manvinder1
TRANSCRIPT
-
7/31/2019 MANVINDER1
1/83
28-58
ORGANIZATION OVERVIEW
SQL Technologies is an internationally recognized Software Development and IT
Consultancy Company . SQL's core Management team is built around the expertise of topclass performance with proven track in software design, development, testing andimplementation for topnotch companies. Our superior methodologies, standard quality
processes, effective project management and a right mix of on-site and off-shore softwareteams help us execute projects that often exceed client expectations. Currently we arelocated at Chandigarh and Jalandhar .
SQL Technologies has a high-end dedicated software development design center with aversatile skill pool specializing in technologies like .NET, J2EE, PHP, ORACLE , AJAXdevelopment and is fully equipped to expand for various projects as per the client'srequirment
SQL Technologies also has state of art Training Division with more than 10,000 sq.ft.space, which provides an unrivaled range of high quality Training and Certifications inSoftware courses for Engineering/MCA Students and Corporates who seeks a securedcareer in the IT world. All the programs are devised to equip the students with unparalleled
professional expertise as you walk out with the Internationally Acclaimed Certifications.
-
7/31/2019 MANVINDER1
2/83
SQL Technologies Training Division offers specialized High-Tech Industrial TrainingProgram which maps according to the current industry requirements. The focus of theIndustrial Training is to facilitate students with Live Projects on lates technologies likeVB.NET, ASP.NET, PHP, ORACLE DBA/DEVELOPER, J2EE, STRUTS, SPRINGS,HIBERNATE, LINUX, MCITP, CCNA, Web Designing and Development under the strict
guidance of Industry Experts.
SOFTWARE DEVELOPMENT :
-Design, Development & Supports of Business Software Applications.-Free and Open-Source Software Development,Customization & Support.-Programming for Mobile,Handheld Device,OEM Hardware & Embedded Systems.-Networking Consultancy & project implementation.- Dedicated Offshore Technology Center
NETWORK CONSULTANCY:
Outsourcing Local Area Network design and implementation requirements can help toreduce the cost and the risk to business. We will work with clients until their needs are met,
providing the desired infrastructure and implementation. We have years of experience withLAN networking, Switching, Bridging, Firewalling and Network Security. We can help tomaintain the stability of current network as well as upgrading current infrastructure.Our Network Team works to create a great computer network infrastructure with a widevariatey of functions. Our team of experienced network engineers will provide hands-onexpertise to implement the desired networking infrastructure for clients needs. We can
also help to setup home network for personal use, or family computer networkingneeds.
TRAINING PROGRAMS
SQL Technologies, INDIA's leading IT-Education provider, equips learners withactionable knowledge, getting the right learning to the right people at the right time WithSQL Technologies, you can accelerate and certify the skills of a globally dispersed staff with standardised course materials through every stage of the IT learning curve
2
-
7/31/2019 MANVINDER1
3/83
PROFILE OF THE PROBLEM
THE MAIN COMPONENTS INCLUDE:
Project Manger assign project to Team leaders and Team Leader assign the
particular module to their team member.
Overall Supervision whether project is completed within time or under
development
Authentication and Verification done by Project Manager who plays the role of Administrator
OBJECTIVE:
To reduce the overall manpower of the system, to increase the efficiency productivity
and to facilitate the work done in present system, to streamline and speed-up the
information flow between concerned departments, it provides the overall view of the
organization from the single desk and reduces the inconsistencies. It provides the
multi-user view and access to the data using G.U.I. it increases the data security and
flexibility. Identify the opportunities available and processes having highest potential
improvement.
3
-
7/31/2019 MANVINDER1
4/83
It is the first and the foremost thing to decide the principles and objectives in
development of any application. These objectives lay down the path for the successful
completion of any application. These decide the framework on which the user can turn
his brain on and make things happen his own way. Predetermination of the objectives
makes things go easy. The application in our case is the automation of bank. First of all
we decide the reason as to why there is a need to develop such an application. The
answer for this question is not just a single reason. It includes a wide application area
via which we have successfully implemented this project. The reasons are as follows:
1. Removal of the old manual framework.
2. Fulfilling the needs of the organization in a way that it benefits the physical
outfit of the organization.
3. Removal of any discrepancies that may lead to human harassment due to the
old framework in action.
4. Develop a user friendly environment which a user can appreciate and use as he
desires.
5. Limiting the economic structure of the organization in which it is to be
implemented and used.
Making it adaptable for changing environment and alterations that can affect its presentworking
4
-
7/31/2019 MANVINDER1
5/83
EXISTING SYSTEM
1. In the existing system the Project Manager, Team Leader has to compute
results and cut offs manually.
2. The existing lengths of some fields could not be increased.
3. Lack of access to instant information.
4. Non-availability of Dynamic Reports at different levels.
5. Data redundancy due to single Reports at different levels.
6. Lack of consistency between the various education grades.
7. No track of hands involving in the task.
DRAWBACKS OF EXISTING SYSTEM:
1. Slow and inefficient.
2. Error prone.
3. Redundancy of data.
4. Non centralized data.
5. Higher maintenance cost.
6. Inconsistency of data.
7. Changes of tampering with the documents and data by unauthorized persons.
8. All the work being delayed leads to the bad quality of the product.
5
-
7/31/2019 MANVINDER1
6/83
9. Customer complaints are increased due to the defective products.
ADVANTAGES OF PROPOSED SYSTEM OVER EXISTING SYSTEM:
1. Improved accuracy
2. Improved timeliness of information.
3. Interactive in nature.
4. Far more reliable than existing system.
5. Large volumes of data can be processed in time.
6. Cost of paper work reduced.
7. There is only one time installation cost and future upgradeability.
8. Tampering of data from unauthorized persons will not be there.
9. Reports can be had to increase the effectiveness and efficiency of the Company.
FUNCTIONS TO BE PROVIDED/USER REQUIREMENTS :
Keeping in view the working of the company the model to be developed should meetfollowing requirement and objectives. These requirements were taken in a specialsession with the employees and staff of the organization who are finally going tooperate on to the system. Following are the requirements for the users side.
6
-
7/31/2019 MANVINDER1
7/83
USER FRIENDLY:
a) The system should be as far as possible to understand and to work with.
b) Data entry should be easier.
SECURITY:
a) The system should be secure from malicious data entry.
b) The system should not be in reach of any unauthorized user.
c) Should be robust to handle if there is any unwanted attack over the data andinformation because the system is going to be implemented on the web and there arechances of viruses and security threat to a great extent.
REAL TIME:
a) The system should be capable of generating up to date information.
b) Generation of information should consider time factor i.e. turnaround time should beminimum.
OBJECTIVES OF PROPOSED SYSTEM:
PRIMARY OBJECTIVES:
The Database is the Foundation Stone of Future Application Development It should
make application development easier, cheaper faster and more flexible.
The Data Can Have Multiple Uses different users who perceive the same data
differently can employ them in different ways.
Intellectual Investment : protects existing programs and logical data structure willnot have to be redone when changes are made to the database.
Clarity : users can easily know and understand what data are available to them.
7
-
7/31/2019 MANVINDER1
8/83
Ease of Use: Users can gain access to data in a simple fashion. Complexity is
hidden from the readers by the database management system. The data can be used
or searched in flexible ways with different access paths.
Unanticipated requests for data can be handled quickly. Spontaneous requests for
data can be handled without application programs having to be written , by means
of high-level query or report generation system.
Change is Easy : The database can grow and change without interfering with
established ways of using the data.
Low Cost : Low cost of storing and using data. And minimization of the high cost
of making changes.
Less data Proliferation : New application needs may be met with existing
data rather than creating new files, thus avoiding the excessive data proliferation in
todays tape libraries.
Performance : Data requests can be satisfied with speed suitable to the usage of data.
SECONDARY OBJECTIVES:
Physical data Independence : Storage hardware and physical storage
techniques can be changed without causing application program re-writing
Logical data Independence : New item data can be added or the overall
logical structures expanded without existing programs having to be re-written.
Controlled Redundancy : Data items will be stored only once except where there are
technical or economic reasons for redundant storage.
Suitably fast Access : Access mechanism and addressing methods will be fast
enough for the usage in the question.
Suitably Fast Searching : The need for fast spontaneous searching of the data will
grow as inter-active systems usage spreads.
