionListener(this);
m6.addActionListener(this);
op2.add(m1);
op2.add(m2);
op2.add(m3);
op2.add(m4);
op2.add(m5);
op2.add(m6);
pm.add(op1);
pm.add(op2);
//fr.setUndecorated(true);
btn1 = new JButton(img1);
btn2 = new JButton(img2);
btn3 = new JButton(img3);
btn4 = new JButton(img4);
btn5 = new JButton(img5);
btn6 = new JButton(img6);
btn1.setToolTipText("Registration");
btn2.setToolTipText("Remove Record");
btn3.setToolTipText("Search Record");
btn4.setToolTipText("Modify Record");
btn5.setToolTipText("Marks Record");
btn6.setToolTipText(" Exit ");
btn1.addActionListener(this);
btn2.addActionListener(this);
btn3.addActionListener(this);
btn4.addActionListener(this);
btn5.addActionListener(this);
btn6.addActionListener(this);
toolBar = new JToolBar();
toolBar.setBackground(Color.pink);
addtool();
fr.setVisible(true);
fr.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
fr.addMouseListener (new MouseAdapter () {
public void mousePressed (MouseEvent me) { checkMouseTrigger (me); }
public void mouseReleased (MouseEvent me) { checkMouseTrigger (me); }
private void checkMouseTrigger (MouseEvent me) {
if (me.isPopupTrigger ())
pm.show (me.getComponent (), me.getX (), me.getY ());
}
}
);
}
public void actionPerformed(ActionEventae)
{
if((ae.getSource()==ar) || (ae.getSource()== btn1) || (ae.getSource()== ar1))
{
fr.setTitle("Student Management System [Insert Record]");
fr.setEnabled(false);
newaddrecord();
}
if((ae.getSource()==dr) || (ae.getSource()== btn2) || (ae.getSource()== dr1))
{
fr.setTitle("Student Management System [Remove Record]");
fr.setEnabled(false);
newdeleterecord();
}
if((ae.getSource()==sr) || (ae.getSource()== btn3) || (ae.getSource()== sr1))
{
fr.setTitle("Student Management System [Search Record]");
fr.setEnabled(false);
new search();
}
if((ae.getSource()==mr) || (ae.getSource()== btn4) || (ae.getSource()== mr1))
{
fr.setTitle("Student Management System [Modify Record]");
fr.setEnabled(false);
newsearchmodify();
}
if((ae.getSource()==dsr) || (ae.getSource()== btn5) || (ae.getSource()== dsr1))
{
fr.setTitle("Billing Management System [Marks Record]");
fr.setEnabled(false);
newsearchmarks();
}
if((ae.getSource()==ext) || (ae.getSource()== btn6) || (ae.getSource()== ext1))
{
//fr.setTitle("Billing Management System [Marks Record]");
//fr.setEnabled(false);
fr.dispose();
new login();
}
if(ae.getSource()==m1)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\wood2.jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m2)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\wood3.jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m3)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\img..jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m4)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\img.png"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m5)
{
limg1 = new JLabel(new ImageIcon("c:\\stdmgtsys\\images\\back\\sm.jpg"));
fr.setContentPane(limg1);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
if(ae.getSource()==m6)
{
fr.setContentPane(limg);
fr.invalidate();
fr.validate();
fr.repaint();
addtool();
}
}

public void addtool()


{
toolBar.add (btn1);
toolBar.addSeparator ();
toolBar.add (btn2);
toolBar.addSeparator ();
toolBar.add (btn3);
toolBar.addSeparator ();
toolBar.add (btn4);
toolBar.addSeparator ();
toolBar.add (btn5);
toolBar.addSeparator ();
toolBar.add (btn6);
toolBar.setBounds(0,0,width,50);
fr.add(toolBar);
}
public void run()
{
while(true)
{
try
{
sleep(80);
}
catch(Exception e)
{
}
fx = fx + x;
l1.setBounds(fx,fy,1050,85);
if(fx<= 1366)
{
x = x * +1;
}
if(fx> 1366)
{
fx = 0;
}
}
}
public static void main(String args[])
{
newmainform();
}
}
//*****************************************//
6-Testing

System Development and Testing:

System Development is a process of conceiving the specification

specified in the designing stage into source code. Careful study and observation

about system designing were made and accordingly the system was coded to

convert from designing to source code, where visual Basic as the front end and

OracleXE as the backend. The System was developed such that it should be used

for the future enhancement.

