Free Essay

Design of Idcard System

In: Computers and Technology

Submitted By tonyfor
Words 5810
Pages 24
CHAPTER ONE
INTRODUCTION
1.0 Introduction An identity document is any document which may be used to verify aspects of a person’s personality. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). Countries which do not have formal identity documents may require informal documents. In the absence of formal identity document, driving licenses can be used in many countries as a method of proof of identity, although some countries do not accept driving licenses for identification, often because in those countries they do not expire as documents and can be old easily forged. Most countries accepts passports as a form of identification. Most countries have the rule that foreign citizens need to have their passport or occasionally a national identity card from their country, available at anytime if they do not have residence permit in the country. A student identification card can only be issued to genuine bonafide students. Card holders can use the card to identify themselves as a student around the campus or outside the campus. The identity card is managed and administered by the (Student Identity Card Association (SICA) of the school.

1.1 Theoretical Background Today, it is believed that the application of computer technology in any activity would go a long way in making that activity much easier. To the research, this statement remains a theory until proven otherwise by the implementation of a computerized student ID-card processing system. It is also believed that benefits and advantage of using computers outweighs that of manual methods. This also wants to be proven beyond doubts by the researcher through the implementation of the new system.

1.2 Statement of the Problem
The major problems that gave rise to this research project is faced by Akwa Ibom State Polytechnic and they include late registration of student’s, corrupt students that know diverse ways of producing fake identity cards, corrupt and tactical student’s who have a way of sneaking into the examination hall with fake identity cards.

1.3 Aim and Objectives of the Study
The aim of the study is to design and implement workable computerized system for student’s identity cards.
The objectives of the study are as follows: 1. To establish efficient means of tracking students with fake ID-Card. 2. To reduce examination malpractice in Akwa Ibom State Polytechnic, at least in the area of impersonation 3. To create a reliable database of students in Akwa Ibom State Polytechnic, with unique features like passport photographs and registration numbers. 4. For research purpose (project writing defense).

1.4 Significance of the Study
This research work would be unnecessary if it has no significance to humanity. Firstly, the newly designed system would make other-higher institutions to see the need for creating a computerized student ID-card processing system to use in production of student ID-card. Secondly, the knowledge that the new system has designed would make students and invigilators contemplating on impersonation and have a change of mind for fear of being caught. Thirdly, the designed of the system would provide jobs for system analysts and programmers contacted to build the system for other institutions. Fourthly, student identity card is used to check out books from the library, register to vote on student union matters, and get student discount. Finally, the research projects would serve as reference material to other scholars interested to further research on the topic.

1.5 Scope of the Study
This research work restricted to implementation of computerized student ID-card processing system; using Akwa Ibom State Polytechnic as a case study. Data used for the study were gathered from this source.

1.6 Organization of the Research
This research work has been arrange in the following order: Chapter one contains introduction, theoretical background, statement of the problem, aim and objectives of the study, significance of the study, scope of the study, organization of the research and definition of terms (where necessary). Chapter two focused on the relevant literature review, highlighting basic concept. Chapter three is concerned with the system design which emphasis on system design and flowcharting. It also expands the development of the new information system that would facilitate tracking of fake ID-cards. Chapter four is the system implementation which gives the direction of system and analysis of modules. Chapter five summarizes and concludes the research work offering some useful recommendations.

1.7 Definition of Terms
In order to do away with ambiguity, some terms and keywords in the context of this research are hereby defined.
Identity Card: It is a proof of the holder’s identity that includes a photograph.
Impersonation: The act of pretending to be avoid candidate in order to write examination for someone else using that person identity card.
Verification: Is the evidence that proves that something is true or current.
Photograph: It is an image appeared on the identity card owner.
Malpractice: Is a careless, wrong, or illegal practices that is not ethical in a particular field like academics.

CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
This chapter focused on the review of related literature on research topics, it take a look at the suggestion, comments, citations, of various authors, scholar’s and professionals and the issue of the student ID-Card. The review is carried out under the following sub-headings:

2.1 Concept if Identity Card
Security lapses on school campuses are a real threat and growing problem in today’s world. Improve security at your school by updating the visitor sign-is process, which often fails to provide sufficient visitor identity information, and replace it with an automated ID-card scanning solution (Ben, Quarmby, 2003). Ensure that along with visitor name, data and time of entry, you also gave their address, drivers licenses number and basic physical description in your system. Is your school using antiquated paper attendance tracking and manual visitor log book? In addition to increase safety, modern attendance tracking software can save time and money for teachers and school alike. Using the existing student and staff ID-cards on use on campus, upgrade, school tracking system by incorporating magnetic stripe, barcode reader or proximity smart card technologies. Attendance tracking software increase accuracy with immediate transmission to central location, offering the ability to quick compile attendance data from which you can learn if certain classes routinely struggle with attendance problem, and which students if any, are frequently tardy to class or absent. The data can be as individualized or campus-wide as you’d like, so you can learn about developing or potential problems before it too late depending on the schools policy you can also automatically notify parents. According to (Naledi, 2003), schools and educational institutions can save money by using a single photo ID-card to serve multitude of applications. Student ID-cards first and foremost as a form of identification, but can also be used for school food service account management, access to computer and technology facilities, secure access control for tracking student activity and attendance. With an onsite photo ID system student faculty, staff and visitor IDs can be produced and demand using photo ID printers, with very little wait time. Students can have their photos taken and receive their printed ID cards within minutes, without involving an outside vendor and the time and cost involved in dealing with one.

2.2 Overview of Plastic Identity Badges
This serve to visually identity students, staff and visitors at a glance. There a countless techniques for adding visual verification, and security to your school photo ID-cards. A basic level of security can be incorporated onto your cards simply within ID card design, but rather than just putting a photo on a plain white fraudulent ID card replication, consider using custom imagery on holographic over-laminates on cards. To further easily distinguish between students faculty and design and be sure to use self-expiring temporary visitor badges for campus visitors. Multi-use ID cards such as magnetic name badges and those with or period barcode can be used to manage the school lunch program as well as library ID card check-out system.
2.3 Identity Card-An Overview
An identity card is a proof of the holder’s identity that includes a photograph. To a limited extent, an identity card can also be used a travel document (Nelson, 2005). An identity can also contains a technical component (a microchip), which for example makes it possible to use e-services (a so-called electronic identity card). On the applicant’s request, such as health insurance information cab be stored on the identity card, and the card can be used instead of a Kela card in pharmacies or medical centres. Identity card are issued by the police on application, on certain conditions, an identity can be also be issued to a foreign citizen or a minor. For particular reason a temporary identity card may also be issued. A standard identity card is valid for 5 years, a temporary card valid for not more than 4 months.

2.4 Overview of Identity Document Forgery
Identity document forgery is the process by which identity documents issued by governing bodies are copied and or modified by persons not authorized to create such documents about the identity or those who would view the documents the identity or status of the bearer (Philips 2008). The term also encompasses the activity of acquiring identity documents from governing bodies by falsifying the required supporting documentation in order to create the desired identity. Identity documents differ from other credentials in that, they are intended only to be usable by the person holding the card. Unlike other credentials, they be used to restrict the activities of the holders as well as to expand them. Documents that have been forged in this way include drivers licenses, (which historically have been forged or altered as an attempt to conceal the fact that person desiring the consume alcohol are under the legal drinking age), birth certificates and social security cards (like used in identity theft schemes, or to defraud the government), and passports (used to evade restrictions on entry to particular country). At the beginning of 2010, there were 11million stolen or lost passports listed in the global data base of Interpol. Such falsified documents can be used for identity theft, age, deception, illegal immigration, and organized crime.

5. Use Scenarios, Forgery Techniques and Security Countermeasures of ID-Cards.
A distinctions needs to be made between the different uses of an identity document. In one case the fake ID may only have to pass a surgery inspection such as flashing a plastic ID card for a security guard. At the other extreme a document who may be equipped with technical tools for verifying biometrics and reading hidden security features within the card. To make forgery more difficult, most modern IDs contains numerous security features that require specialized and expensive equipment to duplicate. School IDs are typically easier to fake, as they often do not have the same law of security measures of government issued IDs. Modern fake ID cards almost invariably carry a picture of authorized user, a simple and effective form, of biometric identification. However, forgery of simple photographic ID cards has become simple in recent year’s with the variability of low cost high- resolution printers and scanners and photo editing, software. Simple fake ID cards are commonly made using an inkjet or laser printer to print a replica documents which is then laminated to resemble or real ID card. Most design are made using computer programs, recreating scanned copies of a license. Most complex ID card are now being created by printing on a material called teslin or Artesyn, which are paper- like material that are actually micro-porous plastic- sheets when butterfly and holograms are applied, the card is then run through a heat laminator which creates a fissional looking ID card. Numerous security printing techniques have been used to attempt to enhance the security of 10 cards. For examples many modern documents includes holograms, which are difficult to replicate without expensive equipment which is not generally available. Though accurate recreation of this holograms is extremely difficult using a mixture of pigments and base can create a similar shiny multicolored look which may pass cursery inspections.