Data standardization : Within a Corporation Inter Department agreement is needed
in data format and definitions. Standardization is needed between Departments who
would otherwise create incompatible data.
8
-
7/31/2019 MANVINDER1
9/83
Data Dictionary : A Data Dictionary, defining all data items used, is needed.
High Level Programmer Interface : Application programmer should use simple,
powerful data re1quests and be insulated from the complexities of file layout and
addressing.
End user Language : A high level query or report generation language should permit
some end users to bypass the application programming step.
Inter control : Range checks and other controls should detect data inaccuracies,
Where possible.
Fast Recovery from Failures : Automatic recovery without loss of transactions.
Tenability: The database should be tunable, to improve performance without
causing application program re-writing.
Design and Monitoring Aids : Aids, which permit the designer or data administrator
to predict and optimize performance.
Automatic Reorganization or Migration : Data Migration or other automatic
physical reorganization designed to improve performance.
Evolution to Distributed Data Base operation : The system should be designed so
that distributed processing and computer network operations can evolve.
ADVANTAGES OF PROPOSED SYSTEM :
Accuracy will be highly enhanced.
Data stored will become much easy and compact.
Reports and bills can be made available which is must for them.
A lot of computational burden will be off.
Users can easily know and understand what data are available to them.
The Database is the Foundation Stone of future Application Development.
It should make application development easier, cheaper, faster, reliable and more
flexible.
The data can have multiple uses different users who perceive the same data
differently can employ them in different ways.
9
-
7/31/2019 MANVINDER1
10/83
Unanticipated requests for data can be handled quickly. Spontaneous requests for
data can be handled without application programs having to be written (a time
consuming bottleneck), by means of high-level query or report generation system.
Even stranger to computer can use the system being menu driven with little effort.
SYSTEM REQUIREMENTS
HARDWARE & SOFTWARE SPECIFICATIONS
The Software Interface will be based on a standalone workstation concept. The front-
end interface being used is designed in JAVA Technology The back-end being used for
database MS-Access.
SOFTWARE SPECIFICATION:
1. Front end: JAVA
2. Back end: Oracle
LANGUAGES AND TECHNOLOGIES USED: Java Core JDBC Swings
HARDWARE SPECIFICATION:
1. Processor: Intel P4 and advanced
2. Ram: 1gb or more
3. Windows: xp,7
10
-
7/31/2019 MANVINDER1
11/83
PRODUCT DEFINITION (INTRODUCTION TO PROJECT)
PROJECT DESCRIPTION
This is the Desktop application. The Project is mainly concerned with getting less burdenon employees of the bank and to centralized the database. The bank will require moremanpower to maintain financial transactions, updating etc.
All the information thus entered will reach the Corporate Office through the Internet andthis Information will be updated in the corporate databases by the Online Client andcompany admin.
DETAILS OF THE PROJECT
This project is easiest to use. This project has been developed in AWT+SWING. I have
used jdk1.6 software to develop this project. You can create new account account. You
can deposit amount in the particular account no. You can also withdraw amount from the
particular account no. You can search the information about a particular account no. You
can delete the account and their information.
You can also update the account information through this project. This project reduce
paper work.
This project is used to perform banking related transaction.
11
-
7/31/2019 MANVINDER1
12/83
`
PROBLEM STATEMENT
APPLICATION TYPE
An application type is derived by registering the user details in the database by
authenticated user who has access to the database of the project as new user cannot be
created by everyone.
APPLICATION INSTANCE
An initiated execution of an application type is defined as an application instance. The
application is uploaded on the personal computers of the employees and it is not
available for public.
Each instance is contained within its own domain-this means that any user account
made cannot be accessed by any other user.
12
-
7/31/2019 MANVINDER1
13/83
FUNCTIONS TO BE PROVIDED:
The overall objective of the team was for seeking the daily task done by employees of their
Organization. By using this Project, Project Manager Assign the project to Team Leader of
their Organization .The main aim of this project manger is to know whether project is
completed within tentative time. With the help of these projects Organization come to
know efficiency of their employees.
Provide security by login facility.
Very user friendly.
Easy to operate.
PROCESSING ENVIRONMENT:
HARDWARE & SOFTWARE PROFILE
The application would be developed in:
Front End Interface Notepad and DOS
Programming Language JAVABack End Database Oracle (10g).OPERATING SYSTEM Windows Xp/2000/2003/7
LANGUAGES AND TECHNOLOGIES USED: Java Core JDBC Swings Oracle (10g).
13
-
7/31/2019 MANVINDER1
14/83
SOLUTION STRATEGY:
Desktop Applications are automations of system whether they are bank systems,
college management system, hospital management system etc. As such they require
proper maintenance to ensure that accurate and updated information is presented
adequately. Therefore every project development and maintenance project is given
equal emphasis when it comes to following the guidelines and process we have laid
down as part of our well defined project development and maintenance methodology.
CONTENT:
A Desktop Application is your automated system. We focus on firstly the essentials
like user friendly interface, ease of navigation etc. The total content is uploaded in
datbase priority wise. The client can add any other information or features, which they
feel is important.
EASE OF NAVIGATION:
At Soften Creative Solutions Pvt. Ltd., we design logical navigation systems that allowvisitors to understand your projects clearly and easily find the information.
SPEED:
While designing your applications, we follow certain technical guidelines that help in
loading your forms fast, leading to minimum time.
14
-
7/31/2019 MANVINDER1
15/83
FEASIBILITY ANALYSIS:
Feasibility Study is defined as an evaluation or analysis of the potential impact of a proposed project or program. An initial investigation in a proposal that determines
whether an alternative system is feasible. A proposal summarizing the thinking of theanalyst is presented to the user for review. When approved the proposal initiates afeasibility study that describe and evaluates candidates system and provides for theselection of the best system performance requirement.
Following are the types of feasibility analysis: -
ECONOMIC FEASIBILITY:
An evaluation of development cost weighted against the ultimate income or benefit
derived from the developed system. Economic analysis is the most frequently usedmethod for evaluating the effectiveness of the system. More commonly known ascost/benefit analysis, the procedure is to determine the benefits and savings that areexpected from a system and compare them with cost. If benefits overweigh cost. Thenthe decision is made to design and implement the system. Otherwise, further
justification or alteration in the proposed system will have chances of being approved.This is an ongoing effort that improves inaccuracy at each phase of the system lifecycle.
TECHNICAL FEASIBILITY:
Technical feasibility center on the existing computer (hardware, software) etc and towhat extend it can support the proposed addition. System developed by us in technicalfeasible because no system was previously running on their system as they have
purchased new system. Our system is easy to use as it is user friendly that events a manwho knows simple English, how to type can use it efficiency and it is capable infulfilling their requirements about letter of credit and billing process of trade. We haveremoved all the technicalities unnecessary botheration for users while developingsystem.
The necessary technologies that are required to implement the proposed system are
available easily in the software market. The main hardware equipments such ascomputers, printers, etc. are readily available.
15
-
7/31/2019 MANVINDER1
16/83
OPERATIONAL FEASIBILITY:
The main objective here is to determine whether the system will work after it is
developed and installed. A proper investigation was done in this regard and as a result,the following conclusions were derived: There was sufficient support from the management and the client involved.
The current methods are too cumbersome and take a lot of time and include
repetitive works.
The important data is not available as and when desired.
It takes a lot of time to gather the important statistics regarding the system.
The persons involved in the current working of the system were met and
discussions were held with them to evolve a system with which they had good
support and participation.
16
-
7/31/2019 MANVINDER1
17/83
PROJECT PLAN
TEAM STRUCTURE:
The team structure for the project is guided by the Mr. Kunwarpal. Proper sessionunder his guidance is established for the requirements and need on the users side aswell from the developers side.
The team structure of the organization is shown as per the hierarchy level of the
organization.
DEVELOPMENT SCHEDULE:
The following steps were followed in developing the application
1. Study, Analysis and Requirement Specifications: The study of the
existing system and its drawback gave an idea about what kind of interface was
required. The study was conducted through information gathering and studying the
existing system.
