You are on page 1of 79

Crime File System 1

M.S. RAMAIAH COLLEGE OF ARTS


SCIENCE
AND COMMERCE
Project Report on
CRIME FILE SYSTEM
CRIME FILE SYSTEM
Submitted in partial fulfillment for the
Completion of IV SEM
Bachelor of Science (BSC)
PRESENTE B!
ARCHIKAM NAGARA1 (10KUS75076)
"nder the #uidance of
EP$RTMENT %& C%MP"TER SCIENCE

Crime File System 2
CERTIFICATE
This is to certify that this Project entitled

Submitted by
ARCHIKAM NAGARA1 (10KUS75076)
In partial fulfillment of the re'uirement( for the &ourth Seme(ter B$C)E*%R %&
SCIENCE of Ban+alore "ni,er(it- durin+ the academic -ear .$N /011 to M$! /011
under our (uper,i(ion



Examiners Signature:
_________________
_____________


Crime File System 3
ABSTRACT

The objective of the project is to build the Crime File System. In
the project e have facilitate the user by providin! him to navi!ate
provided by the oner. In the project main emphasis is an use of
advanced technolo!ies such as "isual #asic $.% and &icrosoft
'ccess (ata #ase. The user of this To)Tier 'rchitecture help
user ith more efficiency for access and security. The user is
provided ith separate lo!in Id and Passord. *very time the user
lo!in separate session is established. The user is provided ith
Facility to add ne records so that he+she can ma,e his+her choice.
-ner has control over the order has final authority lies ith him
only.
Crime File System .
CONTENTS
1. INTRODUCTION 2
2. SYSTEM ANALYSIS 5
2.1 Introduction
2.2 Existing System
2.3 Proposed System
2.4 Data Flow Diagram
3. SYSTEM DESIGN 18
3.1 Input design
3.2 Output design
3.3 Form design
3.4 Database design
4. SYSTEM IMPLEMENTATION 38
4.1 About Language
4.2 System Configuration
5. APPENDIX 50
5.1 Source Code
Crime File System /
6. IMPLEMENTATION AND TESTING 69

7. FUTURE ENHANCEMENT 73
8. CONCLUSION 74
9. BIBLIOGRAPHY 75
1. INTRODUCTION
1. LOGIN
This includes Administrator and User login. There will be a
username and password to login into the system to use all the facilities.
2. COMPLAINT REGISTRATION
This module helps to register the details about the crime. This is
done by entering some details, such as incident details, Victim details, crime
details etc
3. VIEW COMPLAINT STATUS
This module allows us to view the status of the complaint that you
have registered earlier.
4. CRIMINAL REGISTER MANAGEMENT
Here we can have the facility to view the details of the criminals.
The administrator can add new criminal`s details and save it in a database.
Crime File System $
This can be done by entering details such as criminal number, age,
occupation, type of crime etc.
5. FIR MANGEMENT
This module allows viewing the First Information Report of all the
crimes that took place at recent years. The administrator can enter FIR
information and save it in a database.
6. CASE HISTORY DETAILS MANAGEMENT
Here we can view the details of the case, date of occurrence, the type
of crime and place of occurrence etc.
7. MANAGING POSTMORTEM DETAILS
This module helps to view the postmortem details of a person. The
details such as date of death cause of death, name of the doctor etc.
8. PRISONER REGISTER MANGEMENT
Crime File System 0
This module helps the administrator as well as the user to store, view and
manage the details of the past and present prisoners.
9. MANAGE THE LIST OF MOST WANTED CRIMINALS
This is an additional feature added to this Software, which helps us to
make a quick search about the most wanted criminals. This helps to always keep
track of and identify a person quickly, who is a most wanted criminal.
2. SYSTEM ANALYSIS
2.1 Introduction to System Analysis
System analysis is a process of gathering and interpreting
facts, diagnosing problems and the information to recommend
improvements on the system. It is a problem solving activity that
requires intensive communication between the system users and
system developers. System analysis or study is an important phase of
Crime File System 1
any system development process. The system is studied to the
minutest detail and analyzed. The system analyst plays the role of the
interrogator and dwells deep into the working of the present system.
The system is viewed as a whole and the input to the system are
identified. The outputs from the organizations are
traced to the various processes. System analysis is concerned with
becoming aware of the problem, identifying the relevant and
decisional variables, analyzing and synthesizing the various factors
and determining an optimal or at least a satisfactory solution or
program of action.
A detailed study of the process must be made by various
techniques like interviews, questionnaires etc. The data collected by
these sources must be scrutinized to arrive to a conclusion. The
conclusion is an understanding of how the system functions. This
system is called the
existing system. Now the existing system is subjected to close study
and problem areas are identified. The designer now functions as a
problem solver and tries to sort out the difficulties that the enterprise
faces. The solutions are given as proposals. The proposal is then
weighed with the existing system analytically and the best one is
selected. The proposal is presented to the user for an endorsement by
the user. The proposal is reviewed on user request and suitable
Crime File System 2
changes are made. This is loop that ends as soon as the user is
satisfied with proposal.
Preliminary study is the process of gathering and interpreting
facts, using the information for further studies on the system.
Preliminary study is problem solving activity that requires intensive
communication between the system users and system developers. It
does various feasibility studies. In these studies a rough figure of the
system activities can be obtained, from which the decision about the
strategies to be followed for effective system study and analysis can
be taken.
2.2 Existing System
Lack of security of data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.
2.3 Proposed System
Crime File System 1%
The aim of proposed system is to develop a system of improved
facilities. The proposed system can overcome all the limitations of the
existing system. The system provides proper security and reduces the
manual work.
Security of data.
Ensure data accuracy`s.
Proper control of the higher officials.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Minimum time required.
2.3.1. FEASIBILITY STUDY
Feasibility study is made to see if the project on completion will
serve the purpose of the organization for the amount of work, effort
and the time that spend on it. Feasibility study lets the developer
foresee the future of the project and the usefulness. A feasibility study
of a system proposal is according to its workability, which is the
impact on the organization, ability to meet their user needs and
effective use of resources. Thus when a new application is proposed it
Crime File System 11
normally goes through a feasibility study before it is approved for
development.
The document provide the feasibility of the project that is being
designed and lists various areas that were considered very carefully
during the feasibility study of this project such as Technical,
Economic and Operational feasibilities. The following are its
features:
A. TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view
first. The assessment of this feasibility must be based on an outline
design of the system requirement in the terms of input, output,
programs and procedures. Having identified an outline system, the
investigation must go on to suggest the type of equipment, required
method developing the system, of running the system once it has been
designed.
Technical issues raised during the investigation are:
Does the existing technology sufficient for the
suggested one?
Can the system expand if developed?
Crime File System 12
The project should be developed such that the necessary functions
and performance are achieved within the constraints. The project is
developed within latest technology. Through the technology may
become obsolete after some period of time, due to the fact that never
version of same
software supports older versions, the system may still be used. So
there are minimal constraints involved with this project. The system
has been developed using 1ava the project is technically feasible for
development.
B. ECONOMIC FEASIBILITY
The developing system must be justified by cost and benefit.
Criteria to ensure that effort is concentrated on project, which will
give best, return at the earliest. One of the factors, which affect the
development of a new system, is the cost it would require.

