Professional Documents
Culture Documents
This project is aimed to serve the people to provide the information about the donors
detail for blood in emergency situations like operations, accidents, delivery etc. This project
was also used to store the details of organ transplantation throughout the Government
Hospitals and other private hospitals. All the process is executed for voluntary based service
only.
A blood donation occurs when a person voluntarily has blood drawn and used for
transfusions or made into medications by a process called fractionation. In the developed
world, most blood donors are unpaid volunteers who give blood for a community supply.
1
1. INTRODUCTION
This project also provides the details of eye donor, human part transplantation donors.
The requisition about blood details contains the type of blood, requested date, place and units.
MODULES
This project consists of six major modules. They are:
Information
Application
Donar Detail
Requisition
Service Branches
Reports
INFORMATION
There are so many known and unknown information’s about blood donation and
organ transplantation. This module clears all the doubts and make awareness about the blood
donation and transplantation. It displays the type of disease, causes, possible for donation or
not are also placed.
APPLICATION
This application module is used to accept the information about the volunteer’s profile
whose who are willing to join in this group. This application requires the blood type, blood
group, diseases, pressures, identification details about the person etc.
2
DONOR DETAIL
After submitting the application form to the donor’s association, they enquiry some
interview and verification about the applicant. After the successful of verification, the
applicant will be permitted to donate blood and other transplantation. This module consists of
applicant name, address, mobile number, email id etc.
REQUISITION
The requisition module plays a vital role in this project. The blood will be required for
major operations, accidents, and other purpose. For that situation, this module is designed for
two purposes like Immediate and advance booking. Immediate is mainly for accidents and
urgent requirement of blood. Advance booking is used to place a request for a particular day
such as post operation.
SERVICE BRANCHES
This module is used to show all the service branches both government and private in
different places throughout the Sivagangai District. This is used to provide the information of
the nearest service center and enquiry for any urgent requirements.
REPORTS
Reports are the main task in every process. This module is used to sort all the records
by the user’s criteria in the enhanced GUI supported screen. This also gives the information
about date wise requisition; donor’s those who are having the eligibility for blood donation
etc.
3
1.2. ORGANIZATION PROFILE
Thamizh Technologies is a professionally managed organization providing total HR
Solutions, Recruitments, Outsourcing and Training to various companies. We provide
services to various types of students which include Engineering, IT, Management department
etc.
GROUP
We have an enviable history of providing high quality services in the fields of R&D,
Design and Development, Training and HR Consulting in Sivaganga. Our organization has
already established its reputation in offering High quality education in the areas of
Engineering, Arts, Science, and Management Courses.
SERVICES
We dedicate our trainees in Software Development, Human Resource Consulting,
Academic Assistance and Training.
4
2. SYSTEM SPECIFICATION
The Common Language Runtime and class libraries, including Windows Forms,
ADO.NET, and VB.NET, combine together to provide services and solutions that can be
easily integrated within and across a variety of systems. The .NET Framework provides a
fully managed, protected, and feature-rich application execution environment, simplified
development and deployment, and seamless integration with a wide variety of languages.
6
.NET FRAMEWORK CLASS LIBRARY
The .NET Framework class library provides a collection of useful and reusable types
that are designed to integrate with the common language runtime.
Types are object-oriented and
Fully extensible
The Common Language Specification defines the minimum standards that .NET
language compilers must conform to, and thus ensures that any source code compiled by a
.NET compiler can interoperate with the .NET Framework. The Common Type System
ensures type compatibility between .NET components. Because .NET applications are
converted to IL prior to deployment and execution, all primitive data types are represented
as .NET types. Thus, a Visual Basic Integer and a C# int are both represented in IL code as a
System.Int32. Because both languages use a common and interconvertable type system, it is
possible to transfer data between components and avoid time-consuming conversions or hard-
to-find errors.
7
Each assembly has one and only one assembly manifest, and it contains all the
description information for the assembly. The assembly manifest can be contained in its own
separate file, or it can be contained within one of the assembly's modules.
8
Some of the services provided by the Execution Support are
Automatic Memory Management
Security
Interoperability with Unmanaged Code
Cross – Language Debugging Support
Enhanced Deployment and Versioning Support
COMPONENTS OF CLR
.NET also provides many other features, such as garbage collection for freeing up
resources, true inheritance for the first time, debugging that works across languages and
against running applications, and the ability to create Windows services and console
applications.