2. Design of the proposed system: The next step was to design the screen,
windows and reports for the inputs and outputs. The concerned authorities
consulted during the design phase to ensure user acceptances and not to miss out on
17
PROJECT LEADER Mr. Sarabjit Singh
DEVELOPERS FOR NewAccount form, Deposit form,Withdraw form, DepositInquiry form, WithdrawInquiry form:
1. M/s Manvinder Kaur.
DEVELOPERS FOR Searchform, Update form, DeleteA/C form, Checkbook Inquiry form, IssueCheckbook form:
1. M/s Manvinder Kaur.
-
7/31/2019 MANVINDER1
18/83
any vital information. In the same phase, the project was broken down into various
modules.
3. Coding of the design system: A modular approach was followed, where,
in each module, a well-defined procedure was developed independently. These
modules were developed to use the same database file structure to ensure integrity.
4. System documentation: This stage consists of documenting the layout of
entire system. It indicated the purpose of interlinking of different modules along
with the integration of the entire system.
5. Testing and Debugging: Preliminary test were done with the self-
generating dummy data. After identifying and removing errors, it was tested for all
activities together.
Programming Languages and Development Tools
FRONT END (JAVA)
BACK END(ORACLE)
18
-
7/31/2019 MANVINDER1
19/83
INTRODUCTION TO JAVA
Java is a general purpose, object-oriented programming language introduced by Sun
Microsystems of USA in 1991.Originally called Oak by James Gosling, one of the
inventors of the language. The java team which included Patrick Naughton discovered that
the existing languages like c and c++ had limitations in terms of both reliability and
portability. They modeled their new language java on C and C++ but removed a number of
features of C and C++ that were considered as sources of problems and thus made Java is
really simple, reliable, portable, simple, compact, interactive and powerful language. The
most striking feature of the language is that it is a platform neutral Language. Java is the
first language that is not tied to any particular hardware or operating system. Programs
developed in java can be executed anywhere on any system.
JAVA FEATURES:
1. Compiled and Interpreted : - Java combines both these approaches thus making java a two stage systems. First, java compiler translates source code into what is
known as bytecode instructions. Second, java interpreter generates machine code
that can be directly executed by the machine that is running the java programs.
2. Platform-independent and portable : - The most significant contribution of java
over other language is its portability. Java programs can be easily moved from one
computer system to another, anywhere and anytime.
3. Object-Oriented: - Java is a true object-oriented language. Almost everything in
java is an object. All program code and data reside within objects and classes. The
object model in java is simple and easy to extend.
19
-
7/31/2019 MANVINDER1
20/83
4. Robust and secure: -Java is a robust language. It provides many safeguards to
ensure reliable code. It has strict compile time and run time checking for data types.
Security becomes an important issue for a language that is used for programming
on internet.
5. Distributed: - Java is designed as a distributed language. It has the ability to share
both data and programs. This enables multiple programmers at multiple remote
locations to collaborate and work together on a single project.
6. Multithreaded: - Multithreaded means handling multiple tasks simultaneously.
Java supports multithreaded programs. This means we need not wait for the
application to finish one task before beginning another.
7. Dynamic and Extensible: - Java is a dynamic language. Java is capable of
dynamically linking in new class libraries, methods and objects. Java programs
support functions in other languages such as C and C++. These are native methods.
SYSTEM REQUIREMENT
20
-
7/31/2019 MANVINDER1
21/83
Hardware requirements:
Hardware Requirement
Processor Intel 32 bit
Memory 64 MB for OS,
128 MB for Web Server Disk Space 98 MB for OS,
110 MB for web server Software Requirement:
Operating System Version
Solaris SPARC Version 7
Solaris SPARC Version 8
Windows NT/XP/ME Version 4
Windows 2000 Professional
Windows Server 2003 Standard
Linux RedHat Version 6.0
Linux RedHat Version 6.1
JAVA SUPPORT SYSTEMS
Support system DescriptionWeb server Is a program that accepts the requests sent
by a client and processes the request.Web browser Is a program that provides access to the
world wide web and runs the java applet programs.
Web technologies Are the technologies that are used to createhypertext information to be displayed on the
internet. Various web technologies availablein the market are HTML and JSP.Java code Is used to create various programs and
application in java.Byte code Are the interpreted java code that are
converted to the machine code by javavirtual machines.
Internet connection Is used to connect a web server to the client
21
-
7/31/2019 MANVINDER1
22/83
computer that can be located anywhere inthe world.
JAVA ENVIRONMENT:
JAVA DEVELOPMENT KIT : Java Development Kit contains various
tools used by the java Runtime Environment that can be used to compile and
interpret java programs.
1. applet viewer allows you to run java applet.
2. Javac is a java compiler that translate the java source code into java class files or
the byte code files that can be interpreted by the java interpreter.
3. java is a java interpreter that executes various application by interpreting the byte
code files.
4. javah is used for including the c header files in a java program.
5. javap acts as a disassemble and is used to convert byte code files into a program
source code.
6. jdb is a java debugger that locates error in a java program.
7. javadoc creates documentation of the java source code files in the HTML format
from the comments available in a java source code.
JAVA STANDARD LIBRARY:
22
-
7/31/2019 MANVINDER1
23/83
1. Language support classes, which support basic features in java such as string, array,
threads and exception handling.
2. Utility classes that are used for various functions such as random number generator
function and container function.
3. Input or output classes that are used to read data from various input devices and
write data on various output devices.
4. Networking classes, which allow communication between different computers over
a network.
5. Abstract window toolkit that is used for creating platform- independent GUI
application.
6. Applet that allows you to create Applets which can be downloading and run on a
client browser.
THE JAVA ABSTRACT WINDOW TOOLKIT (AWT) & (SWING) PACKAGE: -
AWT stands for Abstract Window ToolKit. The Abstract Window Toolkit supports GUI
Java programming. It is a portable GUI library for stand-alone applications and/or applets.
The Abstract Window Toolkit provides the connection between your application and the
native GUI. The AWT provides a high level of abstraction for your Java program since it
hides you from the underlying details of the GUI your program will be running on.
AWT FEATURES INCLUDE:
A rich set of user interface components.
A robust event-handling model.
Graphics and imaging tools, including shape, color, and font classes.
Layout managers, for flexible window layouts that don't depend on a particular
window size or screen resolution.
Data transfer classes, for cut-and-paste through the native platform clipboard.
23
-
7/31/2019 MANVINDER1
24/83
The AWT components depend on native code counterparts (called peers) to handle their
functionality. Thus, these components are often called "heavyweight" components.
An Overview of Swing:
Swing implements a set of GUI components that build on AWT technology and provide a
pluggable look and feel. Swing is implemented entirely in the Java programming language,
and is based on the JDK 1.1 Lightweight UI Framework.
Swing features include:
All the features of AWT.
100% Pure Java certified versions of the existing AWT component set (Button,
Scrollbar, Label, etc.).
A rich set of higher-level components (such as tree view, list box, and tabbed
panes).
Pure Java design, no reliance on peers.
Pluggable Look and Feel.
Swing components do not depend on peers to handle their functionality. Thus, these
components are often called "lightweight" components.
JDBC:
The JDBC API is the industry standard for database-independent connectivity between theJava programming language and a wide range of databases. The JDBC API provides a call-level API for SQL-based database access. JDBC technology allows you to use the Java
programming language to exploit "Write Once, Run Anywhere" capabilities for applications that require access to enterprise data.The JDBC API makes it possible to do three things:
Establish a connection with a database or access any tabular data source
Send SQL statements
Process the results
JDBC Architecture:
24
-
7/31/2019 MANVINDER1
25/83
The JDBC API contains two major sets of interfaces: the first is the JDBC API for application writers, and the second is the lower-level JDBC driver API for driver writers.JDBC technology drivers fit into one of four categories. Applications and applets canaccess databases via the JDBC API using pure JavaJDBC technology-based drivers, as shown in this figure:
Left side, Type 4: Direct-to-Database Pure Java Driver: This style of driver converts JDBC calls into the network protocol used directly byDBMSs, allowing a direct call from the client machine to the DBMS server andproviding a practical solution for intranet access.
Right side, Type 3: Pure Java Driver for Database MiddlewareThis style of driver translates JDBC calls into the middleware vendor's protocol,which is then translated to a DBMS protocol by a middleware server. Themiddleware provides connectivity to many different databases.
