Professional Documents
Culture Documents
ABSTRACT
Page
1
INDEX
Abstract---------------------------------------------------------1
Introduction----------------------------------------------------3
Overview--------------------------------------------------------4
ER Diagram-----------------------------------------------------21
Converting ER Diagram into Tables-----------------------22
Normalization--------------------------------------------------23
Code--------------------------------------------------------------14
Table Structures----------------------------------------------Snapshots------------------------------------------------------Conclusion-----------------------------------------------------Scope of Enhancement---------------------------------------
SYNOPSIS
Page
2
This application basically deals with the Chit fund companies which will have the
transactions like starting chit groups, joining subscribers to those groups, conducting
monthly, by monthly, weekly and daily auctions, according to that auction bid amount which
is bid by auction winner this bid amount should be divided to all the subscribers in that group.
Then installments collections could collect from subscribers every month or depending on the
type of auction. Every month payments should be pay to the prized subscribers according to
those chit groups after getting proper guarantees from the auction winner.
The title chit fund management software is as per chit fund companies
but
We hope that this package would prove to be an excellent environment for chit fund
companies.
INTRODUCTION
Page
4
Visual Basic is an interesting topic, which has different types. It has all the
methods have their won features with each having merits and demerits which help in
data processing. The topic includes their architecture representing the elements
involved in it and their action is also specified.
Visual Basic 6.0 allows creating object-oriented applications. Visual Basic 6.0
profoundly concentrates on the Internet development features, Active X technology,
enhanced controls, enhanced features of existing control, client/server, new language
features development, data access, a few design enhancement etc.,
Relational databases are logical collection of inter-related data in tabular form
relational databases have always been core to any management system. Its relevance
is profound and hence the need to incorporate new functionalities, utilities becomes
important. These are currently the predominant choice in storing financial records
manufacturing and logistical information, personnel data and much more.
Relational databases are used in huge management systems like Post Office,
Banking, Railway, Defense, and Logistics. Databases pertaining to Educational
Institutions and other large collection of related data.
Relational databases have largely replaced hierarchical databases and network
databases because they are easy to understand and use even though they are much
less efficient. They have been however challenged by Object Databases and XML
databases.
SYSTEM DESCRIPTION:
Page
5
The proposed system is for making easier to manage chit holder details, agent
details, policy details, claimant details and payment details. So this will be developed
for managing the insurance management system. The overall system is control
through the main menu.
MODULES:
The main menu contains 6 parts.
1. Chit description.
2. Chit amount description.
3. Customer Login.
4. Administrator Login.
5. About us.
6. Contact us.
MODULE DESCRIPTION:AGENT LOGIN
The agent login form links to1. Basic agent information like contact details and address which will be shown
in customer insurance information window.
2. All the information related to insurances which he has made to his clients.
3. Commission received by him for each insurance made by him respectively.
4. Option to create a new policy to any existing/new client.
5. Option to edit the contact information of its client.
6. Option to delete a policy of any client in case of policy lapse.
CUSTOMER LOGIN:Page
6
The form contains the agent information like1. Personal information required by insurance agency.
2. Next premium due of respective insurances by the client along with
maturity date,agent info etc.
ADMINISTRATOR LOGIN:Administrator has rights to1. Create new agent
2. Edit agents information and its commission percentage.
3. Delete an agents database and all its policies respectively.
ABOUT US:It contains information about the organizations history and its achievements.
CONTACT US:It contains the contact details of the organizations various branches located in
different parts of a country.
REPORTS:
Sales report
Claimant information report
Agent information report
Client information report
HARDWARE REQUIREMENTS
The hardware that is needed for our system is:
Processor (CPU)
Pentium Processor
Page
7
64 MB
20 GB
Display Size
14 Monitor
Text Resolution
80 Columns by 25 Rows
Key Board
Control
American Standard
Printer Available
HP Laser Jet 6 l
Power Requirement
3)
4)
Data
redundancy
will
be
greatly
reduced
because
this
new
INTRODUCTION
System analysis is the performance management and documentation of activities
related to the four life cycle phases of any software namely:
Page
9
1. Problem Definition
2. Feasibility Study
3. System Analysis
4. System Design
5. Implementation
6. Post Implementation
7. Maintenance
EXISTING SYSTEM
Existing system refers to the system that is being followed till now. The
existing system requires more computational time, more manual calculations, and the
complexity involved in Selection of features is high. The other disadvantages are lack
Page
11
of security of data, Deficiency of Data accuracy, Time consuming etc. To avoid all
these limitations and make the working more accurately the system needs to be
computerized. Here in the Chit fund Maintenance, a detailed study of existing system
is carried along with all the steps in system analysis.
