2.2 Existing System 2.3 Proposed System 2.4 Data Flow Diagram
2.2 Existing System 2.3 Proposed System 2.4 Data Flow Diagram
2.2 Existing System 2.3 Proposed System 2.4 Data Flow Diagram
CONTENTS
1. INTRODUCTION 2
2. SYSTEM ANALYSIS 5
2.1 Introduction
3. SYSTEM DESIGN 17
3.1 Input design
3.2 Output design
3.3 Form design
3.4 Database design
4. SYSTEM IMPLEMENTATION 33
5. APPENDIX 46
7. FUTURE ENHANCEMENT 54
8. CONCLUSION 55
9. BIBLIOGRAPHY 56
Crime File System 2
1. INTRODUCTION
Crime File System is a system used to report crimes. This project will be
done using VB 6.0 as front end, and MS Access as back end. It can used to report
crime. This project is mainly useful for police stations. This system will help to
manage all the activities in a police station using computers. Currently all the
works are done manually, by computerizing all the activities inside a police station
• Complaint registration
• FIR Management
LOGIN
1. COMPLAINT REGISTRATION
This module helps to register the details about the crime. This is done by
entering some details, such as incident details, Victim details, crime details etc
This module allows us to view the status of the complaint that you have
registered earlier.
Here we can have the facility to view the details of the criminals. The
administrator can add new criminal’s details and save it in a database. This can be
done by entering details such as criminal number, age, occupation, type of crime
etc.
5. FIR MANGEMENT
This module allows viewing the First Information Report of all the crimes
that took place at recent years. The administrator can enter FIR information and
save it in a database.
Crime File System 4
Here we can view the details of the case, date of occurrence, the type of
crime and place of occurrence etc…
This module helps to view the postmortem details of a person. The details
such as date of death cause of death, name of the doctor etc.
This module helps the administrator as well as the user to store, view and manage
the details of the past and present prisoners.
2. SYSTEM ANALYSIS
process. The system is studied to the minutest detail and analyzed. The
system analyst plays the role of the interrogator and dwells deep into the
working of the present system. The system is viewed as a whole and the
input to the system are identified. The outputs from the organizations are
existing system. Now the existing system is subjected to close study and
solver and tries to sort out the difficulties that the enterprise faces. The
solutions are given as proposals. The proposal is then weighed with the
existing system analytically and the best one is selected. The proposal is
reviewed on user request and suitable changes are made. This is loop that
using the information for further studies on the system. Preliminary study
the system users and system developers. It does various feasibility studies.
from which the decision about the strategies to be followed for effective
• Time consuming.
facilities. The proposed system can overcome all the limitations of the
existing system. The system provides proper security and reduces the
manual work.
• Security of data.
• Greater efficiency.
• Better service.
the purpose of the organization for the amount of work, effort and the time
that spend on it. Feasibility study lets the developer foresee the future of
ability to meet their user needs and effective use of resources. Thus when
designed and lists various areas that were considered very carefully during
A. TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first.
suggested one?
The project should be developed such that the necessary functions and
after some period of time, due to the fact that never version of same
Crime File System 10
software supports older versions, the system may still be used. So there are
minimal constraints involved with this project. The system has been
B. ECONOMIC FEASIBILITY
to ensure that effort is concentrated on project, which will give best, return
at the earliest. One of the factors, which affect the development of a new
errors.
manual cost to spend for the proposed system. Also all the resources are
Crime File System 11
C. BEHAVIORAL FEASIBILITY
LEVEL 0 DFD
Crime File System 13
LEVEL 1 DFD
Crime File System 14
LEVEL 2 DFD
Crime File System 15
LEVEL 3 DFD
Crime File System 16
LEVEL 4 DFD
Crime File System 17
3. SYSTEM DESIGN
Design is the first step into the development phase for any engineered
product or system. Design is a creative process. A good design is the key
to effective system. The term “design” is defined as “the process of
applying various techniques and principles for the purpose of defining a
process or a system in sufficient detail to permit its physical realization”.
