You are on page 1of 79

CHIT FUND MAINTENANCE

ABSTRACT

The project, Chit Fund Maintenance system is a VB application, that


permits the user to register into the VB and receive the description regarding the
chits and the auction sum associated to their chits. It also permits a newly
recorded individual to unite with a new chit based on their needs.
The administrator plays a pivotal part in this project as he has the entire
authority on the website and can alter the data, wherever its required in the
database.
The Chit Fund Maintenance system project explains chit description,
consumer description, chit amount description etc. The chit management will
digitize the several operations executed in the chits and also offers user to
respond and view the description. It facilitates the users to update or alter the
description if required.
A chit is a reciprocally profitable plan where a association of persons
contribute to the chit and a member of that association is granted the prize sum
and dividends are shared by the remaining members of the association. A chit
comprises of n number of persons and they ought to pay an amount for n
number of months. The amount is evenly distributed amidst those persons. The
amount can be paid in cash or via bank, within a week later to auction. A
member can take part in auction from the beginning only if he has paid the
amount in time.

Page
1

CHIT FUND MAINTENANCE

INDEX

Abstract---------------------------------------------------------1
Introduction----------------------------------------------------3
Overview--------------------------------------------------------4
ER Diagram-----------------------------------------------------21
Converting ER Diagram into Tables-----------------------22
Normalization--------------------------------------------------23
Code--------------------------------------------------------------14
Table Structures----------------------------------------------Snapshots------------------------------------------------------Conclusion-----------------------------------------------------Scope of Enhancement---------------------------------------

SYNOPSIS
Page
2

CHIT FUND MAINTENANCE

This application basically deals with the Chit fund companies which will have the
transactions like starting chit groups, joining subscribers to those groups, conducting
monthly, by monthly, weekly and daily auctions, according to that auction bid amount which
is bid by auction winner this bid amount should be divided to all the subscribers in that group.
Then installments collections could collect from subscribers every month or depending on the
type of auction. Every month payments should be pay to the prized subscribers according to
those chit groups after getting proper guarantees from the auction winner.
The title chit fund management software is as per chit fund companies

but

functionality of it can be generalized for multiple purposes like.


1) Company Registration by Foreman with Directors: -As per companies act Company will
register with directors.
2) Starting New Groups:- After registered the company as per companies act, Foreman will
start new Chit Groups.
3) Recruiting Business Promoters (Agents): - As per Company business development
Strategy Company will appoint agents to promote new subscribers for Chit groups.
4) Creating New Members for New Groups: -After getting PSO Number for chit group
Company will recruit Subscribers in that Group.
5) Collection of subscriptions, Penalty and others (Receipts):-Subscriptions will collect from
subscribers in different modes like cash, cheque, D.D, adjustments and general receipts.
6) Business Promoters Vouchers Depending on business: -After getting defined instalment
number from subscribers.
7) Reports: -After entered data according to customer needs reports should be generate.
This volume presents the manner in which the software was developed and how the various
problems are tackled at the different levels to convince the user.
Page
3

CHIT FUND MAINTENANCE

We hope that this package would prove to be an excellent environment for chit fund
companies.

INTRODUCTION
Page
4

CHIT FUND MAINTENANCE

Visual Basic is an interesting topic, which has different types. It has all the
methods have their won features with each having merits and demerits which help in
data processing. The topic includes their architecture representing the elements
involved in it and their action is also specified.
Visual Basic 6.0 allows creating object-oriented applications. Visual Basic 6.0
profoundly concentrates on the Internet development features, Active X technology,
enhanced controls, enhanced features of existing control, client/server, new language
features development, data access, a few design enhancement etc.,
Relational databases are logical collection of inter-related data in tabular form
relational databases have always been core to any management system. Its relevance
is profound and hence the need to incorporate new functionalities, utilities becomes
important. These are currently the predominant choice in storing financial records
manufacturing and logistical information, personnel data and much more.
Relational databases are used in huge management systems like Post Office,
Banking, Railway, Defense, and Logistics. Databases pertaining to Educational
Institutions and other large collection of related data.
Relational databases have largely replaced hierarchical databases and network
databases because they are easy to understand and use even though they are much
less efficient. They have been however challenged by Object Databases and XML
databases.

OVERVIEW OF THE PROJECT

SYSTEM DESCRIPTION:
Page
5

CHIT FUND MAINTENANCE

The proposed system is for making easier to manage chit holder details, agent
details, policy details, claimant details and payment details. So this will be developed
for managing the insurance management system. The overall system is control
through the main menu.
MODULES:
The main menu contains 6 parts.
1. Chit description.
2. Chit amount description.
3. Customer Login.
4. Administrator Login.
5. About us.
6. Contact us.
MODULE DESCRIPTION:AGENT LOGIN
The agent login form links to1. Basic agent information like contact details and address which will be shown
in customer insurance information window.
2. All the information related to insurances which he has made to his clients.
3. Commission received by him for each insurance made by him respectively.
4. Option to create a new policy to any existing/new client.
5. Option to edit the contact information of its client.
6. Option to delete a policy of any client in case of policy lapse.

CUSTOMER LOGIN:Page
6

CHIT FUND MAINTENANCE

The form contains the agent information like1. Personal information required by insurance agency.
2. Next premium due of respective insurances by the client along with
maturity date,agent info etc.
ADMINISTRATOR LOGIN:Administrator has rights to1. Create new agent
2. Edit agents information and its commission percentage.
3. Delete an agents database and all its policies respectively.
ABOUT US:It contains information about the organizations history and its achievements.
CONTACT US:It contains the contact details of the organizations various branches located in
different parts of a country.
REPORTS:
Sales report
Claimant information report
Agent information report
Client information report

HARDWARE REQUIREMENTS
The hardware that is needed for our system is:

Processor (CPU)

Pentium Processor
Page
7

CHIT FUND MAINTENANCE

Primary Memory (RAM)

64 MB

Hard Disk Drive

20 GB

Display Size

14 Monitor

Text Resolution

80 Columns by 25 Rows

Key Board

Total 104 keys with 12


Functions keys

Control

American Standard

Printer Available

HP Laser Jet 6 l

Power Requirement

220 250 Volts

1.3 SOFTWARE REQUIREMENTS

The software that is needed for our system is:

Microsoft Visual Basic 6.0


Microsoft Access 2000

OBJECTIVE OF THE PROJECT

The main objective while implementing the project Telephone Billing


System was to minimize the work and at the same time increase the speed of
the work done.
Page
8

CHIT FUND MAINTENANCE

This new system is built with the following objective:

1) Information retrieval will become easy.