9
COMMON TYPE SYSTEM
The Common Type System specifies the types supported by the CLR. The types
specified by the CLR include
Classes — the definition of what will become an object; includes properties, methods,
and events
Interfaces — the definition of the functionality a class can implement, but does not
contain any implementation code
Value Types — User-defined data types that are passed by value
The type system sets out the rules that language compilers must follow to produce
code that is cross-language compatible. By following the type system, vendors can produce
code that is guaranteed to work with code from other languages and other compilers because
all languages are consistent in their use of types.
In this system, the concept of ADO.NET will have different requirements for working
with data. In some cases, the user might simply want to display data on a form. In other cases,
the user might need to device a way to share information with another company. The user
might never need to know some of the details of data handling — for example, user might
never need to directly edit an XML file containing data — but it is very useful to understand
the data architecture in ADO.NET.
10
Similarly, applications that require an open database connections are extremely
difficult to scale up. An application that does not scale up well might perform acceptably with
four users but will likely not to do so with hundreds.
For all these reasons, data access with ADO.NET is designed around an architecture
that uses connections sparingly. Applications are connected to the database only long enough
to fetch or update the data. Because the database is not holding on to connections that are
largely idle, it can service many more users of languages.
ADO.NET
ActiveX ® Data Objects.NET (ADO.NET), formerly known as ADO+, is a new set of
classes that e7ose the data access services of the .NET Framework. ADO.NET is a natural
evolution of ADO and is built around N-Tier application development. ADO.NET has
been created with XML at its core. The ADO.NET object model is composed of two central
components: the connected layer, which consists of the classes that comprise the .NET Data
Provider, and the disconnected layer, which is rooted in the Dataset.
ADO.NET is essentially a collection of classes that e7ose methods and attributes used
to manage communications between an application and a data store. An integral part of the
.NET Framework, ADO.NET simplifies integration of data sharing in distributed VB.NET
applications.ADO.NET is an e7ansion of ADO with some of the key concepts retained.
ADO.NET has greatly extended to provide access to structured data from diverse sources,
which are all accommodated in a consistent, standardized programming model. ADO.NET
11
can be used in any consumer application that needs to connect to, and communicate with,
data sources such as Microsoft SQL Server, as well as data sources e7osed via OLE DB and
XML.
DATA VIEW
The Data View speaks to the Dataset and is a special class designed for objects to
bind to and can provide customized views of the Data Set. It provides methods and properties
that enable objects such as a Data Grid to bind to a Dataset and contains properties such as
Allow Edit and Count that allow the object to work with the data in meaningful ways. A Data
View is only used in conjunction with a Dataset and never with a Data Reader.
DATA SET
The Dataset is the core component of the disconnected architecture of ADO.NET that
caches data locally on the client. The Dataset is e7licitly designed for data access independent
of any data source. As a result it can be used with multiple and differing data sources, XML
data, or used to manage data local to the application. The Dataset contains a collection of one
or more Data Table objects made up of rows and columns of data, as well as primary key,
foreign key, constraint and relation information about the data in the Data Table objects.
DATA PROVIDER
The Data Provider connects to the database on behalf of ADO.NET. It encapsulates all
connections to a database. The Data Provider containing some objects in it:
Connection
Command
DataAdaptor
DataReaderS
12
CONNECTIONS
Connections are part of a Data Provider and the Connection object provides
connectivity to a data source. Connections can be opened in two ways:
1. E7licitly by calling the Open method on the connection;
2. Implicitly when using a DataAdapter.
COMMANDS
The Command object enables access to database commands to return data, modify
data, run stored procedures, and send or retrieve parameter information. Commands contain
information that is submitted to a database as a query, and, like connections, are represented
by the provider-specific classes SqlCommand and OleDbCommand. Functionally, once the
Connections are established and the Commands are executed the results are in the form of
streams. These resultant streams can be accessed either by DataReader object, or passed into
a DataSet object via a DataAdapter. The SqlCommand class provides four different methods
to execute a command. They are: ExecuteReader, ExecuteNonQuery, ExecuteScalar and
ExecuteXmlReader.
DATA ADAPTERS
The DataAdapter provides a set of methods and properties to retrieve and save data
between a DataSet and its source data store. It does the actual work of putting returned data
from a database into a DataSet. It also manages reconciling how data should be updated
against a database. Connections and Commands whose properties are set early on in code are
often passed into DataAdapters for use when their action methods are invoked. The
DataAdapter object encapsulates a set of data commands and a database connection, which
are used to fill the DataSet and update the data source.
