crime file system project report

99
Crime File System 1 M.S. RAMAIAH COLLEGE OF ARTS SCIENCE AND COMMERCE Project Report on CRIME FILE SYSTEM CRIME FILE SYSTEM Submitted in partial fulfillment for the Completion of IV SEM Bachelor of Science (BSC) PRESENTED BY ARCHIKAM NAGARAJ (10KUS75076) Under the Guidance of DEPARTMENT OF COMPUTER SCIENCE

Upload: bidisha30

Post on 29-Dec-2015

180 views

Category:

Documents


20 download

DESCRIPTION

It's a detailed report about crime file system software project. Any indian graduate who is working on cs project based on visual basic on crime file system will be helped by this project report.

TRANSCRIPT

Page 1: Crime file system project report

Crime File System 1

M.S. RAMAIAH COLLEGE OF ARTS SCIENCE

AND COMMERCE

Project Report on

CRIME FILE SYSTEMCRIME FILE SYSTEM

Submitted in partial fulfillment for theCompletion of IV SEM

Bachelor of Science (BSC)

PRESENTED BYARCHIKAM NAGARAJ (10KUS75076)

Under the Guidance of

DEPARTMENT OF COMPUTER SCIENCE

Page 2: Crime file system project report

Crime File System 2

CERTIFICATE

This is to certify that this Project entitled

Submitted by

ARCHIKAM NAGARAJ (10KUS75076)

In partial fulfillment of the requirements for the Fourth Semester BACHELOR OF SCIENCE of Bangalore University during the academic year JAN 2011 to MAY 2011 under our supervision

Examiner’s Signature: _________________ _____________

Page 3: Crime file system project report

Crime File System 3

ABSTRACT

The objective of the project is to build the Crime File System. In

the project we have facilitate the user by providing him to navigate

provided by the owner. In the project main emphasis is an use of

advanced technologies such as Visual Basic 6.0 and Microsoft

Access Data Base. The user of this Two-Tier Architecture help

user with more efficiency for access and security. The user is

provided with separate login Id and Password. Every time the user

login separate session is established. The user is provided with

Facility to add new records so that he/she can make his/her choice.

Owner has control over the order has final authority lies with him

only.

Page 4: Crime file system project report

Crime File System 4

CONTENTS

1. INTRODUCTION 2

2. SYSTEM ANALYSIS 5

2.1 Introduction

2.2 Existing System

2.3 Proposed System

2.4 Data Flow Diagram

3. SYSTEM DESIGN 18 3.1 Input design 3.2 Output design 3.3 Form design

3.4 Database design

4. SYSTEM IMPLEMENTATION 38

4.1 About Language 4.2 System Configuration

5. APPENDIX 50

Page 5: Crime file system project report

Crime File System 5

5.1 Source Code

6. IMPLEMENTATION AND TESTING 69

7. FUTURE ENHANCEMENT 73

8. CONCLUSION 74

9. BIBLIOGRAPHY 75

1. INTRODUCTION

1. LOGIN

This includes Administrator and User login. There will be a

username and password to login into the system to use all the facilities.

2. COMPLAINT REGISTRATION

This module helps to register the details about the crime. This is

done by entering some details, such as incident details, Victim details, crime

details etc

3. VIEW COMPLAINT STATUS

This module allows us to view the status of the complaint that you

have registered earlier.

4. CRIMINAL REGISTER MANAGEMENT

Page 6: Crime file system project report

Crime File System 6

Here we can have the facility to view the details of the criminals. The

administrator can add new criminal’s details and save it in a database. This

can be done by entering details such as criminal number, age, occupation,

type of crime etc.

5. FIR MANGEMENT

This module allows viewing the First Information Report of all the

crimes that took place at recent years. The administrator can enter FIR

information and save it in a database.

6. CASE HISTORY DETAILS MANAGEMENT

Here we can view the details of the case, date of occurrence, the type

of crime and place of occurrence etc…

7. MANAGING POSTMORTEM DETAILS

This module helps to view the postmortem details of a person. The

details such as date of death cause of death, name of the doctor etc.

8. PRISONER REGISTER MANGEMENT

Page 7: Crime file system project report

Crime File System 7

This module helps the administrator as well as the user to store, view and

manage the details of the past and present prisoners.

9. MANAGE THE LIST OF MOST WANTED CRIMINALS

This is an additional feature added to this Software, which helps us to

make a quick search about the most wanted criminals. This helps to always keep

track of and identify a person quickly, who is a most wanted criminal.

2. SYSTEM ANALYSIS

2.1 Introduction to System Analysis

System analysis is a process of gathering and interpreting facts,

diagnosing problems and the information to recommend

improvements on the system. It is a problem solving activity that

requires intensive communication between the system users and

system developers. System analysis or study is an important phase of

any system development process. The system is studied to the

minutest detail and analyzed. The system analyst plays the role of the

Page 8: Crime file system project report

Crime File System 8

interrogator and dwells deep into the working of the present system.

The system is viewed as a whole and the input to the system are

identified. The outputs from the organizations are

traced to the various processes. System analysis is concerned with

becoming aware of the problem, identifying the relevant and

decisional variables, analyzing and synthesizing the various factors

and determining an optimal or at least a satisfactory solution or

program of action.

      A detailed study of the process must be made by various

techniques like interviews, questionnaires etc. The data collected by

these sources must be scrutinized to arrive to a conclusion. The

conclusion is an understanding of how the system functions. This

system is called the

existing system. Now the existing system is subjected to close study

and problem areas are identified. The designer now functions as a

problem solver and tries to sort out the difficulties that the enterprise

faces. The solutions are given as proposals. The proposal is then

weighed with the existing system analytically and the best one is

selected. The proposal is presented to the user for an endorsement by

the user. The proposal is reviewed on user request and suitable

changes are made. This is loop that ends as soon as the user is satisfied

with proposal. 

Page 9: Crime file system project report

Crime File System 9

      Preliminary study is the process of gathering and interpreting

facts, using the information for further studies on the system.

Preliminary study is problem solving activity that requires intensive

communication between the system users and system developers. It

does various feasibility studies. In these studies a rough figure of the

system activities can be obtained, from which the decision about the

strategies to be followed for effective system study and analysis can be

taken. 

2.2 Existing System

Lack of security of data.

More man power.

Time consuming.

Consumes large volume of pare work.

Needs manual calculations.

No direct role for the higher officials.

2.3 Proposed System

The aim of proposed system is to develop a system of improved

facilities. The proposed system can overcome all the limitations of the

existing system. The system provides proper security and reduces the

manual work.

Security of data.

Page 10: Crime file system project report

Crime File System 10

Ensure data accuracy’s.

Proper control of the higher officials.