2.5.1 Security Countermeasures
The combination of multiple high security features, biometric, and well trained document inspections with technical assistance can be very effective at preventing forged documents from being easily produced. Instead of acquiring the expensive specialized equipment needed to make fake documents, it may be more economical to produce a “genuine fake”; a legitimate document, but which contains false information. One way of doing is to present the document issuing authority with false credentials, which they will then endorse by issuing a new document. In this way, false identities and credentials can be “bootstrapped” over period of time. Another simple way of generating false credentials, is to suborn one of the officials involved in the document issuing process through bribery or intimidation. This may also be combined with the bootstrapping process mentioned above to amount complex attacks. Corruption in the document issuing process is hard to counter, since as the value of credential increase, the economic in centuries for corruption also increase. This is particularly, true in the case of fake ID cards that combines many functions in one document, and for documents which are issued in large numbers, thus requiring many thousand of people to have authority powers, thus creating a long chain of people who can possibly be exploited. Defection of a “genuine fake” document is also difficult, process, as such a fake legitimate document; it will pass any test for forgery. To detect such fakes, it is necessary to perform a background check on then individual in question to confirm the legitimacy of the document information. Now day’s drivers license and identification cards are verified by the scanning the magnetic stripe on the back of license or by using an ultraviolet light to view image printed by the government on the identifications which are only visible under ultraviolet light.

CHATPER THREE
SYSTEM ANALYSIS AND DESIGN
3.0 Introduction The design phase is very important in any design development for a degree of creativity and precision. It determines to a large extent, successful implementation and efficiency with which the system is defined. A badly designed system will produce incorrect, disastrous and misleading output and this might be problematic to the designer and the users. It is therefore, important that the designer of a system should do it with utmost care.

3.1 Research Methodology In this work, the methodology used in achieving the aims and objectives of the study are as following:
i. Interviews and observations of the procedures and activities in a manual student identity card system ii. Studying the operations of students identity card produces. iii. Implementation of the system using a suitable programming language.

3.2 System Analysis
It is the study of sets of interacting entities, including computer systems. It also look into the existing and proposed system and analyzed it to see whether there are need of conversion from the current to the proposed one.
And also consists of finding out what are the requirements specifications that the system will used and the benefit of the application program.
3.2.1 Analysis of the Existing System
The manual method of students identity card was prone to errors and at the end generated result that was not veritable. Since there was not one department of the institution that was at the identity card production centre, the corrupt staff of students identity card production unit refused to followed FIFO system and it lead to student procrastination at the identity card unit. The manual system did not generate timely output, after students have registered at the production unit, he or she has to check in regularly to see whether the staff of the identity card has done with the card production which lead to the students’ time consumption.

3.2.2 Problem of the Existing System
The existing student are: ▪ Poor information storage method ▪ Insecurity of data because it is prone to vandalization and unauthorized accessibility. ▪ It takes long time in accessing records of students in the manual system. ▪ It is not dependable.

3.2.3 Analysis of the Proposed System The computerized system will augment the work of student identity card production unit in time of registration and record processing of students. The proposed system would be very easy to use because of its speed, safety, accuracy and reliability. Information on student status and verification can be promptly accessed.

3.2.3.1 Advantages of the Proposed System The advantages of the proposed system thus include: ➢ It will help to reduce intrusion to users data. ➢ It will help to save time which compared to the existing system. ➢ It will create convenience and user friendliness to the operators. ➢ It will reduce the regular loss of files due to poor management. ➢ It would generally improve the knowledge base by computing in our society.

3.2.3.2 Disadvantages of the Proposed System The disadvantages of the proposed system include: ➢ There might be the possible corruption and damages of files if the system is attacked by virus. ➢ The system cannot be put to use when there is power outage. ➢ The system will thus cost a fortune to maintain regularly.