13
DATA READERS
When dealing with large read only data, e.g. reading 5,000 rows of data, the .NET
framework includes the DataReader object, which is a read-only, forward-only stream
returned from the database record set. It is a highly optimized, no buffering, and fire hose-
style interface for getting the results of a query executed against the data source. The Data
Adapter provides the bridge between the .NET Data Providers and the Dataset. The Dataset
is a local buffer of tables or a collection of disconnected record sets.
Microsoft Access (current full name Microsoft Office Access) is a relational database
management system from Microsoft, packaged with Microsoft Office Professional which
combines the relational Microsoft Jet Database Engine with a graphical user interface.
Microsoft Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or
any ODBC-complaint data container. Skilled software developers and data architects use it
to develop application software. Relatively unskilled programmers and non-programmer
“power users” can use it to build simple applications. It supports some object-oriented (OO)
techniques but falls short of being a fully OO development tool.
Microsoft Access was also the name of a communications program from Microsoft,
meant to compete with ProComm and other programs. This Microsoft Access proved a
failure and was dropped. Years later Microsoft reused the name for its database software.
FEATURES
One of the benefits of Access from a programmers perspective is its relative
compatibility with SQL – queries may be viewed and edited as SQL statements, and SQL
statements can be used directly in Macros and VBA Modules to manipulate Access tables.
Users may mix and use both VBA and “Macros” for programming forms and logic and offers
object-oriented possibilities.
14
MSDE (Microsoft SQL Server Desktop Engine) 2000, a mini-version of MS SQL
Server 2000, is included with the developer edition of Office 7 and may be used with Access
as an alternative to the Jet Database Engine.
Unlike a complete RDBMS, the Jet Engine lacks database triggers and stored
procedures. Starting in MS-Access 2000(Jet 4.0), there is a syntax that allows creating
queries with parameters, in a way that looks like creating stored procedures, but these
procedures are limited to one statement per procedure. Microsoft Access does allow forms to
contain code that is trigged as changes are made to the underlying table (as long as the
modifications are done only with that form), and it is common to use pass-through queries
and other techniques in Access to run stored procedures in RDBMS that support these.
In ADP files (supported in MS Access 2000 and later), the database-related features
are entirely different, because this type of file connects to a MSDE or Microsoft SQL Server,
instead of using the Jet Engine. Thus, it supports the creation of nearly all objects in the
underlying server (tables with constraints and triggers, views, stored procedures and UDF-s).
However, only forms, reports, macros and modules are stored in the ADP file (the other
objects are stored in the back-end database).
With windows the user can run programs, enter and move data around and performs
DOS tasks by simply using the mouse to point objects on the screen. Windows owes its name
to the fact it runs each program or each document in its own separate window. Further, the
user can have any number of Windows on the screen at time, each containing its own
program. It is possible to switch between windows easily.
Another advanced feature in windows is that it has clipboard facility. It lets the user to
copy data of different document types, make it easy to cut and paste information from one
application to another.
15
FEATURES OF WINDOWS 7
Microsoft windows 7 is more compatible and more powerful than any workstation
that you have used before.
- Easier to use
- Easier to manage
- More compatible and Powerful
EASIER TO USE
Windows 7 makes it easier to:
- Work with files
- Find information
- Personalize your computer environment
- Work on the web Work remotely
MORE POWERFUL
Windows 7 provides
- Industrial Strength reliability
- The highest level of security
- Powerful performance
DISTRIBUTED PROCESSING
Windows 7 allows the connectivity with variety of host environment through its
support of multiple transport protocol an client server facilities.
16
3. SYSTEM ANALYSIS
In this situation a method is required to allocate a suitable person for the correct job at
correct time and maintain the donor, program and applicant details, requisition of blood and
other organ transplantation information whereby functions within the application can only be
accessed by persons to whom permission has been granted.
17
3.2. PROPOSED SYSTEM
Maintaining different category wise security using the types like roles,
responsibilities, and the links with the above two to assign user roles.
Automatic mailing to the users with the administrative category users will the next
added advantage over all the systems present. Since they are all automated the
hacking possibility is totally reduced to considerable extend in our system.