Minimize manual data entry.

Minimum time needed for the various processing.

Greater efficiency.

Better service.

User friendliness and interactive.

Minimum time required.

2.3.1. FEASIBILITY STUDY

Feasibility study is made to see if the project on completion will

serve the purpose of the organization for the amount of work, effort

and the time that spend on it. Feasibility study lets the developer

foresee the future of the project and the usefulness. A feasibility study

of a system proposal is according to its workability, which is the

impact on the organization, ability to meet their user needs and

effective use of resources. Thus when a new application is proposed it

normally goes through a feasibility study before it is approved for

development.

The document provide the feasibility of the project that is being

designed and lists various areas that were considered very carefully

during the feasibility study of this project such as Technical,

Page 11: Crime file system project report

Crime File System 11

Economic and Operational feasibilities. The following are its features:

A. TECHNICAL FEASIBILITY

The system must be evaluated from the technical point of view

first. The assessment of this feasibility must be based on an outline

design of the system requirement in the terms of input, output,

programs and procedures. Having identified an outline system, the

investigation must go on to suggest the type of equipment, required

method developing the system, of running the system once it has been

designed.

Technical issues raised during the investigation are:

Does the existing technology sufficient for the

suggested one?

Can the system expand if developed?

The project should be developed such that the necessary functions

and performance are achieved within the constraints. The project is

developed within latest technology. Through the technology may

become obsolete after some period of time, due to the fact that never

version of same

Page 12: Crime file system project report

Crime File System 12

software supports older versions, the system may still be used. So

there are minimal constraints involved with this project. The system

has been developed using Java the project is technically feasible for

development.

B. ECONOMIC FEASIBILITY

The developing system must be justified by cost and benefit.

Criteria to ensure that effort is concentrated on project, which will

give best, return at the earliest. One of the factors, which affect the

development of a new system, is the cost it would require.

The following are some of the important financial questions asked

during preliminary investigation:

The costs conduct a full system investigation.

The cost of the hardware and software.

The benefits in the form of reduced costs or fewer costly

errors.

Since the system is developed as part of project work, there is no

manual cost to spend for the proposed system. Also all the resources

are already available, it give an indication of the system is

economically possible for development.

Page 13: Crime file system project report

Crime File System 13

C. BEHAVIORAL FEASIBILITY

This includes the following questions:

Is there sufficient support for the users?

Will the proposed system cause harm?

The project would be beneficial because it satisfies the objectives

when developed and installed. All behavioral aspects are considered

carefully and conclude that the project is behaviorally feasible.

ENTITY RELATIONSHIP DIAGRAM

Page 14: Crime file system project report

Crime File System 14

Page 15: Crime file system project report

Crime File System 15

Data Flow Diagram

LEVEL 0 DFD

Page 16: Crime file system project report

Crime File System 16

LEVEL 1 DFD

Page 17: Crime file system project report

Crime File System 17

LEVEL 2 DFD

Page 18: Crime file system project report

Crime File System 18

LEVEL 3 DFD

Page 19: Crime file system project report

Crime File System 19

LEVEL 4 DFD

Page 20: Crime file system project report

Crime File System 20

3. SYSTEM DESIGN

Introduction to System Design

Design is the first step into the development phase for any

engineered product or system. Design is a creative process. A good

design is the key to effective system. The term “design” is defined as

“the process of applying various techniques and principles for the

purpose of defining a process or a system in sufficient detail to permit

its physical realization”. It may be defined as a process of applying

various techniques and principles for the purpose of defining a device,

a process or a system in sufficient detail to permit its physical

realization. Software design sits at the technical kernel of the software

engineering process and is applied regardless of the development

paradigm that is used. The system design develops the architectural

detail required to build a system or product. As in the case of any

systematic approach, this software too has undergone the best

possible design phase fine tuning all efficiency, performance and

accuracy levels. The design phase is a transition from a user oriented

document to a document to the programmers or database personnel.

System design goes through two phases of development: Logical and

Physical Design.

Page 21: Crime file system project report

Crime File System 21

3.1 Input design

The design of input focuses on controlling the amount of input

required, controlling the errors, avoiding delay, avoiding extra steps

and keeping the process simple. The input is designed in such a way so

that it provides security and ease of use with retaining the privacy.

Input Design considered the following things:

o What data should be given as input?

o How the data should be arranged or coded?

o The dialog to guide the operating personnel in providing input.

o Methods for preparing input validations and steps to follow when

error occur.

3.2 Output Design

A quality output is one, which meets the requirements of the end

user and presents the information clearly. In output design it is

determined how the information is to be displaced for immediate need

and also the hard copy output. It is the most important and direct

source information to the user. Efficient and intelligent output design

improves the system’s relationship to help user decision-making.

Designing computer output should proceed in an organized, well

thought out manner; the right output must be developed while

ensuring that each output element is designed so that people will find

the system can use easily and effectively. When analysis design

computer output, they should :

Identify the specific output that is needed to meet the requirements.

Page 22: Crime file system project report

Crime File System 22

Select methods for presenting information.

3.3 Form design

Progress

MDI FORM

Page 23: Crime file system project report

Crime File System 23

Login

Add New User

Page 24: Crime file system project report

Crime File System 24

Delete User

Criminal Register

Page 25: Crime file system project report

Crime File System 25

Complaint Registeration

FIR

Page 26: Crime file system project report

Crime File System 26

Charge Sheet

Post mortem

Page 27: Crime file system project report

Crime File System 27

PRISONER REGISTERATION

Most wanted criminals

Page 28: Crime file system project report

Crime File System 28

Case history

REPORTS

Crime report

Page 29: Crime file system project report

Crime File System 29

Most Wanted Report

Page 30: Crime file system project report

Crime File System 30

Post Mortem Report

FIR Report

Page 31: Crime file system project report

Crime File System 31

Admin Complaint Status

View Complaint Status

3.4 Database Design

Page 32: Crime file system project report

Crime File System 32

A database is an organized mechanism that has the

capability of storing information through which a user can retrieve

stored information in an effective and efficient manner. The data is

the purpose of any database and must be protected.

The database design is a two level process. In the first step, user

requirements are gathered together and a database is designed which

will meet these requirements as clearly as possible. This step is called

Information Level Design and it is taken independent of any

individual DBMS.

In the second step, this Information level design is transferred into

a design for the specific DBMS that will be used to implement the

system in question. This step is called Physical Level Design,

concerned with the characteristics of the specific DBMS that will be

used. A database design runs parallel with the system design. The

organization of the data in the database is aimed to achieve the

following two major objectives.

Data Integrity

Data independence

Normalization is the process of decomposing the attributes in an

application, which results in a set of tables with very simple structure.