2.3.1 Draw backs of existing system.
Here in the Chit Fund Maintenance, a detailed study of existing system is carried
along with all the steps in system analysis. An idea for creating a better project was
carried and the next steps were followed.
Lack of security of data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.
Damage of machines due to lack of attention.
To avoid all these limitations and make the working more accurately the system
needs to be computerized.
Page
12
2.4
PROPOSED SYSTEM
This would help the corporation prepare and organize its schedules more efficiently
on the basis of traffic demand.
It would provide data on concessions given to various sections.
language
for any project is very important. Basically it depends upon the nature of project and
its system requirements. Windows provides a Multitasking Environment, enabling
user to run various applications at a time. Windows offer many advantages to both the
user and the programmer besides GUIs such as point-and-click capabilities and
multitasking.
Microsoft Visual Basic development system is the most productive tool for
creating fast business solutions for Windows and the Web. A comprehensive, rapid
application development environment helps development environment help
developers quickly create and deploy client /server applications, plus easily program
for the Internet using familiar Visual Basic programming tools and techniques.
With the introduction of Visual Basic 6.0, Microsoft builds upon its critically
acclaimed RAD enterprise development platform with the features that extended and
enhance the currently robust development environment. These features are based on
five design themes, in turn derived from these customer requirements.
The goal of any development tool is to facilitate the developer's need for
quick and efficient creation and deployment of high performance, scalable
applications. Visual Basic 6.0 works to address these needs through the delivery of a
quick-executing, native-code environment. Tens of millions of Visual Basic based
Page
16
applications in use today stand as a testament to the success of Visual Basic in this
area. With Visual Basic 6.0, Microsoft made improvements in the following areas:
Deliver native-code compiled performance
Accelerated Microsoft Win 32 API based forms.
Provide scalable solutions.
Facilitate the development of thread-safe, persist able components.
Package and deploy middle-tier components with ease and peace of mind.
Client Development Support
At the heart of the success Visual Basic has enjoyed is the ability it gives
developer to quickly create robust, powerful, and professional client applications,
components and user interfaces. Visual basic 6.0 provides the following
improvements that enhance client application development:
ActiveX Control creation that gives developers the ultimate in
Win32 flexibility.
Creation of browser-independent applications.
Page
18
Page
19
Microsoft access delivers powerful tools for managing and analyzing data.
With XML support, developers can create highly sophisticated
Enterprise - wide database solutions that integrate easily with the web. One can find
comprehensive tools that make building databases more intuitive Features like
Microsoft Pivot table and the Microsoft Pivot chart greatly improve data analysis
capabilities. Microsoft Access is one of the most versatile applications. This
versatility is evidenced by the rich set of tools that even the Most experienced
database user can take advantage of, offering the same level of simplicity for first
time database user. Access extends this versatility by giving developers and more
experienced users new functionality, enabling them to access and analyze their
important data as well as build powerful new data base solution. At same time, access
makes it easy for beginning users to discover and use more of the existing
application.
Page
20
A model basically specifies all the steps to be followed during the system
development. This makes the task of the engineer quite simple and helps him build
software, which is less error prone.
Tasks accomplished by system modeling are:
Define the processes that serve the needs of the view under consideration.
Represent the behavior of the processes and the assumptions on which
behavior is based.
Explicitly define both exogenous and endogenous input to the model.
Represent all linkages that will enable the engineer to better understand the
view.
Page
21
Page
22
INTRODUCTION
System design is the second step in the system life cycle, in which overall
design of the system is achieved. The functionalities of the system is designed and
studied in this phase. The first step is designing of program specification. This
determines the various data inputs to the system, data flow and the format in which
output is to be obtained.
Design phase is a transmission phase because it is a transition from user
oriented document to computer data. The activity in the design phase is the allocation
of functions to manual operations, equipment and computer programs. Flow charts
prepared in the study time received and decomposed until all functions in the system
perform evidently.
