You are on page 1of 132

INTRODUCTION

Computers have become a password today because they have established themselves in all work of life. It is the versatility of the human ability to reduce complex problems to a simple logically connected problem and then apply computer to solve them. Today computers are active in almost all the divisions of science and technology. They are put to use for all sorts of applications ranging form complex calculations in the to field of front-line printing research and

engineering

stimulation

down

teaching,

books

recreation games. The use of computer is increased with time as very complex problems are coming up every day. With new applications the computer can demonstrate never base for helping persons external capabilities and broaden his horizon of knowledge. Computers are affecting our lives in many ways almost everyday we here newest way in which a computer is being used for, it has become an important part of our times with all these rapid development taking place. Computer based designing enables same data to be processed in many ways according to their needs, there by allowing buyers to look at the performance of his dresses from different angles. In the world every one think in their own work on his duty. In the fashion world people think they must design their own dress. So the computer would help to design the dress and to see the designing 1 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

dress. I have developed a project called ‘Kalagram-Fashion Designing’. ‘Kalagram-Fashion Designing software is mainly for designing dress. It also deals with the ready made section of the Kalagram. The stock and purchase section is also computerized. This project is used to any of the user by giving slight changes. The project is arranged in a simple way. So a person with basic knowledge of computers can run the project. The project work entitled Kalagram fashion designing is aimed at computerized fashion design. Our proposed system is the

computerization of design and readymade section.

2 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

ABOUT THE ORGANIZATION
WEBZONE Computers is an organization engaged in offering quality services in software development and training. This is supplemented by its commitment to ensure that its client will be offered the best service and to their satisfaction. All these services are backed up a set of policies that promote a very professional and ethical work culture.

ABOUT THE PROJECT
Kalagram is an organization situated at Pala at Kottayam Dt. in Kerala State which mainly deals with the designing of fashion dress for the films and fashion shows. They had made a noticeable work in the film ‘Kasthuriman’. Kalagram has also a bulk number of young customers those need verity in their life. There are a lot of students for Kalagram who were interested in seeking the pulse of fashion world. So as the customers are very sensitive and have different ideas of their dress, it is needed to show a model of their dress. Currently that model is designed in paper and shown to the customers. It is a tedious process to draw the designs and modify them according to the suggestions. So the need for computerization emerges.

3 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

Speed and accuracy should be improved. integrity. Data validation. Stock and purchase of ready-made dress should be computerized. The new system was proposed with the following objectives. Facilities to provide all essential reports should be provided. and security should be maintained. Most of the design work of Kalagram should be computerized. 4 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Interactive and user friendly environment is to be provided.OBJECTIVE OF THE PROJECT The main objectives of the new system are to overcome the difficulties and disadvantages of the existing manual system. Customer should become more satisfied.

SOFTWARE SELECTION Relational Database Management System is used in the project. The three key components used in relational database design are entities. This makes the records unique. The Relational Database Management System (RDBMS) used is Oracle 8. Primary key is a rule. attributes and relationship. The data is stored in multiple tables and Oracle allows us to setup relationship between the tables to facilitate data retrieval. In Oracle the tables are related to common fields known as key fields. This common key field in the transaction table is called foreign key and its value depend on the primary key value of the master table. which is common. Oracle has a number of components out of which the most important component is the table object. This help in accessing data from more than one table. The two tables related and must be linked based on a field. 5 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . which ensures that unique data is entered for a field and the field is not left blank. The main table is referred to as the master table and the lower level table is the transaction table. The relationship may be defined at the time of table creation or at a later stage. It is used to store and manipulate large amounts of data. In order to manage the data we distribute the data in many tables.

thus path through the application code differs each time the program runs.TOOLS / PLATFORM VISUAL BASIC For creating powerful application for windows operating system. 6 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . It execute different code section in response to events. In traditional or procedural application itself controls which position the code execute and in that sequence in an event driven application the code does not follow a pre-determined path. by message from the system for other application the sequence of this events determine the sequence in which the code execute. Events can be triggered by user actions. This anything powerful that can language be allows professional by any to accomplish windows accomplished other programming language. functions and keywords and may of which relate directly to the windows GUI. Microsoft Visual Basic is very useful. The basic part refers to the BASIC language more programmers use than any other language in the history of computing VB has evolved from the original basic language and now contains several hundreds solution. VB provides a complete set of tools to simplify rapid application development.

Visual Basic is one of the RAD(Rapid Application Development) tools as it enables the programmer t develop application very easily and very quickly. Using this. features of other applications can be used for VB programme. stand alone applications  Using graphic methods effectively  Using OLE to make applications work together 7 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Visual Basic is a powerful programming language to develop sophisticated Windows programs very quickly. Develop an attribute user interface 2. Visual Basic OLE features help us to communicate with the other applications running under windows. Write the code Visual Basic helps in the following fields:  Building custom. Define properties 3. Visual basic application are very popular as front-end to many client server database systems like SQL Server. An active X can recognize the events and execute codes written by the user for different events. Visual Basic also has the ability to create active X controls. Oracle etc. Creating a Windows application using VB involves three steps: 1. It contains the same BASIC like language that has been popular over the years and it includes all the necessary extension required for produce windows programs.Visual Basic is a windows programming language that has been developed at Microsoft Corporation.

Oracle 8 This is Relational Database Management System (RDBMS). It is possible to view. divide your data into separate storage containers called tables. A database is a collection of data related to a particular subject or purpose. add and update the table data using online forms. The data is stored in multiple tables and Access allows us to setup relationships between the tables to facilitate data retrieval. It is used to store and manipulate large amounts of data. Tools of Oracle  SQL  PL/SQL  Forms 8 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Within the database file. Programming Data Base  Incorporating images and videos  Creating and distributing Active X controls  Adding Multimedia elements to application  Using VB Script and Active X documents to activate WebPages  Creating Internet controls using VB applications. find a retrieve the data you want using quires. and analyze or print data in a specific layout using reports. An RDBMS is a computer program which provides retrieve data in a manner consistent with a defined model called the Relational Model. RDBMS stands for Relational Database Management System.

 Reports 9 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

During analysis. and transaction handled by the present system. IDENTIFICATION OF THE NEED The first step in the system development life cycle is the identification of the need.SYSTEM ANALYSIS System analysis is the process of totally understanding the current system by gathering and interpreting facts. One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate system should consider other related systems. the computerized system. 10 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . and it is also time consuming from the view point of the customers. The requirement to improve the system is found. The user or the analyst may identify the need for a candidate system or for enhancement in the existing system. diagnosing problems and using the facts to improve the current system. it is a difficult build the design of the dress. defined. In Kalagram a study amoung the staff and customers are made. Then it is found that in the current system. decision points. Not until the problem has been identified. improve or enhance an existing system. This is a users request to change. data are collected on the available files. User need identification and analysis are concerned with what the ‘user need’ rather than what she/he wants. and evaluated should the analyst think about solutions and whether the problem is worth solving.

PRELIMINARY INVESTIGATION The preliminary investigation/initial investigation is one way of handling the identification of the need. the activities. and costs. 11 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . the existing system. or build a new one. fact-finding and analysis and presentation of results. BACKGROUND ANALYSIS The project is initialized. its approach to customers etc are analyzed. Once the request is approved the following activities are carried out: background investigation. identify the need for change and authorize the initial investigation. In the current system the user request. The objectives is to determine whether the request is valid and feasible before a recommendation is reached to do nothing. inputs. The structure of the organization. It may undergo several modifications before it becomes a written commitment. then learned about the setting. on-site observation and interviews. and the physical processes related to the revised system. improved or modify the existing system. FACT FINDING In the fact finding stage collect data on the existing system’s outputs. the owners.called project proposal. In this system data is collected by the technique of review of written documents.

As an observer. which helps in determining the present system requirements. While making observations. and motivations. and to listen with interest when information is passed on. working of the system and activites going on in the organization. INTERVIEWS The on-site observation is less effective for learning about the people’s perceptions.REVIEW OF WRITTEN DOCUMENTS All documentation on data carriers (forms. The onsite observation at Kalagram gives an idea of flow of information. manuals.) in Kalagram is organized and evaluated. the analyst is more likely to listen than talk. the analyst follows a set of rules. The forms and records which are already stored in the office is evaluated and to analyze how useful these forms and records to the user. In on-site observation the analyst’s role is that of an information seeker. records. feelings. reports. etc. The interviews are conducted with the customers. ON-SITE OBSERVATIONS At the initial stages of system study the main technique used was On-Site Observation where the working of the system and various transactions were observed and noted all the relevant information. the interviewer and the persons interviewed meet face to face. Then determine what changes need to be made. Included in procedures manuals is the requirement of the system. there is an opportunity for greater 12 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Now controlling of the stock and calculation of the expenses are going on manually. When the customer request for a change then it has to be made in a new sheet. PRESENT SYSTEM In Kalagram. When a change in the price of the item is required. it is difficult to change it. In the readymade section the whole work going on in a manual way. The measurements of the material is filed. The bill is also provided for the customer. the information obtained through a questionnaire is limited to the written responses of the subjects to predefined questions. The details of each material is stored in file and the cost of the item is displayed on the item. In Kalagram interview has made with the staff and the management of the office to find their requirements. 13 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . In contrast. A list of requirements based on the study undertaken was prepared and the corresponding prototype was presented to the clients for endorsement. the present system is a manual one. Here the designs are made on paper for customer acceptance. The interviewer is also in a natural position to observe the subject and the situation to which they are responding.flexibility in eliciting information.

ability to meet user needs. The technical need of the system may vary considerably but might include • • • • Facility to produce output in a given time. how these unit is 14 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Facility to communicate data to a distant location. Ability to process a certain at a particular speed. TECHNICAL FEASIBILITY Technical feasibility is concerned with specifying equipment and software that will successfully satisfy the user requirement. A feasibility study is a test of a system proposal according to its workability. impact on the organization. how many workstations are required. A feasibility study focuses on identifying and evaluating alternative candidate system with a recommendation of the best system for the job. The configuration should give the complete picture of the system requirements. operational and economical. and effective use of resources.FEASIBILITY STUDY The feasibility study is a system proposal according to its workability. Response times under certain conditions. impact on the organization. configuration of the system is given more importance than the actual make of hardware. The objective of a feasibility study is not to solve the problem but to acquire a sense of its scope. In examining technical feasibility. Three key considerations are involved in the feasibility analysis: technical. ability to meet user needs and efficient use of resources.

The cost to conduct a full systems investigation 15 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . the requirements are tested and concluded that they are technically feasible. it is desirable that two or three different configurations will be pursued that satisfy the key technical requirements but which represent different levels of ambition and cost. ECONOMIC FEASIBILITY Economic feasibility is the most frequently used technique for evaluating the effectiveness of the proposed system most commonly known as cost/benefit analysis. a decision is taken to design and implement the system. At the feasibility stage. The procedure is to determine the benefits and savings that are expected from a proposed system and compare them with costs.interconnected so that they could operate and communicate smoothly. it is difficult for the system to be used. This is an ongoing effort that improves in accuracy at each phase of system lifecycle. In this project. this is the most difficult to determine. both hardware and software requirements are needed. Out of all types of feasibility. Otherwise further justification or alternative in the proposed system will have to be made if it is to have a chance of being approved. Without the hardware and software. If benefits outweigh costs. The analysis raise financial and economic questions during the preliminary investigation to estimate the following: 1. In relation to the current system.

In relation to the current system. 4. The points considered are: • • What changes will be brought with the system.2. a proposal for the specific project must pass all these tests. must be provided. otherwise it is not considered as a feasible project. there is a chance to lost these information. the system provides a variety of facilities. OPERATIONAL FEASIBILITY Proposed projects are beneficial only if they can be turned into information systems that will meet the operating requirements of the organization. When the information of customers are stored in paper. organizational and political aspects. For storing all these information there is a large space. This test of feasibility asks if the system will work when it is developed and installed. 3. The cost of hardware and software for the Kalagram automation system being considered. The cost if nothing changes To be judged feasible. The benefits in the form of reduced costs or fewer costly errors. but in our system the information’s are stored in databases so there is no such space requirement is needed. To make designs in paper is a time consuming one. Operational feasibility is mainly related to human. The cost required to install and use the system is negligible compared to the expected benefits. What organizational structures are disturbed? 16 INDIRA GANDHI NATIONAL OPEN UNIVERSITY to be .

the management wishes to computerize the procedure to achieve better accuracy and speedy processing.• What new skills will be required? do the existing staff member have these skills. Generally projects will not be rejected because of operational infeasibility but such considerations are likely to critically affect the nature a scope of the eventual recommendations. According to the present system. can they be created in due course of time. The staff-members can be given training how to operate the system and can be provided with responses which will indicate what is actually happening with the system. The measurements are also stored in 17 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . he/she can proceed using the keyboard. if not. In the proposed system design can be made easily with the help of computer. PROPOSED SYSTEM To overcome the limitations of the present system. Also if he/she has difficulty with using the interface or with the mouse. The proposed system is a computerized system. The system needs the platform as stated. This feasibility study is carried by a small group of people who are familiar with the information system techniques who understand the parts of business that are relevant to the project and are skilled in project analysis and design purposes. the system is user friendly and easy to operate as concerned with the users of the system.

In the readymade section the item information is stored and easy retrieval should be provided. ADVANTAGES OF PROPOSED SYSTEM Data storage: The data can be stored in large volume. Turn around time: Turn around time for a manual process taken a long time Easy operation: In the new system. data can be retrieved at any time. 18 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .computer. The information about stock and periodic sales are also proposed in the new system. The data cannot be destroyed unless the user or the programmer needs. Data retrieval: Data can be retrieved from the tables very easily and in the high speed. The computerized system is totally menu driven and user-friendly. These data should be kept safely in the database.