The purpose of normalization is to make tables as simple as possible.

Normalization is carried out in this system for the following reasons.

To structure the data so that there is no repetition of data , this helps

in saving.

To permit simple retrieval of data in response to query and report

request.

To simplify the maintenance of the data through updates, insertions,

deletions.

Page 33: Crime file system project report

Crime File System 33

To reduce the need to restructure or reorganize data which new

application requirements arise.

RELATIONAL DATABASE MANAGEMENT SYSTEM (RDBMS):

A relational model represents the database as a collection of

relations. Each relation resembles a table of values or file of records.

In formal relational model terminology, a row is called a tuple, a

column header is called an attribute and the table is called a relation.

A relational database consists of a collection of tables, each of which is

assigned a unique name. A row in a tale represents a set of related

values.

RELATIONS, DOMAINS & ATTRIBUTES:

A table is a relation. The rows in a table are called tuples. A tuple is

an ordered set of n elements. Columns are referred to as attributes.

Relationships have been set between every table in the database. This

ensures both Referential and Entity Relationship Integrity. A domain

D is a set of atomic values. A common method of specifying a domain

is to specify a data type from which the data values forming the

domain are drawn. It is also useful to specify a name for the domain

to help in interpreting its values. Every value in a relation is atomic,

that is not decomposable.

RELATIONSHIPS:

Table relationships are established using Key. The two main keys of

prime importance are Primary Key & Foreign Key. Entity Integrity and

Referential Integrity Relationships can be established with these keys. Entity

Page 34: Crime file system project report

Crime File System 34

Integrity enforces that no Primary Key can have null values. Referential

Integrity enforces that no Primary Key can have null values.

Referential Integrity for each distinct Foreign Key value, there must

exist a matching Primary Key value in the same domain. Other key

are Super Key and Candidate Keys.

Relationships have been set between every table in the database. This

ensures both Referential and Entity Relationship Integrity.

NORMALIZATION:

As the name implies, it denoted putting things in the normal form.

The application developer via normalization tries to achieve a sensible

organization of data into proper tables and columns and where names

can be easily correlated to the data by the user. Normalization

eliminates repeating groups at data and thereby avoids data

redundancy which proves to be a great burden on the computer

resources. These includes:

Normalize the data.

Choose proper names for the tables and columns.

Choose the proper name for the data.

First Normal Form:

The First Normal Form states that the domain of an attribute must

include only atomic values and that the value of any attribute in a

tuple must be a single value from the domain of that attribute. In

Page 35: Crime file system project report

Crime File System 35

other words 1NF disallows “relations within relations” or “relations

as attribute values within tuples”. The only attribute values permitted

by 1NF are single atomic or indivisible values.

The first step is to put the data into First Normal Form. This can

be donor by moving data into separate tables where the data is of

similar type in each table. Each table is given a Primary Key or

Foreign Key as per requirement of the project. In this we form new

relations for each nonatomic attribute or nested relation. This

eliminated repeating groups of data.

A relation is said to be in first normal form if only if it satisfies the

constraints that contain the primary key only.

Second Normal Form:

According to Second Normal Form, For relations where primary

key contains multiple attributes, no nonkey attribute should be

functionally dependent on a part of the primary key.

In this we decompose and setup a new relation for each partial key

with its dependent attributes. Make sure to keep a relation with the

original primary key and any attributes that are fully functionally

dependent on it. This step helps in taking out data that is only

dependant on apart of the key.

A relation is said to be in second normal form if and only if it

satisfies all the first normal form conditions for the primary key and

every non-primary key attributes of the relation is fully dependent on

its primary key alone.

Third Normal Form:

Page 36: Crime file system project report

Crime File System 36

According to Third Normal Form, Relation should not have a

nonkey attribute functionally determined by another nonkey attribute

or by a set of

nonkey attributes. That is, there should be no transitive dependency

on the primary key.

In this we decompose and set up relation that includes the nonkey

attributes that functionally determines other nonkey attributes. This

step is taken to get rid of anything that does not depend entirely on

the Primary Key.

A relation is said to be in third normal form if only if it is in second

normal form and more over the non key attributes of the relation

should not be depend on other non key attribute.

Table Design

Table: Admin Login

Table: Charge Sheet

Page 37: Crime file system project report

Crime File System 37

Table: Complaint Reg

Table: Complaint

Table: Criminal reg

Page 38: Crime file system project report

Crime File System 38

Table: Most Wanted

Table: History

Table: Prisoners Reg

Page 39: Crime file system project report

Crime File System 39

Table: Prisoners Temp

Table: Post Mortem

Page 40: Crime file system project report

Crime File System 40

Table: FIR

4 SYSTEM IMPLEMENTATION

4.1 About Language

The Control Properties

Before writing an event procedure for the control to response to a user's input, you

have to set certain properties for the control to determine its appearance and how it

will work with the event procedure. You can set the properties of the controls in the

properties window or at runtime.

Page 41: Crime file system project report

Crime File System 41

Handling some of the common controls

The Text Box   

The text box is the standard control for accepting input from the user as well as to

display the output. It can handle string (text) and numeric data but not images or

pictures. String in a text box can be converted to a numeric data by using the

function Val(text). The following example illustrates a simple program that

processes the input from the user. 

Example

In this program, two text boxes are inserted into the form together with a few labels.

The two text boxes are used to accept inputs from the user and one of the labels will

be used to display the sum of two numbers that are entered into the two text boxes.

Besides, a command button is also programmed to calculate the sum of the two

numbers using the plus operator. The program use creates a variable sum to accept

the summation of values from text box 1 and text box 2.The procedure to calculate

and to display the output on the label is shown below. The output is shown in Figure

3.2

Private Sub Command1_Click ()

‘To add the values in text box 1 and text box 2

Sum = Val (Text1.Text) + Val (Text2.Text)

‘To display the answer on label 1

Label1.Caption = Sum

End Sub

Page 42: Crime file system project report

Crime File System 42

Figure

 

The Label    

The label is a very useful control for Visual Basic, as it is not only used to provide

instructions and guides to the users, it can also be used to display outputs. One of its

most important properties is Caption. Using the syntax label.Caption, it can display

text and numeric data . You can change its caption in the properties window and

also at runtime.  Please refer to Example 3.1 and Figure 3.1 for the usage of label.

The Command Button 

The command button is one of the most important controls as it is used to execute

commands. It displays an illusion that the button is pressed when the user click on

it. The most common event associated with the command button is the Click event,

and the syntax for the procedure is

Private Sub Command1_Click ()

Statements

End Sub

Page 43: Crime file system project report

Crime File System 43

The Picture Box 

The Picture Box is one of the controls that is used to handle graphics. You can load

a picture at design phase by clicking on the picture item in the properties window

and select the picture from the selected folder. You can also load the picture at

runtime using the LoadPicture method. For example, the statement will load the

picture grape.gif into the picture box.