3.3 System Design
In this study, several components are put together to make up the system. This will serve as an information unit, the operational unit of the system to be designed. The computerized student identity card system is designed with features of an object oriented programming language using Visual Basic (6.0); the programming interface and Microsoft Access as the database management system. The system presents its design stating its inputs, output and program flowchart.

3.3.1 Input Layout
The input data of the system can either be done online or offline. In this study, the offline approach is employed. The input layout of this system is presented below:
A
NAME SEX DATE OF BIRTH PLACE OF BIRTH
B
PERMANENT ADDRESS CITY STATE
L.G.A DISTRICT POST CODE C
STATE OF ORIGIN HOME TOWN L.G.A UPLOAD PASSPORT
PHONE NO. EMAIL OCCUPATION

OK MODIFY EXT
Figure 3.1: Input Layout of Students’ Identity Card
3.3.2 Program Flowchart
See appendix A for program flowchart.

3.3.3 Output Format
The sample output for this program is presented in Appendix C.

CHAPTER FOUR
SYSTEM IMPLEMENTATION AND DOCUMENTATION
1. Introduction
The details of the structure of any system designed is explained in the implementation phase of such system. This process gives the detail of the initial investigation process, the design phase, programming phase and the review of the system.

4.1 System Design Diagram
Home Page

Main Menu

ID card ID Card Exit
Registration Printing

Ok Exit Yes No

Modify

Exit

Figure 4.1 System Design Diagram of Students’ Identity Card
4.2 Choice of Programming Language
This project requires an object oriented programming language. The research choose visual basic (6.0) programming language to develop this particular software because of it obvious advantage over other object oriented language like PASCAL, COBOL, and C++ etc. Its instruction codes are user friendly language. Visual basic is the object oriented programming language that fits with database applications.

4.3 Analysis of Modules
Module I: (Identity – Registration): This module allows student to register in student identity card unit.
Module II (Identity – Printing): This module enables student to provide their registration number for printing of identity card.
Module III: (Exit): This module terminates the program.

4.4 Programming Environment
The programming environment use windows since visual basic windows based object-oriented programming language which allows users to develop windows and office application by creating command buttons, textbox, windows and toolbar which may be programmed to perform certain actions.

4.4.1 Hardware Requirement
The hardware requirements include: i. At least 450 gigabyte Pentium processor ii. At least a 128 MB RAM iii. At least a 3 GB Hard-disk iv. A VGA or SVGA Monitor v. A stabilizer vi. A standard keyboard

4.4.2 Software Requirements
The following software requirements are also needed:

i. Window XP (Operating System)

ii. Microsoft Visual basic (6.0)

iii. Microsoft Access (7.0)

4.5 System Implementation
For any system to output results, the users must be to use the system effectively. This new system is user friendly, menu-driven, flexible and interactive. Thereby, offering users the ease of learning and training staff of student identity card unit on the used of computer-based system. Once the training is completed. The system is implemented and the manual system has to be replaced. The following change over produce are available in this is study.
The Pilot Approach: In this approach, the change over begins with the selection of all the departments involved in using this application. The system is first tested within these departments so that if users specifications is inline with that of the program specification of the new system, then all other sections of the organization will be converted. If there is any amendment to be made, it is done easily and the specification are met, the new system takes over automatically.
Phased Approach: The conversion types is useful in this study, since it is done in a step by step fashion, starting with a single section of the firm at a time, until the entire conversion of the other sections is completed and the old system is absolutely scared out.
Parallel Approach: This change over approach is also useful in this study, because it allows both data processing operations to occur simultaneously on both the old and new systems. The results from both systems are compared, if identical. Then the new system takes over fully from the old system, despite the fact this approach places strains on the resources of the organization. The staff of the students identity card unit should adopt this change over approach. I thereby recommend that parallel and phase approaches to be implemented in the operations of the case study to enhance the smooth and efficient functioning of the system.

CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5. Introduction
This chapter is the concluding part of this project work. It comprises of constraints of the study, summary and conclusion proffered by this work.

5.1 Constraints of the Study
The problem encountered during the course of this research work. They are as follows:
Poor communication between experts in the field of students identity card production.
Problem of have access to some materials that were useful for the research work.
Time constraint was another problem faced by the researcher during the research work.