The following are some of the important financial questions asked
during preliminary investigation:
The costs conduct a full system investigation.
The cost of the hardware and software.
Crime File System 13
The benefits in the form of reduced costs or fewer
costly errors.
Since the system is developed as part of project work, there is no
manual cost to spend for the proposed system. Also all the resources
are already available, it give an indication of the system is
economically possible for development.
C. BEHAVIORAL FEASIBILITY
This includes the following questions:
Is there sufficient support for the users?
Will the proposed system cause harm?

The project would be beneficial because it satisfies the objectives
when developed and installed. All behavioral aspects are considered
carefully and conclude that the project is behaviorally feasible.
Crime File System 1.
ENTITY RELATIONSHIP DIAGRAM
Crime File System 1/
Crime File System 1$
Data Flow Diagram
LEVEL 0 DFD

Crime File System 10
LEVEL 1 DFD
Crime File System 11
LEVEL 2 DFD
Crime File System 12
LEVEL 3 DFD
Crime File System 2%
LEVEL 4 DFD
Crime File System 21
3. SYSTEM DESIGN
Introduction to System Design
Design is the first step into the development phase for any
engineered product or system. Design is a creative process. A good
design is the key to effective system. The term ~design is defined as
~the process of applying various techniques and principles for the
purpose of defining a process or a system in sufficient detail to permit
its physical realization. It may be defined as a process of applying
various techniques and principles for the purpose of defining a
device, a process or a system in sufficient detail to permit its physical
realization. Software design sits at the technical kernel of the
software engineering process and is applied regardless of the
development paradigm that is used. The system design develops the
architectural detail required to build a system or product. As in the
case of any systematic approach, this software too has undergone the
best possible design phase fine tuning all efficiency, performance and
accuracy levels. The design phase is a transition from a user oriented
document to a document to the programmers or database personnel.
System design goes through two phases of development: Logical and
Physical Design.
Crime File System 22
3.1 Input design
The design of input focuses on controlling the amount of input
required, controlling the errors, avoiding delay, avoiding extra steps
and keeping the process simple. The input is designed in such a way
so that it provides security and ease of use with retaining the privacy.
Input Design considered the following things:
o What data should be given as input?
o How the data should be arranged or coded?
o The dialog to guide the operating personnel in providing input.
o Methods for preparing input validations and steps to follow when
error occur.
3.2 Output Design