2)

Maintenance of database as well as overall project will become


easy.

3)

Security measure will be adopted, by maintaining the login of


username and the password.

4)

Data

redundancy

will

be

greatly

reduced

because

this

new

system is built using Visual Basic 6.0 as front-end. It entails


looking into duplication of efforts, bottlenecks and inefficient existing
procedures.

INTRODUCTION
System analysis is the performance management and documentation of activities
related to the four life cycle phases of any software namely:

Page
9

CHIT FUND MAINTENANCE

The Study Phase


The Design Phase
The Development Phase
The Operators Phase
System analysis is a vast field of study through which system analyst puts his
thoughts and searches for the solution of problem. He has to get a clear idea of what
he has in hand and what he has to produce. He has to extract the essence of
expectations. He has to satisfy the user in the very possible way. System analysis
needs and should include the following steps of study:
Study of current methods, the basic inputs available and output desired.
The splitting of a variable inputs into (.dbf) files so as to reduce
redundancy and increase consistency.
Give the idea of key field (if any) .
Ideas regarding code generation.

Software Analysis starts with a preliminary analysis and later switches on to a


detailed one. During the preliminary analysis the Analyst takes a quick look at what is
needed and whether the cost benefits. Detailed analysis studies in depth all the
cornered factors, which builds and strengthens the software.
A system study is a step-by-step process used to identify and then developed
the software needed to control the processing of specific application. System study is
also known as SDLC (Software Development Life Cycle).
Steps of SDLC are:
Page
10

CHIT FUND MAINTENANCE

1. Problem Definition
2. Feasibility Study
3. System Analysis
4. System Design
5. Implementation
6. Post Implementation
7. Maintenance

EXISTING SYSTEM
Existing system refers to the system that is being followed till now. The
existing system requires more computational time, more manual calculations, and the
complexity involved in Selection of features is high. The other disadvantages are lack
Page
11

CHIT FUND MAINTENANCE

of security of data, Deficiency of Data accuracy, Time consuming etc. To avoid all
these limitations and make the working more accurately the system needs to be
computerized. Here in the Chit fund Maintenance, a detailed study of existing system
is carried along with all the steps in system analysis.
2.3.1 Draw backs of existing system.
Here in the Chit Fund Maintenance, a detailed study of existing system is carried
along with all the steps in system analysis. An idea for creating a better project was
carried and the next steps were followed.
Lack of security of data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.
Damage of machines due to lack of attention.
To avoid all these limitations and make the working more accurately the system
needs to be computerized.

Page
12

CHIT FUND MAINTENANCE

2.4

PROPOSED SYSTEM

The aim of proposed system is to develop a system of improved facilities.


The proposed system can overcome all the limitations of the existing system. The
system provides proper security and reduces the manual work. The existing system
has several disadvantages and many more difficulties to work well. The proposed
system tries to eliminate or reduce these difficulties up to some extent. The proposed
system will help the user to reduce the workload and mental conflict. The proposed
system helps the user to work user friendly and he can easily do his jobs without time
lagging
2.4.1 Advantages of Proposed System
The system is very simple in design and to implement. The system requires
very low system resources and the system will work in almost all configurations. It
has got following features
Ensure data accuracy.
Minimize manual data entry.
Minimum time needed for the various processing
Greater efficiency
Better Service
Minimum time required
Page
13

CHIT FUND MAINTENANCE

This would help the corporation prepare and organize its schedules more efficiently
on the basis of traffic demand.
It would provide data on concessions given to various sections.

OPERATING SYSTEM - WINDOWS 98


Page
14

CHIT FUND MAINTENANCE

Assortment of appropriate Operating system and Programming

language

for any project is very important. Basically it depends upon the nature of project and
its system requirements. Windows provides a Multitasking Environment, enabling
user to run various applications at a time. Windows offer many advantages to both the
user and the programmer besides GUIs such as point-and-click capabilities and
multitasking.

3.2 FRONT END - MICROSOFT VISUAL BASIC 6.0

Microsoft Visual Basic development system is the most productive tool for
creating fast business solutions for Windows and the Web. A comprehensive, rapid
application development environment helps development environment help
developers quickly create and deploy client /server applications, plus easily program
for the Internet using familiar Visual Basic programming tools and techniques.

The important requirements for a rapid, application-development client/server tool


include:
Comprehensive resources necessary for successful Windows 2000
development.
High-performance, scalable application and component creation.
Increased data application development productivity & control.
Greater service application development support.
A robust extensibility model for third party support & availability of
components and add in technology.
Page
15

CHIT FUND MAINTENANCE

Enterprise application development.

With the introduction of Visual Basic 6.0, Microsoft builds upon its critically
acclaimed RAD enterprise development platform with the features that extended and
enhance the currently robust development environment. These features are based on
five design themes, in turn derived from these customer requirements.

Windows 2000 Development with Visual Basic:

The Microsoft Visual Basic development system now provides the


comprehensive resources necessary for successful Windows 2000 development. From
building e-commerce Web technologies, such as network and component load
balancing, to scalable data driven business applications, Visual Basic 6.0 has what
you need.
Windows 2000 Developer's Readiness Kit
Visual studio installer.
MSDN Library Subscription.
Microsoft Data Engine.

High Performance, Scalable Application and Component Creation

The goal of any development tool is to facilitate the developer's need for
quick and efficient creation and deployment of high performance, scalable
applications. Visual Basic 6.0 works to address these needs through the delivery of a
quick-executing, native-code environment. Tens of millions of Visual Basic based
Page
16

CHIT FUND MAINTENANCE

applications in use today stand as a testament to the success of Visual Basic in this
area. With Visual Basic 6.0, Microsoft made improvements in the following areas:
Deliver native-code compiled performance
Accelerated Microsoft Win 32 API based forms.
Provide scalable solutions.
Facilitate the development of thread-safe, persist able components.