There are different process models for software engineering is discovered. A process model for software engineering is chosen based on the nature of the project and application. design. Each of the models has been characterized in a way that assists in the control and coordination o f a real software project. The linear sequential model encompasses the following activities. This strategy is often referred to as a process model or a software engineering paradigm. testing and support. spiral model. concurrent development model etc. incremental model. coding. System /information engineering and modeling: Because software is always a part of a larger system work begins by establishing requirements to software. In this project ‘Linear sequential model’ is used for the development of the system.SOFTWARE ENGINEERING PARADIGM APPLIED To solve the actual problem in an industry setting a software engineer or a team of engineer must incorporate a development strategy that encompasses the process. Each represents an attempt to bring order to an inherently chaotic activity. and the controls and deliverables that are required. sequential approach to software development that begins at the system level and progress through analysis. This system view is essential 19 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . RAD model. methods and tools. Linear sequential model suggests a systematic. which are prototyping model. the methods and tools to be used.

interface representation. Information gathering encompasses requirements gathering at the strategic business level and at the business area level. Testing: The testing process focuses on the logical internal of the software.when software must interact with other elements such as hardware. understand the information domain for the software as well as required function. The design process is also documented and becomes part of the software configuration. The code generation step performs this task. In this stage. and procedural detail. ensuring that all statements have been tested. System engineering and analysis encompasses requirements gathering at the system level with a small amount of toplevel design and analysis. Requirements for both the system and the software are documented and reviewed with the customer. behavior. and on the functional externals that is. software architecture. and interface. Design: Software design is focuses on four distinct attributed of a program: data structure. The design stage translates requirements in to a representation of the software that can be assessed for quality before coding begins. conducted tests to uncover errors and 20 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Code generation : The design must be translated in to a machine readable form. Software requirement analysis: The requirements gathering process is intensified and focused specifically on software. people and databases. performance.

ensure that defined input will produce actual results that agree with required results. Support : Software will undergo change after it is delivered to the customer. 21 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . or because the customer requires functional or performance enhancements. Change will occur because the software must be adapted to accommodate changes in its external environments.

a detailed functional description. a representation of system behavior. and other information pertinent to requirements. an indication of performance requirements and design constraints.SOFTWARE AND HARDWARE REQUIREMENT SPECIFICATION The function and performance allocated to software as part of system engineering are refined by establishing a complete information description. appropriate validation criteria.44MB 14” 52X SOFTWARE SUPPORT: Operating system: front end back end : : WINDOWS 98 Visual Basic 6. HARDWARE SUPPORT: Processor Ram capacity Hard disk Floppy Monitor CD Drive : : : : : : Celeron 128MB 20GB 1.0 Oracle 8i 22 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

their maintenance and report generation.SYSTEM DESIGN System design involves translating information requirements and conceptual design into technical specification and general flow of processing. The logical design specifies the user needs at a level of detail that virtually determines the information flow in to and out of the system and the required data resources. a new system is proposed. After the user requirements are identified. related information is gathered to verify the problem and after evaluating the existing system. 23 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . System design goes through two phases of development: logical and physical design. The proposed system consists of various tables. A dataflow diagram shows the logical flow of the system and defines the boundaries of the system.

Context level : 0 level data flow diagram User Kalagra m Fashion Design Manager DFD level 1 Report Design Login Data Store Ready made 24 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .DATA FLOW DIAGRAMS Data Flow Diagram representation is one of the tools that are used in structured analysis. It has the purpose of clarifying system requirements and identifying major transformations that will become programs in System design. A Data Flow Diagram or DFD is also known as a bubble chart. It is the major starting point in the design phase that functionally decomposes the requirements specifications down to the lowest level of detail.

25 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

which is meaningful. During the process of normalization. 26 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . The major aim of the process of normalization is to reduce data redundancy and prevent losing data integrity. The overall objective in the process of table design has been to treat data as an organizational resource and as an integrated whole. Each of these columns has a data type associated with it. Poor normalization can cause problems related to storage and retrieval of data. The organization of data in a database aims to achieve three major objectives. The data stored in the tables must be organized in some manner. Data integrity has to be converted at all levels. which are given below. Normalizing also helps in simplifying the structure of tables. This data type is the roadmap that Oracle follows so it knows how to correctly manipulate the contents. Redundancy refers to unwanted and unnecessary repetition of data.. • • • Data Integration Data Integrity Data Independence Several degrees of normalization have to be applied during the process of table design. A table is a database object that that holds our data.TABLE DESIGN The most important aspect of building an application is the design of tables or the database schema. dependencies can be identified which cause serious problems during deletion and updation. It is made up of many columns.

2 5. TABLES Fashion Name ID NAME ADDRESS EMAIL ODATE DUEDATE ITEM LENGTH SHOULDER COLLAR SLEEVELENGTH SLEEVEBW CHESTLOOSE POCKETDOWN POCKETSIZE BOTTUMSTYLE LOOPS STITCHTYPE STICHING INNERPOCKET POCKETS COLLARTYPE POCKETTYPE BUTTONSTYLE POCKETBUTTON HANDPOCKET Orderchuri 27 INDIRA GANDHI NATIONAL OPEN UNIVERSITY Type NUMBER VARCHAR2 VARCHAR2 VARCHAR2 DATE DATE VARCHAR2 NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 Size 3 20 30 15 20 10.2 5.2 5.2 5. Each table has been designed with a perfect vision.2 5. The entire package depends on how the data are maintained in the system.2 5.2 30 20 20 20 20 20 30 30 30 30 30 .The theme behind a database is to handle information as an integrated whole thus making access to information easy. quick.2 5. Minor tables have been created which though takes much space facilitates the process of querying fast and accurate. inexpensive and flexible for users.

2 20.2 20.2 30 30 30 30 28 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Name ID NAME ADDRESS EMAIL ODATE DUEDATE ITEM LENGTH SHOULDER NWIDE NDFRONT NDBACK CHEST SLEEVLENGTH SLEEVBOTTAM FLEETLENGTH WAIST NECKSTYLE SLITSTYLE HANDSTYLE BOTTAMSTYLE Type NUMBER VARCHAR2 VARCHAR2 VARCHAR2 DATE DATE VARCHAR2 NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 Size 3 20 30 15 20 10.2 20.2 20.2 20.2 20.2 20.2 20.2 20.

2) NUMBER NUMBER NUMBER NUMBER NUMBER NUMBER VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 Size 3 20 30 15 10.2 10.2 10.2 30 30 30 30 29 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .2 10.2 10.2 Type NUMBER VARCHAR2 VARCHAR2 VARCHAR2 DATE DATE VARCHAR2(20) NUMBER(10.Orderpant Name ID NAME ADDRESS EMAIL ODATE DUEDATE ITEM LENGTH BOTTUMROUND KNEEDOWN KNEELOOSE THYLOOSE WAIST CROTCHDEPTH PANTTYPE FRONTPOCKET BACKPOCKET BACKPOCKETSTYLE Price Name ITEM PRICE Type VARCHAR2 NUMBER Size 40 10.2 10.

2 Report Name TEXT1 TEXT2 TEXT3 TEXT4 TEXT5 TEXT6 TEXT7 TEXT8 Type VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 Size 20 20 20 20 20 20 20 20 Reportchuri Name TEXT1 TEXT2 TEXT3 TEXT4 TEXT5 TEXT6 TEXT7 TEXT8 TEXT9 TEXT10 TEXT11 Type VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 30 Size 20 20 20 20 20 20 20 20 20 20 20 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Purchase Name ITNO CNAME ITNAME ITSIZE QUANTITY PRICE ready Name SLNO ITEM PRICE Type NUMBER VARCHAR2 VARCHAR2 Size 20 30 30 Type NUMBER VARCHAR2 VARCHAR2 NUMBER NUMBER NUMBER Size 6 20 20 3 5 6.

TEXT12 TEXT13 TEXT14 TEXT15 TEXT16 TEXT17 TEXT18 TEXT19 TEXT20 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 20 20 20 20 20 20 20 20 20 31 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Reportpant Name TEXT1 TEXT2 TEXT3 TEXT4 TEXT5 TEXT6 TEXT7 TEXT8 TEXT9 TEXT10 TEXT11 TEXT12 TEXT13 TEXT14 TEXT15 TEXT16 TEXT17 Type VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 Size 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 32 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Reportshirt Name TEXT1 TEXT2 TEXT3 TEXT4 TEXT5 TEXT6 TEXT7 TEXT8 TEXT9 TEXT10 Sale Name BNO PDATE ITNAME AMOUNT CNAME Type VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 Type NUMBER DATE VARCHAR2 NUMBER VARCHAR2 Size 20 20 20 20 20 20 20 20 20 20 Size 6 20 6.2 20 33 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

tailorshirtreport Name TEXT1 TEXT2 TEXT3 TEXT4 TEXT5 TEXT6 TEXT7 TEXT8 TEXT9 TEXT10 TEXT11 TEXT12 TEXT13 TEXT14 TEXT15 TEXT16 TEXT17 TEXT18 TEXT19 TEXT20 Type VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 Size 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 34 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

However it suffers from major problems. This will lead to update difficulties . Steps in normalization 1. Data are grouped in the simplest way possible so that later changes can be made with a minimum of impact on the data structure. Isolate repeating groups from an entity because they are easier to process separate from the rest of an entity. we 35 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . the repeated columns can be isolated from the table. Nonkey attributes that do not meet this condition are split in to simpler entities. When too many attributes are grouped together to form entities. To overcome these difficulties.Secondly no attributes can serve as a primary key. Such a table is said to be in first normal form(1NF). Firstly it contains redundant information. 2. The second normalization (2NF) makes sure that each non key attribute depends on a key attribute or concatenated key. The second normalization offers several benefits. try to simplify the relation further. To normalize the table by removing the repeating columns. If an item changes. After isolation. some attributes are found to be entities themselves. Further normalization of these entities in to attributes linked by common data elements to form relationships improves the effectiveness of the DBMS.NORMALIZATION Data structuring is refined through a process called normalization.

If an item is deleted. 36 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . From the second normalization. it will not affect any other file. 4. The next step is to again simplify the table by decomposition. A normalized database must serve the application needs of the organization. 3. The table is decomposed until a no loss decomposition is possible. try to find further room for improvement.need to change only the item file. It has to be accepted that it is not possible to eliminate all redundancies using normalization techniques. because it cannot be assumed that all decompositions will be non-loss. With the third normalization (3NF) no attribute of the table should be transitively functionally dependent on the primary key. In fourth normal form(4NF) the table doesn’t contain any multi-valued dependencies. Normalization simplifies the data structure and make it easy to use and modify. In this project the tables are in fourth normal form. This normalization simplifies relationships and provides logical links between files without losing information. So that we can store any information independent of the other attributes in the table.

Intelligent output design will improve the systems relationship with the user and help much in decision-making. data is accepted for computer processing and input to the system is done through mapping via some map support or links. It defines the interface between user and system.INPUT/OUTPUT DESIGN I/O design forms one of the major aspects of any system design. Inaccurate input data is the most common cause of errors in data processing. The collection of input data is the most expensive part of the system in terms of the equipment used and the number of people involved. The input screens need to be designed very carefully and logically. INPUT DESIGN Input design converts user-oriented inputs to computer-based format. 37 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Carefully designed inputs and outputs define how effective the system is. It requires much careful attention towards the user side. proper validation checks are done and messages will be generated by the system if incorrect data has been entered. In input design. OUTPUT DESIGN Outputs are the most important and direct source of information to the customer and to the management. A set of menus is provided which help for better application navigation. While entering data in the input forms.

Outputs can be meant for users as well as management. Following are the input and output forms in the present system Front Screen MDI Form 38 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Outputs are also used to provide a permanent hard copy of the results for later uses.

Shirt Pant 39 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Churidar Shirt measures 40 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Shirt Measures Purchase 41 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Sales Sales Report 42 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Stock Details Tailors Report 43 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

"tom" End Sub Module3 Calling Design Public pcode As New spocket ' used for class module Public ColCode As Integer 'used collar Public Bcode As Integer Public PButton As Boolean Public PocketN As Integer 'used pocket Public ordpantf As Integer 'used pant Public ordpantb As Integer Public ordl As Boolean Public OrdPFront As Integer 'for ordanary pant front pockat pattern Public OrdPBack As Integer 'for ordanary pant Back pockat pattern Public OrdPStyle As Boolean 'for ordanary pant Back pockat Style Public BootPFront As Integer 'for Bootcut pant front pockat pattern Public BootPBack As Integer 'for Bootcut pant Back pockat pattern Public BootPStyle As Boolean 'for Bootcut pant Back pockat Style Public FlatPFront As Integer 'for Flat pant front pockat pattern Public FlatPBack As Integer 'for Flat pant Back pockat pattern Public FlatPStyle As Boolean 'for Flat pant Back pockat Style Public CarPFront As Integer 'for Car pant front pockat pattern Public CarPBack As Integer 'for Car pant Back pockat pattern 44 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . "tom".CODING Module1 Connection Public cn As New ADODB.connection Public Sub connection() cn.Open "tom".

