Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
OF
ON THE
1
THE BANK OF INDIA
(BOI) PROJECT
2
PROJECT
BASED ON
ALL FIELDS OF BANK
UNDERGUIDANCE
Mr. SATYA PRAKASH SINGH
CENTER MANAGER
SUBMITED BY
DIVYANI PANDEY
ADCA
3
PROJECT
BASED ON
ALL FIELDS OF BANK
UNDERGUIDANCE
Mr. SATYA PRAKASH SINGH
CENTER MANAGER
SUBMITED BY
KANAHIYA
ADCA
4
PROJECT
BASED ON
ALL FIELDS OF BANK
UNDERGUIDANCE
Mr. SATYA PRAKASH SINGH
CENTER MANAGER
SUBMITED BY
KAWLESH
ADCA
TABEL OF CONTENTS
ACKNOWLEDGEMENT
5
WHY A PROJECT
PREFACE
INTRODUCTION OF COMPUTER
DATA TABLE
OBJECTIVE OF PROJECT
RESEARCH METHODOLOGY
CODING
OUTPUT
THANKYOU
6
I CONVEY MY GRADUATE AND SINCERE
ACKNOWLEDGEMENT TO MY COMPUTER
TEACHER MR. SATYA PRAKASH SINGH
FOR HIS DEDICATIVE HELP PROVIDE TO ME
WITH ADEQUATE INFORMATION AND
GUIDANCE WHICH HELPED ME TO COMPLETE
MY PROJECT SUCESSFULY.
I AM ALSO EXTEND MY
HEARTFELT THANKFUL TO MY COMPANIONS
FOR THEIRMOST VALUABLE CO-OPERATION.
DIVYANI PANDEY
ADCA
7
Practical aspect of computer science is
a PROJECT.
8
PREFACE
GLOBLE AGE IS THE AGE OF COMPUTER . THE
9
IN INDIA, THE INDUSTRY AREC ORGANIZED WITH ALL
MANAGEMENT SYSTEAM.
10
11
History
Computers such as the ENIAC had to be
physically rewired in order to perform different
tasks, which caused these machines to be
called "fixed-program computers." Since the
term "CPU" is generally defined as a software
(computer program) execution device, the
earliest devices that could rightly be called
CPUs came with the advent of the stored-
program computer.
The idea of program computer was already
present in the design of tand John William
Mauchly's ENIAC, but was initially omitted so
the machine could be finished sooner. On June
30, 1945, before ENIAC was even completed,
mathematician John von Neumann distributed
the paper entitled "First Draft of a Report on
the EDVAC". It outlined the design of a stored-
program computer that would eventually be
completed in August 1949. EDVAC was
designed to perform a certain number of
instructions (or operations) of various types.
These instructions could be combined to create
useful programs for the EDVAC to run.
Significantly, the programs written for EDVAC
were stored in high-speed computer memory
rather than specified by the physical wiring of
the computer. This overcame a severe
limitation of ENIAC, which was the
considerable time and effort required to
reconfigure the computer to perform a new
task. With von Neumann's design, the
program, or software, that EDVAC ran could be
changed simply by changing the contents of
12
the computer's memory. While von Neumann is
most often credited with the design of the
stored-program computer because of his
design of EDVAC, others before him, such as
Konrad Zuse, had suggested and implemented
similar ideas. The so-called Harvard
architecture of the Harvard Mark I, which was
completed before EDVAC, also utilized a
stored-program design using punched paper
tape rather than electronic memory. The key
difference between the von Neumann and
Harvard architectures is that the latter
separates the storage and treatment of CPU
instructions and data, while the former uses
the same memory space for both. Most modern
CPUs are primarily von Neumann in design, but
elements of the Harvard architecture are
commonly seen as well.
As a digital device, a CPU is limited to a set of
discrete states, and requires some kind of
switching elements to differentiate between
and change states. Prior to commercial
development of the transistor, electrical relays
and vacuum tubes (thermionic valves) were
commonly used as switching elements.