Design is a multistep process that focuses on data structures, software
architecture, procedural details ( algorithms etc) and links between the modules. The
design process goes through logical and physical stages. In logical design reviews are
made linking existing system and specification gathered. The physical plan specifies
any hardware and software requirement, which satisfies the local design.
Modularization of task is made in the mode. The success of any integrated
system depends on the planning of each and every fundamental module. Usually a
project is revised in step by step sequence. Inter phase management of such module is
also important. Software design methodology changes continually as new methods,
better analysis and broader understanding evolve.
Various techniques for software design do exit with the availability of criteria for
design quality. Software design leads three technical activities-design, code and test.
The techniques for software design do exit with the availability of criteria for
design quality. Software design leads three technical activities-design, code and test
Page
23
that are required to build and verify software. Each activity transforms information,
which validates the software. The design system converts theoretical solution
introduced by the feasibility study into a logical reality.
3)(ii) DESIGN STRATEGY
The design strategy is a vital aspect of the system to be developed. The design
of the software reflects the basic understanding of the problem. For designing a good
system what we have to be is to get correct definition of the problem and analyze the
problem thoroughly.
The design of a system should be such that if a small portion is changed. The rest of
the system should be unaffected. This is the flexibility of the system. Greater the
system flexibility greater will be the system reliability. While carrying out the job of
designing of a new system one has to consider many factors. These factors include
the drawbacks and limitations of the present manual system as well as of the features
and advantages of the proposed system. It should be designed in such a manner that
even a layman can run it without any difficulty.
An important quality of a software must enjoy is user friendliness. It can be
achieved in many ways like providing menu, giving context sensitive help, doing
automatic validation to input data, etc. Another main factor is speed efficiency. In
order to achieve speed efficiency, the program should be designed accordingly and
the user is provided with a compiled copy of the software package with necessary
data file format rather than source code.
Design of input and output formats is equally important for any design. The
output format should be designed in such a way that it must reflect all the required
information in detail. The design of the database itself such as type of data stored,
size of data etc. Some of the decisions made during database design are:
Page
24
Page
25
4.3
Page
27
Page
28
ER DIAGRAM
Use Cases chit fund Interface
Main form
User login
Admin login
Add subscribers
Add User
Page
29
Main form
Login form
Chit form
Employee
Day of auction
installments
Contact S
About US
Page
30
Main form
Login form
Agent add
Payment
bid Status
Field officer
cancel agent
Contact S
About US
Page
31
2. Converting relationships
Relationships are based on cardinalities and degree of the relation
m:n
INSURED
POLICY
HOLDER
BY
POLICY
Binary 1:1
CHOOSES
POLICY
HOLDER
CLAIMANT
1 1
Page
32
3. Relations converted
Policy holder and policy have m:n cardinality which results in
conversion of the relation insured by into a table named as
insurance. The insurance table has ph key and pol_key from policy
holder table and policy table respectively ,as its composite primary
key.
Also policy and agent table have m:n cardinality resulting in
conversion of relation sales, into a table named as sales. The table
sales has ph key and pol key from policy holder table and policy table
respectively ,as its composite primary key and agent key from agent
table as a foreign key.
NORMALISATION
Own table normalization
DEFINITION:
A relation schema is in 1NF if all of its attributes are:
Single valued
Restricted to assuming atomic values
Functionally dependent on the primary key
Domain is atomic if its elements are considered to be indivisible units .
Examples of non-atomic domains
Set of names, composite attributes
Identification numbers like ph_key that can be broken up into parts
A relational schema R is in first normal form if the domains of all
attributes of R are atomic.
All domains in our database are atomic since they are indivisible.
No Duplication of data ,Insert Anomaly ,Delete Anomaly ,Update
Anomaly found, therefore our database clears the first normal form test.
2. 2NF
DEFINITION:
A relational table is said to be in second normal form 2NF if it is in 1NF and
every non-key attribute is fully functionally dependent upon primary key.
The criteria for second normal form(2NF) are:
The table must be in !NF.
Every non-key attributes of the table must be dependent upon the entire
primary key.
Tables agent ,policy holder ,claimant ,insurance ,sales are also in 2NF.
our database satisfies all the conditions of 2NF since The tables are in
1NF and Every non-key attributes of the table must be dependent upon
the entire primary key.