Hide Else MsgBox "Invalid Password. try again!".Public CarPStyle As Boolean 'for Car pant Back pockat Style Public ColChuri As Integer 'for colchur Public SlChuri As Integer 'for slit Public HaChuri As Integer 'for hand Class module Public HPocket As Boolean Public HandR As Boolean Public HandL As Boolean Public LPocket As Boolean Public RPocket As Boolean Public PCover As Integer Form Login Option Explicit Public LoginSucceeded As Boolean Private Sub cmdCancel_Click() LoginSucceeded = False End Me.SetFocus SendKeys "{Home}+{End}" End If End Sub MDI Form Private Sub Churi_Click() 45 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . "Login" txtPassword.Show Me.Hide End Sub Private Sub cmdOK_Click() If txtPassword = "Tom" And txtUserName = "Tom" Then LoginSucceeded = True MDIForm1. .

Form4.Show End Sub Private Sub mnrep_Click() Reportf.Show End If End Sub Private Sub Gen_Click() Gent.Show End Sub Private Sub churi1_Click() Form2. vbYesNo.Show End Sub Private Sub lady_Click() churidar.Show End Sub Private Sub mnuabout_Click() frmAbout.Show End Sub Private Sub mnstock_Click() Dstock.Show End Sub Private Sub ex_Click() t = MsgBox("Are You Want To Exit".Show 46 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Show End Sub Private Sub MDIForm_Load() connection End Sub Private Sub mnpur_Click() Pur. "Kalagram") If t = vbYes Then End Else MDIForm1.

5) = Text4.End Sub Private Sub mnugents_Click() Form5.TextMatrix(r.Text .Text = "" Text3.Show End Sub Private Sub mnukids_Click() Kids.TextMatrix(r.Text . 3) = Text1.Show End Sub Private Sub pant_Click() Orderpant. 4) = Text3.TextMatrix(r.Text . 0) = Text10.Text .Show End Sub Sale Form Dim r As Integer Private Sub Command2_Click() With Flex .Text = "" 47 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Show End Sub Private Sub tshirt_Click() orderr.Text = "" Text2.Text r=r+1 Text1. 1) = Text7.Show End Sub Private Sub shirt_Click() DETAIL.Show End Sub Private Sub tpant_Click() Order.TextMatrix(r.TextMatrix(r.TextMatrix(r. 2) = Text6.Text .

Text DataReport1.Execute "COMMIT" Dim Quantity As Integer Dim rsa As New ADODB.Text & " . 5)) & ".Itno from purchase where Itno ='" & Trim(UCase(. cn." & Val(.TextMatrix(a.'" & .Close Next End With DataReport1.1 sql = " insert into sale " & _ "(BNo . Itname .Open str.TextMatrix(a.' " & . 4)) sql = "Update purchase set QUANTITY=" & Quantity & " where Itno ='" & Trim(UCase(. 0))) & "'" rsa. Pdate . Cname)values " & _ "(" & Text8. adOpenStatic Quantity = rsa("QUANTITY") Quantity = Quantity .Execute sql str = "Select quantity. 1) & " '. Amount .TextMatrix(a.Controls("Label10").Val(.Text = "" List1.TextMatrix(a.Sections("section5").Text4.Execute sql rsa.Recordset Dim sql As String Dim str As String With Flex For a = 1 To r .SetFocus End With End Sub Private Sub Command3_Click() cn. "DD-MMMM-YYYY") & " '.Show 48 INDIRA GANDHI NATIONAL OPEN UNIVERSITY = .TextMatrix(a.Caption Text1.TextMatrix(a. 2) & "')" cn. ' " & Format(Date.Execute "DELETE fROM REPORT" cn. 0))) & "'" cn.

Text = Date End Sub Public Sub loaditem() Dim RS As New ADODB.MoveNext Wend End Sub Private Sub List1_KeyPress(KeyAscii As Integer) Dim RS As New ADODB. adOpenStatic Text1. adOpenStatic While Not RS.Recordset Dim sql As String If KeyAscii = 13 Then sql = "select QUANTITY.Text = RS("Cname") 49 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text)) & " " RS.End Sub Private Sub Command4_Click() Unload Me End Sub Private Sub Form_Activate() Billno End Sub Private Sub Form_Load() flexload loaditem r=1 Text9.Cname from Purchase where Itno= " & Trim(UCase(List1.Text = RS("QUANTITY") Text6.AddItem RS(0) RS. cn.Text = RS("PRICE") Text2.EOF List1.Open sql.Open sql.Itname.Recordset Dim sql As String sql = "select Itno from purchase" RS.PRICE. cn.

TextMatrix(0. 0) = "Item No" .ColWidth(5) = 1000 .Text) Text5.ColWidth(3) = 1050 .Text = RS("Itname") Text2.SetFocus End If End Sub Private Sub Text3_KeyPress(KeyAscii As Integer) If KeyAscii = 13 And Val(Text3.Text) Then Text4.TextMatrix(0.Text) Command2.SetFocus Else MsgBox "Quantity More Than Stock" End If End If End Sub Public Sub flexload() With Flex .Text = Val(Text1.Text RS. 1) = "Item Name" .Text = List1.TextMatrix(0.ColWidth(4) = 1000 . 4) = "Quantity" .Text7.Text) >= Val(Text3.ColWidth(2) = 1050 .ColWidth(0) = 2000 .Text) + Val(Text4.Clear . 3) = "Rate" .Text) > 0 Then If Val(Text2.ColWidth(1) = 1050 . 5) = "Amount" 50 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text = Val(Text5.Text = RS("QUANTITY") Text10.Text) * Val(Text3.Close Text3.TextMatrix(0.TextMatrix(0.TextMatrix(0. 2) = "Company" .

(vbOKOnly). "Kalagram" Text3. "Kalagram" Text3. (vbOKOnly).Open sql.Text)) = 0 Then MsgBox "Enter Company name".Close End Function Purchase Private Sub Command1_Click() If Len(Trim(Text2.Recordset Dim sql Dim a As Integer sql = "select max(Bno) from Sale" RS. cn. "Kalagram" Text4. (vbOKOnly).Text = a RS.SetFocus ElseIf IsNumeric(Text4. (vbOKOnly).End With End Sub Public Function Billno() Dim RS As New ADODB.SetFocus ElseIf Len(Trim(Text3.Text)) = 0 Then MsgBox "Enter Price". "Kalagram" Text4.SetFocus ElseIf IsNumeric(Text3. "Kalagram" Text2.Text)) = 0 Then MsgBox "Enter Quantity".Text = "" Text4.Text = "" Text3.SetFocus Else Dim sql 51 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .SetFocus ElseIf Len(Trim(Text4. (vbOKOnly).Text) = False Then MsgBox "Price should be a number". adOpenStatic a = RS(0) + 1 Text8.Text) = False Then MsgBox "Quantity should be a number".

Text = "" Text3.' " & .Text & " .Text & " '.Text = "Select the size" End Sub Private Sub Command3_Click() Unload Me End Sub Private Sub Form_Activate() Dim RS As New ADODB.Text) & " '.Open sql.Text = "" Combo1.Close End Sub Stock Dim r As Integer Private Sub Command1_Click() Unload Me End Sub 52 INDIRA GANDHI NATIONAL OPEN UNIVERSITY Text1.sql = "Insert " Into & Purchase(Itno.Execute (sql) MsgBox "Data Entered". "Kalagram" End If End Sub Private Sub Command2_Click() Text2.' " & Trim(Text2.Itsize.Text & " )" cn.Itname. cn. adOpenStatic a = RS(0) + 1 Text1.Text = a RS." & Text4. (vbOKOnly).Recordset Dim sql Dim a As Integer sql = "select max(Itno) from Purchase" RS.Text & " ' .Text = "Select an Item" Combo2.price)values( Combo2.Text & " .Text = "" Text4. " & Text3.' " & Combo1.CName.Quantity.

TextMatrix(a.Private Sub Command2_Click() cn.TextMatrix(a.Itsize.TextMatrix(a.Open sql. " & _ " '" & .TextMatrix(a. cn. 2) & "'.Execute sql Next DataReport3. 6) & "')" cn.'" & .ColWidth(2) = 2000 Grid2." & _ "'" & .Quantity.text2.Show End With End Sub Private Sub Form_Activate() Grid2.ColWidth(1) = 2000 Grid2.'" & . 0) & "'.ColWidth(5) = 1000 Dim RS As New ADODB.TextMatrix(a.text3.1 sql = "insert into report(text1.text5.ColWidth(4) = 1000 Grid2. 3) & "'.text7)values " & _ " ('" & .'" & .EOF 53 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . adOpenStatic r=1 While Not RS.ColWidth(3) = 1000 Grid2.text4.TextMatrix(a.TextMatrix(a.Execute "delete from report" cn.Itname.ColWidth(0) = 1000 Grid2.Price FROM Purchase" RS. 1) & "'.'" & . 4) & "'.text6.Execute "commit" Dim sql As String With Grid2 rowcount For a = 1 To r .Recordset Dim sql As String sql = "SELECT Itno. 5) & "'.CName.

5) & " ')" cn.TextMatrix(a. 4) = IIf(IsNull(RS(4)).Execute "commit" Dim a As Integer With Grid rowcount For a = 1 To c sql = "Insert into Report (text1. "".TextMatrix(a.Show End Sub 54 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .'" & .TextMatrix(r.text2.TextMatrix(r. "". "".Close End Sub Periodic Report Form Dim c As Integer Private Sub Command1_Click() Display End Sub Private Sub Command2_Click() cn.TextMatrix(a.Execute sql Next End With DataReport2.TextMatrix(r.Grid2. "". RS(5)) RS.TextMatrix(a.TextMatrix(a. RS(2)) Grid2.text4. RS(4)) Grid2. 3) = IIf(IsNull(RS(3)).text3. 5) = IIf(IsNull(RS(5)). 0) = IIf(IsNull(RS(0)). "".TextMatrix(r.text5) " & _ " values ( '" & .MoveNext Grid2. 2) = IIf(IsNull(RS(2)).'" & . 1) = IIf(IsNull(RS(1)). 2) & " '" & _ " .'" & . 3) & "'.TextMatrix(r.TextMatrix(r. "". RS(3)) Grid2.Execute "delete from report" cn.'" & . 1) & "'. RS(1)) Grid2.AddItem "" r=r+1 Wend RS. RS(0)) Grid2. 4) & " '" & _ ".

Rows > r + 3 Then Grid. adOpenStatic If RS. 1) = IIf(IsNull(RS(0)). "". RS(2)) Grid. 4) = IIf(IsNull(RS(3)). (vbOKOnly). RS(0)) Grid. 5) = IIf(IsNull(RS(4)). "".MoveNext r=r+1 If Grid.AddItem "" Wend Else MsgBox "No Transactions In This Period". RS(3)) Grid. RS(1)) Grid.ColWidth(0) = 0 Grid.RecordCount > 0 Then While Not RS. "".Enabled = True End Sub Private Sub Form_Load() Grid. 3) = IIf(IsNull(RS(2)).Private Sub Command3_Click() Unload Me End Sub Public Sub Display() Dim RS As New ADODB.EOF Grid. "dd-mmm-yyyy") & "'" INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Open sql.Recordset Dim r As Integer r=1 Dim sql As String sql = "Select * from sale where pdate & "' between And '" '" & & Format(DTPicker1. "". RS(4)) RS. "".TextMatrix(r. "".TextMatrix(r. "KALAGRAM" End If Command2. 2) = IIf(IsNull(RS(1)).ColWidth(1) = 1000 Grid.TextMatrix(r. sql RS.Value.TextMatrix(r.TextMatrix(r.ColWidth(2) = 1500 55 "dd-mmm-yyyy") Format(DTPicker2. 'InputBox "". cn.Value.

TextMatrix(0. 1) = "" Then c=c+1 End If Next End With End Sub Ladies Private Sub Command1_Click() Unload Me End Sub Private Sub Command2_Click() If Len(Trim(Text24.Text)) = 0 Then MsgBox ("Enter ID") Text24.TextMatrix(0. 2) = "DATE" Grid. 1) = "Item No" Grid.Grid. 4) = "AMOUNT" Grid.Text = "" Text24.SetFocus ElseIf IsNumeric(Text24.Rows .TextMatrix(0.Text) = False Then MsgBox ("ID should be a number") Text24.TextMatrix(0. 5) = "CNAME" End Sub Public Sub rowcount() With Grid For a = 1 To .SetFocus 56 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .TextMatrix(0.2 If Not .SetFocus ElseIf Len(Trim(Text1.TextMatrix(a.ColWidth(3) = 2400 Grid.ColWidth(4) = 1000 Grid. 3) = "ITNAME" Grid.Text)) = 0 Then MsgBox ("Enter Name") Text1.ColWidth(5) = 2500 Grid.

SetFocus ElseIf IsNumeric(Text7.SetFocus ElseIf Text6.Text) = False Then Text8.Text = "" MsgBox ("Length must be a Number") Text5.Text = "" MsgBox ("Neck Wide must be a Number") Text7.Text = "" MsgBox ("Neck Depth Front must be a Number") 57 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text) = False Then Text5.SetFocus ElseIf Text7.Text = "" Then MsgBox ("Enter Email-ID") Text3.SetFocus ElseIf IsNumeric(Text8.Text = "" Then MsgBox ("Enter Address") Text2.SetFocus ElseIf Text5.ElseIf Text2.Text) = False Then Text6.SetFocus ElseIf IsNumeric(Text5.Text = "" Then MsgBox ("Enter Neck Depth Front") Text8.SetFocus ElseIf IsNumeric(Text6.SetFocus ElseIf Text3.Text = "" Then MsgBox ("Enter Shoulder") Text6.Text = "" MsgBox ("Shoulder must be a Number") Text6.SetFocus ElseIf Text8.Text = "" Then MsgBox ("Enter Length") Text5.Text = "" Then MsgBox ("Enter Neck Wide") Text7.Text) = False Then Text7.