Data-Centric Application Development

Ninety-five percent of developers using Visual Basic create solutions that


access either local or remote database and the vast majority of all corporate
applications are data-centric. In fact, a recent tracking study revealed that Visual
Basic is the most popular development tool used in Conjunction with Microsoft SQL
Server and Oracle Servers. Clearly, developers require more productive ways to
connect to and manipulate data with reduced complexity and open to access to a wide
variety of data sources.
While developing Visual Basic 6.0, Microsoft addressed these important
needs by focusing on the following data-productivity objectives:
Provide faster and more comprehensive data access.
Provide an integrated set of data base design and programming tool.
Simplify the creation of data-centric application for the mobile user.
Provide support for the latest data base management technology using ActiveX
Data Objects (ADO) and OLEDB.
Provide easier access to more data types.
Page
17

CHIT FUND MAINTENANCE

Simplify the creation of reusable data consumers.

Server Application Development and Deployment

In recent years, PC-based enterprise client /server development has


gained widespread acceptance. At the center of these installations is Win 32 or
Internet based server applications. In response to this, Microsoft has enhanced Visual
Basic with the existing new server application features. Microsoft focused on the
following objectives to optimize Visual Basic 6.0 for server application development.
Enable the creation of HTML based Web applications.
Utilize Web sites both inside and outside the corporate firewall as a measure
to reduce deployment costs.
Debug middle tier components running under Microsoft Transaction Server.

Package and deploy middle-tier components with ease and peace of mind.
Client Development Support
At the heart of the success Visual Basic has enjoyed is the ability it gives
developer to quickly create robust, powerful, and professional client applications,
components and user interfaces. Visual basic 6.0 provides the following
improvements that enhance client application development:
ActiveX Control creation that gives developers the ultimate in
Win32 flexibility.
Creation of browser-independent applications.

Page
18

CHIT FUND MAINTENANCE

Enterprise Application Development

As the use of information technology changes to meet new business


needs, the very definition of enterprise applications is evolving. While enterprise
infrastructure and applications vary widely across organizations, common attributes
of enterprise applications include:

Being component based for flexibility and scalability.


Requiring life cycle support, including design, development, management and
analysis.
Requiring more sophisticated database architectures.
Being developed by teams.
Being distributed in nature, integrated with desperate backend system.

Page
19

CHIT FUND MAINTENANCE

Back End: Microsoft Access

Microsoft access delivers powerful tools for managing and analyzing data.
With XML support, developers can create highly sophisticated
Enterprise - wide database solutions that integrate easily with the web. One can find
comprehensive tools that make building databases more intuitive Features like
Microsoft Pivot table and the Microsoft Pivot chart greatly improve data analysis
capabilities. Microsoft Access is one of the most versatile applications. This
versatility is evidenced by the rich set of tools that even the Most experienced
database user can take advantage of, offering the same level of simplicity for first
time database user. Access extends this versatility by giving developers and more
experienced users new functionality, enabling them to access and analyze their
important data as well as build powerful new data base solution. At same time, access
makes it easy for beginning users to discover and use more of the existing
application.

Page
20

CHIT FUND MAINTENANCE

Study of project through Classical Model

A system model is a systematic approach towards software development.


Before any building is built it is necessary to make the drawing of that building,
similar is the case with any software. Here also before any coding of the software
begins, it is necessary to make the model of the software.

A model basically specifies all the steps to be followed during the system
development. This makes the task of the engineer quite simple and helps him build
software, which is less error prone.
Tasks accomplished by system modeling are:
Define the processes that serve the needs of the view under consideration.
Represent the behavior of the processes and the assumptions on which
behavior is based.
Explicitly define both exogenous and endogenous input to the model.
Represent all linkages that will enable the engineer to better understand the
view.

The model used is shown below:

Page
21

CHIT FUND MAINTENANCE

SYSTEM DEVELOPMENT LIFE CYCLE

A crucial phase in the System Development Life Cycle (SDLC)


Is the successful implementation of the new system design? Implementation includes all
those activities that take place to convert from the old system to the new one. The new
system may be completely new, replacing an existing manual or automated system or it
may be major modification to an existing system. In either case, proper implementation
becomes necessary so that a reliable system based on the requirements of the organization
can be provided.
Successful Implementation may not guarantee improvement in the
organization using the new system, but improper installation will prevent it. It has
been observed that even the best system cannot show good results if the analyst
managing the implementation does not attend to every important detail. This is the
area where the system analyst needs to work most carefully
The proposed system is very simple to implement. As specified prior, the
required Hardware and Software are sufficient for implementing this software. The
implementation process is quite similar to most softwares. So the implementations of
this software become easy.

Page
22

CHIT FUND MAINTENANCE

INTRODUCTION
System design is the second step in the system life cycle, in which overall
design of the system is achieved. The functionalities of the system is designed and
studied in this phase. The first step is designing of program specification. This
determines the various data inputs to the system, data flow and the format in which
output is to be obtained.
Design phase is a transmission phase because it is a transition from user
oriented document to computer data. The activity in the design phase is the allocation
of functions to manual operations, equipment and computer programs. Flow charts
prepared in the study time received and decomposed until all functions in the system
perform evidently.
Design is a multistep process that focuses on data structures, software
architecture, procedural details ( algorithms etc) and links between the modules. The
design process goes through logical and physical stages. In logical design reviews are
made linking existing system and specification gathered. The physical plan specifies
any hardware and software requirement, which satisfies the local design.
Modularization of task is made in the mode. The success of any integrated
system depends on the planning of each and every fundamental module. Usually a
project is revised in step by step sequence. Inter phase management of such module is
also important. Software design methodology changes continually as new methods,
better analysis and broader understanding evolve.
Various techniques for software design do exit with the availability of criteria for
design quality. Software design leads three technical activities-design, code and test.
The techniques for software design do exit with the availability of criteria for
design quality. Software design leads three technical activities-design, code and test
Page
23

CHIT FUND MAINTENANCE

that are required to build and verify software. Each activity transforms information,
which validates the software. The design system converts theoretical solution
introduced by the feasibility study into a logical reality.
3)(ii) DESIGN STRATEGY
The design strategy is a vital aspect of the system to be developed. The design
of the software reflects the basic understanding of the problem. For designing a good
system what we have to be is to get correct definition of the problem and analyze the
problem thoroughly.
The design of a system should be such that if a small portion is changed. The rest of
the system should be unaffected. This is the flexibility of the system. Greater the
system flexibility greater will be the system reliability. While carrying out the job of
designing of a new system one has to consider many factors. These factors include
the drawbacks and limitations of the present manual system as well as of the features
and advantages of the proposed system. It should be designed in such a manner that
even a layman can run it without any difficulty.
An important quality of a software must enjoy is user friendliness. It can be
achieved in many ways like providing menu, giving context sensitive help, doing
automatic validation to input data, etc. Another main factor is speed efficiency. In
order to achieve speed efficiency, the program should be designed accordingly and
the user is provided with a compiled copy of the software package with necessary
data file format rather than source code.
Design of input and output formats is equally important for any design. The
output format should be designed in such a way that it must reflect all the required
information in detail. The design of the database itself such as type of data stored,
size of data etc. Some of the decisions made during database design are:
Page
24

CHIT FUND MAINTENANCE

Which data items are to be recorded and in which database.