Page
34
3. 3NF
A relation is in 3NF if and only if,it is in 2NF and there are no transitive
functional dependencies.
Transitive functional dependencies arise.
When one non-key attribute is functionally dependent on another nonkey attribute.
Functional Dependency: non-key attribute>non-key attribute.
When there is redundancy in the database.
The tables insurance ,claimant ,policy holder and sales have been
converted into 3NF.
By definition transitive functional dependency can only occur if there is more
than one non-key field, so we can say that a relation in 2NF with zero or one
non-key field must automatically be in 3NF.
Page
35
DATABASE DESIGN
A database is an organized mechanism that has the capability of
storing information through which a user can retrieve stored information in an
effective and efficient manner. The data is the purpose of any database and
must be protected.
The database design is a two level process. In the first step, user
requirements are gathered together and a database is designed which will meet
these requirements as clearly as possible. This step is called Information Level
Design and it is taken independent of any individual Database Management
System (DBMS).
In the second step, this Information level design is transferred into a
design for the specific DBMS that will be used to implement the system in
question. This step is called Physical Level Design, concerned with the
characteristics of the specific DBMS that will be used. A database design runs
parallel with the system design. The organization of the data in the database is
aimed to achieve the following two major objectives.
Data Integrity
Data independence
Page
36
INPUT DESIGN
Input design is the process of converting user-originate inputs to a computerbased format. The goal of design input data is to make data entry as easy, logical and
free. The most common source of data processing errors is inactive input data.
Effective design of the input data minimizes the error made by data entry operators.
Catching errors on input is far less costly than correcting after data storage is
complete.
User-friendly input design enables quick error detecting and correction. Verification
and validation is the most important in input design. Since the system is used
interactively, it has two types of inputs. Interactive input-which is the point contact of
the user with the system and the input to the internal system i.e. Databases. For full
efficiency of the system, it is necessary that the input must be accurate. Since the user
of the system may not be a technical person and may not know input concepts so it is
required that he warn, prevent and correct invalid data entry.
There are many ways that can be designed to handle such a situation. We can
prevent the user entering invalid data into the databases by warning, neglecting or
messaging appropriately. The user is then allowed to input correct data. Some help
provisions may aid the user to point out the error. In this system inputs are collected
from terminals through keyboard.
Page
37
OUTPUT DESIGN
Output design has been an ongoing activity from the very beginning of the
project. The objective of the output design is to convey the information of all past
activities, current status and to emphasize important events. The output generally
refers to the results and information that is generated from the system.
The output design of the system is accomplished keeping in mind the following
activities:
Determine what information is to display.
Decide whether to display or print the information retrieved, processed,
generated from the system.
Arrange the presentation of information in an acceptable format.
Decide how to distribute the output to the intended recipients.
In the output design phase one or more output media can be selected.
Out of which the most common ones are CRT displays and print out.
Here only CRT display has been attempted. A rapid enquiry is obtained
from CRT displays. From design is made interesting and attractive. Easy
understanding and effectiveness is made possible.