25
-
7/31/2019 MANVINDER1
26/83
Left side, Type 1: JDBC-ODBC Bridge plus ODBC DriverThis combination provides JDBC access via ODBC drivers. ODBC binary code -- and inmany cases, database client code -- must be loaded on each client machine that uses aJDBC-ODBC Bridge. Sun provides a JDBC-ODBC Bridge driver, which is appropriate for experimental use and for situations in which no other driver is available.
Right side, Type 2: A native API partly Java technology-enabled driverThis type of driver converts JDBC calls into calls on the client API for Oracle, Sybase,Informix, DB2, or other DBMS. Note that, like the bridge driver, this style of driver requires that some binary code be loaded on each client machine.
Partnering for ProgressSun worked with an array of companies in the industry to create and rapidly establish theJDBC API as the industry-standard, open interface for Java applications to accessdatabases.
Industry Momentum:Leading database, middleware and tool vendors have been building support for JDBCtechnology into many new products. This ensures that customers can build portable Javaapplications while choosing from a wide range of competitive products for the solution
best suited to their needs.
ADVANTAGES OF JDBC TECHNOLOGY
Leverage Existing Enterprise Data:With JDBC technology, businesses are not locked in any proprietary architecture, and cancontinue to use their installed databases and access information easily -- even if it is storedon different database management systems.
Simplified Enterprise Development :The combination of the Java API and the JDBC API makes application development easyand economical. JDBC hides the complexity of many data access tasks, doing most of the"heavy lifting" for the programmer behind the scenes. The JDBC API is simple to learn,easy to deploy, and inexpensive to maintain.
Zero Configuration for Network Computers :With the JDBC API, no configuration is required on the client side. With a driver written
26
-
7/31/2019 MANVINDER1
27/83
in the Java programming language, all the information needed to make a connection iscompletely defined by the JDBC URL or by a Data Source object registered with a Java
Naming and Directory Interface (JNDI) naming service. Zero configurations for clientssupports the network computing paradigm and centralizes software maintenance.
KEY FEATURES
Full Access to Metadata:The JDBC API provides metadata access that enables the development of sophisticatedapplications that need to understand the underlying facilities and capabilities of a specificdatabase connection.
No Installation:A pure JDBC technology-based driver does not require special installation; it isautomatically downloaded as part of the applet that makes the JDBC calls.
Database Connection Identified by URL : JDBC technology exploits the advantages of Internet-standard URLs to identify databaseconnections. The JDBC API includes an even better way to identify and connect to a datasource, using a Data Source object, that makes code even more portable and easier tomaintain.
In addition to this important advantage, Data Source objects can provide connection pooling and distributed transactions, essential for enterprise database computing. Thisfunctionality is provided transparently to the programmer.
Included in the Java Platform :
As a core part of the Java 2 Platform, the JDBC API is available anywhere that the
27
-
7/31/2019 MANVINDER1
28/83
platform is. This means that your applications can truly write database applications once
and access data anywhere. The JDBC API is included in the Java 2 Platform, Standard
Edition (J2SE) and the Java 2 Platform, Enterprise Edition (J2EE), providing server-side
functionality for industrial strength scalability.
INTRODUCTION TO ORACLE 10g
Oracle certifications are industry- recognized, sought after credentials that can help you
succeed in the IT career. The OCP 10g demonstrates an expertise with oracle Database10g, the industrys first relational database designed for grid computing. This advancedcertifications proves the skills in configuring an Oracle database for multilingualapplications, using various methods of recovering and tuning the database, and usingdatabase technologies such as Resource Manager, Scheduler and Automatic StorageManagement (ASM).
ADVANTAGES OF SQL
Global Alliances & Affiliations with Oracle Corp. OCP Certified & Industry Experienced Trainers. Original & Exhaustive Courseware from Oracle. Intensive On line Training with hands on experience on Real Time Projects. World Class infrastructure & well equipped Labs.
28
-
7/31/2019 MANVINDER1
29/83
SYSTEM REQUIREMENTS SPECIFICATIONS
A software requirements specification (SRS) is a complete description of the system to
be developed. It includes a set of use cases that describes all of the interactions that theusers will have with the software. Use cases are also known as functional requirements.In addition to use cases, the SRS also contains nonfunctional requirements.Non-functional requirements which impose constraints on the design or implementation .
In system engineering and software engineering, requirements analysis encompassesthose tasks that go into determining the requirements of a new or altered system, takingaccount of the possibly conflicting requirements of the various stakeholders, such asusers. Requirements analysis is critical to the success of a project. The document thatcontains all the requirements of the project is termed as Software RequirementSpecification
Input Specifications:
Input specifications refer to the kind of the input that should be given to the system.
Design of Input:
29
-
7/31/2019 MANVINDER1
30/83
Input generally refers to what data is given to system so the system can give best output
to user. Input design must be complete, efficient and effective so that we can provide
user with desired output, which he requires.
When designing input, system analyst must take of the following: -
1.) What data to be Input?
2.) What medium to use?
3.) How data should be arranged or coded?
4.) The dialogue to guide the users in providing input?
5.) Data items and transactions needing validation to detect errors?
6.) Methods for performing input, validation and steps to follow when errors
occur?
Output Specifications:
Output specifications refer to the kind of the output that should be received from thesystem.
Design of Output:
Output as you probably know generally refers to the results and information that are
generated by the system. For many end users, output is the main reason for developing
the system and the basis on which they will evaluate the usefulness of the application.
Most end users will not actually operate the information system or enter data through
workstation, but they will use the output from the system.
30
-
7/31/2019 MANVINDER1
31/83
DESIGN
DATA FLOW DIAGRAM
A data flow diagram is graphical tool used to describe and analyze movement of data
through a system. These are the central tool and the basis from which the other
components are developed. The transformation of data from input to output, through
processed, may be described logically and independently of physical components
associated with the system. These are known as the logical data flow diagrams. A fulldescription of a system actually consists of a set of data flow diagrams. Each
component in a DFD is labeled with a descriptive name. Process is further identified
with a number that will be used for identification purpose. The development of DFDs
is done in several levels. Each process in lower level diagrams can be broken down
into a more detailed DFD in the next level. The lop-level diagram is often called
31
-
7/31/2019 MANVINDER1
32/83
context diagram. It consists a single process bit, which plays vital role in studying the
current system. The process in the context level diagram is exploded into other process
at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at
one level of detail is exploded into greater detail at the next level. This is done until
further explosion is necessary and an adequate amount of detail is described for analyst
to understand the process.
A DFD is also known as a bubble Chart has the purpose of clarifying system
requirements and identifying major transformations that will become programs in
system design. So it is the starting point of the design to the lowest level of detail. A
DFD consists of a series of bubbles joined by data flows in the system.
DFD Symbols:
In the DFD, there are four symbols
A square defines a source(originator) or destination of system data
An arrow identifies data flow. It is the pipeline through which the information flows
A circle or a bubble represents a process that transforms incoming data flow into outgoing
data flows.
An open rectangle is a data store, data at rest or a temporary repository of data
Process that transforms data flow
Source or Destination of data
Data flow
32
-
7/31/2019 MANVINDER1
33/83
Data Store
A graphic tool used to describe and analyze the moment of data through a system manual
or automated including the processes, stores of data, and delays in the system. Data flow
diagrams are the central tools and the basis from which other components are developed.
The transformation of data from input to output, through processes, may be described
logically and independently of the physical components associated with the system.
Query Process data
Output
OVERALL WORK FLOW
33
User Login Graphical UserInterface
MDI Form
Check UserVerification.
User Logout
-
7/31/2019 MANVINDER1
34/83
LEVEL 0
34
-
7/31/2019 MANVINDER1
35/83
LEVEL 1
35
-
7/31/2019 MANVINDER1
36/83
LEVEL 2
Menu Hierarchy LEVEL 2
36
-
7/31/2019 MANVINDER1
37/83
37
Login
Main Go Close
NewAccount
Checkbook Issue
Logout
Checkbook InquiryDeposit Withdraw
DepositInquiry
WithdrawInquiry
Search Update
Delete A/C
-
7/31/2019 MANVINDER1
38/83
DATABASE DESIGN
Database was unique to large corporations with mainframes. Today it is recognized as a
standard of MIS and is available for virtually every size of computer. Before the database
concept became operational, users had programs that own data independent of other users.