It may be defined as a process of applying various techniques and
principles for the purpose of defining a device, a process or a system in
sufficient detail to permit its physical realization. Software design sits at
the technical kernel of the software engineering process and is applied
regardless of the development paradigm that is used. The system design
develops the architectural detail required to build a system or product. As
in the case of any systematic approach, this software too has undergone
the best possible design phase fine tuning all efficiency, performance and
accuracy levels. The design phase is a transition from a user oriented
document to a document to the programmers or database personnel.
System design goes through two phases of development: Logical and
Physical Design.
A quality output is one, which meets the requirements of the end user
and presents the information clearly. In output design it is determined how
the information is to be displaced for immediate need and also the hard
copy output. It is the most important and direct source information to the
user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.
Progress
Login
Crime File System 20
Criminal Register
Crime File System 22
Delete User
Post mortem
The database design is a two level process. In the first step, user
requirements are gathered together and a database is designed which will
meet these requirements as clearly as possible. This step is called
Information Level Design and it is taken independent of any individual
DBMS.
• RELATIONSHIPS:
Table relationships are established using Key. The two main keys of prime
importance are Primary Key & Foreign Key. Entity Integrity and Referential
Integrity Relationships can be established with these keys. Entity Integrity
enforces that no Primary Key can have null values. Referential Integrity enforces
that no Primary Key can have null values.
• Referential Integrity for each distinct Foreign Key value, there must exist
a matching Primary Key value in the same domain. Other key are Super Key and
Candidate Keys.
• Relationships have been set between every table in the database. This
ensures both Referential and Entity Relationship Integrity.
NORMALIZATION:
As the name implies, it denoted putting things in the normal form. The
application developer via normalization tries to achieve a sensible
organization of data into proper tables and columns and where names can
be easily correlated to the data by the user. Normalization eliminates
repeating groups at data and thereby avoids data redundancy which proves
to be a great burden on the computer resources. These includes:
Crime File System 26
The First Normal Form states that the domain of an attribute must
include only atomic values and that the value of any attribute in a tuple
must be a single value from the domain of that attribute. In other words
1NF disallows “relations within relations” or “relations as attribute values
within tuples”. The only attribute values permitted by 1NF are single
atomic or indivisible values.
The first step is to put the data into First Normal Form. This can be
donor by moving data into separate tables where the data is of similar type
in each table. Each table is given a Primary Key or Foreign Key as per
requirement of the project. In this we form new relations for each
nonatomic attribute or nested relation. This eliminated repeating groups of
data.
In this we decompose and setup a new relation for each partial key with
its dependent attributes. Make sure to keep a relation with the original
primary key and any attributes that are fully functionally dependent on it.
This step helps in taking out data that is only dependant on apart of the
key.
Table Design
Table: Complaint
Table: History
Table: FIR
Crime File System 33
4 SYSTEM IMPLEMENTATION
Crime File System 34
Before writing an event procedure for the control to response to a user's input, you have
to set certain properties for the control to determine its appearance and how it will work
with the event procedure. You can set the properties of the controls in the properties
window or at runtime.
The text box is the standard control for accepting input from the user as well as to display
the output. It can handle string (text) and numeric data but not images or pictures. String
in a text box can be converted to a numeric data by using the function Val(text). The
following example illustrates a simple program that processes the input from the user.
Example
In this program, two text boxes are inserted into the form together with a few labels. The
two text boxes are used to accept inputs from the user and one of the labels will be used
to display the sum of two numbers that are entered into the two text boxes. Besides, a
command button is also programmed to calculate the sum of the two numbers using the
plus operator. The program use creates a variable sum to accept the summation of values
from text box 1 and text box 2.The procedure to calculate and to display the output on the
Label1.Caption = Sum
End Sub
Figure
The Label
The label is a very useful control for Visual Basic, as it is not only used to provide
instructions and guides to the users, it can also be used to display outputs. One of its most
important properties is Caption. Using the syntax label.Caption, it can display text and
numeric data . You can change its caption in the properties window and also at runtime.