A quality output is one, which meets the requirements of the end
user and presents the information clearly. In output design it is
determined how the information is to be displaced for immediate
need and also the hard copy output. It is the most important and
direct source information to the user. Efficient and intelligent output
design improves the system`s relationship to help user decision-
making.
Designing computer output should proceed in an organized, well
thought out manner; the right output must be developed while
ensuring that each output element is designed so that people will find
the system can use easily and effectively. When analysis design
computer output, they should :
Crime File System 23
Identify the specific output that is needed to meet the requirements.
Select methods for presenting information.
3.3 Form design
Progress
MDI FORM
Crime File System 2.
Login
Crime File System 2/
Add New User
Delete User
Criminal Register
Crime File System 2$
Complaint Registeration
Crime File System 20
FIR
Charge Sheet
Crime File System 21
Post mortem
PRISONER REGISTERATION
Crime File System 22
Most wanted criminals
Case history
REPORTS
Crime File System 3%
Crime report
Most Wanted Report
Crime File System 31
Post Mortem Report
FIR Report
Crime File System 32
Admin Complaint Status
View Complaint Status
Crime File System 33
3.4 Database Design
A database is an organized mechanism that has the
capability of storing information through which a user can retrieve
stored information in an effective and efficient manner. The data is
the purpose of any database and must be protected.
The database design is a two level process. In the first step, user
requirements are gathered together and a database is designed which
will meet these requirements as clearly as possible. This step is called
Information Level Design and it is taken independent of any
individual DBMS.
In the second step, this Information level design is transferred
into a design for the specific DBMS that will be used to implement
the system in question. This step is called Physical Level Design,
concerned with the characteristics of the specific DBMS that will be
Crime File System 3.
used. A database design runs parallel with the system design. The
organization of the data in the database is aimed to achieve the
following two major objectives.
Data Integrity
Data independence
Normalization is the process of decomposing the attributes in an
application, which results in a set of tables with very simple
structure. The purpose of normalization is to make tables as simple
as possible. Normalization is carried out in this system for the
following reasons.
To structure the data so that there is no repetition of data , this helps
in saving.
To permit simple retrieval of data in response to query and report
request.
To simplify the maintenance of the data through updates, insertions,
deletions.
To reduce the need to restructure or reorganize data which new
application requirements arise.
RELATIONAL DATABASE MANAGEMENT SYSTEM (RDBMS):
A relational model represents the database as a collection of
relations. Each relation resembles a table of values or file of records.
In formal relational model terminology, a row is called a tuple, a
column header is called an attribute and the table is called a relation.
A relational database consists of a collection of tables, each of which
is assigned a unique name. A row in a tale represents a set of related
values.
Crime File System 3/
RELATIONS, DOMAINS & ATTRIBUTES:
A table is a relation. The rows in a table are called tuples. A tuple
is an ordered set of n elements. Columns are referred to as attributes.
Relationships have been set between every table in the database. This
ensures both Referential and Entity Relationship Integrity. A domain
D is a set of atomic values. A common method of specifying a domain
is to specify a data type from which the data values forming the
domain are drawn. It is also useful to specify a name for the domain
to help in interpreting its values. Every value in a relation is atomic,
that is not decomposable.
RELATIONSHIPS:
Table relationships are established using Key. The two main keys of
prime importance are Primary Key & Foreign Key. Entity Integrity and
Referential Integrity Relationships can be established with these keys. Entity
Integrity enforces that no Primary Key can have null values. Referential
Integrity enforces that no Primary Key can have null values.
Referential Integrity for each distinct Foreign Key value, there must
exist a matching Primary Key value in the same domain. Other key
are Super Key and Candidate Keys.
Relationships have been set between every table in the database. This
ensures both Referential and Entity Relationship Integrity.
Crime File System 3$
NORMALIZATION:
As the name implies, it denoted putting things in the normal form.
The application developer via normalization tries to achieve a
sensible organization of data into proper tables and columns and
where names can be easily correlated to the data by the user.
Normalization eliminates repeating groups at data and thereby
avoids data redundancy which proves to be a great burden on the
computer resources. These includes:
Normalize the data.
Choose proper names for the tables and columns.
Choose the proper name for the data.
First Normal Form:
The First Normal Form states that the domain of an attribute
must include only atomic values and that the value of any attribute in
a tuple must be a single value from the domain of that attribute. In
other words 1NF disallows ~relations within relations or ~relations
as attribute values within tuples. The only attribute values
permitted by 1NF are single atomic or indivisible values.
The first step is to put the data into First Normal Form. This can
be donor by moving data into separate tables where the data is of
similar type in each table. Each table is given a Primary Key or
Foreign Key as per requirement of the project. In this we form new
relations for each nonatomic attribute or nested relation. This
eliminated repeating groups of data.
Crime File System 30
A relation is said to be in first normal form if only if it satisfies the
constraints that contain the primary key only.
Second Normal Form:
According to Second Normal Form, For relations where primary
key contains multiple attributes, no nonkey attribute should be
functionally dependent on a part of the primary key.
In this we decompose and setup a new relation for each partial key
with its dependent attributes. Make sure to keep a relation with the
original primary key and any attributes that are fully functionally
dependent on it. This step helps in taking out data that is only
dependant on apart of the key.
A relation is said to be in second normal form if and only if it
satisfies all the first normal form conditions for the primary key and
every non-primary key attributes of the relation is fully dependent on
its primary key alone.
Third Normal Form:
According to Third Normal Form, Relation should not have a
nonkey attribute functionally determined by another nonkey
attribute or by a set of
nonkey attributes. That is, there should be no transitive dependency
on the primary key.
In this we decompose and set up relation that includes the nonkey
attributes that functionally determines other nonkey attributes. This
Crime File System 31
step is taken to get rid of anything that does not depend entirely on
the Primary Key.
A relation is said to be in third normal form if only if it is in second
normal form and more over the non key attributes of the relation
should not be depend on other non key attribute.
Table Design
Table: Admin Login
Table: Charge Sheet
Table: Complaint Reg
Crime File System 32
Table: Complaint
Table: Criminal reg
Table: Most Wanted
Crime File System .%
Table: History
Table: Prisoners Reg
Table: Prisoners Temp
Crime File System .1
Table: Post Mortem
Table: FIR
Crime File System .2
4 SYSTEM IMPLEMENTATION
4.1 About Language
The Control Properties
Before writing an event procedure for the control to response to a user's input, you
have to set certain properties for the control to determine its appearance and how it
will work with the event procedure. You can set the properties of the controls in the
properties window or at runtime.
Handling some of the common controls
Crime File System .3
The Text Box
The text box is the standard control for accepting input from the user as well as to
display the output. It can handle string (text) and numeric data but not images or
pictures. String in a text box can be converted to a numeric data by using the
function Val(text). The following example illustrates a simple program that
processes the input from the user.
Example
In this program, two text boxes are inserted into the form together with a few
labels. The two text boxes are used to accept inputs from the user and one of the
labels will be used to display the sum of two numbers that are entered into the two
text boxes. Besides, a command button is also programmed to calculate the sum of
the two numbers using the plus operator. The program use creates a variable sum
to accept the summation of values from text box 1 and text box 2.The procedure to
calculate and to display the output on the label is shown below. The output is shown
in Figure 3.2
Private Sub Command1_Click ()
To add the values in text box 1 and text box 2
Sum Val (Text1.Text) + Val (Text2.Text)
To display the answer on label 1
Label1.Caption Sum
End Sub
Figure
Crime File System ..

The Label
The label is a very useful control for Visual Basic, as it is not only used to provide
instructions and guides to the users, it can also be used to display outputs. One of its
most important properties is Caption. Using the syntax label.Caption, it can display
text and numeric data . You can change its caption in the properties window and
also at runtime. Please refer to Example 3.1 and Figure 3.1 for the usage of label.
The Command Button
The command button is one of the most important controls as it is used to execute
commands. It displays an illusion that the button is pressed when the user click on
it. The most common event associated with the command button is the Click event,
and the syntax for the procedure is
Private Sub Command1_Click ()
Statements
End Sub
Crime File System ./
The Picture Box
The Picture Box is one of the controls that is used to handle graphics. You can load
a picture at design phase by clicking on the picture item in the properties window
and select the picture from the selected folder. You can also load the picture at
runtime using the LoadPicture method. For example, the statement will load the
picture grape.gif into the picture box.
Picture1.PictureLoadPicture ("C:\VB program\Images\grape.gif")
You will learn more about the picture box in future lessons. The image in the
picture box is not resizable.

The Image Box
The Image Box is another control that handles images and pictures. It functions
almost identically to the picture box. However, there is one major difference, the
image in an Image Box is stretchable, which means it can be resized. This feature is
not available in the Picture Box. Similar to the Picture Box, it can also use the
LoadPicture method to load the picture. For example, the statement loads the
picture grape.gif into the image box.
Image1.PictureLoadPicture ("C:\VB program\Images\grape.gif")
The List Box
The function of the List Box is to present a list of items where the user can click and
select the items from the list. In order to add items to the list, we can use the Add
Crime File System .$
Item method. For example, if you wish to add a number of items to list box 1, you
can key in the following statements
Example

Private Sub Form_Load ( )
List1.AddItem ~Lesson1
List1.AddItem ~Lesson2
List1.AddItem ~Lesson3
List1.AddItem ~Lesson4
End Sub
The items in the list box can be identified by the ListIndex property, the value of
the ListIndex for the first item is 0, the second item has a ListIndex 1, and the
second item has a ListIndex 2 and so on
The Combo Box
The function of the Combo Box is also to present a list of items where the user can
click and select the items from the list. However, the user needs to click on the small
arrowhead on the right of the combo box to see the items which are presented in a
drop-down list. In order to add items to the list, you can also use the AddItem
method. For example, if you wish to add a number of items to Combo box 1, you
can key in the following statements
Example
Private Sub Form_Load ( )
Combo1.AddItem ~Item1
Crime File System .0
Combo1.AddItem ~Item2
Combo1.AddItem ~Item3
Combo1.AddItem ~Item4
End Sub

