E Passport Tracking System Feb

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 46

ELECTRONIC P A S S P O R T T R A C K I N G SYSTEM

Submitted in partial fulfillment of the requirements for the award of the


Degree of

MASTER OF INFORMATION TECHNOLOGY

NAME : ROBERT WANI ANTHONY

REG NO : 20APTN062

SPECIALIZATION : INFORMATION TECHNOLOGY

STUDY CENTER : BHARATHIYAR

Under the guidance of

Dr .T. RAMESH

ASSOCIATE PROFESSOR

DEPARTMENT OF INFORMATION TECHNOLOGY

BHARATHIER UNIVERSITY

COIMBATORE 641046

Bharathiar University Coimbatore – 641 046

(FEB 2022)

1
DECLARATION

I hereby declare that this project work entitled “ELECTRONIC PASSPORT

TRACKING SYSTEM” Under the guidance of Dr .T. RAMESH Asst Prof. in

Department of Information Technology and that this project work has not formed the basis

for the award of my Degree /Diploma/Associate ship/Fellowship or similar title to any

candidate of any University.

Signature of the candidate

Name : ROBERT WANI ANTHONY

Enrolment No. : 20APTN062

Course with Specialization: M.Sc INFORMATION TECHNOLOGY

Date :

Countersigned by

Signature of the Guide Signature of the Centre Co-ordinator

(with seal) (with seal)

2
CERTIFICATE

This is to certify that the project work titled as “ELECTRONIC PASSPORT


TRACKING SYSTEM” submitted to Bharathiar University in partial fulfillment of
requirements for the award of the degree of MASTER OF SCIENCE in School of
Distance Education is record of the original work done by ROBERT WANI

ANTHONY ( Reg No: 20APTN062) under my supervision and guidance and that
this project work has not formed the basis for the award of any
Degree/Diploma/Associate ship/Fellowship or similar title to any candidate of any
University.

(Seal) Signature of the Guide


Name and Designation

Forwarded by

Director
School of Distance Education
Bharathiar University
Coimbatore – 46

Submitted to the University Examination held on

Internal Examiner External Examiner

3
TABLE OF CONTENT

S.NO DESCREPTION PAGE.NO


1 INTRODUCTION- 5
E-PASSPORT TRACKING SYSTEM
1 DESCRIPTION OF MODULES 7
1.1. SYSTEM SPECIFICATION 9
1.3 SOFTWARE FEATURES 10
2 2.SYSTEM STUDY 14
2.1 EXISTING SYSTEM 15
2.2 PROPOSED SYSTEM 15
3. SYSTEM DESIGN 16
3.1 INPUT DESIGN 16
3.2 OUTPUT DESIGN 17
3.3 DATABASE DESIGN 18
4. SYSTEM TESTING 19
5. CONCLUSION 23
6. SCOPE FOR FUTURE ENHANCEMENT 24
7. BIBLIOGRAPHY 25
8. APPENDIX 26
A.SCREEN SHOTS
B.TABLE DESIGN
C.SOURCE CODE

4
1. INTRODUCTION

The project entitled “Electronic passport tracking system” is developed using VB.NET as

front end and SQL server as backend. All data can be viewed using data report, for clear data

information retrieval. Basically this is a government based project for passport verification.

The main objective of this project is to develop a client server based passport verification

system for verifying the authorized passport. This method is used for government purpose for all

countries. In case of implementing this project, fake passports will be identified and frequent

visitor to many countries can be identified. This is because now days there are many fake

passports are using by terrorist and business people. In order to control the illegal activates this

methods will implemented. It is very important one in the modern world, because now a days

Passport is very important for all citizen. This project passport management is very useful for the

Passport Authority.