Picture1.Picture=LoadPicture ("C:\VB program\Images\grape.gif")

You will learn more about the picture box in future lessons. The image in the

picture box is not resizable.

 

The Image Box

The Image Box is another control that handles images and pictures. It functions

almost identically to the picture box. However, there is one major difference, the

image in an Image Box is stretchable, which means it can be resized. This feature is

not available in the Picture Box. Similar to the Picture Box, it can also use the

LoadPicture method to load the picture. For example, the statement loads the

picture grape.gif into the image box.

Image1.Picture=LoadPicture ("C:\VB program\Images\grape.gif")

The List Box

The function of the List Box is to present a list of items where the user can click and

select the items from the list. In order to add items to the list, we can use the Add

Page 44: Crime file system project report

Crime File System 44

Item method. For example, if you wish to add a number of items to list box 1, you

can key in the following statements

Example

 

Private Sub Form_Load ( )

List1.AddItem “Lesson1”

List1.AddItem “Lesson2”

List1.AddItem “Lesson3”

List1.AddItem “Lesson4”

End Sub

The items in the list box can be identified by the ListIndex property, the value of the

ListIndex for the first item is 0, the second item has a ListIndex 1, and the second

item has a ListIndex 2 and so on

The Combo Box 

The function of the Combo Box is also to present a list of items where the user can

click and select the items from the list. However, the user needs to click on the small

arrowhead on the right of the combo box to see the items which are presented in a

drop-down list. In order to add items to the list, you can also use the AddItem

method. For example, if you wish to add a number of items to Combo box 1, you can

key in the following statements

Example

Private Sub Form_Load ( )

Combo1.AddItem “Item1”

Page 45: Crime file system project report

Crime File System 45

Combo1.AddItem “Item2”

Combo1.AddItem “Item3”

Combo1.AddItem “Item4”

End Sub

 

The Check Box

The Check Box control lets the user  selects or unselects an option. When the Check

Box is checked, its value is set to 1 and when it is unchecked, the value is set to 0.

You can include the statements Check1.Value=1 to mark the Check Box and

Check1.Value=0 to unmark the Check Box, as well as  use them to initiate certain

actions. For example, the program will change the background color of the form to

red when the check box is unchecked and it will change to blue when the check box

is checked.  You will learn about the conditional statement If….Then….Elesif in

later lesson. VbRed and vbBlue are color constants and BackColor is the

background color property of the form.

The Option Box

 

The Option Box control also lets the user selects one of the choices. However, two or

more Option Boxes must work together because as one of the Option Boxes is

selected, the other Option Boxes will be unselected. In fact, only one Option Box can

be selected at one time. When an option box is selected, its value is set to “True” and

when it is unselected; its value is set to “False”. In the following example, the shape

Page 46: Crime file system project report

Crime File System 46

control is placed in the form together with six Option Boxes. When the user clicks

on different option boxes, different shapes will appear. The values of the shape

control are 0, 1, and 2,3,4,5 which will make it appear as a rectangle, a square, an

oval shape, a rounded rectangle and a rounded square respectively.

Example

Private Sub Option1_Click ( )

Shape1.Shape = 0

End Sub

Private Sub Option2_Click()

Shape1.Shape = 1

End Sub

Private Sub Option3_Click()

Shape1.Shape = 2

End Sub

Private Sub Option4_Click()

Shape1.Shape = 3

End Sub

Private Sub Option5_Click()

Shape1.Shape = 4

End Sub

Private Sub Option6_Click()

Shape1.Shape = 5

End Sub

Page 47: Crime file system project report

Crime File System 47

The Drive List Box

The Drive ListBox is for displaying a list of drives available in your computer.

When you place this control into the form and run the program, you will be able to

select different drives from your computer as shown in Figure 3.3

 

The Directory List Box

The Directory List Box is for displaying the list of directories or folders in a selected

drive. When you place this control into the form and run the program, you will be

able to select different directories from a selected drive in your computer as shown

in Figure 3.4

 

The File List Box

The File List Box is for displaying the list of files in a selected directory or folder.

When you place this control into the form and run the program, you will be able to

shown the list of files in a selected directory as shown in Figure

You can coordinate the Drive List Box, the Directory List Box and the File List Box

to search for the files you want. The procedure will be discussed in later lessons. 

MS ACCESS 2003

Page 48: Crime file system project report

Crime File System 48

Microsoft Access is a powerful program to create and manage your databases. It has

many built in features to assist you in constructing and viewing your information.

Access is much more involved and is a more genuine database application than

other programs such as Microsoft Works.

The keywords involved in the process are: Database File, Table, Record, Field, Data-

type. Here is the Hierarchy that Microsoft Access uses in breaking down a database.

Database File: This is your main file that encompasses the entire database and that

is saved to your hard-drive or floppy disk.

Example: StudentDatabase.mdb

Table:A table is a collection of data about a specific topic. There can be multiple

tables in a database.

Field: Fields are the different categories within a Table. Tables usually contain

multiple fields.

Page 49: Crime file system project report

Crime File System 49

Datatypes: Datatypes are the properties of each field. A field only has 1 datatype.

FieldName) Student LastName

Datatype) Text

Starting Microsoft Access

Two Ways

1. Double click on the Microsoft Access icon on the desktop.

Page 50: Crime file system project report

Crime File System 50

2. Click on Start --> Programs --> Microsoft Access

Creating New, and Opening Existing Databases

Page 51: Crime file system project report

Crime File System 51

The above picture gives you the option to:

Create a New Database from scratch

Use the wizard to create a New Database

Open an existing database

o The white box gives you the most recent databases you have used. If

you do not see the one you had created, choose the More Files option

and hit OK. Otherwise choose the database you had previously used

and click OK.