It was a conventional file environment, common data are available and used by several
users. Instead of each program managing its own data, data across application are shared
by authorized users with the data base software managing the data as an entity. A program
now requests data through the data base management system, which determines data
sharing.
OBJECTIVES OF DATABASE
The general theme behind a database is to handle information as an integrated whole.
There is none of artificiality that is normally embedded in separate files or applications.
A database is a collection of interrelated data stored with minimum redundancy to
serve many users quickly and efficiently. The general objective is to make information
access easy, quick, and inexpensive and flexibility for the user. In data base design,
several specific objectives are considered:
Controlled redundancy
Redundancy data occupies space and therefore, is wasteful. If versions of the same data
are in different phases of updating, the system often gives conflicting information. A
unique aspect data base design is storing only once, which controls redundancy and
improves system performance.
Accuracy and Integrity
The accuracy of a database ensures that quality and contents remains constant. Integrity
controls detect data inaccuracies where they occur.
Derby we use for storing the data. The database design becomes very crucial and
important part of the system.
38
-
7/31/2019 MANVINDER1
39/83
Data Integration
It refers to the fact that the data is stored physically at different locations, but logically
the information is centralized.
Data Integrity
Data Integrity means storing all the data. This leads to more consistency, less
redundancy and reduces direct access storage requirement.
Data Independence
Data Independence is the insulation of application programs from changing aspects of
physical data organization.
39
-
7/31/2019 MANVINDER1
40/83
LOGIN FORM
The login form is made for authentication. It has two fields:Username: In this field we need to fill the valid username. The username will show as it is
as you typed.Password: In this field we need to enter the password for the username. The password willshow stars as it should not be seen by the unauthorized person.Button : There are 2 buttons used in this form. They are as follow:
Submit : This button is used to store the entered values in the database.
Exit : This button is used to exit from the form.
MAIN FORM
40
-
7/31/2019 MANVINDER1
41/83
MDI FORM: Banking Management software is the starting form that provides any easy
access to all forms. Whenever a User click on any image according to his/her requirement
a new form will be displayed with some other details.
TEST PLANS
41
-
7/31/2019 MANVINDER1
42/83
Once the code has been written, program testing begins. The testing process focuses on the
logical internals of the software, ensuring that all statements have been tested, and on the
functional externals; that is, conducting tests to uncover errors end to ensure that thedefined input will produce the desired output. The project has been tested on dummy as
well as lives data.
FOLLOWING STEPS WERE CARRIED OUT DURING TESTING:
1. Online response : Our project is such that it requires optimum response time and it
does not cause any hardship to the user. We have tested it in the peak hours and time to
establish a true performance level.
2. Volume: We created as many records as are normally produced to verify that the
hardware and software function correctly. The users were asked to provide test data for
the test.
3. Stress testing : In this test, the system was subjected to high volume of data over a
short time period.
4. Recovery and Security: A forced system failure was induced to test a backup
recovery produce for file integrity. Inaccurate data were entered to see how the system
responds in terms of error detection and protection. The Administrator, Key users and
End users are recognized by their User IDs and Passwords in order to prevent any
unauthorized access to the system
5. Usability Documentation and Procedure: This test was carried out to verify theuser-friendly nature of the system. This included normal operating and error handling
procedures.
42
-
7/31/2019 MANVINDER1
43/83
Testing is a critical element of quality assurance and representations the ultimate
review of specification, design and code generation. This stage is the validation of the
program. It ensures that the program performs correctly the required tasks.
Once code has been generated, project must be tested to uncover as many errors as
possible before delivery to the customer. The testing process focuses on the logical
internals of the software, ensuring that all statements have been tested, and on the
functional externals; that is conducting test to uncover errors and ensures that defined
input will produce actual results that agree with required results.
The great difficulty one can have in describing what a system should do is illustrated
by the facts found in table shown below. The table shows, that more than half the errors
one can have in a system are introduced during requirements analysis.
On the other hand, one only discovers a minority (5%) of the errors in a system during
requirement analysis. Another point to be noted is that 55% of the faults are introduced
in the first phase of the software development project.
SOFTWARE DEVELOPMENT
PHASE
ERRORS
INTRODUCED
ERROR
OBSERVEDRequirements Analysis 55% 5%Design 30% 10%Construction & System Test 15% 40%Acceptance Test & Operation
/ Maintenance
NA 45%
After observing the above table, one can easily understand the importance of careful
testing at the right time.
TESTING OBJECTIVES:
43
-
7/31/2019 MANVINDER1
44/83
Testing is a process of executing a program with the intent of finding an
error.
A good test is one that has a high probability of finding an as-yet-
undiscovered error.
A successful test is one that uncovers an as-yet-undiscovered error.
If testing is conducted successfully, it will uncover errors in the software or in your
project. As a secondary benefit, testing demonstrates that software functions appear to
be working according to specification, that behavioral and performs requirements
appear to have been met. But testing cant show the absence of errors and defects, it
can show only that software errors and defects are present.
LEVELS OF TESTING:
1. Unit Testing : In this individual modules are tested together. By the following
strategy all the errors are identified in the coding. This method was applied in
collaboration with the white and black box testing techniques.
2. Integration Testing : Integration testing is a systematic technique for constructing
the program structure while at the same time conducting tests to uncover errorsassociated with the interface.
3. System Testing : System testing in which all the modules are tested together as a
system to uncover the errors.
4. Acceptance Testing : Acceptance testing is performed at the client side to ensure the
user has accepted the system.
The levels of resting attempt to detect different types of faults. The relation of faults
introduces in different phases and the different levels of testing are shown.
Employee Needs Acceptance Testing
44
-
7/31/2019 MANVINDER1
45/83
Requirements System Testing
Design Integration Testing
Code Unit Testing
TESTING PRINCIPLES:
All tests should be traceable to the customer requirements.
Here the main objective is to detect the errors. It follows that the most severe
defects are those that cause the program to fail to meet its requirements.
Test should be plant long before testing begins.
Test planning should begin as soon as the requirement model is complete. The
detailed definition of test cases should be defined as soon as design model has been
solidified.
The Pareto Principle
The principle states that 80% of all errors uncovered during testing will likely be
traceable to 20% of all program components. Therefore the major concern is to isolate
these suspect components and thoroughly test them.
Testing should begin in the small and progress toward testing in the
large.
The first tests planned and executed generally focus on individual
components. As testing proceeds focus shift in an attempt to find errors in
integrated clusters of components and ultimately in the entire system.
45
-
7/31/2019 MANVINDER1
46/83
Exhaustive testing is not possible.
The number of path permutations for even a moderately sized program is
exceptionally large. For this reason, it is impossible to execute every combination of
paths during testing. It is possible, however, to adequately cover program logic and to
ensure that all conditions in the component level design have been exercised.
To be most effective, testing should be conducted by an independent third
party.
By most effective, we mean testing that has the highest probability of
finding errors. For this reason, the software engineer who created the
system us not the best person to conduct all tests for the software.
During the testing Phase of this project we have covered the various testing criterion
following the above principles to our level best.
a). After the partial completion of the module, it was tested to check whether it was
following the customers requirements or not. And accordingly the changes were madein the module.
b) . actually the testing phase comes in the view after completion of design phase but
here it was conducted in parallel with the design phase.
c). As the other conventional application follows the Pareto principle, this project
follows the same. For e.g. the main problem were faced during handling the database,
that is, access of records. This was appeared to be the most suspected feature; therefore
this feature was tested very frequently and carefully.
46
-
7/31/2019 MANVINDER1
47/83
d) . other thing was that the project was tested from the execution of simple conditions,
simple loops, and nested loops to the evaluation of complex conditions and execution
of complete modules.
e). as the project was being to implement in an organization, the major concern was to
test the project by a third person before implementing it properly in the organization.
For this two staff members of the organization were called to try software or project in
their own way to discover the errors & to check the operations.
f). Testing was treated as one of the main factor in the problem definition, problem
design and coding stages.
g). All the trivial and special cases were tested. Even the simplest conditions were
tested to avoid major problems in the future.
h). Test data was selected on a random basis. Maximum and minimum values of all test
data variables were included in the test cases.
STATIC AND DYNAMIC TESTING:
Testing may be of two different types:-
47
-
7/31/2019 MANVINDER1
48/83
STATIC TESTING: Static test are those that do not involve the execution of anything- be it
code or executable specifications. In static testing, specifications are compared with each other to
verify errors have not been introduced during the process.