Although these had distinct speed advantages
over earlier, purely mechanical designs, they
were unreliable for various reasons. For
example, building direct current sequential
logic circuits out of relays requires additional
hardware to cope with the problem of contact
bounce. While vacuum tubes do not suffer from
contact bounce, they must heat up before
becoming fully operational, and they
eventually cease to function due to slow
contamination of their cathodes that occurs in
13
the course of normal operation. If a tube's
vacuum seal leaks, as sometimes happens,
cathode contamination is accelerated. Usually,
when a tube failed, the CPU would have to be
diagnosed to locate the failed component so it
could be replaced. Therefore, early electronic
(vacuum tube based) computers were
generally faster but less reliable than
electromechanical (relay based) computers.
14
Parallelism
Performance
The performance or speed of a processor
depends on e.g. the clock rate and the
instructions per clock (IPC), which together are
the factors for the instructions per second
18
(IPS) that the CPU can perform. Many reported
IPS values have represented "peak" execution
rates on artificial instruction sequences with
few branches, whereas realistic workloads
consist of a mix of instructions and
applications, some of which take longer to
execute than others. The performance of the
memory hierarchy also greatly affects
processor performance, an issue barely
considered in MIPS calculations. Because of
these problems, various standardized tests
such as SPECint have been developed to
attempt to measure the real effective
performance in commonly used applications.
Processing performance of computers is
increased by using multi-core processors,
which essentially is plugging two or more
individual processors (called cores in this
sense) into one integrated circuit.[20] Ideally, a
dual core processor would be nearly twice as
powerful as a single core processor. In
practice, however, the performance gain is far
less, only about fifty percent, due to, e.g.
imperfect software algorithms and
implementation.
•
Virtual computers
A "computer" is commonly considered to be a
physical device. However, one can create a
computer program which describes how to run
a different computer, i.e. "simulating a
computer in a computer". Not only is this a
19
constructive proof of the Church-Turing thesis,
but is also extremely common in all modern
computers. For example, some programming
languages use something called an interpreter,
which is a simulated computer built on top of
the basic computer; this allows programmers
to write code (computer input) in a different
language than the one understood by the base
computer (the alternative is to use a compiler).
Additionally, virtual machines are simulated
computers which virtually replicate a physical
computer in software, and are very commonly
used by IT. Virtual machines are also a
common technique used to create emulators,
such game console emulators.
History of computing
Control unit
Diagram showing how a particular MIPS
architecture instruction would be decoded by
the control system.
20
The control unit (often called a control system
or central controller) manages the computer's
various components; it reads and interprets
(decodes) the program instructions,
transforming them into a series of control
signals which activate other parts of the
computer. Control systems in advanced
computers may change the order of some
instructions so as to improve performance.
A key component common to all CPUs is the
program counter, a special memory cell (a
register) that keeps track of which location in
memory the next instruction is to be read
from. The control system's function is as
follows—note that this is a simplified
description, and some of these steps may be
performed concurrently or in a different order
depending on the type of CPU:
21
the hardware to perform the requested
operation.
7.Write the result from the ALU back to a
memory location or to a register or
perhaps an output device.
8.Jump back to step (1).
23
Read-only memor y
History
The simplest type of solid state ROM is as old
as semiconductor technology itself.
Combinational
logic gates can be joined manually to map n-bit
address input onto arbitrary values of m-bit
data
output (a look-up table). With the invention of
the integrated circuit came mask ROM. Mask
ROM
consists of a grid of word lines (the address
input) and bit lines (the data output),
selectively joined
together with transistor switches, and can
represent an arbitrary look-up table with a
regular physical layout and predictable
propagation delay.
25
In mask ROM, the data is physically encoded in
the circuit, so it can only be programmed
during
fabrication. This leads to a number of serious
disadvantages:
1.It is only economical to buy mask ROM in
large quantities, since users must contract
with a
2. foundry to produce a custom design.
3.The turnaround time between completing
the design for a mask ROM and receiving
the finished product is long, for the same
reason.
4. Mask ROM is impractical for R&D work
since designers frequently need to modify
the contents of memory as they refine a
design.
5. If a product is shipped with faulty mask
ROM, the only way to fix it is to recall the
product and physically replace the ROM.