4.2 System Configuration

HARDWARE REQUIREMENTS

Processor : X86 Compatible processor

Page 52: Crime file system project report

Crime File System 52

with 1.7 GHz Clock speed

RAM : 512 MB or more

Hard disk : 20 GB or more

Monitor : VGA/SVGA

Keyboard : 104 Keys

Mouse : 2 buttons/ 3 buttons

SOFTWARE REQUIREMENTS

Operating System : Windows 2000/XP

Front end : Visual Basic 6.0

Back end : MS ACCESS

5 APPENDIX

5.1 Source Code

Add Complaint

Page 53: Crime file system project report

Crime File System 53

Private Sub cmdAdd_Click()If (cmbComplntNo.Text = "" Or txtStatus.Text = "") Then MsgBox "Missing Fields", vbInformation, "CFS"Elsecon.Execute ("insert into ComplntStatus values(" + cmbComplntNo.Text + ",'" + txtStatus.Text + "')")MsgBox "Status Added Successfully", vbInformation, "Crime File System"txtDetails.Text = ""txtStatus.Text = ""cmbComplntNo.SetFocusEnd IfEnd Sub

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdDetails_Click()Set rest = con.Execute("select Details from ComplaintReg where ComplntNo=" + cmbComplntNo.Text + "")If (Not rs.EOF) Then txtDetails.Text = rest(0) txtStatus.SetFocusEnd If

End Sub

Private Sub Form_Load()connectdbSet rest = con.Execute("select ComplntNo from ComplaintReg")While (Not rs.EOF) cmbComplntNo.AddItem rest(0) rs.MoveNextWendrs.CloseEnd Sub

Add user

Private Sub Form_Load()connectdbEnd SubPrivate Sub cmdAdd_Click()

Page 54: Crime file system project report

Crime File System 54

Set rest = con.Execute("select * from UserLogin where Username='" + txtUsername.Text + "' and Password='" + txtPassword.Text + "'")If (Not rs.EOF) Then MsgBox "Sorry!! User already exists. Try another username", vbCritical, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocusElse con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" + txtPassword.Text + "')") MsgBox "User added sucessfully", vbInformation, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocusEnd IfEnd Sub

Private Sub cmdCancel_Click()Unload Me

FIR Report

Dim x As IntegerPrivate Sub cmdShRpt_Click()x = cmbMno.Text If (DataEnvironment1.rsCommand4.State = 1) Then DataEnvironment1.rsCommand4.Close Else DataEnvironment1.Command4 (x) Load DataReportFIR DataReportFIR.Show End IfEnd Sub

Private Sub Form_Load()connectdbSet rest = con.Execute("select Firno from FIR")While (Not rs.EOF) cmbMno.AddItem rest(0) rs.MoveNextWendEnd Sub

Page 55: Crime file system project report

Crime File System 55

Login

Private Sub cmdAdminLog_Click()Set rest = con.Execute("Select * from AdminLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'")If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuAdminAddU.Enabled = True frmMDI.mnuAdminDelU.Enabled = True frmMDI.mnuActiv.Enabled = True frmMDI.mnuLogin.Enabled = False frmMDI.mnuAdminAddComSt.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True Unload MeElse MsgBox "Failure", vbCritical, "Crime File System"End If'rs.CloseUnload MeEnd Sub

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdUserLog_Click()Set rest = con.Execute("Select * from UserLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'")If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuLogin.Enabled = False

frmMDI.mnuActiv.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True Unload MeElse MsgBox "Failure", vbCritical, "Crime File System"End If'rs.Close

Page 56: Crime file system project report

Crime File System 56

End Sub

Private Sub Form_Load()connectdbEnd Sub

Private Sub Form_Unload(Cancel As Integer)con.CloseEnd Sub

Post Mortem Report

Dim x As IntegerPrivate Sub cmdShRpt_Click() x = cmbMno.Text If (DataEnvironment1.rsCommand3.State = 1) Then DataEnvironment1.rsCommand3.Close Else DataEnvironment1.Command3 (x) Load DataReportmortem DataReportmortem.Show End If End Sub

Private Sub Form_Load()connectdbSet rest = con.Execute("select PMortemNo from Postmortem")While (Not rs.EOF) cmbMno.AddItem rest(0) rs.MoveNextWendEnd Sub

Splash

Dim i As IntegerDim x As IntegerOption Explicit

Page 57: Crime file system project report

Crime File System 57

Private Sub Form_Load()File1.FileName = App.Pathx = File1.ListCountEnd Sub

Private Sub Form_MouseDown(Button As Integer, Shift As Integer, x As Single, Y As Single)Unload MeEnd Sub

Private Sub Form_Unload(Cancel As Integer)Load frmMDIfrmMDI.Show

End Sub

Private Sub Frame1_MouseDown(Button As Integer, Shift As Integer, x As Single, Y As Single)Unload MeEnd Sub

Private Sub Timer1_Timer()If (Image1.Left <= 6480) Then Image1.Left = Image1.Left + 100Else Image1.Left = 0End IfIf (i <= x) ThenLabel2.Caption = File1.List(i)i = i + 1ElseLoad frmMDIfrmMDI.ShowUnload MeEnd IfEnd Sub

MDI Form

Private Sub MDIForm_Load()mnuLogoff.Enabled = FalsemnuAdminAddU.Enabled = FalsemnuAdminDelU.Enabled = FalsemnuActiv.Enabled = FalsemnuAdminAddComSt.Enabled = FalsemnuActivReg.Enabled = FalsemnuActivComp.Enabled = FalsemnuActivRpt.Enabled = False

Page 58: Crime file system project report

Crime File System 58

DataEnvironment1.Connection1.ConnectionString = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path & "\crimefile.mdb;Persist Security Info=False"End Sub

Private Sub mnuActivChrgSht_Click()Load frmChargeSheetfrmChargeSheet.ShowEnd Sub

Private Sub mnuActivCompReg_Click()Load frmCompltRegfrmCompltReg.Show

End Sub

Private Sub mnuActivCompStat_Click()Load frmCompStatusfrmCompStatus.ShowEnd Sub

Private Sub mnuActivCsHist_Click()Load frmHistSheetfrmHistSheet.ShowEnd Sub

Private Sub mnuActivFir_Click()Load frmFIRfrmFIR.ShowEnd Sub

Private Sub mnuActivRegCrim_Click()Load frmCriminalRegisterfrmCriminalRegister.ShowEnd Sub

Private Sub mnuActivRegPost_Click()Load frmPostmortemfrmPostmortem.ShowEnd Sub

Private Sub mnuActivRegPris_Click()Load frmPrisonerRegfrmPrisonerReg.ShowEnd Sub

Private Sub mnuActivRptCrim_Click()Load DataReportCrimeRpt

Page 59: Crime file system project report

Crime File System 59

DataReportCrimeRpt.ShowEnd Sub

Private Sub mnuActivRptMst_Click()Load DataReportMostWantedDataReportMostWanted.ShowEnd Sub

Private Sub mnuActRegMst_Click()Load frmMostWantedfrmMostWanted.ShowEnd Sub

Private Sub mnuAdminAddComSt_Click()Load frmAddCompltStatusfrmAddCompltStatus.ShowEnd Sub