Each specification phase emphasis a different aspect of software
development, with each subsequent phase introducing more detail. We can
express each aspect in terms of the deliverables:
The requirements expressions state what the system is expected to achieve from
the end users point of view.
The system specification list that functions and attributes of the actual
system in detail.
A module specification states what an item of codes is expected to do andrecords it design. It is the basis for programming the item.
In static testing, the above documents are compared with each other to
verify that each item accurately translates information from the previous
document.
DYNAMIC TESTING: Dynamic testing confirms that a deliverable- typically some
software- functions according to its specifications. It differs from static testing in that
verification is done by executing that deliverables rather than by comparing one
specification with another. Dynamic testing can be based on two different aspects of the
design process
BLACK BOX TESTING: When computer software is considered, Black Box Testing test
that are conducted at the software interface. Although they are designed to uncover errors,
black box test are used to demonstrate that software functions are operational, that input is
properly accepted and output is correctly produced, and that the integrity of external
information is maintained.
WHITE BOX TESTING: It is predicated on close examination of procedural detail.
Logical paths through the software are tested by providing test cases that exercise specific
48
-
7/31/2019 MANVINDER1
49/83
sets of conditions and / or loops. The status of the program may be examined at various
points to determine if the expected or asserted status corresponds to the actual status.
ALPHA AND BETA TESTING: It is virtually impossible for a software developer to
foresee how the customer with really uses a program. Instructions for use may be
misinterpreted; strange combinations of data may be regularly used; output that seemed
clear to the tester may be unintelligible to a user in the field.
If software is developed as a product to be used by many customers, it is
impractical to perform formal acceptance tests with each one. Most software
product builders use a process called Alpha and Beta testing to uncover errors
that only the end-user seems able to find.
The Alpha test is conducted at the developers site by a customer. The software
is used in a natural setting with the developer looking over the shoulder of
the user and recording errors and usage problems. Alpha tests are conducted in
a controlled environment.
The Beta test is conduct at one or more customer sites by the end-user of thesoftware. Unlike Alpha testing, the developers is generally not present.
Therefore, the Beta test is a live application of the software in an
environment that cant be controlled by the developer. The customer records all
problems that are encountered during Beta testing and reports these to the
developers at regular intervals. As a result of problems reported during Beta
tests, software engineers make modifications and then prepare for release of the
software product to the entire customer base.
I have performed black box testing. I checked the functionality of each menu
item whether the display is correct and the specified menu field id displaying
the required article. After that the registration form was also tested to check
whether the data is inserted into the table and validations on the textboxes and
49
-
7/31/2019 MANVINDER1
50/83
radio buttons. Certain validations are applied on textboxes like no textbox
should be kept empty and while selecting radio button only one option should
be selected.
IMPLEMENTATION & MAINTENANCE
50
-
7/31/2019 MANVINDER1
51/83
Implementation involves placing the completed and tested system of hardware and
software into the actual work environment of the users. As the system is tested it starts to
move into the implementation phase. Ideally the system should be completed and fully
tested before implementation gets under way.
As soon as the first phase of implementation- file set-up-starts, all system
documentation should be available, viz., user manuals, procedures manuals, computer
operating instructions and security procedures. The system then passes from the
development staff to the computer operations personnel and once the system is live,
strict procedures should be enforced governing programmers access to programs and
files.
THERE ARE BOTH TECHNICAL & PEOPLE ORIENTED ACTIVITIES
DURING THIS STAGE:
. Technical Conversion Activities : Depending on the size of the organization
that will be involved in using the application and the risk associated with its
use, system developers may choose only to pilot the operation in one area of the
firm, say, in one department or with just one or two persons. In some situations
developers will stop use of the old system one day and begin use of the newone the next.
People-Oriented Activities : Since work tasks are often changed when a new
system is installed, user oriented, training, & support are a very important of
system implementation. It is not unusual to find a full time system training
department in large organizations; since systems are continuously being
installed somewhere. Even with so much attention, users usually consider
training to be very poor. There are 4 reasons for this:
There is usually a staggering of information for users to absorb in a short period
of time.
Users may think they have inadequate skills for using computers.
51
-
7/31/2019 MANVINDER1
52/83
Users are often very nervous and apprehensive of computer and are afraid of
looking stupid.
Training materials are very complicated, difficult to organize, and difficult to
present clearly.
Due to lack of communication between user and developer, the main problem that
arises is that developer is unable to recognize each and every requirement. Same was
the case here, when the project was finally to be implemented in the organization, the
sponsors asked for another requirement. They wanted that the project should provide a
provision of manipulation of database, i.e. administrator is only to manipulate. No user
should be able to do that; user has only authority of browsing the reports. They also
wanted that if any user by mistake knows the name of any page or file then he may not
be able to do this until he or she is a legitimate user and is navigating from starting
from starting of system. This was done by making a function Auth Check which used
to check for authorized users before opening any page. The last part is maintenance. It
is a Post Implementatio n stage. This stage is the updating & correcting of the program
to account for changing conditions or field experience. Proper testing & documentation
should significant reduce the frequency and extent of the required maintenance
representative from the user department, internal audit and data processing. Its basic purpose is to see if the system has met the objectives set for it. This will comprise a
comparison of actual costs and benefits against the original estimates, a review of
requests for changes and an examination of documentation, control and security
procedures and back-up arrangements.
Corrective Maintenance: Its means repairing processing or performance failure or
making changes because of previously uncorrected problems or false assumptions.
PROJECT LEGACY
52
-
7/31/2019 MANVINDER1
53/83
CURRENT STATUS OF THE PROJECT:
The projects complete with no of master tables as well as transaction tables and a
number of screens and reports. Enhancements can be done if required but the project is
yet to be implemented. Documentation has being prepared. Data has been uploaded.
The project has accomplished all the stipulations, which a competent and proficient
project intents to fulfill. Following acceptance criteria has fulfilled.
User friendly
Modularity
Transparency
Security
TECHNICAL AND MANAGERIAL LESSONS LEARNT :
Working in this professional environment was a totally neoteric and unique experience.
Besides learning about Open Source and Progress Joomla covering technical side, se
were appraised of various managerial skills. We apprehended how to behave and
express ourselves in an industrial environment.
TECHNICAL LESSONS LEARNT:
Extensive knowledge of JAVA technology.
Progress Proprietary language Open Source.
Introduction and exposure to Open Source.