Actually it’s a distributed processing, which provides complete information

regarding the real work of the Passport Authority, New Passport Registration, Enquiry About the

exiting passport, Administration, conformation. It is totally user friendly and menu driven thus

helping a person to use a project with case and accurately. The records can be updated at any

time. And can able to upload at any time. In this project is mainly divided into three parts. They

are namely New Passport Registration, Enquiry about the Existing Passport, Administration and

conformation.

5
We take so many reports like Passport Details, Personal Details; Passport Issuing

Details, Address Details, Physical Details Report, and Educational Qualification Report,

Previous Details about the Passport, Record Report .

In future this application can be interact with the web application and mobile

application. So whenever the user do immigration from one county to another county all the

travel history of the user can be fetched out with the passport details.

6
1 DESCRIPTION OF MODULES

 Enquiry details

 Verification

 Eligibility

 Issue

 Renewal

MODULES DESCRIPTION

MODULE: 1

ENQUIRY DETAILS:

This module contains all the personal details of a person those who are applying for
passport. This contain most of the users information like name, age, dob, education status,
personal identification, finger print details and address information. In case of the user is
uneducated the passport will be comes under the category of the non education list. So that the
user will be restricted to visit some countries.

MODULE: 2

VERIFICATION:

The apply details will be verified to the issue of the passport. Here one person gets one
passport only. So duplication can be avoided. While issuing the passport a keen verification will
be done. The important verification will be the address and the personal identification of the
user.

7
MODULE: 3

ELIGIBILITY:

In case of verifying all the details, the person is eligibility to get the passport. Here the
applicant wants to submit prior medical reports. Here medical details too verified. A spreadable
disease person will not be allowed to travel from one country to another country.

MODULE: 4

ISSUE:

Now the person will get the passport, by getting the permission from the embassy. The
passport will issue in the local police station. After the keen verification the passport was verified
by the local police and issue to the user.

MODULE: 5

RENEWAL:

The issued passport will renew here. All kinds of renewal process will be done, here. The
renewal will done yearly once or yearly twice according to the embassy. The renewal process to
will have the same procedure like, This contain most of the users information like name, age,
dob, education status, personal identification, finger print details and address information.

8
1.2. SYSTEM SPECIFICATION

1.2.1. HARDWARE SPECIFICATION:

System : HCL

Processor : Pentium IV

Processor Speed : 2.80GHz

Main Storage : 512MB RAM

Hard Disk Capacity : 80GB

Floppy Disk Drive : 1.44MB

CD-ROM Drive : LG 52X Reader

Keyboard : 104 Keys

Mouse : Logitech

Monitor : Samsung 17” Color

1.2.2 SOFTWARE SPECIFICATION

Operating System : Windows XP

Front end : Visual Basic.Net

Back End : SQL Server 2008

9
1.3 SOFTWARE FEATURES

VISUAL BASIC.NET

Visual Baic.Net has revolutionized windows programming windows programming


and with an object based, event driven approach to software designs. Visual basic.Net
applications act as a front end to the database. Visual basic.Net application provides the interface
between the user and the database. Sophisticated features that make the language truly object
oriented and interfaces it with the latest in the database technology.

.NET provides a new, object-oriented API as a set of classes that will be accessible
from any programming language. This book describes this framework of classes and provides a
reference to what is available and how you can use this framework to write Windows
applications in the brave new world of .NET.

Microsoft .NET Framework is a computing platform for developing distributed applications for
the Internet. Following are the design goals of Microsoft .NET Framework:

1. To provide a very high degree of language interoperability


2. To provide a runtime environment that completely manages code execution

3. To provide a very simple software deployment and versioning model

4. To provide high-level code security through code access security and strong type
checking

5. To provide a consistent object-oriented programming model

6. To facilitate application communication by using industry standards such as SOAP and


XML.

7. To simplify Web application development

10
Visual basic.net lets the user to add menus, text boxes, command buttons, option buttons,
check boxes, list boxes, scroll bars, and file directory boxes to blank windows. Visual basic.net
has many different tools.