SetFocus ElseIf IsNumeric(Text10.SetFocus ElseIf Text13.Text = "" Then MsgBox ("Enter Waist") Text13.Text = "" 58 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text = "" Then MsgBox ("Enter Chest") Text10.Text) = False Then Text12.Text) = False Then Text13.Text = "" MsgBox ("Sleeve Bottom must be a Number") Text11.Text) = False Then MsgBox ("Neck Depth Back must be a Number") Text9.SetFocus ElseIf IsNumeric(Text12.SetFocus ElseIf Text10.Text = "" Text10.Text = "" Then MsgBox ("Enter Neck Depth Back") Text9.Text) = False Then MsgBox ("Chest must be a Number") Text10.Text8.Text) = False Then Text11.SetFocus ElseIf IsNumeric(Text11.SetFocus ElseIf Text12.Text = "" Then MsgBox ("Enter Sleeve Bottom") Text11.Text = "" MsgBox ("Fleet Length must be a Number") Text12.SetFocus ElseIf Text9.SetFocus ElseIf IsNumeric(Text13.SetFocus ElseIf IsNumeric(Text9.Text = "" Then MsgBox ("Enter Fleet Length") Text12.SetFocus ElseIf Text11.

"DD-MMMM-YY") & "'." & & & & Trim(Text11.WAIST.ADDRESS.Text) Trim(Text17.SLITSTYLE.Text) & & & & ".Value. "".' " & Trim(Text1.NDBACK .Text) & ".Text) Trim(Text15." & Trim(Text10.Text) InputBox "". sql cn." & Trim(Text6.'" "'.CHEST.Text) & & & & ".Text) Trim(Text16.DUEDATE." & Trim(Text8.Text) Trim(Text14.shoulder.Text) & ".SetFocus Else Dim sql sql = "insert into orderchuri .Show Unload Me End Sub Private Sub Command4_Click() Dim a As Integer Dim b As Integer Dim c As Integer Dim sql 59 INDIRA GANDHI NATIONAL OPEN UNIVERSITY "'.LENGTH.'" "'.NECKSTYLE .'" & Format(Text4.Text) & " '.'" "'.MsgBox ("Waist must be a Number") Text13.' " & Trim(Text23.Text) & " '." & Trim(Text5.Text) & "')" .ODATE.NAME NWIDE .'" & & & & Trim(Text12. "dd/mmmm/yy") & "'.HANDSTYLE.Text) & ".NDFRONT.'" "'.Text) & " ." & Trim(Text7.SLEEVLENGTH.' " & Trim(Text3.'" "'.BOTTAMSTYLE) VALUES ( " & Trim(Text24.Text.Text) & " '." & Trim(Text9.'" Trim(Text13.' " & Trim(Text2.SLEEVBOTTAM.FLEETLENGTH.Text) & " '. (id.ITEM .EMAIL.'" & Format(DTPicker1.Text) Trim(Combo1.Text) & ".Execute sql MsgBox "enter" End If End Sub Private Sub Command3_Click() DataReport5.Text) & ".

Close End Sub Private Sub Form_Activate() Dim sql As String Dim RS As New ADODB. record1(0)) End If record1.RecordCount > 0 Then 60 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . adOpenStatic If record2. record3(0)) End If f = a + b + c + 100 MsgBox "the cost of Churidar is " & f record3. adOpenStatic If record3.RecordCount > 0 Then b = IIf(IsNull(record2(0)).Recordset Dim record3 As New ADODB.Recordset Dim record2 As New ADODB.Open sql. adOpenStatic If record1. cn.RecordCount > 0 Then c = IIf(IsNull(record3(0)). chr32.Recordset sql = "select cost from pricechuri where item='" & LTrim(RTrim(Text15.Open sql. record2(0)) End If record2.Recordset sql = "select max(id) from orderpant" RS.RecordCount > 0 Then a = IIf(IsNull(record1(0)). chr32. cn. cn.Open sql.Text)) & "' " record1.Text)) & "' " record2. adOpenStatic If RS.Close sql = "select cost from pricechuri where item='" & Trim(Text17.Close sql = "select cost from pricechuri where item='" & LTrim(RTrim(Text16. chr32.Dim record1 As New ADODB. cn.Open sql.Text) & "' " record3.

3000). 1800). 1800). 40 Circle (4950. 1415) Circle (4550. 2600). 2200). 40 Circle (4950. 1700) Line (4550. 2200). "dd-mmm-yyyy") End Sub Gents Dim pocket1 As Integer Public Sub colurbutton() 'color right Line (4250. 1725)-(5000. 1625). 1700)-(4800. 40 Circle (4950.Text = Format(Date. 1415) Circle (5200. 1625). 40 Circle (4950. 40 61 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .code = RS(0) + 1 Else code = 1 End If Text24.Text = code End Sub Private Sub Timer1_Timer() Text4. 1725)-(5500. 20 End Sub Public Sub SingleButton() ' single button Circle (4950. 40 Circle (4950. 1420)-(4550. 40 End Sub Public Sub DoubleButton() 'double button Circle (4950. 3400). 1400) Line (5200. 20 'color left Line (5200.

Circle (4950, 2600), 40 Circle (4950, 3000), 40 Circle (4950, 3400), 40 Circle (4950, 1900), 25 Circle (4950, 2300), 25 Circle (4950, 2700), 25 Circle (4950, 3100), 25 Circle (4950, 3500), 25 End Sub Public Sub leftpocketbutton() Circle (5600, 2100), 25 End Sub Public Sub lrpocketbutton() Circle (5600, 2100), 25 Circle (4400, 2100), 25 End Sub Private Sub Command1_Click() Command3.Enabled = True Command5.Value = False shirt Me Me.Cls If pcode.HandL = True Then LeftHandPocket End If If pcode.HandR = True Then RightHandPocket End If If pcode.HandL = True And pcode.HandR = True Then LeftHandPocket RightHandPocket End If ' insert from pocket If pcode.PCover = 1 Then 62

INDIRA GANDHI NATIONAL OPEN UNIVERSITY

If pcode.LPocket = True Then LeftPocket ElseIf pcode.RPocket = True Then LeftPocket RightPocket End If ElseIf pcode.PCover = 2 Then If pcode.LPocket = True Then LeftPocket coverpocket1a End If If pcode.RPocket = True Then coverpocket1a coverpocket1b LeftPocket RightPocket End If ElseIf pcode.PCover = 3 Then If pcode.LPocket = True Then coverpocket3r LeftPocket End If If pcode.RPocket = True Then coverpocket3r coverpocket3l LeftPocket RightPocket End If ElseIf pcode.PCover = 4 Then If pcode.LPocket = True Then coverpocket4r LeftPocket End If 63 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

If pcode.RPocket = True Then coverpocket4r coverpocket4l LeftPocket RightPocket End If ElseIf pcode.PCover = 5 Then If pcode.LPocket = True Then roundpocket1l End If If pcode.RPocket = True Then roundpocket1l roundpocket1r End If ElseIf pcode.PCover = 6 Then If pcode.LPocket = True Then roundpocket2l End If If pcode.RPocket = True Then roundpocket2l roundpocket2r End If ElseIf pcode.PCover = 7 Then If pcode.LPocket = True Then roundpoket3l End If If pcode.RPocket = True Then roundpoket3l roundpocket3r End If ElseIf pcode.PCover = 8 Then If pcode.LPocket = True Then roundpocket4l 64 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

RPocket = True Then rectangle3l rectangle3r End If ElseIf pcode.PCover = 11 Then If pcode.PCover = 10 Then If pcode.LPocket = True Then rectangle4l End If 65 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .RPocket = True Then rectangle2l rectangle2r End If ElseIf pcode.End If If pcode.PCover = 9 Then If pcode.RPocket = True Then rectangle1l rectangle1r End If ElseIf pcode.LPocket = True Then rectangle2l End If If pcode.LPocket = True Then rectangle3l End If If pcode.PCover = 12 Then If pcode.LPocket = True Then rectangle1l End If If pcode.RPocket = True Then roundpocket4l roundpocket4r End If ElseIf pcode.

Cls End Sub Private Sub Command3_Click() MsgBox "If you like design then goto ordermenu" 66 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .RPocket = True Then rectangle4l rectangle4r End If End If ' insert colCode from Color If ColCode = 1 Then chinesco ElseIf ColCode = 2 Then ordco ElseIf ColCode = 3 Then doubleco ElseIf ColCode = 4 Then doublecol End If 'insert button code from button If Bcode = 1 Then SingleButton ElseIf Bcode = 2 Then DoubleButton End If If PButton = True And PocketN = 1 Then leftpocketbutton ElseIf PButton = True And PocketN = 2 Then lrpocketbutton End If End Sub Private Sub Command2_Click() Me.If pcode.

Text = "Flatfront pant" ElseIf Option8 Then Order.Text = "Pocket" Else Order.Text13.Text = "Left&Right pocket" Order.Text = "Pocket" End If ElseIf OrdPBack = 2 Then If OrdPStyle = True Then 67 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text = "Ordinary pant" ElseIf Option7 Then Order.Text12.Text = "Curve pocket" ElseIf OrdPFront = 2 Then Order.End Sub Private Sub Command4_Click() Unload Me End Sub Private Sub Command5_Click() Command1.Text = "Bootcut pant" ElseIf Option9 Then Order.Text14.Text13.Text = "Rectangle pocket" ElseIf OrdPFront = 3 Then Order.Text12.Text15.Text15.Text13.Text14.Text12.Text = "Carlog pant" End If If OrdPFront = 1 Then Order.Text = "Line pocket" End If If OrdPBack = 1 Then If OrdPStyle = True Then Order.Text12.Value = False If Option6 Then Order.Text = "Left pocket" Order.

Text14.Text15.Text15.Text = "Left&right pocket" Order.Text = "Left pocket" Order.Text = "Cover Pocket" End If ElseIf OrdPBack = 3 Then If OrdPStyle = True Then Order.Text15.Text14.Text = "Line pocket" End If If FlatPBack = 1 Then If FlatPStyle = True Then Order.Text = "Curve pocket" ElseIf FlatPFront = 2 Then Order.Text = "Left pocket" 68 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text14.Order.Text15.Text = "Left pocket" Order.Text14.Text13.Text = "Circle Pocket" Else Order.Text = "RectanglePocket" Else Order.Text14.Text = "Left& right pocket" Order.Text13.Text = "Rectangle pocket" ElseIf FlatPFront = 3 Then Order.Text = "Cover Pocket" Else Order.Text15.Text = "Circle Pocket" End If ElseIf OrdPBack = 4 Then If OrdPStyle = True Then Order.Text13.Text = "Left pocket" Order.Text15.Text = "Left&right pocket" Order.Text = "Rectangle Pocket" End If ElseIf Option7 Then If FlatPFront = 1 Then Order.Text15.Text14.

Text15.Text14.Text15.Text15.Text14.Text = "Left&Right pocket" Order.Text13.Text15.Text = "Curve pocket" ElseIf BootPFront = 2 Then Order.Text13.Text = "Left pocket" Order.Text14.Text15.Text = "Left pocket" Order.Text = "Left&right pocket" Order.Text14.Text = "Rectangle pocket" 69 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text = "Circle Pocket" End If ElseIf FlatPBack = 4 Then Order.Text14.Text = "Cover Pocket" Else Order.Text = "Pocket" End If ElseIf FlatPBack = 2 Then If FlatPStyle = True Then Order.Text14.Text = "Circle Pocket" Else Order.Text = "Left& right pocket" Order.Text = "Left&right pocket" Order.Text15.Text14.Text = "Pocket" Else Order.Text = "RectanglePocket" Else Order.Text = "Rectangle Pocket" End If ElseIf Option8 Then If BootPFront = 1 Then Order.Text15.Order.Text = "Left pocket" Order.Text14.Text = "Cover Pocket" End If ElseIf FlatPBack = 3 Then If FlatPStyle = True Then Order.

Text = "Pocket" End If ElseIf BootPBack = 2 Then If BootPStyle = True Then Order.Text = "Left& right pocket" Order.Text15.Text = "Circle Pocket" End If ElseIf BootPBack = 4 Then If BootPStyle = True Then Order.Text14.Text15.Text = "Line pocket" End If If BootPBack = 1 Then If BootPStyle = True Then Order.Text = "Left pocket" Order.Text = "Left&right pocket" Order.Text14.Text = "Left pocket" Order.Text = "Cover Pocket" End If ElseIf BootPBack = 3 Then Order.Text14.Text15.Text = "Left&right pocket" Order.Text = "Left&Right pocket" Order.Text15.Text15.Text14.Text = "Rectangle Pocket" 70 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text14.Text = "Cover Pocket" Else Order.Text14.Text = "Left pocket" Order.Text15.Text13.Text15.Text = "RectanglePocket" Else Order.Text15.ElseIf BootPFront = 3 Then Order.Text = "Pocket" Else Order.Text = "Left pocket" Order.Text14.Text = "Circle Pocket" Else Order.Text14.

Text = "Left pocket" Order.Text15.Text13.Text14.Text14.Text = "line pocket" End If If CarPBack = 1 Then If CarPStyle = True Then Order.End If ElseIf Option9 Then If CarPFront = 1 Then Order.Text = "Rectangle pocket" ElseIf CarPFront = 3 Then Order.Text = "Left&Right pocket" Order.Text = "Pocket" Else Order.Text = "Circle Pocket" Else Order.Text = "Curve pocket" ElseIf CarPFront = 2 Then Order.Text14.Text13.Text = "Left& right pocket" Order.Text = "Pocket" End If ElseIf CarPBack = 2 Then If CarPStyle = True Then Order.Text14.Text15.Text = "Left pocket" Order.Text15.Text = "Left&right pocket" Order.Text = "Cover Pocket" End If ElseIf CarPBack = 3 Then If CarPStyle = True Then Order.Text15.Text14.Text = "Left pocket" Order.Text = "Cover Pocket" Else Order.Text13.Text = "Circle Pocket" 71 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text15.Text14.Text15.