Analysis will give as further implementation of the system more secured, and the
design of the future system can be modified as per the results of the analysis of the
system proposed.
Process can be assigned to the donor to identify the category level with configured
identity e7lains the development design involved behind the application.
System proposed in entirely new to the world with the web technology and
application wise security enhancement. Since in all the cases all the systems will take care of
the positive results from the users and they normally won’t care of the issues regarding the
failures, which only can prove the applications reliability and user interface, and mainly the
accessibility control. Our application will surely met that criteria and it can be included to any
module to support the same.
18
3.3. FEASIBILITY STUDY
Feasibility is the determination of whether or not a project is worth doing. the
processes is followed in making this determination is called a feasibility study is the test of
system proposal according to its work ability impact on the organization ability to meet users
needs, and effective use of resources the result feasibility is a formal proposal.
This simply reports – a formal document detailing the nature and scope of the
proposed solution. The main objective of the feasibility study is test the technical, social and
economic feasibility of developing a computer system. this is done by investigation the
existing system in the area under investigation and generating ideas about a new system.
On studying the feasibility of the system three major consideration are deal with, to
find whether the automation of the system feasible.
TECHNICAL FEASIBILITY
All the process of the enterprise is managed in manually. In manual system, the data
storage, data security is very tedious. And it is very difficult to secure and maintain for long
years without any damages or corruptions. Redundancy, misusing of data are the main
problems by using manual process.
Its also takes much of time to retrieve a particular information and some more man
powers are needed. Manage and maintain large amount of data by a single person is not
possible. So many problems raised like storage space, maintenance etc. Much of time will be
spent for to consolidate for a group of data, which was need by the user. Correction or
modification of data makes a way for malfunction.
ECONOMICAL FEASIBILITY
All the problems which are denoted in the existing systems are overcome. The data will
be secured with authentication by providing passwords. The retrieval of data is much faster
than the manual processing. The user can create their reports within a time. There is no data
redundancy, malfunction, data mismatching, timely execution, concurrent updating are the
advantages placed in this project.
19
4. SYSTEM DESIGN
The design of the system is essentially a blue print or a plan for a solution for the
system. At the first level the focus is made which modules are needed for the system and how
modules should be interconnected. This is called system design.
In the second level, the internal design of the modules and how the specification of
the module can be satisfied is decide upon. Thus design level is called detailed design. Since
the detailed design delineates the major characteristics of the system and also its efficiency. A
Design methodology is a systematic approach to create a design by application of a set of
techniques and guidelines.
ARCHITECTURAL DESIGN
20
PROCESS FLOW DIAGRAM
21
4.1. DATAFLOW DIAGRAM
Data Flow Diagram (DFD) is a directed graph in which the nodes specify processing
activities and the arcs specify data items transmitted between processing nodes. Data Flow
Diagrams are excellent mechanisms for communicating with customers during analysis. Data
Flow Diagram are quit valuable for establishing naming conventions and names of system
components such as subsystems, files and data link.
DFD is used to represent the functional relationship of input, process and output
values presented by system. DFD shows how information moves through the system and how
it is modified by series of transformation that are applied as data moves from input to output.
DFD may be used to represent a system at any level of abstraction.
A DFD also called context diagram represents entire system as a single module with
input to output data indicated by incoming and outgoing allows respectively. Additional
processes and information flow paths are represent as a DFD is partitioned to reveal more
detail represent the system with major modules, data flows and data stores, the other levels
will show each module in the top level DFD in a more detailed fashion.
LEVEL – 0
22
LEVEL - 1
23
4.2. INPUT DESIGN
Identification of the correct input and output for a system are the major parts of a
system analysis. During the System analysis the provider’s and seeker’s needs, the data
stores, the key system elements are identified. Based on this identification the input to be
provided to the system and the outputs that are to be generated and their formats are decided.
The Input Design is the kind that ties the information system into the World of its users.
Output refers to the results that are generated by the system. The design decision for handling
input specified how data are accepted for computer processing.
24
4.3. OUTPUT DESIGN
One of the most important features of an information system for users is the output it
produces. Output is the information delivered to the users through the information system.
Without quality output, the entire system may appear to the unnecessary that users will avoid
using it. Users generally merit the system solely by its output. Therefore an effective output
design is an important feature of design specifications.