The Common Language Runtime

The CLR is the mechanism through which .NET code is executed. It is built upon
a single, common language—IL—into which source languages are compiled and includes
mechanisms for executing the compiled code. This includes code verification and just-in-time
(JIT) compilation, garbage collection and enforcement of security policies, and the provision of
profiling and debugging services.

The CLR provides a lot of added value to the programs it supports. Because it controls
how a .NET program executes and sits between the program and the operating system, it can
implement security, versioning support, automatic memory management through garbage
collection, and provide transparent access to system services

IMPORTANT FEATURES:

 The application is a graphical user interface.


 Client-Server architecture benefits picture and image box can be easily
handled using bit mapped files and icons.
 Bit mapped files and icons are used as simple debugging tools.
 With the advent of .NET, Microsoft has introduced many new
technologies that make writing component-based distributed systems
easier, more flexible, and more powerful than ever before.
 It is now easier than it has ever been to write components in any
programming language that can interoperate with components on other
machines, which may not be Windows-based at all.
SQL SERVER 2008

11
The purpose of this document is to help you migrate your applications when

you are migrating the underlying database from Microsoft SQL Server to Some other

Database. Most of the issues encountered when migrating applications to use an Sql Server

Database are related to database incompatibility. This paper presents these incompatibilities

and provides solutions for many issues.

You should familiarize yourself with this document prior to migrating your databases.

The choices made about how to migrate your application affect how you migrate the underlying

database from Microsoft SQL Server to some other Database.

If the application uses the Microsoft OLE DB Provider for SQL Server or a third-party

OLE DB Provider to connect the Microsoft SQL Server database, use the Sql Server Provider for

OLE DB (SQLOLEDB) to connect to the migrated Database.

SQL Server Security

 Login Authentication.

 Windows NT Authentication

 SQL Server Authentication

 Permissions validation on user database

 T-SQL statements sent to SQL Server.

 SQL server checks user permissions on receipt of T-SQL statements

12
FEATURES

 Created by Microsoft and Sybase in the 80s.

 Is SQL Compliant - Uses ANSI SQL

 Supports SQL – 92 standards - Uses T-SQL

 Stores data in a central location and delivers it to clients on request

 New Server Architecture

 Graphic Administration Tools

 Maintains ANSI standards and 6.x Compatibility

 Data integrity means reliability and accuracy of data.

 Integrity rules keep data consistent.

 Supports Client/Server model.

 Request response dialog.

 Workload is split between the client and the server.

 Operating System compatibility.

 Runs on Win 95/98 NT, Netware, UNIX, OS/2, AppleTalk, Banyan VINES.

 SQL Server must have Service Pack 4 (SP4) to run on Windows NT 4.0.

 Multiple protocol compatibility.

 SQL Server supports these protocols - AppleTalk, TCP/IP.

 SMP Compatibility and Scalability

 Supports multiple processors. SMP leads to scalability.

13
2. SYSTEM STUDY

EXISTING SYSTEM
Existing passport verification System is implemented by using Visual Basic 6.0. Its
window based application, it works only in desktop machine. So communication is not easy. In
this System can share Database only, not an Application. Application should implement
individually on each and every desktop machine. It causes more machine space, so it takes more
time and less efficient consuming. System needs a lot of system administrator for maintenance.

2.1.1 DRAWBACKS

 Time efficient is not possible.


 Security in data access is very less.
 No communication can be performed.
 More Machine space is required.
 Data process is slow.

2.2 PROPOSED SYSTEM


The proposed System is in VB.NET, Once Application to be implemented on single
machine that can access and shared on many machines. Application works in both Online and
Offline mode.

14
C#.Net is used for server code. C#.Net is developed on OOPs concept, it reduce the code
repetition and provides security for code. So data processing is performed very easily. This
Application becomes more efficient on less time.

AJAX is plays main role in this system. AJAX to perform the most actions in client page.
It reduces the no. of time accessing the server for each transaction. So it provides time efficient
and transaction to be performed very fast.