MANAGERIAL LESSONS LEARNT:
53
-
7/31/2019 MANVINDER1
54/83
Development of management thoughts
Ethical and Environmental Foundation
Decision making
Planning and Strategic managementLeadership
Communication skills
import java.awt.*;
54
-
7/31/2019 MANVINDER1
55/83
import javax.swing.*;import java.awt.event.*;import java.sql.*;import javax.swing.border.*;
public class ram2 extends JFrame implements ActionListener
{ JLabel u1;JLabel l1,l2,l4;JTextField t1;ImageIcon i;JPasswordField t2;JButton b1,b2;LineBorder line2;Font f;
public ram2(){
super("login...........");f=new Font("Barlin Sans FB",Font.BOLD,15);setLayout(null);line2=new LineBorder(Color.blue,8);u1=new JLabel();u1.setBounds(0,0,400,300);u1.setBorder(line2);l1=new JLabel("Enter Username");l1.setFont(f);l2=new JLabel("Enter Password");l2.setFont(f);
t1=new JTextField(12);t2=new JPasswordField(12);b1=new JButton("Submit");b1.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));
b2=new JButton("Exit");b2.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));setUndecorated(true);i=new ImageIcon("login.jpg");
l4=new JLabel(i);//add(l4);
t1.setFont(f);t2.setFont(f);b1.setFont(f);b1.setFont(f);add(b1);add(b2);//setLocation((Toolkit.getDefaultToolkit().getScreenSize().width
getWidth())/4,//(Toolkit.getDefaultToolkit().getScreenSize().height-getHeight())/5);
55
-
7/31/2019 MANVINDER1
56/83
t1.setBackground(Color.white);t2.setBackground(Color.white );t1.setForeground(Color.black);t2.setForeground(Color.black);l1.setForeground(Color.black);
l2.setForeground(Color.black);b1.setForeground(Color.white);b2.setForeground(Color.white);b1.setBackground(Color.black);b2.setBackground(Color.black);l4.setBounds(0,0,400,100);add(l4);
l1.setBounds(65,78,120,40);l2.setBounds(65,125,120,40);t1.setBounds(215,91,100,20);t2.setBounds(215,133,100,20);
b1.setBounds(88,205,100,20);b2.setBounds(208,205,100,20);add(l1);add(l2);add(t1);add(t2);b1.addActionListener(this);b2.addActionListener(this);add(u1);setSize(400,300);setLocationRelativeTo(null);
setVisible(true);}public void actionPerformed(ActionEvent ae)
{String msg1,msg2;Object o=ae.getSource();if(o==b1){
if(t1.getText().equals("sai") && t2.getText().equals("baba")){
this.dispose();new mainform();
}else
{JOptionPane.showMessageDialog(this,"Invalid User","Try Again",JOptionPane.ERROR_MESSAGE);
}}
56
-
7/31/2019 MANVINDER1
57/83
if(o==b2){
System.exit(0);}}}
import java.awt.*;import javax.swing.*;import java.awt.event.*;import javax.swing.border.*;
57
-
7/31/2019 MANVINDER1
58/83
class mainform extends JFrame implements ActionListener {
String new1="",dep1="",upd1="",src1="";ImageIcon new25,search25,update25,logout25,searchbutton;
ImageIcon c5;deposit1 deposit11;srch srch1;update5 update51;delete de;newaccount abc;withdraw1 nc;
Container con;JMenuBar mb;ImageIcon img1,del5;JDesktopPane mdi;
JMenu main,go,close;checkbook checkbook2;JMenuItem
newuser,deposit,withdraw,search,update,exit,delete,checkbook1,detail,inquiry,inquiry1;
Font f;mainform()
{super("State Bank Of India");new25=new ImageIcon("new.png");
c5=new ImageIcon("ab.png");
searchbutton=new ImageIcon("searchbutton.gif");logout25=new ImageIcon("logout25.png");search25=new ImageIcon("search.png");update25=new ImageIcon("update.png");logout25=new ImageIcon("logout.png");
del5=new ImageIcon("delete.png");mdi=new JDesktopPane();con=getContentPane();
mb=new JMenuBar();main=new JMenu("Main");
go=new JMenu("Go");// i1=new ImageIcon("s.jpg");
newuser = new JMenuItem("New Account",new25);delete = new JMenuItem("Delete A/C",del5);exit=new JMenuItem("Logout",logout25);inquiry=new JMenuItem("Deposit Inquiry",c5);inquiry1=new JMenuItem("Witdraw Inquiry",c5);
detail=new JMenuItem("CheckBook Inquiry",searchbutton);close=new JMenu("Close");
58
-
7/31/2019 MANVINDER1
59/83
delete.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));inquiry.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));
inquiry1.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));detail.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));newuser.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));
exit.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR)); deposit= newJMenuItem("Deposit",c5);deposit.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));withdraw= new JMenuItem("Withdraw",c5);
withdraw.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));search= new JMenuItem("Search",search25);
search.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));update= new JMenuItem("Update",update25);
update.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));checkbook1= new JMenuItem("Issue Checkbook",new25);
checkbook1.setCursor(Cursor.getPredefinedCursor(Cursor.HAND_CURSOR));
setJMenuBar(mb);mb.add(main);mb.add(go);mb.add(close);main.add(newuser);main.addSeparator();main.add(deposit);main.addSeparator();main.add(withdraw);main.add(inquiry);main.add(inquiry1);
main.addSeparator();// m.add(exit);go.add(search);go.addSeparator();go.add(update);go.addSeparator();go.add(delete);
f=new Font("Arial",Font.BOLD,15);inquiry.addActionListener(this);checkbook1.setFont(f);close.add(detail);close.addSeparator();close.add(checkbook1);close.addSeparator();exit.setFont(f);inquiry.setFont(f);inquiry1.setFont(f);detail.setFont(f);delete.setFont(f);
59
-
7/31/2019 MANVINDER1
60/83
close.setFont(f);close.add(exit);close.addSeparator();
main.setFont(f);go.setFont(f);
newuser.setFont(f);deposit.setFont(f);withdraw.setFont(f);search.setFont(f);
update.setFont(f);newuser.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_N,ActionEvent.CTRL_MASK));
deposit.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_S,ActionEvent.CTRL_MASK));
withdraw.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_U,ActionEvent.CTRL_ MASK));
search.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_S,ActionEvent.ALT_MASK));
update.setAccelerator(KeyStroke.getKeyStroke(KeyEvent.VK_N,ActionEvent.ALT_MASK));
// con.setBackground(Color.white);/*n1.setBackground(Color.red);
// s1.setBackground(Color.cyan);// u1.setBackground(Color.magenta);// n.setBackground(Color.yellow);
// s.setBackground(Color.green);//p.setBackground(Color.red);*/
// l1.setBounds(0,0,1280,800);addWindowListener(new WindowAdapter()
{ public void windowClosing(WindowEvent we)
{check();
}});
setExtendedState(MAXIMIZED_BOTH);setVisible(true);
add(mdi);detail.addActionListener(this);exit.addActionListener(this);delete.addActionListener(this);
60
-
7/31/2019 MANVINDER1
61/83
newuser.addActionListener(this);deposit.addActionListener(this);withdraw.addActionListener(this);search.addActionListener(this);update.addActionListener(this);
checkbook1.addActionListener(this);// exit.addActionListener(this);mdi.setBackground(Color.cyan); //it is imp to remember
inquiry1.addActionListener(this);add(mdi);
}public void actionPerformed(ActionEvent ae){
Object o=ae.getSource();if(o==detail){
try{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);}}catch(Exception e)
{}try{if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed()){}else{
61
-
7/31/2019 MANVINDER1
62/83
abc.dispose();mdi.remove(abc);abc.setVisible(false);}}catch(Exception e1)
{}try{if(update51.isClosed()){}else{update51.dispose();mdi.remove(srch1);update51.setVisible(false);}}
catch(Exception e1){}try{if(nc.isClosed()){}else{nc.dispose();mdi.remove(nc);nc.setVisible(false);
}}catch(Exception e1){}try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try{if(checkbook2.isClosed()){}
62
-
7/31/2019 MANVINDER1
63/83
else{checkbook2.dispose();mdi.remove(checkbook2);checkbook2.setVisible(false);
}}catch(Exception e){}
ptu ptu1=new ptu(this,"CHECK BOOK INFORMATION"); ptu1.setSize(480,350); ptu1.setVisible(true);
}if(o==exit){System.exit(0);
}if(o==newuser){
try{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);
deposit11.setVisible(false);}}catch(Exception e){}try{if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed())
63
-
7/31/2019 MANVINDER1
64/83
{}else{abc.dispose();mdi.remove(abc);
abc.setVisible(false);}}catch(Exception e1){}try{if(update51.isClosed()){}else{update51.dispose();
mdi.remove(srch1);update51.setVisible(false);}}catch(Exception e1){}try{if(nc.isClosed()){}else{
nc.dispose();mdi.remove(nc);nc.setVisible(false);}}catch(Exception e1){}try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try