Length of each record, based on the characteristics of the data items on which
it is based.
Data whos unauthorized change must be prevented.
Data, which must be avoided from redundancy.
Maintenance of data integrity etc.
Avoid over writings.
Prevents invalid data access and changes.
Having all this, a positive interaction with clients at every stage of development is the
core around which the software is built.

Page
25

CHIT FUND MAINTENANCE

4.3

DATA FLOW DIAGRAM


Data flow oriented techniques advocate that the major data items
handled by a system must be first identified and then the processing
required on these data items to produce the desired outputs should be
determined. The DFD (also called as bubble chart) is a simple graphical
formalism that can be used to represent a system in terms of input data to
the system, various processing carried out on these data, and the output
generated by the system. It was introduced by De Macro (1978), Gane
and Sarson (1979).The primitive symbols used for constructing DFDs
are:
Symbols used in DFD
A circle represents a process.

A rectangle represents external entity

A square defines a source or destination of the system data.


Page
26

CHIT FUND MAINTENANCE

An arrow identifies dataflow.


Double line with one
end closed indicates data store

Page
27

CHIT FUND MAINTENANCE

Page
28

CHIT FUND MAINTENANCE

ER DIAGRAM
Use Cases chit fund Interface

Chit fund management interface

Main form

User login

Admin login

Add subscribers

Add new user


Admin

Add User

Page
29

CHIT FUND MAINTENANCE

Chit fund interface

Main form

Login form

Chit form

Cancle member payment

Add new subscriber

Employee

Day of auction

installments

Contact S

About US

Page
30

CHIT FUND MAINTENANCE

Zeppelin Reservation Interface

Main form

Login form

Agent add

Payment

bid Status
Field officer
cancel agent

Contact S

About US

Page
31

CHIT FUND MAINTENANCE

CONVERTING ER DIAGRAM INTO TABLES


1. Converting strong entity types
Each entity type becomes a table
Each single valued attribute becomes a column
Derived attributes are ignored
Composite attributes are represented by components
Multi-valued attributes are represented by a separate table
Key attributes of the entity type is the Primary Key

2. Converting relationships
Relationships are based on cardinalities and degree of the relation
m:n
INSURED
POLICY
HOLDER

BY

POLICY

Binary 1:1

CHOOSES
POLICY
HOLDER

CLAIMANT

1 1
Page
32

CHIT FUND MAINTENANCE

3. Relations converted
Policy holder and policy have m:n cardinality which results in
conversion of the relation insured by into a table named as
insurance. The insurance table has ph key and pol_key from policy
holder table and policy table respectively ,as its composite primary
key.
Also policy and agent table have m:n cardinality resulting in
conversion of relation sales, into a table named as sales. The table
sales has ph key and pol key from policy holder table and policy table
respectively ,as its composite primary key and agent key from agent
table as a foreign key.

NORMALISATION
Own table normalization

Normalization is a method for organizing data elements in a database into tables.


It keeps track to keep the database less vulnerable to some types of logical
inconsistencies and anomalies. Tables can be normalized to varying degrees like first,
second, BCNF. Greater the degree of normalization more is the protected from
inconsistencies and anomalies.
The tables may be normalized under the following guideline:
1. 1NF
Page
33

CHIT FUND MAINTENANCE

DEFINITION:
A relation schema is in 1NF if all of its attributes are:
Single valued
Restricted to assuming atomic values
Functionally dependent on the primary key
Domain is atomic if its elements are considered to be indivisible units .
Examples of non-atomic domains
Set of names, composite attributes
Identification numbers like ph_key that can be broken up into parts
A relational schema R is in first normal form if the domains of all
attributes of R are atomic.
All domains in our database are atomic since they are indivisible.
No Duplication of data ,Insert Anomaly ,Delete Anomaly ,Update
Anomaly found, therefore our database clears the first normal form test.

2. 2NF
DEFINITION:
A relational table is said to be in second normal form 2NF if it is in 1NF and
every non-key attribute is fully functionally dependent upon primary key.
The criteria for second normal form(2NF) are:
The table must be in !NF.
Every non-key attributes of the table must be dependent upon the entire
primary key.
Tables agent ,policy holder ,claimant ,insurance ,sales are also in 2NF.
our database satisfies all the conditions of 2NF since The tables are in
1NF and Every non-key attributes of the table must be dependent upon
the entire primary key.

Page
34

CHIT FUND MAINTENANCE

3. 3NF
A relation is in 3NF if and only if,it is in 2NF and there are no transitive
functional dependencies.
Transitive functional dependencies arise.
When one non-key attribute is functionally dependent on another nonkey attribute.
Functional Dependency: non-key attribute>non-key attribute.
When there is redundancy in the database.
The tables insurance ,claimant ,policy holder and sales have been
converted into 3NF.
By definition transitive functional dependency can only occur if there is more
than one non-key field, so we can say that a relation in 2NF with zero or one
non-key field must automatically be in 3NF.