The Check Box
The Check Box control lets the user selects or unselects an option. When the Check
Box is checked, its value is set to 1 and when it is unchecked, the value is set to 0.
You can include the statements Check1.Value1 to mark the Check Box and
Check1.Value0 to unmark the Check Box, as well as use them to initiate certain
actions. For example, the program will change the background color of the form to
red when the check box is unchecked and it will change to blue when the check box
is checked. You will learn about the conditional statement If..Then..Elesif in
later lesson. VbRed and vbBlue are color constants and BackColor is the
background color property of the form.
The Option Box

The Option Box control also lets the user selects one of the choices. However, two or
more Option Boxes must work together because as one of the Option Boxes is
selected, the other Option Boxes will be unselected. In fact, only one Option Box can
be selected at one time. When an option box is selected, its value is set to ~True
and when it is unselected; its value is set to ~False. In the following example, the
Crime File System .1
shape control is placed in the form together with six Option Boxes. When the user
clicks on different option boxes, different shapes will appear. The values of the
shape control are 0, 1, and 2,3,4,5 which will make it appear as a rectangle, a
square, an oval shape, a rounded rectangle and a rounded square respectively.
Example
Private Sub Option1_Click ( )
Shape1.Shape 0
End Sub
Private Sub Option2_Click()
Shape1.Shape 1
End Sub
Private Sub Option3_Click()
Shape1.Shape 2
End Sub
Private Sub Option4_Click()
Shape1.Shape 3
End Sub
Private Sub Option5_Click()
Shape1.Shape 4
End Sub
Private Sub Option6_Click()
Shape1.Shape 5
End Sub
Crime File System .2
The Drive List Box
The Drive ListBox is for displaying a list of drives available in your computer.
When you place this control into the form and run the program, you will be able to
select different drives from your computer as shown in Figure 3.3

The Directory List Box
The Directory List Box is for displaying the list of directories or folders in a selected
drive. When you place this control into the form and run the program, you will be
able to select different directories from a selected drive in your computer as shown
in Figure 3.4

The File List Box
The File List Box is for displaying the list of files in a selected directory or folder.
When you place this control into the form and run the program, you will be able to
shown the list of files in a selected directory as shown in Figure
You can coordinate the Drive List Box, the Directory List Box and the File List Box
to search for the files you want. The procedure will be discussed in later lessons.
MS ACCESS 2003
Crime File System /%
Microsoft Access is a powerful program to create and manage your databases. It
has many built in features to assist you in constructing and viewing your
information. Access is much more involved and is a more genuine database
application than other programs such as Microsoft Works.
The keywords involved in the process are: Database File, Table, Record, Field,
Data-type. Here is the Hierarchy that Microsoft Access uses in breaking down a
database.
Database File: This is your main file that encompasses the entire database and that
is saved to your hard-drive or floppy disk.
Example: StudentDatabase.mdb
Table:A table is a collection of data about a specific topic. There can be multiple
tables in a database.
Field: Fields are the different categories within a Table. Tables usually contain
multiple fields.
Crime File System /1
Datatypes: Datatypes are the properties of each field. A field only has 1 datatype.
FieldName) Student LastName
Datatype) Text
Starting Microsoft Access
Two Ways
1. Double click on the Microsoft Access icon on the desktop.
Crime File System /2
2. Click on Start --> Programs --> Microsoft Access
Crime File System /3
Creating New, and Opening Existing Databases
The above picture gives you the option to:
Create a New Database from scratch
Use the wizard to create a New Database
Open an existing database
o The white box gives you the most recent databases you have used. If
you do not see the one you had created, choose the More Files option
and hit OK. Otherwise choose the database you had previously used
and click OK.
Crime File System /.
4.2 System Configuration
HARDWARE REQUIREMENTS
Processor : X86 Compatible processor
with 1.7 GHz Clock speed
RAM : 512 MB or more
Hard disk : 20 GB or more
Monitor : VGA/SVGA
Keyboard : 104 Keys
Mouse : 2 buttons/ 3 buttons
SOFTWARE REQUIREMENTS
Operating System : Windows 2000/XP
Front end : Visual Basic 6.0
Back end : MS ACCESS
Crime File System //
5 APPENDIX
5.1 Source Code
Add Complaint
Private Sub cmdAdd_Click()
If (cmbComplntNo.Text "" Or txtStatus.Text "") Then
MsgBox "Missing Fields", vbInformation, "CFS"
Else
con.Execute ("insert into ComplntStatus values(" + cmbComplntNo.Text + ",'" +
txtStatus.Text + "')")
MsgBox "Status Added Successfully", vbInformation, "Crime File System"
txtDetails.Text ""
txtStatus.Text ""
cmbComplntNo.SetFocus
End If
End Sub
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdDetails_Click()
Set rest con.Execute("select Details from ComplaintReg where ComplntNo" +
cmbComplntNo.Text + "")
If (Not rs.EOF) Then
txtDetails.Text rest(0)
txtStatus.SetFocus
End If
End Sub
Private Sub Form_Load()
connectdb
Set rest con.Execute("select ComplntNo from ComplaintReg")
While (Not rs.EOF)
cmbComplntNo.AddItem rest(0)
rs.MoveNext
Wend
rs.Close
End Sub
Crime File System /$
Add user
Private Sub Form_Load()
connectdb
End Sub
Private Sub cmdAdd_Click()
Set rest con.Execute("select ` from UserLogin where Username'" +
txtUsername.Text + "' and Password'" + txtPassword.Text + "'")
If (Not rs.EOF) Then
MsgBox "Sorry!! User already exists. Try another username", vbCritical,
"Crime File System"
txtPassword.Text ""
txtUsername.Text ""
txtUsername.SetFocus
Else
con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" +
txtPassword.Text + "')")
MsgBox "User added sucessfully", vbInformation, "Crime File System"
txtPassword.Text ""
txtUsername.Text ""
txtUsername.SetFocus
End If
End Sub
Private Sub cmdCancel_Click()
Unload Me
FIR Report
Dim x As Integer
Private Sub cmdShRpt_Click()
x cmbMno.Text
If (DataEnvironment1.rsCommand4.State 1) Then
DataEnvironment1.rsCommand4.Close
Else
DataEnvironment1.Command4 (x)
Load DataReportFIR
DataReportFIR.Show
End If
End Sub
Private Sub Form_Load()
connectdb
Crime File System /0
Set rest con.Execute("select Firno from FIR")
While (Not rs.EOF)
cmbMno.AddItem rest(0)
rs.MoveNext
Wend
End Sub
Login
Private Sub cmdAdminLog_Click()
Set rest con.Execute("Select ` from AdminLogin where Username'" +
txtUname.Text + "' and Password'" + txtPass.Text + "'")
If (Not rs.EOF) Then