25
4.4. DATABASE DESIGN
Database Name: MyDB
TableName:Information
FIELD NAME FIELD TYPE FIELD SIZE DESCRIPTION
TableName:Application
FIELD NAME FIELD TYPE FIELD SIZE DESCRIPTION
Appid Number Long integer Applicant id number
Appname Text 50 Applicant name
Fname Text 50 Applicant father name
Dob Text 50 Date of birth
Address Text 250 Address
City Text 50 City
Height Number Long integer Height
weight Number Long integer Weight
Phno Number Long integer Phone number
Email Text 50 Email id
Rcid Number Long integer Recommend id number
Rcname Text 50 Recommend name
Applyby Text 50 Apply by
Proof id type Text 50 Proof id type
Proof id no Number Long integer Proof id number
Photo Text 50 Photo
TableName:DonarsDetails
FIELD NAME FIELD TYPE FIELD SIZE DESCRIPTION
Did Number Long integer Donar id number
Dname Text 50 Donar name
Fname Text 50 Donar father name
Dob Text 50 Date of birth
Address Text 250 Address
City Text 50 City
Blood group Text 50 Blood group
Height Number Long integer Height
Weight Number Long integer Weight
Phno Number Long integer Phone number
Email Text 50 Email id
Photo Number Long integer Photo
Doj Text 50 Date of joining
Proof id type Text 50 Proof id type
26
Proof id no Number Long integer Proof id number
Last donated Text 50 Status
Status Text 250 Summary
Other transplanted Text 50 Other transplanted type
type
TableName:Requisition
FIELD NAME FIELD TYPE FIELD SIZE DESCRIPTION
Rid Number Long integer Requisition id
Rtype Text 50 Requisition type
Sumry Text 50 Summary
Redate Text 50 Requistion date
Applyname Text 50 Applicant name
Address Text 50 Address
City Text 50 City
Phno Number Long integer Phone number
Email id Text 50 Email id
TableName:BranchDetails
FIELD NAME FIELD TYPE FIELD SIZE DESCRIPTION
Bid Number Long integer Branch id number
TableName:Program
FIELD NAME FIELD TYPE FIELD SIZE DESCRIPTION
Pid Number Long integer Program id number
Pname Text 50 Program name
Date Text 50 Date
Time Number Long integer Time
Place Text 50 Place
City Text 50 City
Conducted by Text 50 Conducted by
27
5. SYSTEM IMPLEMENTATION
Implementation is the stage, which is crucial in the life cycle of the new system
designed. This project “Donor’s Chronicle System” was implemented on VB.NET 2010 as
Frontend. The main stage in the implementation is planning, training, system testing.
Implementation is converting a new or revised system into an operational one.
The proposed system is implemented by direct method in which a new a system will
be designed and implemented. The implementation plan consists of testing.
Developed system with a high capacity.
Detection and correction of errors.
Making necessary changes in the system.
Checking the report with that of the existing system
28
6. SYSTEM TESTING
The system “Donor’s Chronicle System” as a whole was deployed in the VB.NET
2010 and was tested. The system was found to be working perfect and an end user has been
asked to enter the data, and further the connected systems has been tested with the sample.
In the project, the login details of the user are being verified by various conditions.
All the conditions are satisfied, then after the user go to visit the system project.
This testing was carried out during the programming stage itself.
Performance Test
Stress Test
PERFORMANCE TESTING
It determines the amount of execution time spent in various parts of the unit, program
throughput, and response time and device utilization by the program unit. To recover the
project from the slow response time, try to avoid of apply the looping statement instead of the
control statements.
STRESS TESTING
Stress Test is those test designed to intentionally break the unit. A Great deal can be
learned about the strength and limitations of a program by examining the manner in which a
programmer in which a program unit breaks.
29
6.2. SYSTEM TESTING
System Testing involves two kinds of activities: Integration Testing and Acceptance
Testing. Strategies for integrating software components into a functioning product include the
bottom-up strategy, the top-down strategy and the sandwich strategy. Acceptance Testing
involves planning and execution of the functional tests, performance tests and the stress tests
to verify that the implemented system satisfies its requirements.
The System testing does not test the module wise, but the integration of each module
in the systems. System testing helps to find in discrepancies between the original objectives
of the system.
The inputs are well verified by different conditions at different stages. Suppose the
user may give wrong username or password, then the system will inform the wrong entry.
The ID will be automatically generated for to avoid the redundancy and duplication.