All the module of the system is combined and is put to the operational

use. This means that the new and old system are run in the parallel for sometimes,

errors are identified and the corresponding errors are to be concerned to get the

required output.

The set of working programs and initialized tables are also provided

for the easy start of the user, in addition, system documentation is also provided,

all users have been trained to use the system.

This creates two problems,

· The time lag between the cause and appearance


of the problem.
· The effect of system errors on files and records
within the system.
Types of testing done:

4.1 Unit Testing:

Unit test is designed to ensure that the purpose for which it was designed

for which it was designed for is fulfilled. Each and every module was tested

individually with the test data and error messages were displayed for incorrect

and sufficient for entry works. All validation was tested to correctness. Test data

were fed in and results were checked for the maintenance module, to ensure that

all tables created contained nothing but valid data. Reverential integrity

constraints specified as part of the table definition was also tested.

4.2 Recovery Testing:

Many computer based systems must recover from faults and resume

processing within a pre-specified time. In some cases a system must be fault

tolerant.ie processing faults must not cause overall system function to cease. In

the casers a system failure must be corrected within a specified period of time or

severe economic damage will occur.

4.3 Security Testing:

Any computer-based system the manages sensitive information or cause

action that can improperly harm individual is a tablet for improper or illegal

penetration Security testing attempts to verify that protection mechanism built


into a system will, in fact protect it from improper penetration . During security

testing, the tester plays the role of the individual who desire to penetrate the

system. The tester may attempt to acquire passwords through external clerical

means; may attack the system with custom software designed to break down any

defenses that have been constructed; may overwhelm the System.

4.4 Performance Testing:


For real time and embedded system, software that provides required

functions but not confirm to performance requirements is unacceptable.

Performance testing is designed to test the run time performance of software

within the context of an integrated system. Performance testing occurs

throughout all steps in the testing process. Even at unit level, the performance of

an individual module may be accessed as white box test recon ducted. However,

it is not until all system elements are fully integrated that true performance of a

system can be ascertained.

Performance Tests are sometimes coupled with stress testing and often

required other hardware and software implementation. It is often necessary to

measure Resource utilization .By incrementing a system the tester can uncover

situations that lead to degradation and possible system failure.

4.5 Integration Testing


In integration testing a system consisting of different modules is tested

for problems arising from component interaction. Integration testing should be


developed from the system specification. Firstly, a minimum configuration must

be integrated and tested. In my project I have done integration testing in a

bottom up fashion i.e. in this project I have started construction and testing with

atomic modules. After unit testing the modules are integrated one by one and

then tested the system for problems arising from component interaction.

4.6 White Box Testing

In white box testing knowing the internal working of the base, test can be

conducted to ensure that internal operations are performed according to

specification and all internal components have been adequately exercised. In

white box testing logical path through the software are tested by providing test

cases that exercise specific set of conditions and loops. Using white-box testing

software developer can derive test case that

• Guarantee that all independent paths within a module have been exercised at
least
once.
• Exercise all logical decisions on their true and false side.
• Exercise all loops at their boundaries and within their operational bound.
• Exercise internal data structure to ensure their validity.
7-Experimental Results

FrmLogin
(Module to Authenticate User)
FrmBill
(Create and modify bill and print the saved bill)

FrmBillSummary
(Show bill summary for particular date range)
FrmExportData
(Export product Data in FlexGrid and MS-Excel with formatting)
FrmCompanyInfo
(Add/Modify Company Info)
8-Conclusion
This project was developed to fulfill user and business requirement; however

there are lots of scope to improve the performance of the E-Billing and Invoice

System in the area of user interface, database performance, and query

processing time. Etc.

So there are many things for future enhancement of this project. The future

enhancements that are possible in the project are as follows.

· Linking and integration of any legacy system for accounting.

· Integration with travel agent through Web Services

· Connection to third-party OLAP applications

· Electronic Data Interchange (EDI) system between banks, other credit

verification agency and their vendors

· In the area of data security and system security.

· Provide more online tips and help.

· To optimize the query which is embedded in the system


9-References

Websites

· http://www.google.com

· http://www.microsoft.com

· http://www.programmer2programmer.net

· http://www.codeproject.com

· http://www.msdn.com.

· http://www.vb123.com

· http://www.vbcode.com

· http://www.sqltuner.com



You might also like