Page
35

CHIT FUND MAINTENANCE

DATABASE DESIGN
A database is an organized mechanism that has the capability of
storing information through which a user can retrieve stored information in an
effective and efficient manner. The data is the purpose of any database and
must be protected.
The database design is a two level process. In the first step, user
requirements are gathered together and a database is designed which will meet
these requirements as clearly as possible. This step is called Information Level
Design and it is taken independent of any individual Database Management
System (DBMS).
In the second step, this Information level design is transferred into a
design for the specific DBMS that will be used to implement the system in
question. This step is called Physical Level Design, concerned with the
characteristics of the specific DBMS that will be used. A database design runs
parallel with the system design. The organization of the data in the database is
aimed to achieve the following two major objectives.
Data Integrity
Data independence

Page
36

CHIT FUND MAINTENANCE

INPUT DESIGN
Input design is the process of converting user-originate inputs to a computerbased format. The goal of design input data is to make data entry as easy, logical and
free. The most common source of data processing errors is inactive input data.
Effective design of the input data minimizes the error made by data entry operators.
Catching errors on input is far less costly than correcting after data storage is
complete.
User-friendly input design enables quick error detecting and correction. Verification
and validation is the most important in input design. Since the system is used
interactively, it has two types of inputs. Interactive input-which is the point contact of
the user with the system and the input to the internal system i.e. Databases. For full
efficiency of the system, it is necessary that the input must be accurate. Since the user
of the system may not be a technical person and may not know input concepts so it is
required that he warn, prevent and correct invalid data entry.
There are many ways that can be designed to handle such a situation. We can
prevent the user entering invalid data into the databases by warning, neglecting or
messaging appropriately. The user is then allowed to input correct data. Some help
provisions may aid the user to point out the error. In this system inputs are collected
from terminals through keyboard.

Page
37

CHIT FUND MAINTENANCE

OUTPUT DESIGN
Output design has been an ongoing activity from the very beginning of the
project. The objective of the output design is to convey the information of all past
activities, current status and to emphasize important events. The output generally
refers to the results and information that is generated from the system.
The output design of the system is accomplished keeping in mind the following
activities:
Determine what information is to display.
Decide whether to display or print the information retrieved, processed,
generated from the system.
Arrange the presentation of information in an acceptable format.
Decide how to distribute the output to the intended recipients.
In the output design phase one or more output media can be selected.
Out of which the most common ones are CRT displays and print out.
Here only CRT display has been attempted. A rapid enquiry is obtained
from CRT displays. From design is made interesting and attractive. Easy
understanding and effectiveness is made possible.

Page
38

CHIT FUND MAINTENANCE

DATABASE TABLE DESIGN

Table Name: Demo Table


Primary Key: PolicyNo

Table Name: Policy Premium Table


Primary Key: PolicyNo

Page
39

CHIT FUND MAINTENANCE

Table Name: Policy Table


Primary Key: PolicyNo

Page
40

CHIT FUND MAINTENANCE

FORM DESIGN

Private Sub abt_Click()


Form6.Show
End Sub
Page
41

CHIT FUND MAINTENANCE

Private Sub alldata_Click()


Form9.Show
End Sub

Private Sub cAdd_Click()


Form8.Show
End Sub

Private Sub exit_Click()


End
End Sub

Private Sub MDIForm_Load()


'log.Show
Form1.Show
'Form5.CurrentX = 0
'Form5.Left = Me.Width / 1.09
'Form5.Height = Me.Height / 1.2
'Form5.Top = 0
Picture1.AutoSize = True
'Picture1.Width = Screen.Width + 1
End Sub
Page
42

CHIT FUND MAINTENANCE

Private Sub MDIForm_Unload(Cancel As Integer)


Unload Me
'Form11.Show
End Sub

Private Sub mnuedit_Click()


Form14.Show
End Sub

Private Sub mwindow_Click()


Form1.Show
End Sub

Private Sub search_Click()


Form2.Show
End Sub

Private Sub Toolbar1_ButtonClick(ByVal Button As MSComctlLib.Button)


Select Case Button.Index
Case 1
Form8.Show
Page
43

CHIT FUND MAINTENANCE

Case 2
MsgBox ("Second")
Case 3
MsgBox ("Third")
End Select
End Su

Page
44

CHIT FUND MAINTENANCE

Dim conn As New ADODB.Connection


Public rs As New ADODB.Recordset
Public rs1 As New ADODB.Recordset

Private Sub Combo2_LostFocus()


On Error GoTo e
If Combo2.Text < 18 Then

txtapntname.Visible = True
txtapntaddr.Visible = True
Label10.Visible = True
Label11.Visible = True
Frame1.Height = 7935
txtapntname.SetFocus
Else
txtapntname.Visible = False
Label10.Visible = False
txtapntaddr.Visible = False
Label11.Visible = False
Text1.SetFocus
Frame1.Height = 6255
End If
e:
End Sub
Page
45

CHIT FUND MAINTENANCE

Private Sub Combo3_Change()


Form_Load
End Sub

Private Sub Combo3_LostFocus()


'If rs1.EOF = False Then
'

Combo4.Text = rs1!Tabel

'
'

'lbl_table.Caption = rs2!T_T

'

'lbldoc.Caption = rs2!DOC

'

'blpre.Caption = rs2!Premium

'End If
'rs1.Close
End Sub

Private Sub Command1_Click()


'Text2.SetFocus
'Combo1.SetFocus
'' Text1.Text = ""
'' Text2.Text = ""
'' Text3.Text = ""
'Command1.Enabled = False
End Sub
Page
46

CHIT FUND MAINTENANCE

Private Sub Command2_Click()

'On Error GoTo h


rs.AddNew
rs(0) = Text1.Text
rs(1) = Text2.Text
rs(2) = txtaddrcp.Text
rs(3) = Combo4.Text & " - " & Combo5.Text
rs(4) = txtaddr.Text
rs(5) = DTPicker1.Value
rs(6) = Text3.Text
rs(7) = txtnaddr.Text
rs(8) = Text4.Text
rs(9) = Combo2.Text
rs(10) = txtapntname.Text
rs(11) = txtapntaddr.Text
rs(12) = Combo3.Text
rs(13) = DTPicker2.Value
rs(14) = Text5.Text
rs(15) = Text6.Text
rs(16) = Combo6.Text
rs(17) = DTPicker3.Value
rs(19) = Combo1.Text
Page
47

CHIT FUND MAINTENANCE

If Image1.Picture = LoadPicture("") Then


rs(18) = "no image.jpg"
Else
g = App.Path & "\LicPhoto\"
rs(18) = Text2.Text + ".jpg"
SavePicture Image1.Picture, g & Text2.Text & ".jpg"
End If

'

On Error GoTo h

'

If Image1.Picture = LoadPicture("") Then

'
'

rs(18) = "no image.jpg"


Else

'

Dim g As String

'

MkDir App.Path & "\LicPhoto"

'

g = App.Path & "\LicPhoto\"

'
'

SavePicture Image1.Picture, g & Text2.Text & ".jpg"