Subsequent developments have addressed
these shortcomings. PROM, invented in 1956,
allowed users
to program its contents exactly once by
physically altering its structure with the
application of high-
voltage pulses. This addressed problems 1 and
2 above, since a company can simply order a
large batch
26
of fresh PROM chips and program them with
the desired contents at its designers'
convenience. The
1971 invention of EPROM essentially solved
problem 3, since EPROM (unlike PROM) can be
repeatedly
reset to its unprogrammed state by exposure
to strong ultraviolet light. EEPROM, invented in
1983,
went a long way to solving problem 4, since an
EEPROM can be programmed in-place if the
containing device provides a means to receive
the program contents from an external source
(e.g. a personal
computer via a serial cable). Flash memory,
invented at Toshiba in the mid-1980s, and
commercialized
in the early 1990s, is a form of EEPROM that
makes very efficient use of chip area and can
be erased
and reprogrammed thousands of times without
damage.
All of these technologies improved the
flexibility of ROM, but at a significant cost-per-
chip, so that in
large quantities mask ROM would remain an
economical choice for many years. (Decreasing
cost of reprogrammable devices had almost
27
eliminated the market for mask ROM by the
year 2000.)
Furthermore, despite the fact that newer
technologies were increasingly less "read-
only," most were envisioned only as
replacements for the traditional use of mask
ROM.
The most recent development is NAND flash,
also invented by Toshiba. Its designers
explicitly broke
from past practice, stating plainly that "the aim
of NAND Flash is to replace hard disks,"[1]
rather than
the traditional use of ROM as a form of non-
volatile primary storage. As of 2007, NAND has
partially achieved this goal by offering
throughput comparable to hard disks, higher
tolerance of physical shock, extreme
miniaturization (in the form of USB flash drives
and tiny microSD memory cards, for example),
and much lower power consumption.
28
Use of ROM for program storage
Every stored-program computer requires some
form of non-volatile, or erasable, storage to
store the
initial program that runs when the computer is
powered on or otherwise begins execution (a
process known as bootstrapping, often
abbreviated to "booting" or "booting up").
Likewise, every non-trivial computer requires
some form of mutable memory to record
changes in its state as it executes.
Forms of read-only memory were employed as
non-volatile storage for programs in most early
stored-program computers, such as ENIAC
after 1948 (until then it was not a stored-
program computer as
every program had to be manually wired into
the machine, which could take days to weeks).
Read-only memory was simpler to implement
since it required only a mechanism to read
stored values, and not to change them in-
place, and thus could be implemented with
very crude electromechanical devices (see
historical examples below). With the advent of
integrated circuits in the 1960s, both ROM and
its
mutable counterpart static RAM were
implemented as arrays of transistors in silicon
chips; however, a
ROM
29
memory cell could be implemented using fewer
transistors than an SRAM memory cell, since
the latter requires a latch (comprising 5-20
transistors) to retain its contents, while a ROM
cell might consist of
the absence (logical 0) or presence (logical 1)
of a single transistor connecting a bit line to a
word line.
Consequently, ROM could be implemented at a
lower cost-per-bit than RAM for many years.
Most home computers of the 1980s stored a
BASIC interpreter or operating system in ROM
as other
forms of non-volatile storage such as magnetic
disk drives were too expensive. For example,
the
Commodore 64 included 64 KB of RAM and
20 KB of ROM contained a BASIC interpreter
and the
"KERNAL" (sic) of its operating system. Later
home or office computers such as the IBM PC
XT often included magnetic disk drives, and
larger amounts of RAM, allowing them to load
their operating
systems from disk into RAM
, with only a minimal hardware initialization
core and bootloader remaining in ROM (known
as the
30
BIOS in IBM-compatible computers). This
arrangement allowed for a more complex and
easily
upgradeable operating system.
In modern PCs, "ROM" (or Flash) is used to
store the basic bootstrapping firmware for the
main
processor, as well as the various firmware
needed to internally control self contained
devices such as graphic cards, hard disks, DVD
drives, TFT screens, etc, in the system. Today,
many of these "read-only" memories –
especially the BIOS – are often replaced with
Flash memory (see below), to permit in-place
reprogramming should the need for a firmware
upgrade arise. However, simple and mature
sub-systems (such as the keyboard or some
communication controllers in the ICs on the
main board, for example)
may employ mask ROM or OTP (one time
programmable).