Private Sub mnuAdminAddU_Click()Load frmAddUserfrmAddUser.ShowEnd Sub

Private Sub mnuAdminDelU_Click()Load frmDeleteUserfrmDeleteUser.ShowEnd Sub

Private Sub mnuLogin_Click()Load frmLoginfrmLogin.Show

End Sub

Private Sub mnuLogoff_Click()mnuLogoff.Enabled = FalsemnuAdminAddU.Enabled = FalsemnuAdminDelU.Enabled = FalsemnuActiv.Enabled = FalsemnuLogin.Enabled = TruemnuAdminAddComSt.Enabled = FalsemnuActivReg.Enabled = FalsemnuActivComp.Enabled = FalsemnuActivRpt.Enabled = FalseEnd Sub

Private Sub mnuRptFIR_Click()Load frmFIRrpt

Page 60: Crime file system project report

Crime File System 60

frmFIRrpt.ShowEnd Sub

Private Sub mnuRptMortem_Click()Load frmPMortemRptfrmPMortemRpt.ShowEnd Sub

Prisoners Register

Dim cnt As IntegerPrivate Sub Command1_Click()If (txtChgrNo.Text = "" Or txtColor.Text = "" Or txtCrmType.Text = "" Or txtFamMem.Text = "" Or txtHt.Text = "" Or txtIdenMark.Text = "" Or txtNikName.Text = "" Or txtPrisNo.Text = "" Or txtWt.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File System"Else If ((Not IsNumeric(txtChgrNo.Text)) Or (Not IsNumeric(txtHt.Text)) Or (Not IsNumeric(txtWt.Text))) Then MsgBox "Some of the values entered are not matching, Please check numbers are entered correctly", vbCritical, "Crime File System" Else Set rest = con.Execute("select * from PrisonersReg where ChargeSheetNo=" + txtChgrNo.Text + "") If (Not rs.EOF) Then MsgBox "Charge Sheet Number Already Exist, Please try another number", vbCritical, "Crime File System" txtChgrNo.Text = "" txtChgrNo.SetFocus Else con.Execute ("insert into PrisonersReg values(" + txtPrisNo.Text + "," + txtChgrNo.Text + ",'" + txtNikName.Text + _ "','" + txtCrmType.Text + "','" + txtFamMem.Text + "','" + txtIdenMark.Text + "'," + txtHt.Text + _ "," + txtWt.Text + ",'" + txtColor.Text + "')") con.Execute ("insert into prisonersTemp values(" + txtPrisNo.Text + ",'No')") MsgBox "Record Added Sucessfully", vbInformation, "CFS" txtPrisNo.Text = txtPrisNo.Text + 1 txtChgrNo.Text = "" txtColor.Text = "" txtCrmType.Text = "" txtFamMem.Text = "" txtHt.Text = "" txtIdenMark.Text = "" txtNikName.Text = ""

Page 61: Crime file system project report

Crime File System 61

txtWt.Text = "" txtChgrNo.SetFocus End If End IfEnd IfEnd Sub

Private Sub Command2_Click()Unload MeEnd Sub

Private Sub Form_Load()connectdbSet rest = con.Execute("select max(PrisonerNo) from PrisonersReg")If (Not rs.EOF) Then cnt = rest(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtPrisNo.Text = cntEnd Ifrs.CloseEnd Sub

POSTMORTEM

Dim cnt As IntegerPrivate Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdSave_Click()If (txtDate.Text = "" Or txtDesc.Text = "" Or txtDoctName.Text = "" Or cmbFirrNo.Text = "" Or txtHouseName.Text = "" Or txtPoliceSt.Text = "" Or txtPostNo.Text = "" Or txtRslt.Text = "") Then MsgBox "Missing Fields!! Please Fill Up all", vbInformation, "Crime File System"Else Set rest = con.Execute("select * from Postmortem where FirNo=" + cmbFirrNo.Text + "") If (Not rs.EOF) Then MsgBox "Duplication is not allowded, Please try another FIR number", vbCritical, "Crime File System" cmbFirrNo.SetFocus Else

Page 62: Crime file system project report

Crime File System 62

con.Execute ("insert into postmortem values(" + txtPostNo.Text + "," + cmbFirrNo.Text + ",'" + txtRslt.Text + _ "','" + cmbSex.Text + "','" + txtDate.Text + "','" + txtDesc.Text + _ "','" + txtHouseName.Text + "','" + txtDoctName.Text + "','" + txtPoliceSt.Text + "')") MsgBox "Record Added Sucessfully", vbInformation, "Crime File System" txtPostNo.Text = txtPostNo + 1 txtDate.Text = "" txtDesc.Text = "" txtDoctName.Text = "" txtHouseName.Text = "" txtPoliceSt.Text = "" txtRslt.Text = "" End IfEnd IfEnd Sub

Private Sub Form_Load()connectdbcmbSex.Text = "Male"Set rest = con.Execute("select max(PMortemNo) from Postmortem")If (Not rs.EOF) Then cnt = rest(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtPostNo.Text = cntEnd Ifrs.CloseSet rest = con.Execute("select Firno from FIR")While (Not rs.EOF) cmbFirrNo.AddItem rest(0) rs.MoveNextWendrs.CloseEnd Sub

POST MORTEM REPORT

Dim X As IntegerPrivate Sub cmdShRpt_Click() X = cmbMno.Text If (DataEnvironment1.rsCommand3.State = 1) Then DataEnvironment1.rsCommand3.Close

Page 63: Crime file system project report

Crime File System 63

Else DataEnvironment1.Command3 (X) Load DataReportmortem DataReportmortem.Show End If End Sub

Private Sub Form_Load()connectdbSet rest = con.Execute("select PMortemNo from Postmortem")While (Not rs.EOF) cmbMno.AddItem rest(0) rs.MoveNextWendEnd Sub

CASE HISTORY

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdSave_Click()If (txtCrimeNo.Text = "" Or txtCrimeType.Text = "" Or txtDate.Text = "" Or txtDesc.Text = "" Or txtPlace.Text = "") Then MsgBox "Missing Fields", vbInformation, "CFS" ElseIf (Not IsNumeric(txtCrimeNo.Text)) Then MsgBox "Crime Number should be a number", vbCritical, "CFS"Else Set rest = con.Execute("select * from History where CrimeNo=" + txtCrimeNo.Text + "") If (Not rs.EOF) Then MsgBox "Duplication of record is not allowded! Try another Crime number", vbCritical, "CFS" txtCrimeNo.Text = "" txtCrimeNo.SetFocus Else con.Execute ("insert into History values(" + cmbPrisNo.Text + "," + txtCrimeNo.Text + _ ",'" + cmbCrimeType.Text + "','" + txtDate.Text + "','" + txtPlace.Text + "','" + txtDesc.Text + "')") con.Execute ("UPDATE PrisonersTemp set Status='Yes' where PrisonerNo=" + cmbPrisNo.Text + "") MsgBox "Recor Added successfully", vbInformation, "CFS" txtCrimeNo.Text = ""