High security for this Jewellery system is provided. In this system if hackers hacked the
Database but they never get Login to the Application. Hashing is a one-way algorithm cannot be
reversed, so only authorized persons can only modify this Application.

2.2.1 FEATURES
 Highly Securable.
 Data Processing is very fast
 Easy to communicate and sharing of transactions.
 It provides accuracy.
 No time consuming.
 Reduce the needs of human to maintain the machine.

15
3. SYSTEM DESIGN

System design is the process of planning a new system to complement or altogether

replace the old system. The purpose of the design phase is the first step in moving from the

problem domain to the solution domain. The design of the system is the critical aspect that

affects the quality of the software. System design is also called top-level design. The design

phase translates the logical aspects of the system into physical aspects of the system.

3.1 INPUT DESIGN

Input design is one of the most important phase of the system design. Input design is the

process where the input received in the system are planned and designed, so as to get necessary

information from the user, eliminating the information that is not required. The aim of the input

design is to ensure the maximum possible levels of accuracy and also ensures that the input is

accessible that understood by the user.

16
The input design is the part of overall system design, which requires very careful

attention. if the data going into the system is incorrect then the processing and output will

magnify the errors.

The objectives considered during input design are:

 Nature of input processing.

 Flexibility and thoroughness of validation rules.

 Handling of properties within the input documents.

 Screen design to ensure accuracy and efficiency of the input relationship with files.

 Careful design of the input also involves attention to error handling, controls, batching

and validation procedures.

Input design features can ensure the reliability of the system and produce result from

accurate data or they can result in the production of erroneous information. The input design of

the system includes the following

3.2 OUTPUT DESIGN

Output design is very important concept in the computerized system, without reliable
output the user may feel the entire system is unnecessary and avoids using it. The proper output
design is important in any system and facilitates effective decision-making.

3.3 DATABASE DESIGN

The data in the system has to be stored and retrieved from database.
Designing the database is part of system design. Data elements and data structures to be stored
have been identified at analysis stage. They are structured and put together to design the data
storage and retrieval system. A database is a collection of interrelated data stored with
17
minimum redundancy to serve many users quickly and efficiently. The general objective is to
make database access easy, quick, inexpensive and flexible for the user. Relationships are
established between the data items and unnecessary data items are removed. Normalization is
done to get an internal consistency of data and to have minimum redundancy and maximum
stability. This ensures minimizing data storage required, minimizing chances of data
inconsistencies and optimizing for updates.

DATA FLOW DIAGRAM


A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change data throughout a system. It’s a structured analysis and design tool that can
be used for flowcharting in place of or in association with information. Oriented and process
oriented system flowcharts. When analysts prepare the Data Flow Diagram, they specify the user
needs at a level of detail that virtually determines the information flow into and out of the system
and the required data resources. This network is constructed by using a set of symbols that do not
imply physical implementations. The Data Flow Diagram reviews the current physical system,
prepares input and output specification, specifies the implementation plan etc.

Four basic symbols are used to construct data flow diagrams. They are symbols that
represent data source, data flows, and data transformations and data storage. The points at which
data are transformed are represented by enclosed figures, usually circles, which are called nodes.

DATA FLOW DIAGRAM SYMBOLS:-

- Source or Destination of data


18
- Data Flow

- Process

- Storage

4. SYSTEM TESTING

Testing is a series of different tests that whose primary purpose is to fully exercise the
computer based system. Although each test has a different purpose, all work should verify that
all system element have been properly integrated and performed allocated function. Testing is
the process of checking whether the developed system works according to the actual requirement
and objectives of the system.

The philosophy behind testing is to find the errors. A good test is one that has a high
probability of finding an undiscovered error. A successful test is one that uncovers the
undiscovered error. Test cases are devised with this purpose in mind. A test case is a set of data
that the system will process as an input. However the data are created with the intent of
determining whether the system will process them correctly without any errors to produce the
required output.