2. Summary
Students identity card is on of the vital document use in within and outside the school to identify a bonefide student who belongs to the institution. The manual or traditional way of producing this document was prone to errors and fraudulent students who knows diverse ways of forging identity card else way forged it without school consent. It was time wasting, easting of resources and often resources and often result to problems between the student and the staff of identity card unit. The alternative method of this problems is the development of the computerized student identity card processing system, which is an intelligent system that would assist both students and identity card producers during production. This system has employed a sophisticated technology termed fuzzy logic. It has proven to be a very powerful tool for handing uncertainty or imprecise or vague variables.

3. Conclusion
The research work titled “Computerized Student Identity Card Processing System” was deeply studied and analyzed to design the code and implement with various testing methods were done under the guidance of experienced project guide. The solution developed is free from all the bugs and executable with all different modules to the utmost satisfaction of the user. All current requirements and possibilities, have been taken care during the research time. The solution provided now will suit t all the needs of various users in the same industry but also the possibilities of further upgrading of this solution with the new and advance technologies, and further additional requirements of the users is not be ruled out.

4. Recommendations
Based on the finding of this research work on the student identity card processing system used in Akwa Ibom State Polytechnic, the following recommendations were made:
The staff of an identity card unit must be computer literate. And the management of the unit should employed more staff or operators in the direction of operating the newly designed system. Checking should be done regularly to make the system up-to-date.
REFERENCES
Ben, Q. (2003). Concept of computerized identity card, London: Oxford University Press.

Naledi, B. (2013). Computer and educational sector in Nigeria, Anambra: Chibuzor Press.

Nelson, R. (2005). Examination: the true test of knowledge. London: Safe Publication.

Oyelali, A. (2007). Education and the Nigerian society, Akure: Onibonoje Ltd.

http://www.google.com/studentidentitydocument(20/11/2013).

http://www.wikipedia.org/education(20/11/2013).

APPENDIX A
PROGRAM FLOWCHART
COMPUTERIZED STUDENT’S IDENTITY CARD

START

IS CHOICE
TO 1?

NO

IS CHOICE
TO 2?

NO

IS CHOICE
TO 3?

YES

EXIT

COMPUTERIZED STUDENT’S IDENTITY CARD REGISTRATION FLOWCHART

A

IS CHOICE
TO SAVE ?

NO

IS CHOICE
TO MODIFY ?

NO

NO
IS CHOICE
TO EXIT ?

YES NO

X NO

COMPUTERIZED STUDENT’S IDENTITY CARD PRINTING FLOWCHART

B

DOES REG.
NO EXIST
?

DISPLAY
ID-CARD

IS CHOICE
TO EXIT
?

X

APPENDIX B
SOURCE CODE
Private Sub Command1_Click()
On Error Resume Next
If Text1.Text = "" Then
MsgBox "Enter your Name", , "Error"
GoTo n
End If

If Text3.Text = "" Then
MsgBox "Enter your Sex", , "Error"
GoTo n
End If
If Text4.Text = "" Then
MsgBox "Enter your Date of Birth", , "Error"
GoTo n
End If
If Text5.Text = "" Then
MsgBox "Enter your Place of Birth", , "Error"
GoTo n
End If
If Text6.Text = "" Then
MsgBox "Enter your Permanent Address", , "Error"
GoTo n
End If
If Text7.Text = "" Then
MsgBox "Enter your City", , "Error"
GoTo n
End If
If Text8.Text = "" Then
MsgBox "Enter your State", , "Error"
GoTo n
End If
If Text9.Text = "" Then
MsgBox "Enter your LGA", , "Error"
GoTo n
End If
If Text10.Text = "" Then
MsgBox "Enter your District", , "Error"
GoTo n
End If
If Text11.Text = "" Then
MsgBox "Enter your Post code", , "Error"
GoTo n
End If
If Text12.Text = "" Then
MsgBox "Enter your State of Origin ", , "Error"
GoTo n
End If
If Text13.Text = "" Then
MsgBox "Enter your Home Town", , "Error"
GoTo n
End If
If Text14.Text = "" Then
MsgBox "Enter your LGA", , "Error"
GoTo n
End If
If Text15.Text = "" Then
MsgBox "Enter your Phone Number", , "Error"
GoTo n
End If
If Text16.Text = "" Then
MsgBox "Enter your Email", , "Error"
GoTo n
End If
If Text17.Text = "" Then
MsgBox "Enter your Occupation", , "Error"
GoTo n
End If
If Text18.Text = "" Then
MsgBox "Enter Student Department", , "Error"
GoTo n
End If
If Text19.Text = "" Then
MsgBox "Enter Student Reg. No.", , "Error"
GoTo n
End If
If Text20.Text = "" Then
MsgBox "Enter Date Issued", , "Error"
GoTo n
End If
If Text41.Text = "" Then
MsgBox "Upload Passport", , "Error"
GoTo n
End If