Page
38
Page
39
Page
40
FORM DESIGN
Case 2
MsgBox ("Second")
Case 3
MsgBox ("Third")
End Select
End Su
Page
44
txtapntname.Visible = True
txtapntaddr.Visible = True
Label10.Visible = True
Label11.Visible = True
Frame1.Height = 7935
txtapntname.SetFocus
Else
txtapntname.Visible = False
Label10.Visible = False
txtapntaddr.Visible = False
Label11.Visible = False
Text1.SetFocus
Frame1.Height = 6255
End If
e:
End Sub
Page
45
Combo4.Text = rs1!Tabel
'
'
'lbl_table.Caption = rs2!T_T
'
'lbldoc.Caption = rs2!DOC
'
'blpre.Caption = rs2!Premium
'End If
'rs1.Close
End Sub
'
On Error GoTo h
'
'
'
'
Dim g As String
'
'
'
'
'
'
End If
'If IsNull(rs(18)) = True Then
'If Image1.Picture = LoadPicture("") Then
Page
48
'rs.Update
Command2.Caption = "Save"
'
'
'
CommonDialog1.ShowOpen
'
Image1.Picture = LoadPicture(CommonDialog1.FileName)
'
End If
'Image1.Picture = LoadPicture("")
'Else
'Image1.Picture = LoadPicture(CommonDialog1.FileName)
'End If
CommonDialog1.Filter = "JPG (*.jpg)|*.jpg|BMP (*.bmp)|*.bmp"
CommonDialog1.ShowOpen
CommonDialog1.Filter = "Picture|*.jpg"
Image1.Picture = LoadPicture(CommonDialog1.FileName, 0.5) ', 256, 100, 150)
Page
49
Combo3.AddItem (rs1(0))
rs1.MoveNext
Wend
End If
'====================================
rs1.MoveFirst
If IsNull(rs1(1)) = False Then
While Not rs1.EOF
Combo4.AddItem (rs1(1))
rs1.MoveNext
Wend
End If
'End If
'rs1.Close
'============================================================
======================
End Sub
Function cmbage()
For I = 1 To 65
Combo2.AddItem (I)
Next
End Function
Set rs = Nothing
Set rs = Nothing
'
'
End If
' db.Close
End If
End Sub
'End If
Dim db As New ADODB.Connection
Dim rs As New ADODB.Recordset
Dim key As Integer, str As String
Set db = Nothing
db.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"/lic.mdb;"
Set rs = Nothing
str = "select * from policy where PolicyNo=" & Text1.Text
rs.Open str, db, adOpenForwardOnly, adLockReadOnly = 1
If rs.EOF = True Then
Else
s = MsgBox("Sorry Data is already Exit" & vbCrLf & _
" Do you want see Data", vbYesNo, "LIC Alart")
If s = vbNo Then
Text1.Text = ""
Text1.SetFocus
Else
Me.Hide
Form13.Label1.Caption = rs!PolicyNo
Form13.Label2.Caption = rs!Name
Form13.Show 'vbModal
End If
'
Set rs = Nothing
'
'
' db.Close
End Sub
ProcExit:
Exit Sub
ProcError:
MsgBox Err.Description
Resume ProcExit
End Sub
Private Function FuncA() As Date
FuncA = CDate("hi there")
Page
57
End Function
Function connectDB()
Set con = New ADODB.Connection
Set rs1 = New ADODB.Recordset
con.Open "Provider=Microsoft.Jet.OLEDB.4.0;Persist Security Info=False;Data
Source= " & App.Path & "\lic.mdb"
End Function
'
Private Sub Command1_Click()
Dim strm As String
Dim a As Integer
Call connectDB
str1 = "select * from pre"
rs1.Open str1, conn, adOpenDynamic, adLockPessimistic
'rs1.MoveNext
'a = rs1(4)
rs1.AddNew
rs1(0) = Text1.Text
rs1(1) = DTPicker1.Value
rs1(2) = Text2.Text
rs1(3) = DTPicker2.Value
Page
59
''
''
Else
Frame1.Visible = True
''
db.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"/lic.mdb;"
''
''
''
rs.MoveFirst
''
lblname.Caption = rs(1)
''
lbladdr.Caption = rs(2)
''
lbl_table.Caption = rs(3)
''
db.Close
''End If
'Set cn = New ADODB.Connection
'Set rs = New ADODB.Recordset
'
''conn = "Provider=Microsoft.Jet.OLEDB.4.0;Persist Security Info=False;Data
Source=" & App.Path & "\lic.mdb"
'
'cn.Open (conn)
'
'
'Dim flag As Boolean
'
'Set rs = cn.Execute("Select PolicyNo,Name, Address, T_T,DOC,Premium from
policy")
Page
61
'
'Do Until rs.EOF = True
'If rs!PolicyNo = Me.Text1 Then
'flag = True
'Exit Do
'End If
'rs.MoveNext
'Loop
'If flag = True Then
'
'
Frame1.Visible = True
'
lblname.Caption = rs!Name
'
lbladdr.Caption = rs!Address
'
lbl_table.Caption = rs!T_T
'
lbldoc.Caption = rs!DOC
'
lblpre.Caption = rs!Premium
'
Command4.Enabled = True
'Else
'Frame1.Visible = False
'MsgBox "Policy Number not found", vbOKOnly, "LIC Payment"
''Timer1.Enabled = True
'
'End If
'Set cn = Nothing
Page
62
'rs.Close
'End Sub
'
Private Sub Command4_Click()
Call connectDB
str1 = "select * from pre"
rs1.Open str1, conn, adOpenDynamic, adLockPessimistic
rs1.AddNew
Text2.Text = " "
Text2.SetFocus
Command4.Enabled = False
Command1.Enabled = True
End Sub
'
'Private Sub Form_KeyDown(KeyCode As Integer, Shift As Integer)
'Select Case KeyCode
'
'Case vbKeyF9
'Frame1.Visible = True
'End Select
'
'End Sub