Page 64: Crime file system project report

Crime File System 64

txtCrimeType.Text = "" txtDate.Text = "" txtDesc.Text = "" txtPlace.Text = "" txtCrimeNo.SetFocus End IfEnd IfEnd Sub

Private Sub Form_Load()connectdbSet rest = con.Execute("select PrisonerNo from PrisonersTemp where Status='No'")While (Not rs.EOF) cmbPrisNo.AddItem rest(0) rs.MoveNextWendrs.CloseEnd Sub

CHARGE SHEET

Dim cnt As IntegerDim X As Control

Private Sub cmdBack_Click()Frame4.Visible = FalseFrame3.Visible = TrueEnd Sub

Private Sub cmdBack2_Click()Frame2.Visible = FalseFrame1.Visible = TrueEnd Sub

Private Sub cmdBack3_Click()Frame3.Visible = FalseFrame2.Visible = TrueEnd Sub

Private Sub cmdFinish_Click()If (txtWitnAdd.Text = "" Or txtWitnName.Text = "" Or txtWitnOcc.Text = "") Then

Page 65: Crime file system project report

Crime File System 65

MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Set rest = con.Execute("select * from ChargeSheet where FirNo=" + cmbFirNo.Text + "") If (Not rs.EOF) Then MsgBox "Dupplication is not allowed, Please try another fir number", vbCritical, "Crime File system" Frame4.Visible = False Frame1.Visible = True cmbFirNo.SetFocus Else con.Execute ("insert into ChargeSheet values(" + txtChrgNo.Text + ",'" + txtPstatName.Text + "','" + txtDate.Text + _ "'," + cmbFirNo.Text + ",'" + txtDist.Text + "','" + txtInfoName.Text + _ "','" + txtInfoAdd.Text + "','" + txtInfoOcc.Text + "','" + txtInfoPart.Text + _ "','" + txtAccuName.Text + "','" + txtAccuAdd.Text + "','" + cmbAccuSex.Text + _ "'," + txtAccuAge.Text + ",'" + txtAccuOcc.Text + "','" + cmbAccuStat.Text + _ "','" + txtAccuAct.Text + "','" + txtWitnName.Text + "','" + txtWitnAdd.Text + _ "','" + txtWitnOcc.Text + "')") MsgBox "Record Added Successfully!!", vbInformation, "Crime File system" Frame4.Visible = False Frame1.Visible = True txtChrgNo.Text = txtChrgNo.Text + 1 ' For Each x In Me.Controls ' If (x = TextBox) Then ' x.Text = "" ' End If 'Next End IfEnd IfEnd Sub

Private Sub cmdNext1_Click()If (txtChrgNo.Text = "" Or txtPstatName.Text = "" Or txtDate.Text = "" Or cmbFirNo.Text = "" Or txtDist.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Frame1.Visible = False Frame2.Visible = TrueEnd If

Page 66: Crime file system project report

Crime File System 66

End Sub

Private Sub cmdNext2_Click()If (txtInfoAdd.Text = "" Or txtInfoName.Text = "" Or txtInfoOcc.Text = "" Or txtInfoPart.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Frame2.Visible = False Frame3.Visible = TrueEnd IfEnd Sub

Private Sub cmdNext3_Click()If (txtAccuAct.Text = "" Or txtAccuAdd.Text = "" Or txtAccuAge.Text = "" Or txtAccuName.Text = "" Or txtAccuOcc.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Frame3.Visible = False Frame4.Visible = TrueEnd IfEnd Sub

Private Sub Form_Load()Frame1.Visible = TrueFrame2.Visible = FalseFrame3.Visible = FalseFrame4.Visible = FalseconnectdbSet rest = con.Execute("select max(ChrgShtNo) from ChargeSheet")If (Not rs.EOF) Then cnt = rest(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtChrgNo.Text = cntEnd Ifrs.CloseSet rest = con.Execute("select Firno from FIR")While (Not rs.EOF) cmbFirNo.AddItem rest(0) rs.MoveNextWendrs.Close

Page 67: Crime file system project report

Crime File System 67

End Sub

CRIMINAL REGISTERATION

Dim cnt As IntegerDim X As String

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdSave_Click()If (optyes.Value = True) Then X = "Yes"Else X = "No"End IfIf (txtAddress.Text = "" Or txtAge.Text = "" Or txtCrimeType.Text = "" Or txtName.Text = "" Or txtNickName.Text = "" Or txtOccupation.Text = "") Then MsgBox "Missing Fields!!,Please fill up all", vbInformation, "Crime File System"ElseIf (Not IsNumeric(txtAge.Text)) Then MsgBox "Age should be numeric"Else con.Execute ("insert into CriminalReg values(" + txtCriminalNo.Text + _ ",'" + txtName.Text + "','" + txtNickName.Text + "'," + txtAge.Text + _ ",'" + txtOccupation.Text + "','" + txtCrimeType.Text + "','" + txtAddress.Text + _ "','" + X + "')") MsgBox "Record Added successfully", vbInformation, "Crime File System" txtCriminalNo.Text = txtCriminalNo.Text + 1 txtAddress.Text = "" txtAge.Text = "" txtCrimeType.Text = "" txtName.Text = "" txtNickName.Text = "" txtOccupation.Text = "" txtName.SetFocusEnd IfEnd Sub

Page 68: Crime file system project report

Crime File System 68

Private Sub Form_Load()connectdbSet rest = con.Execute("select max(CriminalNo) from CriminalReg")If (Not rs.EOF) Then cnt = rest(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtCriminalNo.Text = cntEnd IfEnd Sub

COMPLAINT STATUS

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdViewStat_Click()Set rest = con.Execute("select * from ComplntStatus where ComplntNo=" + cmbComplntNo.Text + "")If (Not rs.EOF) Then txtDetails.Text = rest(1)End If

End Sub

Private Sub Form_Load()connectdbSet rest = con.Execute("select distinct(ComplntNo) from ComplntStatus")While (Not rs.EOF) cmbComplntNo.AddItem rest(0) rs.MoveNextWendrs.CloseEnd Sub