Text = "Rectangle Pocket" End If End If End If Order.Text = "RectanglePocket" Else Order.Text14.Hide If Option6 Then Gent.Text = "Left pocket" Order.Text15.End If ElseIf CarPBack = 4 Then If CarPStyle = True Then Order.Show Me.Text = "Left&right pocket" Order.Text14.Text15.Cls OrdinarypantFront Me OrdinarypantBack Me If OrdPFront = 1 Then Fpocket1 Me ElseIf OrdPFront = 2 Then Fpocket3 Me ElseIf OrdPFront = 3 Then Fpocket2 Me End If If OrdPBack = 1 Then If OrdPStyle = True Then Bpocket1l Me Else Bpocket1l Me Bpocket1r Me End If ElseIf OrdPBack = 2 Then If OrdPStyle = True Then 72 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Cls flatfront1 Me flatback1 Me If FlatPFront = 1 Then Flatfpocket1 Me ElseIf FlatPFront = 2 Then Flatfpocket2 Me ElseIf FlatPFront = 3 Then Flatfpocket3 Me End If If FlatPBack = 1 Then If FlatPStyle = True Then 73 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Bpocket2l Me Else Bpocket2l Me Bpocket2r Me End If ElseIf OrdPBack = 3 Then If OrdPStyle = True Then Bpocket3l Me Else Bpocket3l Me Bpocket3r Me End If ElseIf OrdPBack = 4 Then If OrdPStyle = True Then Bpocket4l Me Else Bpocket4l Me Bpocket4r Me End If End If ElseIf Option7 Then Me.

Flatbpocket1l Me ElseIf FlatPStyle = False Then Flatbpocket1l Me flatbpocket1r Me End If ElseIf FlatPBack = 2 Then If FlatPStyle = True Then flatbpocket2l Me ElseIf FlatPStyle = False Then flatbpocket2l Me flatbpocket2r Me End If ElseIf FlatPBack = 3 Then If FlatPStyle = True Then flatbpocket3l Me ElseIf FlatPStyle = False Then flatbpocket3l Me flatbpocket3r Me End If ElseIf FlatPBack = 4 Then If FlatPStyle = True Then flatbpocket4l Me ElseIf FlatPStyle = False Then flatbpocket4l Me flatbpocket4r Me End If End If ElseIf Option8 Then Me.Cls bootcut1 Me bootcut2 Me If BootPFront = 1 Then bellfpocket1 Me 74 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

ElseIf BootPFront = 2 Then bellfpocket2 Me ElseIf BootPFront = 3 Then bellfpocket3 Me End If If BootPBack = 1 Then If BootPStyle = True Then Bellbpocket1l Me ElseIf BootPStyle = False Then Bellbpocket1l Me Bellbpocket1r Me End If ElseIf BootPBack = 2 Then If BootPStyle = True Then Bellbpocket2l Me ElseIf BootPStyle = False Then Bellbpocket2l Me Bellbpocket2r Me End If ElseIf BootPBack = 3 Then If BootPStyle = True Then Bellbpocket3l Me ElseIf BootPStyle = False Then Bellbpocket3l Me Bellbpocket3r Me End If ElseIf BootPBack = 4 Then If BootPStyle = True Then Bellbpocket4l Me ElseIf BootPStyle = False Then Bellbpocket4l Me Bellbpocket4r Me End If 75 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

End If ElseIf Option9 Then Me.Cls kargose1 Me kargose2 Me If CarPFront = 1 Then Cgpocket1 Me ElseIf CarPFront = 2 Then Cgpocket2 Me ElseIf CarPFront = 3 Then Cgpocket3 Me End If If CarPBack = 1 Then If CarPStyle = True Then Cgbpocket1l Me ElseIf CarPStyle = False Then Cgbpocket1l Me Cgbpocket1r Me End If ElseIf CarPBack = 2 Then If CarPStyle = True Then Cgbpocket2l Me ElseIf CarPStyle = False Then Cgbpocket2l Me Cgbpocket2r Me End If ElseIf CarPBack = 3 Then If CarPStyle = True Then Cgbpocket3l Me ElseIf CarPStyle = False Then Cgbpocket3l Me Cgbpocket3r Me End If 76 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

600. 3600) Line (3800. 1785)-(5000. 3600) 'right hand 'bottumline Line (3800. 1600) 'Right Line (3800. 1325)-(3800. 4. 1600)-(6200. 1600)-(3800. 770) End Sub Public Sub doublecol() Line (4550. 2400) Line (5000. 1000).25.Visible = False Frame2. 2000)-(3400. 3600) Line (6200. 1300)-(4700.2 Line (4200. 1600) Line (5450. 5. 1600)-(3200. 3600)-(6200.ElseIf CarPBack = 4 Then If CarPStyle = True Then Cgbpocket4l Me ElseIf CarPStyle = False Then Cgbpocket4l Me Cgbpocket4r Me End If End If End If Frame1. 2000) 'Left hand Line (3800. 2400) Line (3200. 2150)-(3400. 1325)-(6200. 400.Visible = False End Sub Private Sub Form_Load() Dim pcode As New spocket Dim ColorP As Boolean colrp = t Circle (5000. 3600) 77 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

2150)-(3400. 1335)-(5280. 1200) Line (5415. 3600) Line (6200. 1335)-(4650. 1600)-(6800. 1200) Line (5450. 1575) Line (4600. 1600) Line (3800. 2400) Line (6800. 2400) 78 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 3600) Line (6200. 1600)-(6200. 1575)-(4995. 1200) Line (4700. 1200)-(4630. 3600) 'right hand 'bottumline Line (3800. 1325)-(5415. 1545)-(4995. 2000) Line (6200. 2150)-(6600. 2000)-(6600. 1320) Line (4700. 3570) Line (5300. 3600)-(6200. 1600) 'Right Line (3800. 1200) Line (4755. 2400) Line (4550. 1325)-(5330. 2000)-(3400. 1435)-(5415. 1815)-(4695. 1600)-(6800. 1435)-(4600. 1815) Line (4995. 1435)-(4560. 1335) End Sub Public Sub doubleco() 'left Line (4700. 2400) Line (4980. 1600)-(3200. 1435) Line (5330. 1600)-(3800. 1200) Line (5450.Line (6200. 1485)-(4980. 1325)-(6200. 1575) Line (5400. 1815) Line (4995. 2150)-(6600. 2000) 'Left hand Line (3800. 2400) Line (3200. 1325)-(3800. 2000) Line (6200. 1815)-(5370.

3600)-(6200. 1455)-(4835. 1635) Line (4950. 1320)-(4850. 1185) Line (4710. 1600)-(3200. 2400) Line (6800. 3600) Line (6200. 2400) Line (4680. 2000)-(6600. 1750)-(5310. 1815) Line (4800. 2400) Line (3200. 2150)-(6600. 1805) Line (5190. 1190) Line (4965. 2400) Line (4950. 2000)-(3400. 2000)-(6600. 1325)-(6200. 1325)-(3800. 1600) 'Right Line (3800. 1455)-(5240. 2150)-(3400. 1470)-(4950. 1340)-(4800. 1635) 79 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 1815)-(4965. 1340)-(4800. 1320)-(5240. 1455) Line (4800. 1600)-(6200. 2000) Line (6200. 1190)-(5190. 1169) Line (4965. 1179) Line (4875. 1600)-(6800. 1190)-(5250. 1290)-(5130. 1325) End Sub Public Sub ordco() 'shoulder 'left Line (4700. 1600)-(3800. 2400) Line (4710. 3600) Line (6200. 1600) Line (3800. 1290) Line (4800. 1455)-(4795. 3585) Line (5300. 1190) Line (5295.Line (6800. 2000) 'Left hand Line (3800. 3600) 'right hand 'bottumline Line (3800.

Show End Sub Private Sub Option2_Click() button.Visible = True Frame2.Visible = True Frame1. 1185) End Sub Private Sub Option1_Click() colur. 2000)-(5400. 1340)-(4800. 2400)-(5800. 1600)-(5295. 1190) Line (4965. 1190)-(5250. 1320)-(5240. 2000) Line (5400. 1455) Line (5120. 1190) Line (5120. 2400) Line (5800. 2400)-(5800. 1169) Line (4965. 2000) End Sub Public Sub RightPocket() 80 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 1455)-(5240. 2000)-(5800. 1600)-(4965.Visible = False End Sub Public Sub LeftPocket() Line (5400.Show End Sub Private Sub Option4_Click() Frame1. 1290) Line (4800.Show End Sub Private Sub Option3_Click() pocket. 2400) Line (5400. 1455)-(4795.Line (4710. 1290)-(5130. 1320) Line (5295. 1179) Line (4875.Visible = False End Sub Private Sub Option5_Click() Frame2.

2400)-(4600. 2020)-(3615. 2010)-(5610. 2070) 81 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 1875)-(6540. 1875)-(6650. 2175)-(4590. 2070)-(4499. 2400) Line (4600. 1900) Line (6600. 2160) Line (5610. 2050) Line (6400. 1900) Line (3400. 2000) End Sub Public Sub coverpocket1a() Line (5415. 2400) Line (4200. 1900)-(3450. 1830) End Sub Public Sub LeftHandPocket() Line (3400. 1900) Line (3615. 2020) Line (3600. 2070) End Sub Public Sub coverpocket1b() Line (4200.Line (4200. 2000) Line (4200. 2050)-(5750. 2000)-(4600. 2070)-(5730. 2400)-(4600. 2200) Line (5400. 2000)-(5600. 1750)-(6400. 1995) Line (4290. 2000)-(5600. 2010) Line (5505. 2000) End Sub Public Sub RightHandPocket() Line (6400. 2000)-(4200. 2120)-(5680. 1850)-(6600. 2175) Line (4395. 1995)-(4395. 2200) Line (5450. 1800) End Sub Public Sub coverpocket() Line (5400. 1740)-(3600. 2200)-(5800. 2160)-(5805. 2050) Line (6400. 1850)-(3400. 2055) Line (5525. 2120) Line (5600.

6090) 'Second color Line (5170. 6090) Line (5170. 6495) Line (5610. 6240) Line (6020. 6090)-(5070. 6490) Line (4800.7 End Sub Public Sub CoverPocketPattern() 'coverpocket 'label Label2. 6495)-(6510. 6490) Line (4800. 6090) Line (4400. 6090)-(4400. 6320)-(5625. 6495) Line (5170. 6090) Line (5170. 6090) 'Third color Line (6005. 3.7. 6490)-(4800. 6165) Line (5320. 6300) Line (5400. 600. 5. 6090)-(5635. 6495) Line (6005.Visible = True Line (4400. 6490)-(4800. 6105) Circle (6250. 6490)-(4800. 270. 6495)-(5610.7. 3. 6495)-(5610. 6100)-(5410.7. 6105)-(6000. 6090)-(5170. 1850).End Sub Public Sub coverpocket3l() Circle (4400. 6090) Line (5245.7 End Sub Public Sub coverpocket3r() Circle (5595. 5. 5950). 6090) Line (4400. 6495)-(6490.8 82 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 6090)-(6515. 600. 6495) Line (6500. 270. 6090)-(4800. 5. 6240)-(5455. 600. 6165)-(5550. 3. 6490) Line (4400. 6090) Line (5070. 270. 6490)-(4800. 1850).

6080)-(6990. 6275) Line (6990. 6080)-(7340. 2025)-(4260.'forth Line (6990. 2130)-(4515. 270. 2070) Line (5415. 2070)-(5730. 2010)-(5610. 6495) Line (6990. 2070) 83 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 1995) End Sub Public Sub roundpocket1l() Line (5415. 2130)-(5790. 6300). 6080)-(7450. 1995)-(4395. 2130) Line (4515.9. 3. 2010) Line (5505. 2350) Line (5415. 2160) Line (5610. 2160)-(5805. 305. 6495) End Sub Public Sub coverpocket4l() Line (4215. 6275)-(7350. 2130)-(5700. 6080) Line (6990. . 2099). 2175)-(4590. 6495)-(7450. 2010)-(5805. 1995) End Sub Public Sub coverpocket4r() Line (5415.7. 2175) Line (4395. 6275) Line (7100. 2025)-(5490. 600. 2070)-(4499. 3. 6075)-(7450. 2130) Line (5490.6 End Sub Public Sub roundpocket1r() Line (4200. 5. 2130) Line (5700. 2010)-(5415. 6495) Line (7450. 2010) Circle (5633. 6275) Line (7450. 2010)-(5805.4 Circle (4600. 2320) Line (5805. 5. 2130)-(4599. 6075)-(7100. 1995) Line (4290. 2130) Line (4260.