Here donor detail is the base of the project. The applicants and requisition detailed
report for the donation are maintained under the same category. They can order by the
requisition for a particular date and blood group.
30
7. CONCLUSION
The “Donor’s Chronicle System” has been developed for the present requirement of
volunteer blood donation and organ transplantation and it works satisfactorily under all
circumstances that may arise in the real environment. It caters to need of the volunteers
effectively and easy to handle.
The data generated with live data have proved to be information and also helpful in
making important decisions. This newly developed project consuming less processing time
because all the process are assumed to a single event and high productivity. The system is
designed to be highly flexible so that any future modifications and requirement can be easily
incorporated without much design complications.
31
8. BIBLIOGRAPHY
BOOK REFERENCE
o Essential .NET, James S.Miller, Tata McGraw Hill Publications, 2002 Second
Edition.
WEBSITE REFERENCE
. http://code.msdn.microsoft.com/GotDotNet.aspx
. http://www.devarticles.com/c/b/MSACCESS/
. http://www.vbdotnetheaven.com/
32
9. APPENDIX
33
34
35
36
37
38
39
40
41
42
43
44
45
(B) SAMPLE SOURCE CODE
47
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Button1.Click
Dim a, b, c, d, f, g, h, i, j, k, l, m, n, o, p, q, r, s, t
a = Val(TextBox1.Text)
b = TextBox2.Text
c = TextBox3.Text
d = CDate(DateTimePicker1.Text)
f = Label18.Text
t = TextBox4.Text
g = TextBox5.Text
h = Val(ComboBox3.Text)
i = Val(ComboBox4.Text)
j = Val(TextBox6.Text)
k = TextBox7.Text
l = Val(TextBox8.Text)
m = TextBox9.Text
n = ComboBox1.Text
o = CDate(DateTimePicker2.Text)
p = ComboBox2.Text
q = TextBox10.Text
r = TextBox11.Text
s = TextBox12.Text
con = New OleDb.OleDbConnection("provider=microsoft.Jet.OLEDB.4.0;Data
source=" & System.AppDomain.CurrentDomain.BaseDirectory & "MyDB.mdb;")
con.Open()
cmd = New OleDb.OleDbCommand("insert into Application values(" & a & ",'" & b &
"','" & c & "',#" & d & "#,'" & f & "','" & t & "','" & g & "'," & h & "," & i & ",'" & j & "','" &
k & "','" & l & "','" & m & "','" & n & "',#" & o & "#,'" & p & "','" & q & "','" & r & "','" & s
& "')", con)
cmd.ExecuteNonQuery()
MsgBox("Record Added Sucessfully")
con.Close()
End Sub
ComboBox4.BeginUpdate()
For i = 50 To 120
ComboBox4.Items.Add(i)
Next
ComboBox4.EndUpdate()
appid_inc()
End Sub
Sub appid_inc()
Dim x
con = New OleDb.OleDbConnection("provider=microsoft.Jet.OLEDB.4.0;Data
source=" & System.AppDomain.CurrentDomain.BaseDirectory & "MyDB.mdb;")
con.Open()
cmd = New OleDb.OleDbCommand("select max(appid) from Application", con)
x = cmd.ExecuteScalar
ComboBox3.Items.Add(i)
Next
ComboBox3.EndUpdate()
Did_inc()
End Sub
Sub Did_inc()
Dim x
con = New OleDb.OleDbConnection("provider=microsoft.Jet.OLEDB.4.0;Data
source=" & System.AppDomain.CurrentDomain.BaseDirectory & "MyDB.mdb;")
con.Open()
cmd = New OleDb.OleDbCommand("select max(DId) from Donars", con)
x = cmd.ExecuteScalar
TextBox1.Text = Val(x) + 1
49
con.Close()
End Sub
Private Sub RadioButton1_CheckedChanged(ByVal sender As System.Object, ByVal e As
System.EventArgs)
If RadioButton1.Checked Then
Label2.Text = "Male"
End If
End Sub
Sub appid_inc()
Dim x
con = New OleDb.OleDbConnection("provider=microsoft.Jet.OLEDB.4.0;Data
source=" & System.AppDomain.CurrentDomain.BaseDirectory & "MyDB.mdb;")
con.Open()
cmd = New OleDb.OleDbCommand("select max(appid) from Application", con)
x = cmd.ExecuteScalar
TextBox1.Text = Val(x) + 1
con.Close()
End Sub
54