FIR REGISTERATION

Private Sub cmdCancel_Click()Unload MeEnd Sub

Page 69: Crime file system project report

Crime File System 69

Private Sub cmdSave_Click()If (txtDate.Text = "" Or txtDistrict.Text = "" Or txtFirNo.Text = "" Or txtInfoAdd.Text = "" Or txtInfoRcd.Text = "" Or txtPassNo.Text = "" Or txtPlaceOcc.Text = "" Or txtPolice.Text = "" Or txtRcdTime.Text = "" Or txtTime.Text = "" Or txtTypInfo.Text = "" Or cmbComplantno.Text = "") Then MsgBox "Missing Fields!!", vbInformation, "Crime File System" Else Set rest = con.Execute("select * from FIR where FirNo=" + txtFirNo.Text + " or ComplntNo=" + cmbComplantno.Text + "") If (Not rs.EOF) Then MsgBox "Sorry!! FIR Or Complaint Number already exists. Try another number", vbCritical, "CFS" txtFirNo.Text = "" txtFirNo.SetFocus Else Dim t1, t2, t3 As String t1 = txtTime.Text + cmbT1.Text 't2 = txtTime2.Text + cmbT2.Text t3 = txtRcdTime.Text + cmbT3.Text If ((Not IsNumeric(txtPassNo.Text)) Or (Not IsNumeric(txtFirNo.Text))) Then MsgBox "Please check the number fields", vbInformation, "Crime File System" 'txtPassNo.Text = "" 'txtPassNo.SetFocus Else con.Execute ("insert into FIR values(" + txtFirNo.Text + "," + cmbComplantno.Text + _ ",'" + txtDate.Text + "','" + t1 + "','" + txtTypInfo.Text + _ "','" + txtPlaceOcc.Text + "','" + cmbForLoc.Text + "','" + cmbAct.Text + _ "','" + txtDistrict.Text + "','" + txtInfoAdd.Text + "'," + txtPassNo.Text + ",'" + txtPolice.Text + _ "','" + t3 + "','" + txtInfoRcd.Text + "')") con.Execute ("UPDATE ComplntTemp set Status='Yes' where ComplntNo=" + cmbComplantno.Text + "") MsgBox "Record Added", vbInformation, "Crime File system" txtDate.Text = "" txtDistrict.Text = "" txtFirNo.Text = "" txtInfoAdd.Text = "" txtInfoRcd.Text = "" txtPassNo.Text = "" txtPlaceOcc.Text = ""

Page 70: Crime file system project report

Crime File System 70

txtPolice.Text = "" txtRcdTime.Text = "" txtTime.Text = "" txtTypInfo.Text = "" txtFirNo.SetFocus End If End If End If End Sub

Private Sub Form_Load()cmbT1.Text = "AM"cmbT3.Text = "AM"cmbAct.Text = "Murder"cmbForLoc.Text = "Foreign"connectdbSet rest = con.Execute("Select ComplntNo from ComplntTemp where Status='No'")While (Not rs.EOF) cmbComplantno.AddItem rest(0) rs.MoveNextWendEnd Sub

10. IMPLEMENTATION AND TESTING

Page 71: Crime file system project report

Crime File System 71

Testing is a process of executing a program with the interest of finding

an error. A good test is one that has high probability of finding the yet

undiscovered error. Testing should systematically uncover different classes

of errors in a minimum amount of time with a minimum amount of efforts.

Two classes of inputs are provided to test the process

1. A software configuration that includes a software

requirement specification, a design specification and source code.

2. A software configuration that includes a test plan and

procedure, any testing tool and test cases and their expected results.

Testing is divided into several distinct operations:

1. Unit Testing

Unit test comprises of a set tests performed by an individual

program prior to the integration of the unit into large system. A

program unit is usually the smallest free functioning part of the whole

system. Module unit testing should be as exhaustive as possible to

ensure that each representation handled by each module has been

tested. All the units that makeup the system must be tested

independently to ensure that they work as required.

During unit testing some errors were raised and all of them

were rectified and handled well. The result was quiet satisfactory and

it worked well.

2. Integration Testing

Page 72: Crime file system project report

Crime File System 72

Integration testing is a system technique for constructing the

program structure while at the same time conducting tests to uncover

errors associated with interfacing. The objective is to take unit tested

modules and build a program structure that has been dictated by

design. Bottom-up integration is the traditional strategy used to

integrate the components of a software system into functioning whole.

Bottom-up integration consists

of unit test followed by testing of the entire system. A sub-system

consists of several modules that communicated with other defined

interface.

The system was done the integration testing. All the modules

were tested for their compatibility with other modules .They test was

almost successful. All the modules coexisted very well, with almost no

bugs. All the modules were encapsulated very well so as to not hamper

the execution of other modules.

3. Validation Testing

After validation testing, software is completely assembled as a

package, interfacing errors that have been uncovered and corrected

and the final series of software test; the validation test begins. Steps

taken during software design and testing can greatly improve the

probability of successful integration in the larger system. System

testing is actually a series of different tests whose primary purpose is

to fully exercise the compute –based system.

Page 73: Crime file system project report

Crime File System 73

4. Recovery Testing

It is a system that forces the software to fail in a variety of

ways and verifies that the recovery is properly performed.

5. Security Testing

It attempts to verify that protection mechanisms built into a

system will in fact protect it from improper penetration. The system’s

security must of course be tested from in vulnerability form frontal

attack.

6. Stress Testing

Stress tools are designed to confront programs with abnormal

situations. Stress testing executes a system in a manner that demands

resources in abnormal quantity and volume.

7. Black Box Testing

Black box testing is done to find out the following information

as shown in below:

1. Incorrect or missing functions.

2. Interface errors.

3. Errors or database access.

4. Performance error.

5. Termination error.

The mentioned testing is carried out successfully for this

application according to the user’s requirement specification.

8. Test Data Output

After preparing test data, the system under study is tested

Page 74: Crime file system project report

Crime File System 74

using the test data. While testing the system using test data, errors are

again uncovered and corrected by using above testing and corrections

are also noted for future use.

7. FUTURE ENHANCEMENT

We can update this system as online

application

Page 75: Crime file system project report

Crime File System 75

The main advantage of online

application is that, a person can report the

crime any time from anywhere.

Users can view the progress of their

complaint online.

By the future technology user can view

the case details and progress of the

complaints on their mobile phones

Face recognition technology can apply.

User or witness of the crime can give the

physical information of the thief.

8. CONCLUSION

Page 76: Crime file system project report

Crime File System 76

CRIME FILE MANAGEMENT SYSTEM

initiates the objective of providing the user with

customized and powerful complaint registration

and process management system side software.

The software is built with all options such as

complaint registration, prisoner’s registration, and

postmortem report generation etc…All the

requirements specified during the analysis and

design phase are fully met, thus resulting in the

formation of good software. The interface provided

is very user friendly and flexible for all times.

9. BIBLIOGRAPHY

Page 77: Crime file system project report

Crime File System 77

Books

A Complete Guide to Programming in Visual Basic .Net

A Complete Visual Basic 6 Training Course: How to

Programme: Package

Advanced Programming Using Visual Basic: Version 6.0

Access 2003 Power Programming with VBA

Advanced MS Visual Basic

Site Address

www.associatedcontent.com

www.members.tripod.com