MsgBox "Login Success", vbInformation, "Crime File System"
frmMDI.mnuLogoff.Enabled True
frmMDI.mnuAdminAddU.Enabled True
frmMDI.mnuAdminDelU.Enabled True
frmMDI.mnuActiv.Enabled True
frmMDI.mnuLogin.Enabled False
frmMDI.mnuAdminAddComSt.Enabled True
frmMDI.mnuActivReg.Enabled True
frmMDI.mnuActivComp.Enabled True
frmMDI.mnuActivRpt.Enabled True
Unload Me
Else
MsgBox "Failure", vbCritical, "Crime File System"
End If
'rs.Close
Unload Me
End Sub
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdUserLog_Click()
Set rest con.Execute("Select ` from UserLogin where Username'" +
txtUname.Text + "' and Password'" + txtPass.Text + "'")
If (Not rs.EOF) Then

MsgBox "Login Success", vbInformation, "Crime File System"
frmMDI.mnuLogoff.Enabled True
frmMDI.mnuLogin.Enabled False
Crime File System /1
frmMDI.mnuActiv.Enabled True
frmMDI.mnuActivReg.Enabled True
frmMDI.mnuActivComp.Enabled True
frmMDI.mnuActivRpt.Enabled True
Unload Me
Else
MsgBox "Failure", vbCritical, "Crime File System"
End If
'rs.Close
End Sub
Private Sub Form_Load()
connectdb
End Sub
Private Sub Form_Unload(Cancel As Integer)
con.Close
End Sub
Post Mortem Report
Dim x As Integer
Private Sub cmdShRpt_Click()
x cmbMno.Text
If (DataEnvironment1.rsCommand3.State 1) Then
DataEnvironment1.rsCommand3.Close
Else
DataEnvironment1.Command3 (x)
Load DataReportmortem
DataReportmortem.Show
End If

End Sub
Private Sub Form_Load()
connectdb
Set rest con.Execute("select PMortemNo from Postmortem")
While (Not rs.EOF)
cmbMno.AddItem rest(0)
rs.MoveNext
Wend
End Sub
Crime File System /2
Splash
Dim i As Integer
Dim x As Integer
Option Explicit
Private Sub Form_Load()
File1.FileName App.Path
x File1.ListCount
End Sub
Private Sub Form_MouseDown(Button As Integer, Shift As Integer, x As Single, Y
As Single)
Unload Me
End Sub
Private Sub Form_Unload(Cancel As Integer)
Load frmMDI
frmMDI.Show
End Sub
Private Sub Frame1_MouseDown(Button As Integer, Shift As Integer, x As Single,
Y As Single)
Unload Me
End Sub
Private Sub Timer1_Timer()
If (Image1.Left < 6480) Then
Image1.Left Image1.Left + 100
Else
Image1.Left 0
End If
If (i < x) Then
Label2.Caption File1.List(i)
i i + 1
Else
Load frmMDI
frmMDI.Show
Unload Me
End If
End Sub
MDI Form
Crime File System $%
Private Sub MDIForm_Load()
mnuLogoff.Enabled False
mnuAdminAddU.Enabled False
mnuAdminDelU.Enabled False
mnuActiv.Enabled False
mnuAdminAddComSt.Enabled False
mnuActivReg.Enabled False
mnuActivComp.Enabled False
mnuActivRpt.Enabled False
DataEnvironment1.Connection1.ConnectionString
"ProviderMicrosoft.1et.OLEDB.4.0;Data Source" & App.Path &
"\crimefile.mdb;Persist Security InfoFalse"
End Sub
Private Sub mnuActivChrgSht_Click()
Load frmChargeSheet
frmChargeSheet.Show
End Sub
Private Sub mnuActivCompReg_Click()
Load frmCompltReg
frmCompltReg.Show
End Sub
Private Sub mnuActivCompStat_Click()
Load frmCompStatus
frmCompStatus.Show
End Sub
Private Sub mnuActivCsHist_Click()
Load frmHistSheet
frmHistSheet.Show
End Sub
Private Sub mnuActivFir_Click()
Load frmFIR
frmFIR.Show
End Sub
Private Sub mnuActivRegCrim_Click()
Load frmCriminalRegister
frmCriminalRegister.Show
End Sub
Private Sub mnuActivRegPost_Click()
Load frmPostmortem
frmPostmortem.Show
Crime File System $1
End Sub
Private Sub mnuActivRegPris_Click()
Load frmPrisonerReg
frmPrisonerReg.Show
End Sub
Private Sub mnuActivRptCrim_Click()
Load DataReportCrimeRpt
DataReportCrimeRpt.Show
End Sub
Private Sub mnuActivRptMst_Click()
Load DataReportMostWanted
DataReportMostWanted.Show
End Sub
Private Sub mnuActRegMst_Click()
Load frmMostWanted
frmMostWanted.Show
End Sub
Private Sub mnuAdminAddComSt_Click()
Load frmAddCompltStatus
frmAddCompltStatus.Show
End Sub
Private Sub mnuAdminAddU_Click()
Load frmAddUser
frmAddUser.Show
End Sub
Private Sub mnuAdminDelU_Click()
Load frmDeleteUser
frmDeleteUser.Show
End Sub
Private Sub mnuLogin_Click()
Load frmLogin
frmLogin.Show
End Sub
Private Sub mnuLogoff_Click()
mnuLogoff.Enabled False
mnuAdminAddU.Enabled False
mnuAdminDelU.Enabled False
mnuActiv.Enabled False
Crime File System $2
mnuLogin.Enabled True
mnuAdminAddComSt.Enabled False
mnuActivReg.Enabled False
mnuActivComp.Enabled False
mnuActivRpt.Enabled False
End Sub
Private Sub mnuRptFIR_Click()
Load frmFIRrpt
frmFIRrpt.Show
End Sub
Private Sub mnuRptMortem_Click()
Load frmPMortemRpt
frmPMortemRpt.Show
End Sub
Prisoners Register
Dim cnt As Integer
Private Sub Command1_Click()
If (txtChgrNo.Text "" Or txtColor.Text "" Or txtCrmType.Text ""
Or txtFamMem.Text "" Or txtHt.Text "" Or txtIdenMark.Text "" Or
txtNikName.Text "" Or txtPrisNo.Text "" Or txtWt.Text "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File
System"
Else
If ((Not IsNumeric(txtChgrNo.Text)) Or (Not IsNumeric(txtHt.Text)) Or
(Not IsNumeric(txtWt.Text))) Then
MsgBox "Some of the values entered are not matching, Please check
numbers are entered correctly", vbCritical, "Crime File System"
Else
Set rest con.Execute("select ` from PrisonersReg where
ChargeSheetNo" + txtChgrNo.Text + "")
If (Not rs.EOF) Then
MsgBox "Charge Sheet Number Already Exist, Please try another
number", vbCritical, "Crime File System"
txtChgrNo.Text ""
txtChgrNo.SetFocus
Else
con.Execute ("insert into PrisonersReg values(" + txtPrisNo.Text + "," +
txtChgrNo.Text + ",'" + txtNikName.Text + _
"','" + txtCrmType.Text + "','" + txtFamMem.Text + "','" +
txtIdenMark.Text + "'," + txtHt.Text + _
"," + txtWt.Text + ",'" + txtColor.Text + "')")
con.Execute ("insert into prisonersTemp values(" + txtPrisNo.Text +
",'No')")
Crime File System $3
MsgBox "Record Added Sucessfully", vbInformation, "CFS"
txtPrisNo.Text txtPrisNo.Text + 1
txtChgrNo.Text ""
txtColor.Text ""
txtCrmType.Text ""
txtFamMem.Text ""
txtHt.Text ""
txtIdenMark.Text ""
txtNikName.Text ""
txtWt.Text ""
txtChgrNo.SetFocus
End If
End If
End If
End Sub
Private Sub Command2_Click()
Unload Me
End Sub
Private Sub Form_Load()
connectdb
Set rest con.Execute("select max(PrisonerNo) from PrisonersReg")
If (Not rs.EOF) Then
cnt rest(0)
If (cnt 0) Then
cnt 1
Else
cnt cnt + 1
End If
txtPrisNo.Text cnt
End If
rs.Close
End Sub
POSTMORTEM
Dim cnt As Integer
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdSave_Click()
If (txtDate.Text "" Or txtDesc.Text "" Or txtDoctName.Text "" Or
cmbFirrNo.Text "" Or txtHouseName.Text "" Or txtPoliceSt.Text ""
Or txtPostNo.Text "" Or txtRslt.Text "") Then
MsgBox "Missing Fields!! Please Fill Up all", vbInformation, "Crime File
System"
Crime File System $.
Else
Set rest con.Execute("select ` from Postmortem where FirNo" +
cmbFirrNo.Text + "")
If (Not rs.EOF) Then
MsgBox "Duplication is not allowded, Please try another FIR number",
vbCritical, "Crime File System"
cmbFirrNo.SetFocus