64
-
7/31/2019 MANVINDER1
65/83
{if(checkbook2.isClosed()){}else{
checkbook2.dispose();mdi.remove(checkbook2);checkbook2.setVisible(false);}}catch(Exception e){}abc=new newaccount();mdi.add(abc);abc.setVisible(true);}//aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
if(o==delete){try{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);
}}catch(Exception e){}try{if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed()){}
65
-
7/31/2019 MANVINDER1
66/83
else{abc.dispose();mdi.remove(abc);abc.setVisible(false);
}}catch(Exception e1){}try{if(update51.isClosed()){}else{update51.dispose();mdi.remove(srch1);
update51.setVisible(false);}}catch(Exception e1){}try{if(nc.isClosed()){}else{nc.dispose();
mdi.remove(nc);nc.setVisible(false);}}catch(Exception e1){}try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try{
66
-
7/31/2019 MANVINDER1
67/83
if(checkbook2.isClosed()){}else{checkbook2.dispose();
mdi.remove(checkbook2);checkbook2.setVisible(false);}}catch(Exception e){}de=new delete();mdi.add(de);de.setVisible(true);
}//aaaaaaaaaaaaaaaaaaaaaaaaaaa//VVVVVVVVVVVVVVVVVVVVVVVVVVVVV
if(o==checkbook1){try
{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);
}}catch(Exception e){}try{if(checkbook2.isClosed()){}else{checkbook2.dispose();mdi.remove(checkbook2);checkbook2.setVisible(false);}}catch(Exception e){}try{if(srch1.isClosed()){}
67
-
7/31/2019 MANVINDER1
68/83
else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);
}}catch(Exception e1){}try{if(abc.isClosed()){}else{abc.dispose();mdi.remove(abc);
abc.setVisible(false);}}catch(Exception e1){}try{if(update51.isClosed()){}else{update51.dispose();
mdi.remove(srch1);update51.setVisible(false);}}catch(Exception e1){}try{if(nc.isClosed()){}else{nc.dispose();mdi.remove(nc);nc.setVisible(false);}}catch(Exception e1){}try{
68
-
7/31/2019 MANVINDER1
69/83
if(de.isClosed()){}else{de.dispose();
mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}
checkbook2=new checkbook();mdi.add(checkbook2);checkbook2.setSize(450,400);checkbook2.setVisible(true);}
//vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvif(o==deposit){
try{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);
deposit11.setVisible(false);}}catch(Exception e){}try{if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed())
69
-
7/31/2019 MANVINDER1
70/83
{}else{abc.dispose();mdi.remove(abc);
abc.setVisible(false);}}catch(Exception e1){}try{if(update51.isClosed()){}else{update51.dispose();
mdi.remove(srch1);update51.setVisible(false);}}catch(Exception e1){}try{if(nc.isClosed()){}else{
nc.dispose();mdi.remove(nc);nc.setVisible(false);}}catch(Exception e1){}try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try
70
-
7/31/2019 MANVINDER1
71/83
{if(checkbook2.isClosed()){}else{
checkbook2.dispose();mdi.remove(checkbook2);checkbook2.setVisible(false);}}catch(Exception e){}deposit11=new deposit1();mdi.add(deposit11);deposit11.setVisible(true);
}if(o==search)
{try{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);}}
catch(Exception e){}try{if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed()){}else
71
-
7/31/2019 MANVINDER1
72/83
{abc.dispose();mdi.remove(abc);abc.setVisible(false);}}
catch(Exception e1){}try{if(update51.isClosed()){}else{update51.dispose();mdi.remove(srch1);update51.setVisible(false);
}}catch(Exception e1){}try{if(nc.isClosed()){}else{nc.dispose();mdi.remove(nc);
nc.setVisible(false);}}catch(Exception e1){}
try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try
72
-
7/31/2019 MANVINDER1
73/83
{if(checkbook2.isClosed()){}else{
checkbook2.dispose();mdi.remove(checkbook2);checkbook2.setVisible(false);}}catch(Exception e){}srch1=new srch();mdi.add(srch1);srch1.setVisible(true);
}if(o==update)
{try{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);}}
catch(Exception e){}try{if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed()){}else
73
-
7/31/2019 MANVINDER1
74/83
{abc.dispose();mdi.remove(abc);abc.setVisible(false);}}
catch(Exception e1){}try{if(update51.isClosed()){}else{update51.dispose();mdi.remove(srch1);update51.setVisible(false);
}}catch(Exception e1){}try{if(nc.isClosed()){}else{nc.dispose();mdi.remove(nc);
nc.setVisible(false);}}catch(Exception e1){}try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try{if(checkbook2.isClosed())
74
-
7/31/2019 MANVINDER1
75/83
{}else{checkbook2.dispose();mdi.remove(checkbook2);
checkbook2.setVisible(false);}}catch(Exception e){}update51=new update5();mdi.add(update51);update51.setVisible(true);
}if(o==inquiry){try
{if(deposit11.isClosed()){}else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);}}catch(Exception e){}
try{if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed()){}else{abc.dispose();
75
-
7/31/2019 MANVINDER1
76/83
mdi.remove(abc);abc.setVisible(false);}}catch(Exception e1){}
try{if(update51.isClosed()){}else{update51.dispose();mdi.remove(srch1);update51.setVisible(false);}}catch(Exception e1)
{}try{if(nc.isClosed()){}else{nc.dispose();mdi.remove(nc);nc.setVisible(false);}}
catch(Exception e1){}try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try{if(checkbook2.isClosed()){}else
76
-
7/31/2019 MANVINDER1
77/83
{checkbook2.dispose();mdi.remove(checkbook2);checkbook2.setVisible(false);}}
catch(Exception e){}book ptu2=new book(this,"DEPOSIT FORM");
ptu2.setSize(480,350); ptu2.setVisible(true);
}if(o==inquiry1){try{if(deposit11.isClosed())
{}else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);}}catch(Exception e){}try{
if(srch1.isClosed()){}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed()){}else{abc.dispose();mdi.remove(abc);abc.setVisible(false);
77
-
7/31/2019 MANVINDER1
78/83
}}catch(Exception e1){}try{
if(update51.isClosed()){}else{update51.dispose();mdi.remove(srch1);update51.setVisible(false);}}catch(Exception e1){}try
{if(nc.isClosed()){}else{nc.dispose();mdi.remove(nc);nc.setVisible(false);}}catch(Exception e1){}
try{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try{if(checkbook2.isClosed()){}else{
78
-
7/31/2019 MANVINDER1
79/83
checkbook2.dispose();mdi.remove(checkbook2);checkbook2.setVisible(false);}}catch(Exception e)
{} book2 ptu6=new book2(this,"WITHDRAW FOAM"); ptu6.setSize(480,350); ptu6.setVisible(true);
}if(o==withdraw)
{try{if(deposit11.isClosed()){}
else{deposit11.dispose();mdi.remove(deposit11);deposit11.setVisible(false);}}catch(Exception e){}try{if(srch1.isClosed())
{}else{srch1.dispose();mdi.remove(srch1);srch1.setVisible(false);}}catch(Exception e1){}try{if(abc.isClosed()){}else{abc.dispose();mdi.remove(abc);abc.setVisible(false);}}
79
-
7/31/2019 MANVINDER1
80/83
catch(Exception e1){}try{if(update51.isClosed())
{}else{update51.dispose();mdi.remove(srch1);update51.setVisible(false);}}catch(Exception e1){}try{
if(nc.isClosed()){}else{nc.dispose();mdi.remove(nc);nc.setVisible(false);}}catch(Exception e1){}try
{if(de.isClosed()){}else{de.dispose();mdi.remove(de);de.setVisible(false);}}catch(Exception e1){}try{if(checkbook2.isClosed()){}else{checkbook2.dispose();mdi.remove(checkbook2);
80
-
7/31/2019 MANVINDER1
81/83
checkbook2.setVisible(false);}}catch(Exception e){}nc=new withdraw1();
mdi.add(nc);nc.setVisible(true);} }
public void check(){
try{//Show a Confirmation Dialog.int reply = JOptionPane.showConfirmDialog (this," Are you really want to exit ?","Exit ... ", JOptionPane.YES_NO_OPTION, JOptionPane.PLAIN_MESSAGE);
//Check the User Selection.if (reply == JOptionPane.YES_OPTION){
setVisible (false); //Hide the Frame.dispose(); //Free the System Resources.System.exit (0); //Close the Application.
}else if (reply == JOptionPane.NO_OPTION){
setDefaultCloseOperation(JFrame.DO_NOTHING_ON_CLOSE);
}}catch (Exception e) {}
} public static void main(String args[])
{new mainform();
}}
81
-
7/31/2019 MANVINDER1
82/83
BIBLIOGRAPHY
BOOKS:
The Complete Reference (CORE JAVA)
BLACK BOOK(Java)
Core Java by Sun micro system
WEBSITES:
Google search engine
www. java 2s.com www.w3schools.com/js www.free java guide.com
82
http://www.java2s.com/http://www.java2s.com/http://www.java2s.com/http://www.java2s.com/http://www.w3schools.com/jshttp://www.freejavaguide.com/http://www.freejavaguide.com/http://www.freejavaguide.com/http://www.java2s.com/http://www.w3schools.com/jshttp://www.freejavaguide.com/ -
7/31/2019 MANVINDER1
83/83