Types of Testing:

 Unit testing
19
 Integration testing
 Validation testing
 Output testing
 User acceptance testing
 Performance Testing

Unit Testing

All modules were tested and individually as soon as they were completed and were checked
for their correct functionality.

Integration Testing

The entire project was split into small program; each of this single programs gives a
frame as an output. These programs were tested individually; at last all these programs where
combined together by creating another program where all these constructors were used. It give a
lot of problem by not functioning is an integrated manner.

The user interface testing is important since the user has to declare that the arrangements
made in frames are convenient and it is satisfied. when the frames where given for the test, the
end user gave suggestion. Based on their suggestions the frames where modified and put into
practice.

Validation Testing:

At the culmination of the black box testing software is completely assembled as a


package. Interfacing errors have been uncovered and corrected and a final series of test i.e.,
Validation succeeds when the software function in a manner that can be reasonably Accepted by
the customer.

20
Output Testing

After performing the validation testing the next step is output testing of the proposed
system. Since the system cannot be useful if it does not produce the required output. Asking the
user about the format in which the system is required tests the output displayed or generated by
the system under consideration. Here the output format is considered in two ways. one is on
screen and another one is printed format. The output format on the screen is found to be
corrected as the format was designed in the system phase according to the user needs. And for
the hardcopy the output comes according to the specifications requested by the user.

User Acceptance System

An acceptance test as the objective of selling the user on validity and reliability of the
system. It verifies that the procedures operate to system specification and mat the integrity of
vital is maintained.

Performance Testing

This project is a application based project, and the modules are interdependent with the
other modules, so the testing cannot be done module by module. So the unit testing is not
possible in the case of this driver. So this system is checked only with their performance to check
their quality.

21
4.2 SYSTEM MAINTENENCE

Software maintenance is a set of software engineering activities that occur after software
has been delivered for the customer and put into operation. The success of software and the
project relies and the maintenance procedure performed.

As with the venture of human, not a single one is perfect. The further modifications are
left to the followers. It is because, the opinion or vision of a thing differs from individual to
individual. The maintenance is performed at regular intervals to keep the project safe and
reliable.

Every time changes attempted on the software will cause serious and unexpected side
effects. So, the maintenance of the software should be considered seriously. Software
maintenance is of course fare more than fixing mistakes. Maintenance can be described as the
activities that are to be undertaken after software is released for the use.

The different of maintenance are:

 Corrective maintenance
 Adaptive maintenance
 Perfective maintenance
22
The corrective maintenance deals with the problems that may occur to software and what
sort of corrective measure can be provided to the user on such situations. The 80 % is spent
adapting existing systems to change in their external environment since we have used an
platform independency the software will be adaptive to all hardware and software environment.

5. CONCLUSION

The “E-passport Tracking system” been developed to satisfy all proposed


requirements. The system is highly scalable and user friendly. Almost all the system objectives
have been met. The system has been tested under all criteria. The system minimizes the problem
arising in the existing manual system and it eliminates the human errors to zero level.

The new computerized system was found to be much faster and reliable and user friendly
than the existing system. The system has been designed and developed step by step and each
module has been developed and tested individually to obtain the necessary required output in the
desired form. The project has been done as user friendly software for easy handling of
transaction. The system developed has been designed and run to satisfy the requirements and
needs of the organization as well as the end users. The system reduces the manual work of
process. The entire system is documented and can be easily understood by the end users. The
forms are very user friendly and also easy to handle. The drawbacks in the existing system are
overcome in the proposed system which runs successfully and efficiently.

23
6. SCOPE FOR FUTURE ENHANCEMENT

The project could be implemented in an average sized organization. An average


company will not be very keen on spending loads of money on ledgers. Whereas our project will
greatly reduce the costs which is using common and cheap office items like database and desktop
application. And also there is no requirement to store books or accounts. The data is directly
stored in the database in the hard disk of the PC. This project has been done as user friendly
software for easy handling of transaction.