3. 2010)-(4590. 270.8. 5. 2099). 2010)-(4560. 2100). 600. 2350) Line (5415. 5. 270. 5. 600. . 5. 2010) End Sub Public Sub roundpocket2l() Line (5415. 3.4 End Sub Public Sub roundpocket2r() Line (4560. 2025) Circle (4400. 5.4 End Sub Public Sub roundpocket3r() Circle (4400. 2295)-(4200. 2320) Line (5805.6 Line (4560. 3. 270.8. 2310) Line (4200.5 Line (4200. 2010)-(4590. 2010)-(5805.8. 2310) Line (4200. 600. 3. 600.9. 1850). 2010)-(5805.9. . 2010)-(5415. 2010)-(4560. 1850). 2010) Circle (4400. 5. 2010) Circle (4400. 305. . 2099).5 Circle (5633. 2025) Line (4200. 2010)-(5415.8. 2010)-(5805.5 End Sub 84 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 2010)-(4560. 305. 2350) Line (5415.Line (4560. 5. 3. 2100). 2100). 270. 305. 600. 2310) Line (4200. 2010)-(4590. 2320) Line (5805. 2010) Circle (5633. 2295)-(4200. 3. 3. 2099).4 End Sub Public Sub roundpoket3l() Circle (5595. 5. 270. 2295)-(4200.7 Line (5415. 3.9. 2010)-(5805.9. 2025) Line (4200. 2010) Circle (5633.

Public Sub roundpocket4l() Line (5415, 2025)-(5490, 2130) Line (5490, 2130)-(5700, 2130) Line (5700, 2130)-(5790, 1995) Line (5415, 2010)-(5415, 2320) Line (5805, 2010)-(5805, 2350) Line (5415, 2010)-(5805, 2010) Circle (5633, 2099), 305, 600, 3.9, 5.4 End Sub Public Sub roundpocket4r() Line (4215, 2025)-(4260, 2130) Line (4260, 2130)-(4515, 2130) Line (4515, 2130)-(4599, 1995) Line (4600, 2010)-(4600, 2310) Line (4200, 2295)-(4200, 2025) Line (4200, 2010)-(4590, 2010) Circle (4400, 2100), 270, , 3.8, 5.5 End Sub Public Sub roundpocket() Line (4400, 6090)-(4400, 6470) Line (4400, 6090)-(4800, 6090) Line (4800, 6470)-(4800, 6090) Circle (4600, 6300), 270, , 3.7, 5.6 Line (5170, 6090)-(5635, 6090) Line (5170, 6100)-(5410, 6300) Line (5400, 6320)-(5625, 6090) Line (5070, 6090)-(5070, 6090) Line (5170, 6090)-(5170, 6470) Line (5610, 6470)-(5610, 6090) Circle (5400, 6300), 270, , 3.7, 5.6 Line (5245, 6165)-(5550, 6165) Line (5320, 6240)-(5455, 6240) Line (6020, 6090)-(6515, 6090) 85

INDIRA GANDHI NATIONAL OPEN UNIVERSITY

''Third color Line (6005, 6105)-(6000, 6495) Line (6500, 6495)-(6490, 6105) Circle (6250, 5950), 270, 600, 3.7, 5.8 Circle (6250, 6350), 270, 600, 3.6, 5.8 'forth Line (6990, 6075)-(7450, 6080) Line (6990, 6075)-(7100, 6275) Line (7100, 6275)-(7350, 6275) Line (7450, 6080)-(7340, 6275) Line (6990, 6080)-(6990, 6475) Line (7450, 6080)-(7450, 6475) Circle (7233, 6350), 270, 600, 3.6, 5.8 End Sub Public Sub rectangle1l() Line (5415, 2010)-(5415, 2320) Line (5805, 2010)-(5805, 2350) Line (5415, 2010)-(5805, 2010) Line (5415, 2310)-(5595, 2415) Line (5595, 2415)-(5805, 2325) Line (5415, 2130)-(5805, 2130) End Sub Public Sub rectangle1r() Line (4560, 2010)-(4560, 2310) Line (4200, 2295)-(4200, 2025) Line (4200, 2010)-(4590, 2010) Line (4200, 2310)-(4365, 2410) Line (4365, 2410)-(4560, 2300) Line (4200, 2115)-(4545, 2115) End Sub Public Sub rectangle() Line (4400, 6090)-(4400, 6470) Line (4400, 6090)-(4800, 6090) 86

INDIRA GANDHI NATIONAL OPEN UNIVERSITY

'Line (4400, 6490)-(4800, 6490) Line (4800, 6470)-(4800, 6090) Line (4400, 6470)-(4590, 6585) Line (4590, 6585)-(4800, 6470) Line (4395, 6180)-(4815, 6180) Line (5170, 6090)-(5635, 6090) Line (5175, 6190)-(5610, 6195) Line (5070, 6090)-(5070, 6090) Line (5170, 6090)-(5170, 6195) Line (5610, 6195)-(5610, 6090) Line (6020, 6090)-(6515, 6090) ''Third color Line (6005, 6105)-(6000, 6495) Line (6005, 6495)-(6510, 6495) Line (6500, 6495)-(6490, 6105) Line (6015, 6195)-(6495, 6195) Line (6195, 6210)-(6195, 6495) Line (6270, 6210)-(6270, 6495) Line (6990, 6075)-(7450, 6080) Line (6990, 6075)-(7100, 6275) Line (7100, 6275)-(7350, 6275) Line (7450, 6080)-(7340, 6275) Line (6990, 6585)-(7450, 6580) Line (6990, 6080)-(6990, 6580) Line (7450, 6080)-(7450, 6580) Line (7290, 6480)-(7290, 6345) Line (7110, 6360)-(7290, 6360) Line (7110, 6480)-(7110, 6375) Line (7110, 6480)-(7290, 6480) End Sub Public Sub rectangle2l() Line (5415, 2010)-(5415, 2099) Line (5805, 2010)-(5805, 2099) 87

INDIRA GANDHI NATIONAL OPEN UNIVERSITY

2350) Line (4200. 2010) Line (5415. 2115)-(4545. 2010) Line (4200. 2130) Line (5655. 2099) End Sub Public Sub rectangle3l() Line (5415. 2010)-(5415. 2010)-(4590. 2010) Line (4200. 2350)-(4200. 2040)-(5415. 2340) End Sub Public Sub rectangle4l() Line (5415. 2115) Line (4410. 2350) Line (4200. 2130)-(5805. 2099)-(4590.Line (5415. 2099)-(4200. 2350) Line (5415. 2130)-(4350. 2130) Line (5490. 2145)-(5595. 2010)-(5805. 2340) Line (5595. 2340)-(5655. 2320) Line (5805. 2025)-(5490. 2340)-(5805. 2025) Line (4200. 2010) Line (5415. 2130)-(4410. 2010) Line (4590. 2040)-(4560. 2040)-(5805. 2099) Line (4590. 2099) End Sub Public Sub rectangle2r() Line (4200. 2130)-(5700. 2010)-(4200. 2399) Line (5805. 2130)-(5790. 2010)-(5805. 2345) Line (5415. 2099)-(5805. 2350) Line (4350. 2010)-(4590. 2130) Line (5700. 2350)-(4560. 1995) Line (5415. 2010)-(5805. 2399) 88 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 2130) End Sub Public Sub rectangle3r() Line (4560.

1245)-(4920. 2220) Line (4200. 2010)-(4590. 1320) Line (4680. 2220) Line (4320. 1600) Line (4680. 2205)-(5685. 2310)-(5505. 2010)-(4600. 1245)-(5150. 2210) End Sub Public Sub rectangle4r() Line (4215. 1485)-(5150. 2130)-(4599.Show End Sub Public Sub chinesco() Line (4920.Line (5415. 2399) Line (5505. 1320) Line (4920. 1260)-(5205. 2399) Line (4200. 2215) End Sub Private Sub Option6_Click() Ordinarypantfronts. 2010)-(5805. 2010) Line (5415. 2399)-(4200. 1320)-(5070. 2025) Line (4200. 2205) Line (5685. 2310)-(5505. 2310) Line (5685. 1485) Line (5150. 2290) Line (4320. 1320) Line (5200. 2130) Line (4515. 1995) Line (4600. 1320) 'shoulder 89 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 2205)-(5685. 2399)-(5805. 2215)-(4485. 2290)-(4485. 1250) Line (4755. 2010) Line (4300. 2310)-(4310. 2130) Line (4260. 1600)-(4630. 2290)-(4485. 1245)-(4630. 1320)-(4920. 1260) Line (4680. 2310) Line (5505. 2025)-(4260. 2130)-(4515. 2399)-(4600. 2399) Line (4485.

2400) Line (4920. 2000) 'Left hand Line (3800. 2150)-(3400. 3600) Line (6200. 3600) Line (6200. 1620)-(4920.Show End Sub Private Sub Option9_Click() CarlogFront. 3585) Line (5200. 1600)-(6800.'left Line (4600. 1600)-(3800. 1600) Line (3800. 2000)-(3400. 3600)-(6200.ForeColor = QBColor(15 * Rnd) End Sub Order shirt Dim a As String Dim b As String 90 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 2000) Line (6200. 1600)-(3200. 2400) End Sub Private Sub Option7_Click() Flatfrontdesign. 2150)-(6600. 2000)-(6600.Show End Sub Private Sub Timer1_Timer() Label1. 1600)-(6200. 2400) Line (3200. 1600) 'Right Line (3800. 1350)-(6200. 3600) 'right hand 'bottumline Line (3800. 1300)-(3800.Show End Sub Private Sub Option8_Click() BootcutFront. 2400) Line (6800.

Text) = False Then Text7.Text = "" Then MsgBox ("Enter sleeve length") Text9.Text = "" 91 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text) = False Then Text9.SetFocus ElseIf IsNumeric(Text8.SetFocus ElseIf Text9.SetFocus ElseIf IsNumeric(Text7.Text = "" MsgBox ("Length must be a Number") Text6.Text) = False Then Text6.Text = "" Then MsgBox ("Enter Collar") Text8.Enabled = True Command6.SetFocus ElseIf Text8.Text = "" MsgBox ("shoulder must be a Number") Text7.Dim code As Integer Private Sub Command1_Click() Command5.Enabled = True If Text6.Text = "" MsgBox ("Sleeve length must be a Number") Text8.Text) = False Then Text8.SetFocus ElseIf Text7.Text = "" Then MsgBox ("Enter Length") Text6.SetFocus ElseIf IsNumeric(Text9.SetFocus ElseIf IsNumeric(Text6.Text = "" Then MsgBox ("Enter shoulder") Text7.

Text) = False Then Text5.Text = "" Then MsgBox ("Enter pocketsize") Text13.Text = "" Then MsgBox ("Enter chestloose") Text11.SetFocus ElseIf Text11.Text = "" MsgBox ("pocketdown must be a Number") Text12.SetFocus ElseIf Text13.Text = "" Then MsgBox ("Enter Pocketdown") Text12.Text = "" Then MsgBox ("Enter sleeve bottumwidth") Text10.Text = "" MsgBox ("pocketsize must be a Number") Text13.SetFocus ElseIf Text10.Text) = False Then Text13.SetFocus 92 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text = "" MsgBox ("chestloose must be a Number") Text11.MsgBox (" sleeveLength must be a Number") Text9.Text = "" MsgBox ("sleeve bottumwidth must be a Number") Text10.SetFocus ElseIf Text12.SetFocus ElseIf IsNumeric(Text11.SetFocus ElseIf IsNumeric(Text12.Text) = False Then Text11.SetFocus ElseIf IsNumeric(Text10.SetFocus ElseIf IsNumeric(Text13.Text) = False Then Text12.

Text) & " .POCKETTYPE=' " & Trim(Text15.INNERPOCKET='" & Trim(a) & "'.STICHING=' " " & & Trim(Combo1." & _ "POCKETSIZE=" & Trim(Text13. SLEEVELENGTH= " & Trim(Text9." & _ Trim(Text18.Execute "commit" If Option1 Then l = "Yes" Else 93 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text) & " '.Text) & " .Text & "." & _ " SLEEVEBW= " & Trim(Text10.Text) & " '.Text) & " .Execute "Delete From tailorshirtreport " cn.Text) & " ' WHERE ID=" & Text22.Text & " " cn.Text) & " '.Execute sql cn.SHOULDER=" & Trim(Text7.HANDPOCKET=' " & Trim(Text19." & _ "BUTTONSTYLE=' " & Trim(Text16.CHESTLOOSE=" & Trim(Text11.Text) & " '.Text) & " .Text) & " '." & _ Trim(Combo2.Text) & " '.LOOPS=' " & Trim(b) & " '.COLLAR=" & Trim(Text8.Text) "STITCHTYPE=' "POCKETS=' " " & & & " .Text) '.LENGTH=" & Trim(Text6.POCKETBUTTON=' " & Trim(Text17.BOTTUMSTYLE=' " & & " " '.Text) & " .Else Dim sql If Option1 Then b = "Yes" ElseIf Option2 Then b = "No" End If If Option3 Then a = "Yes" ElseIf Option4 Then a = "No" End If sql = "UPDATE fashion SET id=" & Text22.Text) & " .COLLARTYPE=' Trim(Text14.POCKETDOWN=" & Trim(Text12.Text) & Trim(Combo3.Text) & " .

Text = "" Text14.Text = "" Text12.Text = "" Text18.Text & "')" cn.Text & "'.'" & Text16.'" & Combo2.Text = "" Text8.l = "No" End If If Option3 Then m = "Yes" Else m = "No" End If sql = "Insert Into tailorshirtreport values('" & Text22.'" & Combo1.Text & "'.'" & Text15.'" & Combo3.Text & "'.'" & Text12." & _ " '" & Text7.Text & "'.'" & Text11.Text & "'.'" & Text13.Text = "" 94 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text = "" Text17.'" & Text18.Text = "" Text13.Text = "" Text9.Text & "'." & _ " '" & l & "'.Text & "'.Text = "" Text15.'" & Text9.Text & "'.'" & m & "'.'" & Text6.Execute sql Text7.'" & Text8.Text & "'.Text & "'.Text & "'.Text = "" Text19.Text & "'.'" & Text17.Text = "" Text10.Text = "" Text16.Text & "'.'" & Text10.Text & "'." & _ " '" & Text19.Text & "'.Text & "'.Text = "" Text11.Text & "' " & _ " ." & _ " '" & Text14.