Data1.Recordset.AddNew
Text21.Text = Text1.Text
Text23.Text = Text4.Text
Text22.Text = Text3.Text

Text24.Text = Text5.Text
Text25.Text = Text6.Text
Text26.Text = Text7.Text
Text27.Text = Text8.Text
Text28.Text = Text9.Text

Text29.Text = Text10.Text
Text30.Text = Text11.Text
Text31.Text = Text12.Text
Text32.Text = Text13.Text
Text33.Text = Text14.Text

Text34.Text = Text15.Text
Text35.Text = Text16.Text
Text36.Text = Text17.Text
Text37.Text = Text18.Text
Text38.Text = Text19.Text
Text39.Text = Text20.Text
Text40.Text = Text41.Text
Data1.Recordset.Update
Data1.Refresh
MsgBox " Record Save Successfully", vbExclamation, "Saved"
Text1.Text = "": Text2.Text = "": Text3.Text = "": Text4.Text = "": Text5.Text = "": Text6.Text = "": Text7.Text = "": Text8.Text = ""
Text9.Text = "": Text10.Text = "": Text11.Text = "": Text12.Text = "": Text13.Text = "": Text14.Text = "": Text15.Text = "": Text16.Text = ""
Text17.Text = "": Text18.Text = "": Text19.Text = "": Text20.Text = "": Image1.Picture = LoadPicture("") n: End Sub

Private Sub Command10_Click()
Frame8.Visible = False
End Sub

Private Sub Command11_Click()
Text1.Text = "": Text2.Text = "": Text3.Text = "": Text4.Text = "": Text5.Text = "": Text6.Text = "": Text7.Text = "": Text8.Text = ""
Text9.Text = "": Text10.Text = "": Text11.Text = "": Text12.Text = "": Text13.Text = "": Text14.Text = "": Text15.Text = "": Text16.Text = ""
Text17.Text = "": Text18.Text = "": Text19.Text = "": Text20.Text = "": Image1.Picture = LoadPicture(""): Text43.Text = ""
End Sub

Private Sub Command2_Click()
Frame3.Visible = True
End Sub

Private Sub Command3_Click()
Frame1.Visible = False
End Sub

Private Sub Command4_Click()
Image1.Refresh

On Error Resume Next
'If X = 1 Then ti.ShowOpen Text41.Text = ti.FileName
Image1.Picture = LoadPicture(Text41.Text)
End Sub

Private Sub Command5_Click() On Error Resume Next
Dim V As String
V = Text43.Text + "*"
Data1.Recordset.FindFirst "Reg_No ='" & V & "'"
Data1.RecordSource = "SELECT * FROM student WHERE [Reg_No] LIKE" & "'" & CStr(V) & "'"
Data1.Refresh
If Text43.Text = Text38.Text Then

Text1.Text = Text21.Text
Text4.Text = Text23.Text
Text3.Text = Text22.Text

Text5.Text = Text24.Text
Text6.Text = Text25.Text
Text7.Text = Text26.Text
Text8.Text = Text27.Text
Text9.Text = Text28.Text

Text10.Text = Text29.Text
Text11.Text = Text30.Text
Text12.Text = Text31.Text
Text13.Text = Text32.Text
Text14.Text = Text33.Text

Text15.Text = Text34.Text
Text16.Text = Text35.Text
Text17.Text = Text36.Text
Text18.Text = Text37.Text
Text19.Text = Text38.Text
Text20.Text = Text39.Text
Text41.Text = Text40.Text
Image1.Picture = LoadPicture(Text40.Text)
Image1.Picture = Image1.Picture
Else
MsgBox " Wrong Student Reg.No.", vbInformation, "Error"

End If
End Sub

Private Sub Command6_Click()
On Error Resume Next
If Text1.Text = "" Then
MsgBox "Enter your Name", , "Error"
GoTo n
End If