Please refer to Example 3.1 and Figure 3.1 for the usage of label.
The command button is one of the most important controls as it is used to execute
commands. It displays an illusion that the button is pressed when the user click on it. The
most common event associated with the command button is the Click event, and the
Statements
End Sub
The Picture Box is one of the controls that is used to handle graphics. You can load a
picture at design phase by clicking on the picture item in the properties window and
select the picture from the selected folder. You can also load the picture at runtime using
the LoadPicture method. For example, the statement will load the picture grape.gif into
You will learn more about the picture box in future lessons. The image in the picture box
is not resizable.
The Image Box is another control that handles images and pictures. It functions almost
identically to the picture box. However, there is one major difference, the image in an
Image Box is stretchable, which means it can be resized. This feature is not available in
Crime File System 37
the Picture Box. Similar to the Picture Box, it can also use the LoadPicture method to
load the picture. For example, the statement loads the picture grape.gif into the image
box.
The function of the List Box is to present a list of items where the user can click and
select the items from the list. In order to add items to the list, we can use the AddItem
method. For example, if you wish to add a number of items to list box 1, you can key in
Example
List1.AddItem “Lesson1”
List1.AddItem “Lesson2”
List1.AddItem “Lesson3”
List1.AddItem “Lesson4”
End Sub
The items in the list box can be identified by the ListIndex property, the value of the
ListIndex for the first item is 0, the second item has a ListIndex 1, and the second item
The function of the Combo Box is also to present a list of items where the user can click
and select the items from the list. However, the user needs to click on the small
arrowhead on the right of the combo box to see the items which are presented in a drop-
down list. In order to add items to the list, you can also use the AddItem method. For
example, if you wish to add a number of items to Combo box 1, you can key in the
following statements
Example
Combo1.AddItem “Item1”
Combo1.AddItem “Item2”
Combo1.AddItem “Item3”
Combo1.AddItem “Item4”
End Sub
The Check Box control lets the user selects or unselects an option. When the Check Box
is checked, its value is set to 1 and when it is unchecked, the value is set to 0. You can
include the statements Check1.Value=1 to mark the Check Box and Check1.Value=0 to
unmark the Check Box, as well as use them to initiate certain actions. For example, the
program will change the background color of the form to red when the check box is
unchecked and it will change to blue when the check box is checked. You will learn
Crime File System 39
about the conditional statement If….Then….Elesif in later lesson. VbRed and vbBlue are
color constants and BackColor is the background color property of the form.
The Option Box control also lets the user selects one of the choices. However, two or
more Option Boxes must work together because as one of the Option Boxes is selected,
the other Option Boxes will be unselected. In fact, only one Option Box can be selected
at one time. When an option box is selected, its value is set to “True” and when it is
unselected; its value is set to “False”. In the following example, the shape control is
placed in the form together with six Option Boxes. When the user clicks on different
option boxes, different shapes will appear. The values of the shape control are 0, 1, and
2,3,4,5 which will make it appear as a rectangle, a square, an oval shape, a rounded
Example
Shape1.Shape = 0
End Sub
Shape1.Shape = 1
End Sub
Shape1.Shape = 2
Crime File System 40
End Sub
Shape1.Shape = 3
End Sub
Shape1.Shape = 4
End Sub
Shape1.Shape = 5
End Sub
The Drive ListBox is for displaying a list of drives available in your computer. When you
place this control into the form and run the program, you will be able to select different
The Directory List Box is for displaying the list of directories or folders in a selected
drive. When you place this control into the form and run the program, you will be able to
select different directories from a selected drive in your computer as shown in Figure 3.4
Crime File System 41
The File List Box is for displaying the list of files in a selected directory or folder. When
you place this control into the form and run the program, you will be able to shown the
You can coordinate the Drive List Box, the Directory List Box and the File List Box to
search for the files you want. The procedure will be discussed in later lessons.