'Dim a As Integer
'Call connectDB
'str1 = "select * from pre"
'rs1.Open str1, conn, adOpenDynamic, adLockPessimistic
'rs1.MoveLast
'a = rs1!Total
''a = rs1.Fields(4)
End Sub
conn.Close
End Sub
'=============================================
Public Sub findstr(tb As Control, ByVal str As String, intkey As Integer)
If (intkey > 127 Or intkey < 32) And Not intkey = 8 Then Exit Sub
If Not intkey = 8 Then
If tb.Text = "" Then
findit = str & Chr$(intkey)
Else
findit = Left$(str, tb.SelStart) & Chr$(intkey)
End If
End If
If intkey = 8 Then
If Len(tb.Text) = 0 Then
Else
Exit Sub
num = tb.SelStart - 1
findit = Left(str, num)
End If
End If
query = "select * from policy where PolicyNo like '" & findit & "%'"
Page
65
Page
67
Page
68
Page
69
Page
70
Page
71
Page
72
4.7 Report:
1. The label Box:
.It
allows you to display text that you dont want the user to change, such as a caption
Under a Graphic, when u wants to print the invoice, you need to know if the customer
is going to pay
By cash or check or credit card.
1. Unit Testing
Unit test comprises of a set tests performed by an individual program
prior to the integration of the unit into large system. A program unit is usually
the smallest free functioning part of the whole system. Module unit testing
should be as exhaustive as possible to ensure that each representation handled
by each module has bee tested. All the units that makeup the system must be
tested independently to ensure that they work as required.
During unit testing some errors were raised and all of them were rectified
and handled well. The result was quiet satisfactory and it worked well.
Page
74
2. Integration Testing
Integration testing is a system technique for constructing the program
structure while at the same time conducting tests to uncover errors associated
with interfacing. The objective is to take unit tested modules and build a
program structure that has been dictated by design. Bottom-up integration is
the traditional strategy used to integrate the components of a software system
into functioning whole.
Bottom-up integration consists of unit test followed by testing of the entire
system. A sub-system consists of several modules that communicated with
other defined interface.
The system was done the integration testing. All the modules were tested
for their compatibility with other modules .They test was almost successful. All
the modules coexisted very well, with almost no bugs. All the modules were
encapsulated very well so as to not hamper the execution of other modules.
3. Validation Testing
After validation testing, software is completely assembled as a package,
interfacing errors that have been uncovered and corrected and the final series
Page
75
of software test; the validation test begins. Steps taken during software design
and testing can greatly improve the probability of successful integration in the
larger system. System testing is actually a series of different tests whose
primary purpose is to fully exercise the compute based system.
4. Recovery Testing
It is a system that forces the software to fail in a variety of ways and
verifies that the recovery is properly performed.
5. Security Testing
It attempts to verify that protection mechanisms built into a system will in
fact protect it from improper penetration. The systems security must of course
be tested from in vulnerability form frontal attack.
6. Stress Testing
Stress tools are designed to confront programs with abnormal situations.
Stress testing executes a system in a manner that demands resources in
abnormal quantity and volume.
7. Black Box Testing
Black box testing is done to find out the following information as shown in
below:
1. Incorrect or missing functions.
2. Interface errors.
Page
76
sped up the process. In the current system, the front office managing is very slow.
The Insurance Policy managing system was thoroughly checked and tested with
dummy data and thus is found to be very reliable.
Advantages:
It is fast, efficient and reliable
Avoids data redundancy and inconsistency
Very user-friendly
Easy accessibility of data
Number of personnel required is considerably less
Provides more security and integrity to data
6. Bibliography:
Books
Page
78
5.1 Reference:
www.associatedcontent.com
www.members.tripod.com
www.project-download.com
Page
79