If Text3.Text = "" Then
MsgBox "Enter your Sex", , "Error"
GoTo n
End If
If Text4.Text = "" Then
MsgBox "Enter your Date of Birth", , "Error"
GoTo n
End If
If Text5.Text = "" Then
MsgBox "Enter your Place of Birth", , "Error"
GoTo n
End If
If Text6.Text = "" Then
MsgBox "Enter your Permanent Address", , "Error"
GoTo n
End If
If Text7.Text = "" Then
MsgBox "Enter your City", , "Error"
GoTo n
End If
If Text8.Text = "" Then
MsgBox "Enter your State", , "Error"
GoTo n
End If
If Text9.Text = "" Then
MsgBox "Enter your LGA", , "Error"
GoTo n
End If
If Text10.Text = "" Then
MsgBox "Enter your District", , "Error"
GoTo n
End If
If Text11.Text = "" Then
MsgBox "Enter your Post code", , "Error"
GoTo n
End If
If Text12.Text = "" Then
MsgBox "Enter your State of Origin ", , "Error"
GoTo n
End If
If Text13.Text = "" Then
MsgBox "Enter your Home Town", , "Error"
GoTo n
End If
If Text14.Text = "" Then
MsgBox "Enter your LGA", , "Error"
GoTo n
End If
If Text15.Text = "" Then
MsgBox "Enter your Phone Number", , "Error"
GoTo n
End If
If Text16.Text = "" Then
MsgBox "Enter your Email", , "Error"
GoTo n
End If
If Text17.Text = "" Then
MsgBox "Enter your Occupation", , "Error"
GoTo n
End If
If Text18.Text = "" Then
MsgBox "Enter Student Department", , "Error"
GoTo n
End If
If Text19.Text = "" Then
MsgBox "Enter Student Reg. No.", , "Error"
GoTo n
End If
If Text20.Text = "" Then
MsgBox "Enter Date Issued", , "Error"
GoTo n
End If
Text21.Text = Text1.Text
Text23.Text = Text4.Text
Text22.Text = Text3.Text

Text24.Text = Text5.Text
Text25.Text = Text6.Text
Text26.Text = Text7.Text
Text27.Text = Text8.Text
Text28.Text = Text9.Text

Text29.Text = Text10.Text
Text30.Text = Text11.Text
Text31.Text = Text12.Text
Text32.Text = Text13.Text
Text33.Text = Text14.Text

Text34.Text = Text15.Text
Text35.Text = Text16.Text
Text36.Text = Text17.Text
Text37.Text = Text18.Text
Text38.Text = Text19.Text
Text39.Text = Text20.Text
Text40.Text = Text41.Text
Data1.Recordset.Update
Data1.Refresh
MsgBox " Record Updated Successfully", vbOKCancel, "Updated"

Text1.Text = "": Text2.Text = "": Text3.Text = "": Text4.Text = "": Text5.Text = "": Text6.Text = "": Text7.Text = "": Text8.Text = ""
Text9.Text = "": Text10.Text = "": Text11.Text = "": Text12.Text = "": Text13.Text = "": Text14.Text = "": Text15.Text = "": Text16.Text = ""
Text17.Text = "": Text18.Text = "": Text19.Text = "": Text20.Text = "": Image1.Picture = LoadPicture(""): Text43.Text = "" n: End Sub

Private Sub Command7_Click()

On Error Resume Next
Dim V As String
V = Text43.Text + "*"
Data1.Recordset.FindFirst "Reg_No ='" & V & "'"
Data1.RecordSource = "SELECT * FROM student WHERE [Reg_No] LIKE" & "'" & CStr(V) & "'"
Data1.Refresh
If Text43.Text = Text38.Text Then
On Error Resume Next
Data1.Recordset.Delete
Data1.Refresh
MsgBox " Record deleted successfully.", vbInformation, "Deleted"

Text1.Text = "": Text2.Text = "": Text3.Text = "": Text4.Text = "": Text5.Text = "": Text6.Text = "": Text7.Text = "": Text8.Text = ""
Text9.Text = "": Text10.Text = "": Text11.Text = "": Text12.Text = "": Text13.Text = "": Text14.Text = "": Text15.Text = "": Text16.Text = ""
Text17.Text = "": Text18.Text = "": Text19.Text = "": Text20.Text = "": Image1.Picture = LoadPicture(""): Text43.Text = "" c = "" + "*"
Data1.Recordset.FindFirst "Reg_No ='" & V & "'"
Data1.RecordSource = "SELECT * FROM student WHERE [Reg_No] LIKE" & "'" & CStr(V) & "'"
Data1.Refresh