SetFocus ElseIf Text2.EMAIL.Text = "" Text24.Text = "" Text6.Text20.DUEDATE.ODATE.Text) = False Then MsgBox ("ID should be a number") Text24.SetFocus ElseIf Text3.Text = "" Then MsgBox ("Enter Email-ID") Text3.Text)) = 0 Then MsgBox ("Enter ID") Text24.SetFocus ElseIf Len(Trim(Text1.ITEM) 95 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text)) = 0 Then MsgBox ("Enter Name") Text1.SetFocus End If Dim sql sql = "insert into VALUES fashion(id.SetFocus ElseIf IsNumeric(Text24.NAME ( " & .Text = "" End If End Sub Private Sub Command2_Click() 'connection If Len(Trim(Text24.ADDRESS.Text = "" Then MsgBox ("Enter Address") Text2.

Execute "commit" sql = "Insert Into reportshirt(text1.' " & Trim(Text23.Value & "'.'" & Text1.Execute "Delete From reportshirt " cn.'" & Format(DTPicker1.Execute sql cn." & _ " '" & Text2.Text & "'.Text) & & " " .Text = "" Text2.Text & "')" cn.Text) Trim(Text2.Text.Value.text3.Text & "'.'" & DTPicker1.Execute sql Text1. "DD-MMMM-YY") & "'.Text & "'.Text = "" Text3.' " " & & Trim(Text1.Text) & " ')" cn.text5.text2.'" & & Format(Text4.text6) values('" & Text24.' " '.Text = "" Text4. "dd/mmmm/yy") & "'.Enabled = True Dim a As Integer Dim b As Integer Dim c As Integer Dim d As Integer Dim e As Integer Dim f As Integer Dim sql 96 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .' '." &_ " '" & Text23.text4.Trim(Text24.Text & "'.Text) & & " " '.'" & Text4.Text = "" End Sub Private Sub Command3_Click() Unload Me End Sub Private Sub Command4_Click() Command1.Text) Trim(Text3.

Text) & "' " record3.Dim record1 As New ADODB. record3(0)) End If record3.RecordCount > 0 Then b = IIf(IsNull(record2(0)).Recordset Dim record5 As New ADODB.Text)) & "' " record2.EOF And record4.Open sql. chr32. chr32.Close sql = "select price from price where item='" & Trim(Text16. record2(0)) End If record2.Open sql.Caption)& "'" record4.Recordset Dim record6 As New ADODB. cn. record1(0)) End If record1.RecordCount > 0 Then a = IIf(IsNull(record1(0)).Text) = "Yes" Then sql = "select price from price where item='" & Trim(Label23. adOpenStatic If Not record4.Recordset sql = "select price from price where item='" & LTrim(RTrim(Text14.Recordset Dim record4 As New ADODB.Open sql.Close If Trim(Text17. adOpenStatic If record2.Recordset Dim record2 As New ADODB.Close sql = "select price from price where item='" & LTrim(RTrim(Text15.Text)) & "' " record1.RecordCount > 0 Then c = IIf(IsNull(record3(0)). adOpenStatic If record1. cn.Open sql.Recordset Dim record3 As New ADODB.BOF Then 97 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . cn. Chr(32). adOpenStatic If record3. cn.

d = IIf(IsNull(record4(0)).Close Else e=0 End If End If f = a + b + c + d + e + 70 MsgBox "the cost of shirt is " & f Else 98 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . record5(0)) End If record5. adOpenStatic If record5.RecordCount >= 0 Then e = IIf(IsNull(record6(0)). chr32.Open "select price from price where item='" & Trim(Label25. record6(0)) e = e + 0.Close If Trim(Text19. chr32.Text) = "Both Left&Right" Then record6.6 * e record6.Caption) & "' " record5. record4(0)) record4. chr32. adOpenStatic If record6.Text) = "Left" Or Trim(Text19.Close End If Else d=0 End If If Trim(Text19.Caption) & "' ".RecordCount > 0 Then e = IIf(IsNull(record5(0)). cn.Open sql. cn.Text) = "Right" Then sql = "select price from price where item='" & Trim(Label25.

cn. "DD-MMM-YYYY") Dim sql As String Dim RS As New ADODB.Text = "No" End If End Sub Private Sub SSTab1_Click(PreviousTab As Integer) 99 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .RecordCount > 0 Then code = RS(0) + 1 Else code = 1 End If Text24.Recordset sql = "select max(id) from fashion" RS.Text = "" Then Text17.Show End Sub Private Sub Form_Activate() Text4.Text = "No" End If If Text19.Text = code End Sub Private Sub Form_Load() DTPicker1.Open sql.Show End Sub Private Sub Command6_Click() DataReport2.Text = "" Then Text19. adOpenStatic If RS.Value = True If Text17.Text = Format(Date.f = f + 0.5 * f MsgBox "the cost of shirt is " & f End If End Sub Private Sub Command5_Click() DataReport3.

Text End Sub 100 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Text24.Text = orderr.Text22.

CODE EFFICIENCY
The project uses the objects associated with the ActiveX Data Objects (ADO) 2.0 library. ADO provides better overall

performance than earlier object models. It provides more opportunities to fortune the data cursor of a recordset, an object in the ADODB library. The data cursor can change position to point to a different row of data. It is more resource efficient and also provides more universal data access using the connection object that contributes to the data base connection. The connection object provides a secure connection to the database. Oracle support SQL commands ,which is a powerful tool for representing the system and it provide a high security and integrity. Object oriented DBMS are also provide multi-access, ad hoc querying, back up and restore, security and privacy, concurrent access for consistency and so on.

101 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

OPTIMISATION OF CODE
Use of a single Connection Object:-

ADODB.Connection
Through out the program database recordsets are initiated for retrieving data from the database. Naturally there are many choices provided by visual basic. We can use ado recordsets, datagrids, datalists, ado controls in conjunction with other controls through different methods. Some methods are methods in the database coding side is the usage of cursors provided by oracle. Naturally the implications are many. In fact the program through out emphasises the efficiency of the system without regard of the coding needed or other factors.

OPTIMISATION OF CODE

102 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

Optimization is an important part of software development. It is the method of minimizing cost and there by increasing the output of the project. In each stage we can apply optimization. Code optimization is an important part of software development. At the end of coding a detailed review is conducted. The code reusability is important in code optimization. The process of eliminating unnecessary steps and there by increasing the output in Lions info system is known as code optimization. The purpose of Inheritance is code reusability. Inherit the property of a base class to its derived class. In our project , objects are used to inherit the code from one form to another. It reduces the programming length (LOC). Another stage in code optimization is code restructuring. Restructuring does not modify the overall program architecture. It tends to focuses on the design details of individual modules and on local data structures defined within modules.

BENEFITS OF CODE OPTIMIZATION
• Leads to programs that have higher quality-better documentation and less complexity, conformance to modern software engineering practices and standards. • Reduces frustration among software engineers who must work on the program, there by improving productivity and making learning easier • Reduces the effort required to perform maintenance activities. 103 INDIRA GANDHI NATIONAL OPEN UNIVERSITY

104 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . The oracle engine reads system information and locates the starting location of a tables records on the current storage media. Optimization By Reducing The Number Of Global Variables As the number of global variables increases the overheads by means of memory requirements. This affects the speed and performance of the program in turn. Hence through out the program the numbers of global variables are minimized. OPTIMIZATION BY INDEXING IN DATABASE When the user fires a select statement to search for a particular record.• Make software easier to test and debug Code restructuring is performed to yield a design that produces the same function but with higher quality than the original program. This process is known as code optimization. The oracle engine them performs a sequential search to locate records that match user defined criteria. Wherever needed the local variables are used reducing the number of global variables. code restructuring techniques model program logic using Boolean algebra and then apply a series of transformation rules that yield restructured logic. In general. increases. This has helped in more efficiency. hard disk capacity etc. the oracle engine must first locate the table on the hard disk.

Information can be returned via the Parameters collection or in a Recordset object.Indexing a table is an access strategy. • An address field that identifies the location of the record in the oracle database. When data is inserted in the table. OPTIMIZATION BY USE OF SHARED PROCEDURES IN THE DATABASE Stored procedures are useful tools that allow you to execute a set of SQL statements on the database server by issuing a single command with a series of parameters. This rowed indicates exactly where the record is stored in the table. This is done for every data value inserted into the index. Indexes are essential to improve the speed with which the records can be located and retrieved from a table. a way to sort and search records in the table. An index is an ordered list of the contents of a column. the oracle engine locates an associated record in the table suing the rowed fount in the table. without exception. Stored procedures 105 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Indexing involves forming a two dimensional matrix completely independents of the table on which the index is being created. • A column . of a table. For every data value held in the index the oracle engine inserts a unique rowid value. This address field Is called the Rowid. Hence once the appropriated index data values have been located. which will hold sorted data. the oracle engine inserts the data value in the index. that is. extracted from the table on which the index is being created.

ADVANTAGES OF STORED PROCEDURES Many people use stored procedures in their database applications for three main reasons: faster performance. The first reason is that stored procedures are stored on the database server in a prepared format. most database servers will prepare the statement each time you execute it.are highly dependent on the database system on which they run. This means that the intermediate recordsets you would have transmitted to the client computer. Also. In addition. stored procedures often contain multiple SQL statements. The individual statements are executed in sequence until the stored procedure is complete. if you repeatedly execute the same statement. which means that you don’t have to wait for a response across the network before you send the next command. imposing a lot of extra overhead on the database server. and the commands you would have 106 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . This avoids the overhead of preparing a statement on the fly. FASTER PERFORMANCE Using stored procedures is typically faster than issuing the equivalent SQL statements from your application. the benefits of using stored procedures often far outweigh having SQL statements that are independent of a particular database system. application logic. for several reasons. However. and security.

SECURITY Using a stored procedures can be more secure than granting someone direct access to a database. call other stored procedures. aren’t necessary. but one whose execution is tightly coupled with the database server. they code their business logic as stored procedures and make them available for application programmers to use. you can think of a stored procedure much like you would think of a Visual Basic program. Which in turn reduces the amount of time needed to perform the function. Since many developers find this concept appealing.issued in response. Since stored procedures are database objects. In short. perform computations. and process recordsets —as well as execute SQL statements. they are usually secured using the same tools that you would use for a table or a view for user access. APPLICATION LOGIC Stored procedures are written using a language that allows you to have local variables. and as long as the calling sequence isn’t changed. This ensures that each program can take advantage of the business logic. yet you can allow the stored procedure to run using someone else’s database privileges. This allows you to put code in a stored procedure to perform a specific function 107 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . you won’t have to recompile your Visual Basic program each time a stored procedure is changed.

108 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . The user will not be able to see or change this code.that the user might not otherwise be able to perform.

One of the major constraints imposed is the NOT 109 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . In most of the cases where error occurs an error message is popped to the user who is supposed to realize the fact and do the necessary steps. Any NULL value entered in the Input form will be checked with in the form itself. the system check the validity of the entities. Error procedures must be specified in detail showing decisions. So it is a powerful tool.VALIDATION CHECKS Software that has been built is traceable to customer Validation refers to the different set of activities that ensure that the requirements. date data types. number. The Kalagram Fashion Design. is developed by using visual basic/oracle as tools. writing error record and signaling the appropriate message to the user. The major constraints used in the current system falls under the fore said categories. And also check the width of the data. which includes rejection of the item of input or processing the next item. If a user enter the data of a different data types. The entities in each table contain different data types. which are enter by the user. which are character. The program developed is checked thoroughly for errors by testing it with data and the errors that are raised during this is clarified. actions and exceptions. is accurate with the entering data. which already maintain the security and integrity of the system. which are already specified. There are various ways of handling errors open to the designer.

If all the rows under the referenced key column in a parent table are deleted. the reliability of the users. error. and unauthorized access. To implement this. and restrict system access. then all the rows in the child table with dependent foreign key columns will also be deleted automatically. Its main job is to prevent duplication of values within rows of a specified column or set of columns in a table. SYSTEM SECURITY There is a responsibility to design a workable security system to protect the system from damage. we should define the column in the parent table as Primary key and the same column in the child table as a Foreign Key in the child table referring to the corresponding parent entry. ON DELETE CASCADE clause is also used. The system security problem can be divided in to four related issues: security. PRIMARY KEY constraint avoids duplication of rows and does not allow NULL values when enforced in a column or set of columns. it will not accept null values. The level of protection depends on the sensitivity of the data. The system includes control procedures to provide physical protection. Another constraint is the UNIQUE constraint. 110 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . it is used to identify a row. Referential integrity constraints are used to establish a Master-Child relationship between two tables having common columns. integrity. maintain data integrity. and the complexity of the sytem.NULL constraint. and confidentiality. When such a constraint is imposed on a column or set of columns in a table. privacy. As a result.

The security program accepts the user identification and password and check the validity in the files. The data stored in the database is of high importance. System integrity refers to the proper functioning of hardware and programs appropriate physical security. and safety against external threats. The term confidentiality is a special status given to sensitive information in database to minimize the possible invasion of privacy. Privacy defines the rights of the users or organization to determine what information they are willing to share with or accept from others and how the organization can be protected against unwelcome. unfair. TESTING 111 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Thus tampering the database by unauthorized use should be restricted. In this project the access to the data as a whole is protected by user ids and corresponding password A password is the most commonly used means for authenticating the identity of people. Granting access to specific users will give a high range of security to the database. or excessive dissemination of information about it.System security refers to the technical innovation and procedures applied to the hardware and operating systems to protect against deliberate or accidental damage from a defined threat.