ROM and successor technologies such as Flash
are prevalent in embedded systems. This
governs
everything from industrial robots to home
appliances and consumer electronics (MP3
players,
set-top boxes, etc) all of which are designed
for specific functions, but nonetheless based on
general-purpose microprocessors in most
31
cases. With software usually tightly coupled to
hardware, program changes are rarely needed
in such devices (which typically lack devices
such as hard disks for
reasons of cost, size, and/or power
consumption). As of 2008, most products use
Flash rather than
mask ROM, and many provide some means for
connection to a PC for firmware updates; a
digital audio player's might be updated to
support a new file format for instance. Some
hobbyists have taken
advantage of this flexibility to reprogram
consumer products for new purposes; for
example, the
iPodLinux and OpenWRT projects have enabled
users to run full-featured Linux distributions on
their
MP3 players and wireless routers, respectively.
ROM is also useful for binary storage of
cryptographic data, as it makes them difficult
to replace,
which may be desirable in order to enhance
information security.
32
Since ROM (at least in hard-wired mask form)
cannot be modified, it is really only suitable for
storing
data which is not expected to need
modification for the life of the device. To that
end, ROM has been
used in many computers to store look-up
tables for the evaluation of mathematical and
logical
functions (for example, a floating-point unit
might tabulate the sine function in order to
facilitate
faster
computation).
This was especially effective when CPUs were
slow and ROM was cheap compared to RAM.
Notably, the display adapters of early personal
computers stored tables of bitmapped font
characters in
ROM. This usually meant that the text display
font could not be changed interactively. This
was the
case for both the CGA and MDA adapters
available with the IBM PC XT.
The use of ROM to store such small amounts of
data has disappeared almost completely in
modern
33
general-purpose computers. However, Flash
ROM has taken over a new role as a medium
for
mass storage or secondary storage of files.
Semiconductor based
Classic mask-programmed ROM chips are
integrated circuits that physically encode the
data to be stored
, and thus it is impossible to change their
contents after fabrication. Other types of non-
volatile solid-
state memory permit some degree of
modification:
34
• Programmable read-only memory (PROM),
or one-time programmable ROM (OTP), can
be written
• to or programmed via a special device
called a PROM programmer. Typically, this
device uses
• high voltages to permanently destroy or
create internal links (fuses or antifuses)
within the chip. Consequently, a PROM can
only be programmed once.
• Erasable programmable read-only memory
(EPROM) can be erased by exposure to
strong
• ultraviolet light (typically for 10 minutes or
longer), then rewritten with a process that
again requires application of higher than
usual voltage. Repeated exposure to UV
light will eventually
• wear out an EPROM, but the endurance of
most EPROM chips exceeds 1000 cycles of
erasing and reprogramming. EPROM chip
packages can often be identified by the
prominent quartz
• "window" which allows UV light to enter.
After programming, the window is typically
covered
• with a label to prevent accidental erasure.
Some EPROM chips are factory-erased
before they are packaged, and include no
window; these are effectively PROM.
35
• Electrically erasable programmable read-
only memory (EEPROM) is based on a
similar
• semiconductor structure to EPROM, but
allows its entire contents (or selected
banks) to be electrically erased, then
rewritten electrically, so that they need not
be removed from the
• computer (or camera, MP3 player, etc.).
Writing or flashing an EEPROM is much
slower
• (milliseconds per bit) than reading from a
ROM or writing to a RAM (nanoseconds in
both cases).
o Electrically alterable read-only memory
36
o Flash memory (or simply flash) is a
modern type of EEPROM invented in
1984. Flash
o memory can be erased and rewritten
faster than ordinary EEPROM, and
newer designs
o feature very high endurance
(exceeding 1,000,000 cycles). Modern
NAND flash makes
o efficient use of silicon chip area,
resulting in individual ICs with a
capacity as high as
o 32 GB as of 2007; this feature, along
with its endurance and physical
durability, has allowed NAND flash to
replace magnetic in some applications
(such as USB flash drives).
o Flash memory is sometimes called
flash ROM or flash EEPROM when used
as a
o replacement
o for older ROM types, but not in
applications that take advantage of its
ability to be
o modified quickly and frequently.
By applying write protection, some types of
reprogrammable ROMs may temporarily
become read-only memory.