Else
con.Execute ("insert into postmortem values(" + txtPostNo.Text + "," +
cmbFirrNo.Text + ",'" + txtRslt.Text + _
"','" + cmbSex.Text + "','" + txtDate.Text + "','" + txtDesc.Text + _
"','" + txtHouseName.Text + "','" + txtDoctName.Text + "','" +
txtPoliceSt.Text + "')")
MsgBox "Record Added Sucessfully", vbInformation, "Crime File
System"
txtPostNo.Text txtPostNo + 1
txtDate.Text ""
txtDesc.Text ""
txtDoctName.Text ""
txtHouseName.Text ""
txtPoliceSt.Text ""
txtRslt.Text ""
End If
End If
End Sub
Private Sub Form_Load()
connectdb
cmbSex.Text "Male"
Set rest con.Execute("select max(PMortemNo) from Postmortem")
If (Not rs.EOF) Then
cnt rest(0)
If (cnt 0) Then
cnt 1
Else
cnt cnt + 1
End If
txtPostNo.Text cnt
End If
rs.Close
Set rest con.Execute("select Firno from FIR")
While (Not rs.EOF)
cmbFirrNo.AddItem rest(0)
rs.MoveNext
Wend
rs.Close
End Sub
Crime File System $/
POST MORTEM REPORT
Dim X As Integer
Private Sub cmdShRpt_Click()
X cmbMno.Text
If (DataEnvironment1.rsCommand3.State 1) Then
DataEnvironment1.rsCommand3.Close
Else
DataEnvironment1.Command3 (X)
Load DataReportmortem
DataReportmortem.Show
End If