'

rs(18) = Text2.Text & ".jpg"

'

End If
'If IsNull(rs(18)) = True Then
'If Image1.Picture = LoadPicture("") Then

Page
48

CHIT FUND MAINTENANCE

'rs.Update
Command2.Caption = "Save"

'h: 'Call SubA


MsgBox "Sucessfully Save Your Data"
End Sub
Private Sub Command4_Click()
'CommonDialog1.ShowOpen
'If Image1.Height > 3000 And Image1.Width > 2500 Then
'rst = MsgBox("This Photo size is very large", vbOKCancel) '& vbCrLf _
'

'"Your Photo size 6 cm to 4 cm" & vbcrlf _

'

'Do you want change, vbOKCancel, "LIC Image Load")

'

If rst = vbOK Then

'

CommonDialog1.ShowOpen

'

Image1.Picture = LoadPicture(CommonDialog1.FileName)

'

End If

'Image1.Picture = LoadPicture("")
'Else
'Image1.Picture = LoadPicture(CommonDialog1.FileName)
'End If
CommonDialog1.Filter = "JPG (*.jpg)|*.jpg|BMP (*.bmp)|*.bmp"
CommonDialog1.ShowOpen
CommonDialog1.Filter = "Picture|*.jpg"
Image1.Picture = LoadPicture(CommonDialog1.FileName, 0.5) ', 256, 100, 150)
Page
49

CHIT FUND MAINTENANCE

If Image1.Width > 3000 And Image1.Height > 3500 Then


Image1.Picture = LoadPicture("")
MsgBox "Very Big, Your Photo size must be 5 c.m and 6 c.m"
'Image1.Picture = LoadPicture("")
'Image1.Width = 5000
Image1.Picture = LoadPicture("")
'Else
Else
End If
End Sub

Private Sub Command5_Click()


CommonDialog2.ShowOpen
Ani.AnimatedGIF = Ani.LoadAnimatedGIF_File(CommonDialog2.FileName)
End Sub

Private Sub Form_KeyPress(KeyAscii As Integer)


If KeyAscii = 13 Then
Unload Me
End If
End Sub

Private Sub Form_Load()


Dim str As String
Page
50

CHIT FUND MAINTENANCE

Set conn = Nothing


conn.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"\lic.mdb;Persist Security Info=False"
str = "select * from policy"
rs.Open str, conn, adOpenDynamic, adLockPessimistic
Combo5.Text = 5
Call cmbage
For a = 5 To 50
Combo5.AddItem (a)
Next
Command2.Caption = "Add"
'rs.Close
'============================================================
====================
'Dim str1 As String
'Set db = Nothing
'db.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"/lic.mdb;"

str = "select * from PName"


rs1.Open str, conn, adOpenForwardOnly, adLockReadOnly
'rs.Open str, db, adOpenForwardOnly, adLockReadOnly
rs1.MoveFirst
If IsNull(rs1(0)) = False Then
While Not rs1.EOF
Page
51

CHIT FUND MAINTENANCE

Combo3.AddItem (rs1(0))

rs1.MoveNext
Wend
End If
'====================================
rs1.MoveFirst
If IsNull(rs1(1)) = False Then
While Not rs1.EOF
Combo4.AddItem (rs1(1))

rs1.MoveNext
Wend
End If
'End If
'rs1.Close
'============================================================
======================
End Sub

Private Sub Form_Unload(Cancel As Integer)


conn.Close
Form1.Show
End Sub
Page
52

CHIT FUND MAINTENANCE

Function cmbage()
For I = 1 To 65
Combo2.AddItem (I)
Next
End Function

Private Sub Text1_Change()


If IsNumeric(Text1.Text) = False Then
Text1.Text = ""
Text1.SetFocus
End If
End Sub
Private Sub Text1_KeyPress(KeyAscii As Integer)
If KeyAscii = 13 Then
Dim db As New ADODB.Connection
Dim rs As New ADODB.Recordset
Dim key As Integer, str As String

If Text1.Text = "" Then


Text1.Text = ""
Else
'key = InputBox("Enter the Employee No whose details u want to know: ")
Set db = Nothing
Page
53

CHIT FUND MAINTENANCE

db.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &


"/lic.mdb;"

Set rs = Nothing

str = "select * from policy where PolicyNo=" & Text1.Text


rs.Open str, db, adOpenForwardOnly, adLockReadOnly = 1
If rs.EOF = True Then
Else
s = MsgBox("Sorry Data is already Exit" & vbCrLf & _
" Do you want see Data", vbYesNo, "LIC Alart")
If s = vbNo Then
Text1.Text = ""
Text1.SetFocus
Else
Me.Hide
Form13.Label1.Caption = rs!PolicyNo
Form13.Label2.Caption = rs!Name
Form13.Show 'vbModal
End If
'

Set rs = Nothing

'

str = "select * from policy"

'

rs.Open str, db, adOpenDynamic, adLockPessimistic


End If
Page
54

CHIT FUND MAINTENANCE

End If
' db.Close
End If
End Sub

Private Sub Text5_Change()


If IsNumeric(Text5.Text) = False Then
Text5.Text = ""
End If
End Sub

Private Sub Text1_LostFocus()


'If Text1.MaxLength > 9 Then
'MsgBox "Please Enter only Numeric Value in Policy No."

'End If
Dim db As New ADODB.Connection
Dim rs As New ADODB.Recordset
Dim key As Integer, str As String

If Text1.Text = "" Then


Text1.Text = ""
Else
'key = InputBox("Enter the Employee No whose details u want to know: ")
Page
55

CHIT FUND MAINTENANCE

Set db = Nothing
db.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"/lic.mdb;"
Set rs = Nothing
str = "select * from policy where PolicyNo=" & Text1.Text
rs.Open str, db, adOpenForwardOnly, adLockReadOnly = 1
If rs.EOF = True Then
Else
s = MsgBox("Sorry Data is already Exit" & vbCrLf & _
" Do you want see Data", vbYesNo, "LIC Alart")
If s = vbNo Then
Text1.Text = ""
Text1.SetFocus
Else
Me.Hide
Form13.Label1.Caption = rs!PolicyNo
Form13.Label2.Caption = rs!Name
Form13.Show 'vbModal
End If
'

Set rs = Nothing

'

str = "select * from policy"