Else
MsgBox " Wrong Student Reg.No.", vbInformation, "Error"

b = "" + "*"
Data1.Recordset.FindFirst "Reg_No ='" & V & "'"
Data1.RecordSource = "SELECT * FROM student WHERE [Reg_No] LIKE" & "'" & CStr(V) & "'"
Data1.Refresh
End If

End Sub

Private Sub Command8_Click()
Frame3.Visible = False
End Sub

Private Sub Command9_Click() On Error Resume Next
Dim V As String
V = Text44.Text + "*"
Data1.Recordset.FindFirst "Reg_No ='" & V & "'"
Data1.RecordSource = "SELECT * FROM student WHERE [Reg_No] LIKE" & "'" & CStr(V) & "'"
Data1.Refresh
If Text44.Text = Text38.Text Then b1.Caption = Text21.Text b2.Caption = Text37.Text b3.Caption = Text38.Text

Image1.Picture = LoadPicture(Text40.Text) Image3.Picture = Image1.Picture Frame6.Visible = True Frame8.Visible = False
Else
MsgBox "Sorry Reg. Number is Invalid", vbInformation + vbMsgBoxRtlReading, "Error" 'R.Enabled = True
End If
End Sub

Private Sub E_Click()
Y$ = MsgBox("ARE YOU SURE YOU WANT TO QUIT", vbQuestion + vbYesNo, "EXIT")
If Y$ = vbYes Then End
End Sub

Private Sub I_Click()
Frame1.Visible = True
Frame8.Visible = False
End Sub

Private Sub ID_Click()
Frame1.Visible = False
Frame8.Visible = True
End Sub

Private Sub Label36_Click()
Frame6.Visible = False
Image1.Picture = LoadPicture("")
Image3.Picture = LoadPicture("")
End Sub

APPENDIX C
OUTPUT SAMPLE
[pic]

ABSTRACT

This research work focused on “Implementation of a Computerized Students Identity Card Processing System” a case study of Akwa Ibom State Polytechnic, Ikot Osurua. It aimed at creating computer-based approach to produce student identity card and detect identity card impersonation and other unethical vices. The system was built augment the job of student Identity card production unit. Source of data include textbooks journals, magazines and staying on the internet. The programming language employed for the study is visual Basic (6.0) because it presents a graphical user interface (G.U.I). The solution developed is free from all the bugs and executable with all different modules to the utmost satisfaction of the user. All current requirements and possibilities, have been taken care during the research time.

-----------------------
X

A

YES

A

YES

B

NO

YES

SAVE TO DATA BASE

CLICK OK

CLICK
MODIFY

YES

NO

DISPLAY
ERROR
MESSAGE

DOES REG.
NO EXIST
?

NO

UPDATE
TO DATA
BASE

YES

CLICK
UPDATE

IS CHOICE
TO UPDATE
?

YES

CLICK
DELETE

IS CHOICE
TO DELETE
?

CLICK
CLEAR

IS CHOICE
TO CLEAR
?

YES

EXIT

YES

IS CHOICE
TO EXIT?
?

NO

DISPLAY
ERROR
MESSAGE

YES

NO

NO

YES

Similar Documents

Premium Essay

Capstone Project

...ITT Capstone Project NT2799: Network Systems Administration | Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Table of Contents Part 1: Structure of WAN2 Part 2: Types of Equipment7 Part 3: Protocol Choices25 Part 4: Phone System73 Part 5: Security Proposal78 References89-92 Part 1 Structure of WAN Structure of WAN- Mary Hunter We have initially considered our LAN components and began our documentation. We have planed the design and determined all resources involved. We have considered and interviewed all the stakeholders involved. We are in the beginning stage, so the components, resources, stakeholders and design may change. We will use switches to connect hosts to the internetwork, and both hubs and switches will be used to interconnect devices in our star network architecture. This way if we need to add workstations we will only have to insert another hub or switch. All of ABC worldwide offices will include file services, print services, message services, directory services, and application services. All of the offices will have the use of a file server for file sharing backing up files and storage. They will have access to a print server that will include Queue-based printing and print sharing; a message server that will allow for e-mails with attachment files, including video, sound, and documents. All the offices will have access to......

Words: 13943 - Pages: 56