]Other technologies
37
There are other types of non-volatile memory
which are not based on solid-state IC
technology,
including:
• Optical storage media, such CD-ROM which
is read-only (analogous to masked ROM).
CD-R is
• Write Once Read Many (analogous to
PROM), while CD-RW supports erase-
rewrite cycles
• (analogous to EEPROM); both are designed
for backwards-compatibility with CD-ROM.
•
Historical examples
38
Transformer matrix ROM (TROS), from the IBM
System 360/20
• Diode matrix ROM, used in small amounts
in many computers in the 1960s as well as
electronic
• desk calculators and keyboard encoders for
terminals. This ROM was programmed by
installing discrete semiconductor diodes at
selected locations between a matrix of
word line traces and bit
• line traces on a printed circuit board.
• Resistor, capacitor, or transformer matrix
ROM, used in many computers until the
1970s. Like
• diode matrix ROM, it was programmed by
placing components at selected locations
between a
• matrix of word lines and bit lines. ENIAC's
Function Tables were resistor matrix ROM,
• programmed by manually setting rotary
switches. Various models of the IBM
System/360 and complex peripherial
devices stored their microcode in either
capacitor (called BCROS for
• Balanced Capacitor Read Only Storage on
the 360/50 & 360/65 or CCROS for Card
Capacitor Read
• Only Storage on the 360/30) or
transformer (called TROS for Transformer
Read Only Storage on
39
• the 360/20, 360/40 and others) matrix
ROM.
• Core rope, a form of transformer matrix
ROM technology used where size and/or
weight were
• critical. This was used in NASA/MIT's Apollo
Spacecraft Computers, DEC's PDP-8
computers, and other places. This type of
ROM was programmed by hand by weaving
"word line wires" inside
• or outside of ferrite transformer cores.
• Speed of ROMs
Reading speed
Although the relative speed of RAM vs. ROM
has varied over time, as of 2007large RAM
chips can be read faster than most ROMs. For
this reason (and to make for uniform access),
ROM content is sometimes
copied to RAM or shadowed before its first use,
and subsequently read from RAM.
40
Writing speed
For those types of ROM that can be electrically
modified, writing speed is always much slower
than
reading speed, and it may require unusually
high voltage, the movement of jumper plugs to
apply write-enable signals, and special
lock/unlock command codes. Modern NAND
Flash achieves the highest write speeds of any
rewritable ROM technology, with speeds as
high as 15 MB/s (or 70 ns/bit), by allowing
(indeed requiring) large blocks of memory cells
to be written simultaneously.
41
write cycles, while in modern Flash EEPROM
the endurance may exceed 1,000,000, but it is
by no
means
infinite. This limited endurance, as well as the
higher cost per bit, means that Flash-based
storage is unlikely to completely supplant
magnetic disk drives in the near future.
43
WHAT IS BANK?
44
THERE'S A NEW "BANKING ENTITY" IN FORMATION,
BROOKLYN, NY-BASED BANK SIMPLE OPERATING
(TEMPORARILY I ASSUME) AT THE .NET VERSION OF ITS
NAME <BANKSIMPLE.NET>. I CHATTED WITH THE
FOUNDERS, JOSH REICH AND SHAMIR KARKAL EARLIER THIS
YEAR AND AM ANXIOUSLY AWAITING MORE INFO ON THE
LAUNCH.
45
BANK SIMPLE TALKS ABOUT CUSTOMER SERVICE
(ANSWERING THE PHONE), TAKING DEPOSITS BY MAIL (AND
THIS IS A RUMOR, BY MOBILE REMOTE DEPOSIT) AND OTHER
TRADITIONAL BANKING ACTIVITIES. SO THAT IS MUCH MORE
THAN AN ONLINE PFM (CAN WE AGREE TO CALL THAT
OFM?).
THEY MADE THE TECH PRESS THIS WEEK WHEN THEY ADDED
A NEW CO-FOUNDER, ALEX PAYNE, ONE OF EARLY
ENGINEERS AT TWITTER. SO EXPECT STREAMING
INFORMATION, ALA BLIPPY AND SWIPELY, AND SOCIAL
NETWORKING TO BE A CRUCIAL PART OF THE MIX.