'

rs.Open str, db, adOpenDynamic, adLockPessimistic


End If
End If
Page
56

CHIT FUND MAINTENANCE

' db.Close
End Sub

Private Sub Text6_Change()


If IsNumeric(Text5.Text) = False Then
Text5.Text = ""
End If
End Sub

Public Sub SubA()


On Error GoTo ProcError

' other code


MsgBox FuncA()

ProcExit:
Exit Sub

ProcError:
MsgBox Err.Description
Resume ProcExit
End Sub
Private Function FuncA() As Date
FuncA = CDate("hi there")
Page
57

CHIT FUND MAINTENANCE

End Function

Public rs As New ADODB.Recordset


Public conn As New ADODB.Connection
Dim con As ADODB.Connection
Dim rs1 As ADODB.Recordset
Dim str1 As String
Dim num, idx As Integer
Page
58

CHIT FUND MAINTENANCE

Dim findit, query As String


Dim db2 As New ADODB.Connection
Dim rs2 As ADODB.Recordset

Function connectDB()
Set con = New ADODB.Connection
Set rs1 = New ADODB.Recordset
con.Open "Provider=Microsoft.Jet.OLEDB.4.0;Persist Security Info=False;Data
Source= " & App.Path & "\lic.mdb"
End Function
'
Private Sub Command1_Click()
Dim strm As String
Dim a As Integer
Call connectDB
str1 = "select * from pre"
rs1.Open str1, conn, adOpenDynamic, adLockPessimistic
'rs1.MoveNext
'a = rs1(4)
rs1.AddNew
rs1(0) = Text1.Text
rs1(1) = DTPicker1.Value
rs1(2) = Text2.Text
rs1(3) = DTPicker2.Value
Page
59

CHIT FUND MAINTENANCE

'rs1(4) = Val(a) + Val(Text2.Text)


rs1.Update
strm = MsgBox("Your Data Sucessfully Save", vbOKCancel, "LIC Add")

If strm = vbCancel Then


Exit Sub
Else
Command4.Enabled = False
End If
End Sub

Private Sub Command2_Click()


Unload Me
End Sub
'Private Sub Command2_Click()
'Form1.Show
'Unload Me
'End Sub
'
'Private Sub Command3_Click()
''Dim str As String
''Set db = Nothing
''
''

If IsNumeric(Text1.Text) = False Then


MsgBox "Plese Enter only No:"
Page
60

CHIT FUND MAINTENANCE

''
''

Else
Frame1.Visible = True

''
db.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"/lic.mdb;"
''

str = "select* from policy"

''

rs.Open str, db, adOpenDynamic, adLockPessimistic

''

rs.MoveFirst

''

lblname.Caption = rs(1)

''

lbladdr.Caption = rs(2)

''

lbl_table.Caption = rs(3)

''

db.Close

''End If
'Set cn = New ADODB.Connection
'Set rs = New ADODB.Recordset
'
''conn = "Provider=Microsoft.Jet.OLEDB.4.0;Persist Security Info=False;Data
Source=" & App.Path & "\lic.mdb"
'
'cn.Open (conn)
'
'
'Dim flag As Boolean
'
'Set rs = cn.Execute("Select PolicyNo,Name, Address, T_T,DOC,Premium from
policy")
Page
61

CHIT FUND MAINTENANCE

'
'Do Until rs.EOF = True
'If rs!PolicyNo = Me.Text1 Then
'flag = True
'Exit Do
'End If
'rs.MoveNext
'Loop
'If flag = True Then
'
'

Frame1.Visible = True

'

lblname.Caption = rs!Name

'

lbladdr.Caption = rs!Address

'

lbl_table.Caption = rs!T_T

'

lbldoc.Caption = rs!DOC

'

lblpre.Caption = rs!Premium

'

Command4.Enabled = True

'Else
'Frame1.Visible = False
'MsgBox "Policy Number not found", vbOKOnly, "LIC Payment"
''Timer1.Enabled = True
'
'End If
'Set cn = Nothing
Page
62

CHIT FUND MAINTENANCE

'rs.Close
'End Sub
'
Private Sub Command4_Click()
Call connectDB
str1 = "select * from pre"
rs1.Open str1, conn, adOpenDynamic, adLockPessimistic
rs1.AddNew
Text2.Text = " "
Text2.SetFocus
Command4.Enabled = False
Command1.Enabled = True
End Sub
'
'Private Sub Form_KeyDown(KeyCode As Integer, Shift As Integer)
'Select Case KeyCode
'
'Case vbKeyF9
'Frame1.Visible = True
'End Select
'
'End Sub

Private Sub Form_Activate()


Page
63

CHIT FUND MAINTENANCE

'Dim a As Integer
'Call connectDB
'str1 = "select * from pre"
'rs1.Open str1, conn, adOpenDynamic, adLockPessimistic
'rs1.MoveLast
'a = rs1!Total
''a = rs1.Fields(4)
End Sub

Private Sub Form_Load()


'Dim str As String
'Set conn = Nothing
db2.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"\lic.mdb;Persist Security Info=False"
conn.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path &
"\lic.mdb;Persist Security Info=False"
'Command1.Enabled = False
'Command4.Enabled = False
End Sub

Private Sub Form_Unload(Cancel As Integer)


Form1.Show
'rs2.Close
db2.Close
Page
64

CHIT FUND MAINTENANCE

conn.Close
End Sub

'=============================================
Public Sub findstr(tb As Control, ByVal str As String, intkey As Integer)
If (intkey > 127 Or intkey < 32) And Not intkey = 8 Then Exit Sub
If Not intkey = 8 Then
If tb.Text = "" Then
findit = str & Chr$(intkey)
Else
findit = Left$(str, tb.SelStart) & Chr$(intkey)
End If
End If
If intkey = 8 Then
If Len(tb.Text) = 0 Then
Else
Exit Sub
num = tb.SelStart - 1
findit = Left(str, num)
End If
End If
query = "select * from policy where PolicyNo like '" & findit & "%'"
Page
65

CHIT FUND MAINTENANCE

Set rs2 = db2.Execute(query)