End Sub
Private Sub Form_Load()
connectdb
Set rest con.Execute("select PMortemNo from Postmortem")
While (Not rs.EOF)
cmbMno.AddItem rest(0)
rs.MoveNext
Wend
End Sub
CASE HISTORY
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdSave_Click()
If (txtCrimeNo.Text "" Or txtCrimeType.Text "" Or txtDate.Text ""
Or txtDesc.Text "" Or txtPlace.Text "") Then
MsgBox "Missing Fields", vbInformation, "CFS"
ElseIf (Not IsNumeric(txtCrimeNo.Text)) Then
MsgBox "Crime Number should be a number", vbCritical, "CFS"
Else
Set rest con.Execute("select ` from History where CrimeNo" +
txtCrimeNo.Text + "")
If (Not rs.EOF) Then
MsgBox "Duplication of record is not allowded! Try another Crime
number", vbCritical, "CFS"
txtCrimeNo.Text ""
txtCrimeNo.SetFocus
Crime File System $$
Else
con.Execute ("insert into History values(" + cmbPrisNo.Text + "," +
txtCrimeNo.Text + _
",'" + cmbCrimeType.Text + "','" + txtDate.Text + "','" + txtPlace.Text +
"','" + txtDesc.Text + "')")
con.Execute ("UPDATE PrisonersTemp set Status'Yes' where
PrisonerNo" + cmbPrisNo.Text + "")
MsgBox "Recor Added successfully", vbInformation, "CFS"
txtCrimeNo.Text ""
txtCrimeType.Text ""
txtDate.Text ""
txtDesc.Text ""
txtPlace.Text ""
txtCrimeNo.SetFocus
End If
End If
End Sub
Private Sub Form_Load()
connectdb
Set rest con.Execute("select PrisonerNo from PrisonersTemp where
Status'No'")
While (Not rs.EOF)
cmbPrisNo.AddItem rest(0)
rs.MoveNext
Wend
rs.Close
End Sub
CHARGE SHEET
Dim cnt As Integer
Dim X As Control
Private Sub cmdBack_Click()
Frame4.Visible False
Frame3.Visible True
End Sub
Private Sub cmdBack2_Click()
Frame2.Visible False
Frame1.Visible True
End Sub
Crime File System $0
Private Sub cmdBack3_Click()
Frame3.Visible False
Frame2.Visible True
End Sub
Private Sub cmdFinish_Click()
If (txtWitnAdd.Text "" Or txtWitnName.Text "" Or
txtWitnOcc.Text "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation,
"Crime File system"
Else
Set rest con.Execute("select ` from ChargeSheet where FirNo"
+ cmbFirNo.Text + "")
If (Not rs.EOF) Then
MsgBox "Dupplication is not allowed, Please try another fir
number", vbCritical, "Crime File system"
Frame4.Visible False
Frame1.Visible True
cmbFirNo.SetFocus
Else
con.Execute ("insert into ChargeSheet values(" +
txtChrgNo.Text + ",'" + txtPstatName.Text + "','" + txtDate.Text + _
"'," + cmbFirNo.Text + ",'" + txtDist.Text + "','" +
txtInfoName.Text + _
"','" + txtInfoAdd.Text + "','" + txtInfoOcc.Text + "','" +
txtInfoPart.Text + _
"','" + txtAccuName.Text + "','" + txtAccuAdd.Text + "','" +
cmbAccuSex.Text + _
"'," + txtAccuAge.Text + ",'" + txtAccuOcc.Text + "','" +
cmbAccuStat.Text + _
"','" + txtAccuAct.Text + "','" + txtWitnName.Text + "','" +
txtWitnAdd.Text + _
"','" + txtWitnOcc.Text + "')")
MsgBox "Record Added Successfully!!", vbInformation, "Crime
File system"
Frame4.Visible False
Frame1.Visible True
txtChrgNo.Text txtChrgNo.Text + 1
' For Each x In Me.Controls
' If (x TextBox) Then
' x.Text ""
' End If
'Next
End If
End If
End Sub
Crime File System $1
Private Sub cmdNext1_Click()
If (txtChrgNo.Text "" Or txtPstatName.Text "" Or txtDate.Text
"" Or cmbFirNo.Text "" Or txtDist.Text "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation,
"Crime File system"
Else
Frame1.Visible False
Frame2.Visible True
End If
End Sub
Private Sub cmdNext2_Click()
If (txtInfoAdd.Text "" Or txtInfoName.Text "" Or
txtInfoOcc.Text "" Or txtInfoPart.Text "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation,
"Crime File system"
Else
Frame2.Visible False
Frame3.Visible True
End If
End Sub
Private Sub cmdNext3_Click()
If (txtAccuAct.Text "" Or txtAccuAdd.Text "" Or
txtAccuAge.Text "" Or txtAccuName.Text "" Or
txtAccuOcc.Text "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation,
"Crime File system"
Else
Frame3.Visible False
Frame4.Visible True
End If
End Sub
Private Sub Form_Load()
Frame1.Visible True
Frame2.Visible False
Frame3.Visible False
Frame4.Visible False
connectdb
Set rest con.Execute("select max(ChrgShtNo) from ChargeSheet")
If (Not rs.EOF) Then
cnt rest(0)
If (cnt 0) Then
cnt 1
Else
cnt cnt + 1
End If
Crime File System $2
txtChrgNo.Text cnt
End If
rs.Close
Set rest con.Execute("select Firno from FIR")
While (Not rs.EOF)
cmbFirNo.AddItem rest(0)
rs.MoveNext
Wend
rs.Close
End Sub
CRIMINAL REGISTERATION
Dim cnt As Integer
Dim X As String
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdSave_Click()
If (optyes.Value True) Then
X "Yes"
Else
X "No"
End If
If (txtAddress.Text "" Or txtAge.Text "" Or txtCrimeType.Text
"" Or txtName.Text "" Or txtNickName.Text "" Or
txtOccupation.Text "") Then
MsgBox "Missing Fields!!,Please fill up all", vbInformation,
"Crime File System"
ElseIf (Not IsNumeric(txtAge.Text)) Then
MsgBox "Age should be numeric"
Else
con.Execute ("insert into CriminalReg values(" +
txtCriminalNo.Text + _
",'" + txtName.Text + "','" + txtNickName.Text + "'," +
txtAge.Text + _
",'" + txtOccupation.Text + "','" + txtCrimeType.Text + "','" +
txtAddress.Text + _
"','" + X + "')")
MsgBox "Record Added successfully", vbInformation, "Crime File
System"
txtCriminalNo.Text txtCriminalNo.Text + 1
txtAddress.Text ""
Crime File System 0%
txtAge.Text ""
txtCrimeType.Text ""
txtName.Text ""
txtNickName.Text ""
txtOccupation.Text ""
txtName.SetFocus
End If
End Sub
Private Sub Form_Load()
connectdb
Set rest con.Execute("select max(CriminalNo) from CriminalReg")
If (Not rs.EOF) Then
cnt rest(0)
If (cnt 0) Then
cnt 1
Else
cnt cnt + 1
End If
txtCriminalNo.Text cnt
End If
End Sub
COMPLAINT STATUS
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdViewStat_Click()
Set rest con.Execute("select ` from ComplntStatus where
ComplntNo" + cmbComplntNo.Text + "")
If (Not rs.EOF) Then
txtDetails.Text rest(1)
End If
End Sub
Private Sub Form_Load()
connectdb
Set rest con.Execute("select distinct(ComplntNo) from
ComplntStatus")
While (Not rs.EOF)
cmbComplntNo.AddItem rest(0)
rs.MoveNext
Wend
rs.Close
Crime File System 01
End Sub
FIR REGISTERATION
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdSave_Click()
If (txtDate.Text "" Or txtDistrict.Text "" Or txtFirNo.Text ""
Or txtInfoAdd.Text "" Or txtInfoRcd.Text "" Or txtPassNo.Text
"" Or txtPlaceOcc.Text "" Or txtPolice.Text "" Or
txtRcdTime.Text "" Or txtTime.Text "" Or txtTypInfo.Text ""
Or cmbComplantno.Text "") Then
MsgBox "Missing Fields!!", vbInformation, "Crime File
System"
Else
Set rest con.Execute("select ` from FIR where FirNo" +
txtFirNo.Text + " or ComplntNo" + cmbComplantno.Text + "")
If (Not rs.EOF) Then
MsgBox "Sorry!! FIR Or Complaint Number already exists.
Try another number", vbCritical, "CFS"
txtFirNo.Text ""
txtFirNo.SetFocus
Else
Dim t1, t2, t3 As String
t1 txtTime.Text + cmbT1.Text
't2 txtTime2.Text + cmbT2.Text
t3 txtRcdTime.Text + cmbT3.Text
If ((Not IsNumeric(txtPassNo.Text)) Or (Not
IsNumeric(txtFirNo.Text))) Then
MsgBox "Please check the number fields", vbInformation,
"Crime File System"
'txtPassNo.Text ""
'txtPassNo.SetFocus
Else
con.Execute ("insert into FIR values(" + txtFirNo.Text + "," +
cmbComplantno.Text + _
",'" + txtDate.Text + "','" + t1 + "','" + txtTypInfo.Text +
_
"','" + txtPlaceOcc.Text + "','" + cmbForLoc.Text + "','"
+ cmbAct.Text + _
"','" + txtDistrict.Text + "','" + txtInfoAdd.Text + "'," +
txtPassNo.Text + ",'" + txtPolice.Text + _
"','" + t3 + "','" + txtInfoRcd.Text + "')")
con.Execute ("UPDATE ComplntTemp set Status'Yes' where
ComplntNo" + cmbComplantno.Text + "")
Crime File System 02
MsgBox "Record Added", vbInformation, "Crime File
system"
txtDate.Text ""
txtDistrict.Text ""