MS ACCESS 2003
Microsoft Access is a powerful program to create and manage your databases. It has
many built in features to assist you in constructing and viewing your information. Access
is much more involved and is a more genuine database application than other programs
The keywords involved in the process are: Database File, Table, Record, Field, Data-
type. Here is the Hierarchy that Microsoft Access uses in breaking down a database.
Crime File System 42
Database File: This is your main file that encompasses the entire database and that is
Example: StudentDatabase.mdb
Table:A table is a collection of data about a specific topic. There can be multiple tables
in a database.
Field: Fields are the different categories within a Table. Tables usually contain multiple
fields.
Datatypes: Datatypes are the properties of each field. A field only has 1 datatype.
Datatype) Text
Crime File System 43
• Two Ways
o The white box gives you the most recent databases you have used. If you
do not see the one you had created, choose the More Files option and hit
OK. Otherwise choose the database you had previously used and click
OK.
Crime File System 46
HARDWARE REQUIREMENTS
Monitor : VGA/SVGA
SOFTWARE REQUIREMENTS
5 APPENDIX
5.1 Source Code
Add Complaint
End Sub
Add user
FIR Report
Dim x As Integer
Private Sub cmdShRpt_Click()
x = cmbMno.Text
If (DataEnvironment1.rsCommand4.State = 1) Then
DataEnvironment1.rsCommand4.Close
Else
DataEnvironment1.Command4 (x)
Load DataReportFIR
DataReportFIR.Show
End If
End Sub
Login
frmMDI.mnuActiv.Enabled = True
frmMDI.mnuActivReg.Enabled = True
frmMDI.mnuActivComp.Enabled = True
frmMDI.mnuActivRpt.Enabled = True
Unload Me
Else
MsgBox "Failure", vbCritical, "Crime File System"
End If
'rs.Close
End Sub
Dim x As Integer
Private Sub cmdShRpt_Click()
x = cmbMno.Text
If (DataEnvironment1.rsCommand3.State = 1) Then
DataEnvironment1.rsCommand3.Close
Else
DataEnvironment1.Command3 (x)
Load DataReportmortem
DataReportmortem.Show
End If
End Sub
Splash
Dim i As Integer
Dim x As Integer
Option Explicit
End Sub
error. A good test is one that has high probability of finding the yet undiscovered
procedure, any testing tool and test cases and their expected results.
1. Unit Testing
program prior to the integration of the unit into large system. A program
unit is usually the smallest free functioning part of the whole system.
representation handled by each module has been tested. All the units that
makeup the system must be tested independently to ensure that they work
as required.
Crime File System 53
During unit testing some errors were raised and all of them were
rectified and handled well. The result was quiet satisfactory and it worked
well.
2. Integration Testing
modules and build a program structure that has been dictated by design.
integration consists
The system was done the integration testing. All the modules were
tested for their compatibility with other modules .They test was almost
successful. All the modules coexisted very well, with almost no bugs. All
3. Validation Testing
package, interfacing errors that have been uncovered and corrected and the
final series of software test; the validation test begins. Steps taken during
Crime File System 54
4. Recovery Testing
5. Security Testing
6. Stress Testing
shown in below:
2. Interface errors.
4. Performance error.
5. Termination error.
Crime File System 55
After preparing test data, the system under study is tested using the
test data. While testing the system using test data, errors are again
uncovered and corrected by using above testing and corrections are also
7. FUTURE ENHANCEMENT
8. CONCLUSION
providing the user with customized and powerful complaint registration and
process management system side software. The software is built with all options
generation etc…All the requirements specified during the analysis and design
phase are fully met, thus resulting in the formation of good software. The
interface provided is very user friendly and flexible for all times.
Crime File System 58
9. BIBLIOGRAPHY
Books
• A Complete Guide to Programming in Visual Basic .Net
• A Complete Visual Basic 6 Training Course: How to
Programme: Package
• Advanced Programming Using Visual Basic: Version 6.0
• Access 2003 Power Programming with VBA
• Advanced MS Visual Basic
Site Address
• www.associatedcontent.com
• www.members.tripod.com