The system has been tested and implemented by giving the test data and no programming skill is
required to handle the system. The features of the system are improved security, data security
and reliability. The system can be made real time or online.

This involves provided new future such as

 More number of item details can be inserted into the database.


 It can be integrated with the web for universal access.
 E-payment
 Upgrading the performance.

24
Even though, the system is efficient for meeting user requirements, the scope of future
enhancement can be inevitable as the user requirements changes day by day.

7. BIBLIOGRAPHY

 Elias Awath, “SYSTEM ANALYSIS AND DESIGN”, Tata McGraw Hill Publication, Sixth
Edition,2003
 S.Ramachandran,”COMPUTER AIDED DESIGN”, Air Walk Publication, Third Edition,2003
 .Richard Fairley, “SOFTWARE ENGINEERING CONCEPTS”, Tata McGraw Hill
Publication, Second Edition,1997
 Distributed .NET Programming in VB .NET by Tom Barnaby

 Professional VB.NET, 2nd Edition by Fred Barwell, et al

 The .NET Languages: A Quick Translation Guide by Brian Bischof

 Programming VB.NET: A Guide for Experienced Programmers


by Gary Cornell, Jonathan Morrison

 Learning Visual Basic.NET Through Applications by Clayton Crooks II

 Visual Basic .NET How to Program (2nd Edition) by Harvey M. Deitel, Paul J. Deitel,
Tem R. Nieto
25
APPENDIX:
A. DATA FLOW DIAGRAM

A data-flow diagram (DFD) is a graphical representation of the "flow" of data through an


information system DFDs can also be used for the visualization of data processing (structured
design).A DFD provides no information about the timing or ordering of processes, or about
whether processes will operate in sequence or in parallel.
DFD can be drawn during the requirements analysis and during structured
design. During design it represents how the data will flow in the system when it is built
and also shows the major transformations that the software will have and how the
data will flow through different transforms.
The general rules of drawing a DFD remain the same, we show what transforms
are needed in the software and are not concerned with the logic for implementing them.

DFD Symbols

26
In the DFD there are four symbols as shown below:-
 A square defines a source and destination of system data.
 An arrow identifies data flow. It is a pipeline through which information
flows
 A circle or bubble represents a process that transforms incoming data
flows into out going data flows.
 An open rectangle is a data store or a temporary repository of data.

The need ofr multiple data flows by a process is represented by a “*” between the data
flows.the symbol represents the AND relationship.for example, if there is a “*” between the
two input data flows A and B for a process,it means that A AND B are needed for the process.

Steps to Construct Data Flow Diagrams

Four steps are commonly used to construct a DFD


 Process should be named and numbered for easy reference. Each name should be
representative of the process.
 The destination of flow is from top to bottom and from left to right.
 When a process is exploded in to lower level details they are numbered.
 The names of data stores, sources and destinations are written in capital letters.

Rules for constructing a Data Flow Diagram


 Arrows should not cross each other.
 Squares, circles and files must bear names.
 Decomposed data flow squares and circles can have same names.
 Draw all data flow around the outside of the diagram.
27
CONTEXT DIAGRAM

User Details
User
View Details E Passport
View Details
Tracking Administrator
Manage
Visitor
View Details

Level 1 DFD- User

Details Office
Login Managemen
t
Confirmation
User name, Password
Validation Updating

User Login
Office Files

User Details Add Details

Registratio
Registration
n

28
Level 1 DFD- Visitor

Enquires E Details
Visitor Passport Database
View Details Tracking
system

Level 1 DFD- Administrator

Administrator

Login Details Login

Logi
n

Office Files
Verifications & Approvals
Overall
E Control
Passport
Tracking
system