Testing begins at the module level and work towards the integration of entire computers based system. This is much more tedious than it may at first appear. The performance of the system is measured in this phase. Testing is a set activity that can be planned and conducted systematically. especially for large programs.  A good test case is one that has a high probability of finding an undiscovered error. Nothing is complete without testing. it would uncover errors in the software. 112 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . TESTING OBJECTIVES  Testing is a process of executing a program and finding a BUG. If testing is conducted successfully according to the objectives as stated above.  A successful test is one that uncovers an undiscovered error. There are three ways to test a program  For Correctness  For Implementation efficiency  For Computational Complexity. Also testing demonstrates that software functions appear to the working according to the specification. as it is vital success of the system. that performance requirements appear to have been met. Tests for correctness are supposed to verify that a program does exactly what it was designed to do. Care should be given during the whole process of testing.This forms another major part of any System Development process.

and out of the program unit and out of the program unit under test.The following ideas should be a part of any testing plan  Preventive Measures  Spot checks  Testing all parts of the program  Test Data  Looking for trouble  Time for testing  Re Testing The entire testing process can be divided into 3 phases  Unit Testing  Integrated Testing  Final/ System testing UNIT TESTING Unit testing focuses verification effort on the smallest unit of software designs the module. Control paths are tested to ensure the information properly flows into. All Validations and conditions are tested in the module level in the unit test. modules Boundary condition is tested to ensure that the at boundaries. establishes that it restricts operates processing. To check whether each module in the software works properly so that it gives desired outputs to the given inputs. All independent paths through the control structure ensure 113 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

The test data was given to each and every module in all respects and got the desired output. all errors handling paths are tested. Data may be lost across interface and one module can have an adverse effect on another. INTEGRATION TESTING Though each program works individually. 114 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . the programs are constructed and tested in small segments. they should work after linking them together. may not do the desired function expected by the main routine. Integration testing is a systematic technique for constructing program structure while at same time.that all statements in a module have been executed at least once. conducting test to uncover errors associated with the interface. In this system. Subroutines. The different test cases are. DATA VALIDATION TESTING Data validation is done to see whether the corresponding entries made in the tables are correct. Duplication of data has to be avoided to the maximum extent. Unit testing has been successfully handled. Proper validation checks are done in case of insertion and updating of tables. White Box testing is a test case design method that uses the control structure of other procedural designs to divide the test cases. This is also referred to as Interfacing. Each module has been tested found working properly. In the testing. after linking. In conclusion.

2. TEST DATA The system analyst will provide the test data. Preparation of test data and the checking of results should be carried out in conjunction with the appropriate users and operational departments. Each module was tested and the tested modules were linked and integration test was carried out. Also the extent to which the system should be tested must be planned. Exercise internal data structure to ensure their validity.1. DEBUGGING The potential ability of Java to handle exceptions was used extensively during the planned. The test should take place at the same environment. Execute all loops at their boundaries and within their operational bounds. Guarantee that all independent parts within a module have been exercised at least once. 4. 3. specially designed to show that the system will operate successfully in all its aspects and produce expected results under expected conditions. The test objectives should be clear. Exercise all logical decisions on their true/false side. DEBUGGING 115 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Any mistakes found are rectified and found running successfully. FINAL / SYSTEM TESTING This is the final step in testing. Black box testing has been successfully handled. modules and class modules. Exceptions occur at many of the stages like during start of a program to any abnormal operations done or any missing threads. SQL were caught separately and various modes of their variations were found. Black Box testing methods focus on the functional requirement of the software. incorrect or missing functions. performance errors and initialisation errors and termination errors. That is. TEST DATA 116 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .The potential ability debugging process. In this system. The test-input data was given to the system and got desired input. Black Box testing attempts to find errors in the following categories. Errors in case of back-end tables were used to display to the user in a number of ways. Various errors occurred in the cases of variables. This form of testing is popularly known as Black Box testing or system testing. errors in data structures or external database access. All types of exceptions were caught and explicitly handled. which carried same name and caused a lot of problems when all modules were linked. interface errors. the entire system was tested as a whole with all forms. Black Box testing enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. In this. code.

Test data should be prepared carefully since the data only determines the efficiency and accuracy of the system. Every program validates the input data. Artificial data are prepared solely for the purpose of testing. 117 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

training users. In this system. and verifying printouts for integrity. Implementation of a computer system to replace manual system include converting files. the complete system. When the staffs have been trained. creating accurate files. Once the planning has been completed. It includes careful planning. System testing check the readiness and accuracy of the system access update and retrieve data from new files. investigation of current system and its constraints on implementation. The first task in implementation is planning—deciding on the methods and time-scale to be adopted. the major effort is to ensure that the programs in the system are working properly. the test data are read into the computer and processed. Once the program becomes available.SYSTEM MAINTENANCE IMPLEMENTATION AND Implementation is the process of converting a new or a revised system in to an operational one. design of methods to achieve the changeover. At the same time concentrate on training the staff. conventional Parallel Run was conducted to 118 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . involving both computer and user can be executed effectively. training of the staff in the changeover procedure and evaluation of changeover method.

CHANGEOVER METHOD Changeover is the process of adopting the new system. There is a set of methods like Direct Changeover. This is done after the system has been developed and tested completely. Pilot running is intended here. risks.establish the efficiency of the system. The objective is to put the tested system into operation while holding costs.  Creating Computer-Compatible Files  Training the Operating Staff  Installing Terminals and Hardware A critical aspect of conversion is not disrupting the functioning of the organization. CONVERSION Conversion means changing from one system to another. Parallel Changeover. It involves. Pilot running etc. The new system has to be introduced however. Data from one or more previous periods for the whole or part of the system is run on the new system after results have been obtained from the old system and both are compared. It is performed till the completion of one system life cycle. Conversion is one aspect of implementation. and personal irritation to a minimum. When the changeover has taken place there will be a need for amendment to correct or improve the new 119 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

The second activity that contributes to a definition of maintenance occurs since rapid change is encountered in every aspect of computing. The definition of software maintenance can be given by describing four activities that are undertaken after the program is released for use. or perfective. modifications to the existing functions and general enhancements when the software is used. It holds the software industry captive. prefecture maintenance is performed. Therefore.system. adaptive maintenance modifies software to properly interface with a changing environment. some fields will automatically get their default values. If the user desires to change these default values he can do it. The third activity involves recommendations for new capabilities. trying up programming resources. Maintenance can be classified as corrective. This is called preventive maintenance 120 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . The first maintenance activity occurs since it is unreasonable to assume that software testing will uncover all errors in a large software system. The process of including the diagnosis and correction of one or more errors is called corrective maintenance. adaptive. To satisfy requests. When the user wants to add any new records. The fourth maintenance activity occurs when software is changed to improve future maintainability or reliability. SYSTEM MAINTENANCE Maintenance is the enigma of system development.

121 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .Maintenance covers a wide range of activities. including correcting coding. often complicated by poor internal documentation. global data structure. system interfaces. and upgrading user support. updating documentation and test data. If the only available element of a software configuration is the source code. The amounts of changes that are made to the code are difficult to assess. and performance and design constraints are difficult to handle and are often misinterpreted. and design errors. Maintenance demands more orientation and training than any other programming activities. The subtle characteristics such as program structure. maintenance activity begins with the evaluation of the code.

software costs constituted a small percentage of overall computer-based system cost. 3. Base estimates on similar projects that have already been completed. The remaining options are viable approaches to software estimation. Use one or more empirical models for software cost and effort estimation. technical. a number of options arise: 1. however attractive. 4. A large cost estimation error can make the difference between profit and loss.COST ESTIMATION In the early days of computing. is not practical. political.By decomposing a 122 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . the first option. Use relatively simple “decomposition techniques” to generate project cost and effort estimates. Today. To achieve reliable cost and effort estimates. Unfortunately. 2. past experience has not always been a good indicator of future results. Software cost and effort estimation depends on different variables-human. Decomposition techniques take a “divide and conquer” approach to software project estimation . software is the most expensive element in the most computer -based systems. Cost overrun can be disastrous for the developer. environmental. The second option can work reasonably well if the current project is quite similar to past efforts and other project influences. Delay estimation until late the project. Unfortunately.

attractive option estimating.. D=f(vi) Where d is one of a number of estimated values (eg. effort. cost. project duration) and vi estimated LOC or FP) Automated estimation tools implement one or more decomposition techniques or empirical models. the characteristics of the development organization and the software to be developed are described. cost and effort estimation can be performed in a stepwise fashion. Empirical estimation models can be used to complement decomposition techniques and offer a potentially valuable estimation approach in their own right.project into major functions and related software engineering activities. 123 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Cost and effort estimates are derived from the data.. automated tools provide an are selected independent parameters (eg. In such systems. When combined with an interactive machine interface.

Generally reports are of 3 types. Detailed report. 124 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . summary report and exception report.REPORTS Reports are disciplined way of presenting the data stored on the disk in a well formatted manner. so that one can take decisions based on it.

125 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

……… 126 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .

Project Planning. METHODOLOGY OF PERT The mythology involved in applying PERT for any project may be split into the following stages: Step 1. which an activity takes in completion under ideal conditions. 127 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Optimistic time (a or t0): is that time estimate of an activity when everything is assumed to go well as per plan.They are Optimistic time. However. Step 4.It is a method in which we try to exercise logical discipline in planning and controlling projects. Time Estimation. Step 3. no provisions are made for breakdown. Project Control. Step 5.Most likely estimates in PERT system. Step 2.Pessimistic time. Resource Allocation. PERT System of Three Time Estimates: The traditional single estimate of duration of any activity is replaced by three time time. Scheduling. Step 6. Time-cost trade-offs. In other words it is the estimates of the minimum possible time.PERT AND GANTT CHART PERT is essentially a management technique and can be used with advantage for responsibility accounting in addition to attaining other well-defined objectives. delays etc.

goes wrong in series. They are : the most likely estimate (m). Pessimistic time(b or tp ) :The unlikely but possible performance time if whatever could go wrong . acts of god and unrest.The network is then suitably sketched to conform to rules and conventions Step 4.Most likely time (m or tm):The time which the activity will take more frequently if performed a number of times-the model value.the pessimistic estimate ( a). Then up on the assumption of beta distribution for the activity duration.This however. Develop a list of activities that made up the project including immediate predecessors.Events are numbered in ascending order from left to right Step 5.the expected time .Time estimates for each activity are then obtained. does not include major catastrophes like labour strikes. Step 2. PERT Algorithm: The various steps involved in developing PERT network for analyzing any project are summarized below: Step1. A rough PERT network os drawn on the basis of the three questions for each activity: (1) (11) Which activity is precede this one ? Which activities follow this one ? (111) Which activities are concurrent with this one ? Step 3. optimistic estimate ( b) Step 6. etc. In other words it is the longest time the activity can conceivably take.te for each activity is computed from the following formula: 128 INDIRA GANDHI NATIONAL OPEN UNIVERSITY (111)the .

The earlier tasks appear in the upper left and later ones in the lower right.After determining the latest start time and the latest finish time for each activity. the right ends its finish. Step7. Gantt type chart illustrates the principles of a project planning and reporting chart The Gantt chart uses horizontal bars to show the durations of actions or tasks.Crashing or compressing the project may have to be undertaken if the critical path duration is not acceptable to the management. the earliest finish time for the complete project corresponds to the earlist finish time for the last activity. Using the values for b and a which were determined in step 5. GANTT CHARTS A project plan is a schedule of milestones over the duration of the project. Using expected activity time estimates.calculate the variance(σ 2) of each activity’s time estimates by:=(ba/6)2 Step 10: Use the variability in the activity times to estimate the variability of the project completion date. Charts are an effective mans of depicting a project schedule and of reporting progress as it occurs. A task is specific job that can be assigned 129 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . Step 11. Step8. determine the earliest start time and the earliest finish time for each activity. the critical path activities are the activities with zero float Step 9.te =a+4m+b/6. The left end marks the beginning of task. compute the float associated with each activity.

This is called Slack time.to one person to perform in a specific time . In real time applications. All activities. Determine the tasks for each activity and the estimated completion times. determine the total estimated time for each activity and obtain an agreement to proceed. which ends in a milestone. several steps are undertaken 1. Review and record progress 130 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . 5. 2. Identify the activities and tasks in the stage. an allowance for contingencies is provided. 3. tasks. 4.A group of tasks makes up an activity. In planning this project. Plot activities on a Gantt chart. with emphasis on simplicity and accuracy. and milestones are drawn on the Gantt chart. Each activity must be identified to plan the completion date and allocate responsibilities among members of the project team.

This work is just a small part of the whole work in the organization. 131 INDIRA GANDHI NATIONAL OPEN UNIVERSITY . In the readymade section more reports can be added. Currently the designing of pant. shirt and churidar is accomplished through computerization. In future all the dress materials may be designed through the help of computer.FUTURE SCOPE OF THE PROJECT This work is flexibly developed according to the current requirements of Kalagram.

.BIBLIOGRAPHY 1. Visual Basic Bible IDG Publication 4. Award 6.System Analysis And Design Elias M. Software Engineering – A Practitioner’s Approach McGraw-Hill International Edition Roger S Pressman 3. Operation Research and Statical Analysis Sultan Chand &Sons P. Elements of System Analysis Third Edition Golgotha Book Source Marvin GORE.Korth 2.K. Oracle – Visual Basic Hand Book SSI Limited 5. John Stubbe 7.Database system concepts Hentry F.Gupta & Manmohan 132 INDIRA GANDHI NATIONAL OPEN UNIVERSITY .