If rs2.EOF Then Exit Sub
tb.Text = rs2(0)
tb.SelStart = Len(findit)
tb.SelLength = Len(tb.Text) - tb.SelStart
intkey = 0
End Sub
'====================================
Private Sub Text1_KeyPress(KeyAscii As Integer)
findstr Text1, Text1.Text, KeyAscii
If KeyAscii = 13 Then
If rs2.EOF = False Then
Frame1.Visible = True
Image1.Visible = True

lblname.Caption = rs2!M_St & rs2!Name


lbladdr.Caption = rs2!Address
lblpre.Caption = rs2!Premium
'lbl_table.Caption = rs2!T_T
'lbldoc.Caption = rs2!DOC
'blpre.Caption = rs2!Premium
If IsNull(rs2(18)) = True Then
Image1.Picture = LoadPicture(App.Path & "\LicPhoto\no image.jpg") '")
Else
Page
66

CHIT FUND MAINTENANCE

Image1.Picture = LoadPicture(App.Path & "\LicPhoto\" & rs2(18))


End If
Command4.Enabled = True
Else
MsgBox "Sorry not found"
Command1.Enabled = False
Frame1.Visible = False
Image1.Visible = False
End If
End If
End Sub

Page
67

CHIT FUND MAINTENANCE

Page
68

CHIT FUND MAINTENANCE

Page
69

CHIT FUND MAINTENANCE

Page
70

CHIT FUND MAINTENANCE

Page
71

CHIT FUND MAINTENANCE

Page
72

CHIT FUND MAINTENANCE

4.7 Report:
1. The label Box:
.It

allows you to display text that you dont want the user to change, such as a caption

Under a Graphic, when u wants to print the invoice, you need to know if the customer
is going to pay
By cash or check or credit card.

The command Buttons:


Creates a button that the user can choose to carry out a command. The user
Will click on this button and the computer will perform the task associated with
The button.

2. The Text Box control:


In order to display or accept user input in the form of text like, Customer ID, name
,age etc. it is used to display text and allows the user to edit the data in the box.
A text box control is also called an edit field or edit control.

3. The picture Box:


A picture box control can display a graphic from a bitmap, icon or metafile
, as well as enhanced metafile, GPEG, or GIF.it clips the graphic if the control
Isnt large enough to display the entire image.

4. The Data Control:


The data control is part of standard toolbox. It has buttons for moving from
Record too record ,you have buttons to move the next or last record and to move
The previous and first record .you can also set the caption property for the data
4.8 TESTING
Page
73

CHIT FUND MAINTENANCE

Testing is a process of executing a program with the interest of finding an


error. A good test is one that has high probability of finding the yet
undiscovered error. Testing should systematically uncover different classes of
errors in a minimum amount of time with a minimum amount of efforts. Two
classes of inputs are provided to test the process
1. A software configuration that includes a software requirement
specification, a design specification and source code.
2. A software configuration that includes a test plan and
procedure, any testing tool and test cases and their expected
results.
Testing is divided into several distinct operations:

1. Unit Testing
Unit test comprises of a set tests performed by an individual program
prior to the integration of the unit into large system. A program unit is usually
the smallest free functioning part of the whole system. Module unit testing
should be as exhaustive as possible to ensure that each representation handled
by each module has bee tested. All the units that makeup the system must be
tested independently to ensure that they work as required.
During unit testing some errors were raised and all of them were rectified
and handled well. The result was quiet satisfactory and it worked well.
Page
74

CHIT FUND MAINTENANCE

2. Integration Testing
Integration testing is a system technique for constructing the program
structure while at the same time conducting tests to uncover errors associated
with interfacing. The objective is to take unit tested modules and build a
program structure that has been dictated by design. Bottom-up integration is
the traditional strategy used to integrate the components of a software system
into functioning whole.
Bottom-up integration consists of unit test followed by testing of the entire
system. A sub-system consists of several modules that communicated with
other defined interface.
The system was done the integration testing. All the modules were tested
for their compatibility with other modules .They test was almost successful. All
the modules coexisted very well, with almost no bugs. All the modules were
encapsulated very well so as to not hamper the execution of other modules.

3. Validation Testing
After validation testing, software is completely assembled as a package,
interfacing errors that have been uncovered and corrected and the final series
Page
75

CHIT FUND MAINTENANCE

of software test; the validation test begins. Steps taken during software design
and testing can greatly improve the probability of successful integration in the
larger system. System testing is actually a series of different tests whose
primary purpose is to fully exercise the compute based system.
4. Recovery Testing
It is a system that forces the software to fail in a variety of ways and
verifies that the recovery is properly performed.

5. Security Testing
It attempts to verify that protection mechanisms built into a system will in
fact protect it from improper penetration. The systems security must of course
be tested from in vulnerability form frontal attack.
6. Stress Testing
Stress tools are designed to confront programs with abnormal situations.
Stress testing executes a system in a manner that demands resources in
abnormal quantity and volume.
7. Black Box Testing
Black box testing is done to find out the following information as shown in
below:
1. Incorrect or missing functions.
2. Interface errors.
Page
76

CHIT FUND MAINTENANCE

3. Errors or database access.


4. Performance error.
5. Termination error.
The mentioned testing is carried out successfully for this
application according to the users requirement specification.

8. Test Data Output


After preparing test data, the system under study is tested using the test
data. While testing the system using test data, errors are again uncovered and
corrected by using above testing and corrections are also noted for future use.

5. Conclusion & Advantageous


5.1 Conclusion:
The CHIT FUND MAINTENANCE SYSTEM is a great improvement over the
manual system using case fields and paper. The computerization of the system has
Page
77

CHIT FUND MAINTENANCE

sped up the process. In the current system, the front office managing is very slow.
The Insurance Policy managing system was thoroughly checked and tested with
dummy data and thus is found to be very reliable.

Advantages:
It is fast, efficient and reliable
Avoids data redundancy and inconsistency
Very user-friendly
Easy accessibility of data
Number of personnel required is considerably less
Provides more security and integrity to data

6. Bibliography:
Books
Page
78

CHIT FUND MAINTENANCE

A Complete Guide to Programming in Visual Basic .6.0


-Mohammed Azam

A Complete Visual Basic 6 Training Course: How to Programme:


Package
-Harvey M deitel,Paul j deitel,Tem R Neito
Advanced Programming Using Visual Basic: Version 6.0
-Julia Case Bradley
Access 20037Power Programming with VBA
-Allen G Taylor
Advanced MS Visual Basic
-Peter Morris

5.1 Reference:

www.associatedcontent.com

www.members.tripod.com

www.project-download.com

Page
79

You might also like