Office
Managemen 29
Visitor t

User Managing
Level 2 DFD- Visitor

Visitor

View Details
Advertisements

Adding Details

E Passport Ads Details


Tracking Posting
Help Desk Files
Ads

Feedback
Enquires Help
Marriage Registration,
Desk
Death Registration

Registration Reg: Details


s Office Files 30
ER diagram

31
start the process
HOME
PAGE

choosing the menu

Reading form

valid form

Reenter the
Enter username invalid password
and password

valid
valid

GET
APPOINTME NT

proceesing detail

Verification
details
invalid
valid for enquiry

Police
enquiry

valid report
Issue passport

pass word ready to deliver

Passport
delivery

delivery

B.TABLE DESIGN: Table Design:


32
1)tbl_mst_city

FieldsName DataType Null/notnull/primary Key

cityId int Primary key

cityName Varchar(50) Null

isActive bit Null

CREATE TABLE tbl_mst_city


(

cityId int IDENTITY(1,1) NOT NULL,


cityName varchar(50) NULL,
isActive bit NULL,
)

2)country

FieldsName DataType Null/notnull/primary Key

countryId int Primary key

countryName Varchar(50) Null

stateId int Null

isActive bit Null

CREATE TABLE tbl_mst_country(


countryId int IDENTITY(1,1) NOT NULL,
countryName varchar(50) NULL,
stateId int NULL,
isActive bit NULL,
)

3)Eligiblity

FieldsName DataType Null/notnull/primary Key

eligibilityid int Primary key

eligibilitydate datetime Null

isEligibility bit Null

eligibilityReason varchar(max) Null


33
enquiryId int Null

REATE TABLE tbl_mst_eligibility(


eligibilityid int IDENTITY(0,1) NOT NULL,
eligibilitydate datetime NULL,
isEligibility bit NULL,
eligibilityReason varchar(max) NULL,
enquiryId int NULL,
)

4) Enquiry

FieldsName DataType Null/notnull/primary Key

enquiryId int Primary key

enquiryName Varchar(50) Null

enquiryDate datetime Null

CREATE TABLE tbl_mst_enquiry(


enquiryId int IDENTITY(0,1) NOT NULL,
enquiryName varchar(50) NULL,
enquiryDate datetime NULL,
enquiryPassportNo varchar(50) NULL,
enquiryAddress varchar(max) NULL,
cityId int NULL,
stateId int NULL,
countryId int NULL,
enquiryEducation varchar(max) NULL,
enquiryDateofbirth datetime NULL,
isActive bit NULL,
enquiryComments varchar(max) NULL,
isVerified bit NULL,

34
)

FieldsName DataType Null/notnull/primary Key

cityId int Primary key

cityName Varchar(50) Null

isActive bit Null

CREATE TABLE tbl_mst_renewal(


renewalId int IDENTITY(0,1) NOT NULL,
renewalDate datetime NULL,
enquiryId int NULL,
isActive int NULL,
expirydate datetime NULL,
)

FieldsName DataType Null/notnull/primary Key

cityId int Primary key

cityName Varchar(50) Null

isActive bit Null

CREATE TABLE tbl_mst_state(


StateId int IDENTITY(1,1) NOT NULL,
cityId int NULL,
StateName varchar(50) NULL,
isActive bit NULL,
)

FieldsName DataType Null/notnull/primary Key

cityId int Primary key

cityName Varchar(50) Null

isActive bit Null

CREATE TABLE tbl_mst_UserList(


slno int NULL,
username varchar(50) NULL,
userPassword varchar(50) NULL,
createdDate datetime NULL,

35
isActive bit NULL
) ON PRIMARY

FieldsName DataType Null/notnull/primary Key

cityId int Primary key

cityName Varchar(50) Null

isActive bit Null

CREATE TABLE tbl_mst_UserLogin(


UserId int IDENTITY(1,1) NOT NULL,
UserName varchar(100) NULL,
UserPassword varchar(100) NULL,
createdDate datetime NULL,
isActive bit NULL,
)
(

36
C..SOURCE CODE:

<Global.Microsoft.VisualBasic.CompilerServices.DesignerGenerated()> _

Partial Class Form1

Inherits System.Windows.Forms.Form

'Form overrides dispose to clean up the component list.