txtFirNo.Text ""
txtInfoAdd.Text ""
txtInfoRcd.Text ""
txtPassNo.Text ""
txtPlaceOcc.Text ""
txtPolice.Text ""
txtRcdTime.Text ""

txtTime.Text ""
txtTypInfo.Text ""
txtFirNo.SetFocus
End If
End If
End If

End Sub
Private Sub Form_Load()
cmbT1.Text "AM"
cmbT3.Text "AM"
cmbAct.Text "Murder"
cmbForLoc.Text "Foreign"
connectdb
Set rest con.Execute("Select ComplntNo from ComplntTemp
where Status'No'")
While (Not rs.EOF)
cmbComplantno.AddItem rest(0)
rs.MoveNext
Wend
End Sub
Crime File System 03
10. IMPLEMENTATION AND TESTING
Testing is a process of executing a program with the interest of finding
an error. A good test is one that has high probability of finding the yet
undiscovered error. Testing should systematically uncover different classes
of errors in a minimum amount of time with a minimum amount of efforts.
Two classes of inputs are provided to test the process
1. A software configuration that includes a software
requirement specification, a design specification and source code.
2. A software configuration that includes a test plan and
procedure, any testing tool and test cases and their expected results.
Testing is divided into several distinct operations:
1. Unit Testing
Unit test comprises of a set tests performed by an individual
program prior to the integration of the unit into large system. A
program unit is usually the smallest free functioning part of the
whole system. Module unit testing should be as exhaustive as possible
to ensure that each representation handled by each module has been
tested. All the units that makeup the system must be tested
independently to ensure that they work as required.
Crime File System 0.
During unit testing some errors were raised and all of them
were rectified and handled well. The result was quiet satisfactory and
it worked well.
2. Integration Testing
Integration testing is a system technique for constructing the
program structure while at the same time conducting tests to uncover
errors associated with interfacing. The objective is to take unit tested
modules and build a program structure that has been dictated by
design. Bottom-up integration is the traditional strategy used to
integrate the components of a software system into functioning whole.
Bottom-up integration consists
of unit test followed by testing of the entire system. A sub-system
consists of several modules that communicated with other defined
interface.
The system was done the integration testing. All the modules
were tested for their compatibility with other modules .They test was
almost successful. All the modules coexisted very well, with almost no
bugs. All the modules were encapsulated very well so as to not
hamper the execution of other modules.
3. Validation Testing
After validation testing, software is completely assembled as a
package, interfacing errors that have been uncovered and corrected
and the final series of software test; the validation test begins. Steps
Crime File System 0/
taken during software design and testing can greatly improve the
probability of successful integration in the larger system. System
testing is actually a series of different tests whose primary purpose is
to fully exercise the compute -based system.
4. Recovery Testing
It is a system that forces the software to fail in a variety of
ways and verifies that the recovery is properly performed.
5. Security Testing
It attempts to verify that protection mechanisms built into a
system will in fact protect it from improper penetration. The system`s
security must of course be tested from in vulnerability form frontal
attack.
6. Stress Testing
Stress tools are designed to confront programs with abnormal
situations. Stress testing executes a system in a manner that demands
resources in abnormal quantity and volume.
7. Black Box Testing
Black box testing is done to find out the following information
as shown in below:
1. Incorrect or missing functions.
2. Interface errors.
3. Errors or database access.
4. Performance error.
5. Termination error.
Crime File System 0$
The mentioned testing is carried out successfully for this
application according to the user`s requirement specification.
8. Test Data Output
After preparing test data, the system under study is tested
using the test data. While testing the system using test data, errors
are again uncovered and corrected by using above testing and
corrections are also noted for future use.
Crime File System 00
7. FUTURE ENHANCEMENT
3e can update this system as online
application
The main advanta!e of online
application is that4 a person can report the
crime any time from anyhere.
5sers can vie the pro!ress of their
complaint online.
#y the future technolo!y user can
vie the case details and pro!ress of the
complaints on their mobile phones
Face reco!nition technolo!y can
apply. 5ser or itness of the crime can !ive
the physical information of the thief.
Crime File System 01
8. CONCLUSION
CRIME FILE MANAGEMENT SYSTEM
initiates the objective of providing the user with
customized and powerful complaint registration
and process management system side software.
The software is built with all options such as
complaint registration, prisoner`s registration, and
postmortem report generation etc.All the
requirements specified during the analysis and
design phase are fully met, thus resulting in the
formation of good software. The interface
provided is very user friendly and flexible for all
times.
Crime File System 02
9. BIBLIOGRAPHY
Books
A Complete Guide to Programming in Visual Basic .Net
A Complete Visual Basic 6 Training Course: How to
Programme: Package
Advanced Programming Using Visual Basic: Version 6.0
Access 2003 Power Programming with VBA
Advanced MS Visual Basic
Site Address
www.associatedcontent.com
www.members.tripod.com

You might also like