<System.Diagnostics.DebuggerNonUserCode()> _

Protected Overrides Sub Dispose(ByVal disposing As Boolean)

Try

If disposing AndAlso components IsNot Nothing Then

components.Dispose()

End If

Finally

MyBase.Dispose(disposing)

End Try

End Sub

'Required by the Windows Form Designer

Private components As System.ComponentModel.IContainer

'NOTE: The following procedure is required by the Windows Form Designer

'It can be modified using the Windows Form Designer.

'Do not modify it using the code editor.

37
<System.Diagnostics.DebuggerStepThrough()> _

Private Sub InitializeComponent()

Private components As System.ComponentModel.IContainer

'NOTE: The following procedure is required by the Windows Form Designer

'It can be modified using the Windows Form Designer.

'Do not modify it using the code editor.

<System.Diagnostics.DebuggerStepThrough()> _

Private Sub InitializeComponent()

Me.Panel3 = New System.Windows.Forms.Panel

Me.rdbNo = New System.Windows.Forms.RadioButton

Me.rdbYes = New System.Windows.Forms.RadioButton

Me.txt_Reason = New System.Windows.Forms.TextBox

Me.dtpDOB = New System.Windows.Forms.DateTimePicker

Me.Label4 = New System.Windows.Forms.Label

Me.cmbName = New System.Windows.Forms.ComboBox

Me.Label8 = New System.Windows.Forms.Label

Me.Label1 = New System.Windows.Forms.Label

Me.Panel2 = New System.Windows.Forms.Panel

Me.btnCancel = New System.Windows.Forms.Button

Me.btnSave = New System.Windows.Forms.Button

Me.Label10 = New System.Windows.Forms.Label

Me.Panel1 = New System.Windows.Forms.Panel

Me.GroupBox1 = New System.Windows.Forms.GroupBox

38
Me.Panel3.SuspendLayout()

Me.Panel2.SuspendLayout()

Me.Panel1.SuspendLayout()

'GroupBox1

Me.Panel3.PerformLayout()

Me.Panel2.ResumeLayout(False)

Me.Panel1.ResumeLayout(False)

Me.Panel1.PerformLayout()

Me.GroupBox1.ResumeLayout(False)

Me.GroupBox1.PerformLayout()

Me.ResumeLayout(False)

End Sub

Friend WithEvents Panel3 As System.Windows.Forms.Panel

Friend WithEvents Panel2 As System.Windows.Forms.Panel

Friend WithEvents btnCancel As System.Windows.Forms.Button

Friend WithEvents btnSave As System.Windows.Forms.Button

Friend WithEvents Label10 As System.Windows.Forms.Label

Friend WithEvents Panel1 As System.Windows.Forms.Panel

Friend WithEvents cmbName As System.Windows.Forms.ComboBox

Friend WithEvents Label8 As System.Windows.Forms.Label

Friend WithEvents Label1 As System.Windows.Forms.Label

Friend WithEvents dtpDOB As System.Windows.Forms.DateTimePicker

Friend WithEvents Label4 As System.Windows.Forms.Label

39
Friend WithEvents rdbNo As System.Windows.Forms.RadioButton

Friend WithEvents rdbYes As System.Windows.Forms.RadioButton

Friend WithEvents txt_Reason As System.Windows.Forms.TextBox

Friend WithEvents GroupBox1 As System.Windows.Forms.GroupBox

40
Screenshots:

Login screen:

41
Enquiry:

Elgibility:
42
43
Renewal

44
45
Verification:

46

You might also like