46
RECOMMENDED TOPICS:
BANK CREDIT CARD
BANK CREDIT
BANK CREDIT CHECK
BANK LOAN CREDIT
BANK BUSINESS CREDIT
BANK CREDIT LINE
BANK CREDIT TRAINING
47
BANK CREDIT
BANK CREDIT HAS TO DO WITH THE AMOUNT OF FUNDS
THAT AN INDIVIDUAL OR A BUSINESS MAY BE ABLE TO
BORROW FROM ONE OR MORE LENDING INSTITUTIONS. IN
EFFECT, BANK CREDIT IS A MEASURE OF HOW MUCH IN THE
WAY OF CASH LOANS MAY BE ISSUED, BASED ON THE
CREDIT HISTORY AND THE ASSETS OF THE COMPANY OR
PERSON. HERE IS SOME INFORMATION ABOUT HOW BANK
CREDIT WORKS, AND WHY KNOWING YOUR BANK CREDIT
RATING MAY BE VERY IMPORTANT.
48
A basic PHILOSOPHY OF THE BANKING SYSTEM IS THAT
WHEN MONEY IS LOANED OUT, THERE MUST BE A
REASONABLE EXPECTATION OF REPAYMENT OF THE LOAN,
PLUS INTEREST. THIS MEANS THAT LOOKING AT THE
OVERALL FINANCIAL STATUS OF THE APPLICANT IS
IMPORTANT.
49
WHAT IS A PERSONAL BANK LOAN?
... 2000S, MOST PEOPLE WITH A GOOD CREDIT SCORE
COULD OBTAIN A MODEST PERSONAL BANK LOAN. THIS
CHANGED DRAMATICALLY IN THE US WITH THE BANK CRASH
THAT USHERED IN ...
50
WHAT IS A BANK TELLER?
... OFFER VERY MANY OPPORTUNITIES FOR ADVANCEMENT
WITHIN THE BANK. IN ORDER TO BECOME A BANKER, LOAN
OFFICER, OR OTHER HIGHER RANKING MEMBER OF THE
STAFF, A BANK ...
2
WHEN LOOKING TO OBTAIN A BANK CREDIT LINE OR A BANK
CREDIT LOAN IT IS BEST TO ELIMINATE OR REDUCE ALL
OTHER DEBT IN ORDER TO PROVIDE A MORE FAVORABLE
CREDIT PROFILE.
53
EQUITY LINE OF CREDIT, THE BANK WILL ALSO CONSIDER
THE MARKET VALUE OF THE HOME AND THE AVAILABLE
EQUITY IN IT.
3
BRICKBACK-BANKS OFTEN DO AN EXTENSIVE BANK CREDIT
CHECK IN ORDER TO EXTEND OR APPROVE A BANK CREDIT
LOAN LIKE A MORTGAGE.
54
BANKS OFTEN RAISE INTEREST RATES ON THOSE
BORROWERS WITH AN ADVERSE CREDIT HISTORY.
SOMETIMES THE BANK MIGHT REFUSE TO EXTEND CREDIT AT
ALL.
2
WHEN LOOKING TO OBTAIN A BANK CREDIT LINE OR A BANK
CREDIT LOAN IT IS BEST TO ELIMINATE OR REDUCE ALL
OTHER DEBT IN ORDER TO PROVIDE A MORE FAVORABLE
CREDIT PROFILE.
55
CREDIT, HOME EQUITY LOAN, AUTO LOAN, OR PERSONAL
LOAN, IT DOES SO AFTER IT REVIEWS THE BORROWER’S
CREDIT PROFILE.
56
57
V ISUAL B ASIC
THIS VISUAL BASIC LANGUAGE
ARTICLE IS ABOUT THE
SHIPPING WITH MICROSOFT VISUAL STUDIO 6.0 OR
EARLIER. FOR THE VISUAL BASIC LANGUAGE SHIPPING WITH
MICROSOFT VISUAL STUDIO LATER, SEE VISUAL BASIC
58
What is Visual Basic
VISUAL BASIC is a high level programming
language which evolved from the earlier
DOS version called BASIC. BASIC means
Beginners' All-purpose Symbolic
Instruction Code. It is a very easy
59
programming language to learn. The code
look a lot like English Language. Different
software companies produced different
versions of BASIC, such as Microsoft
QBASIC, QUICKBASIC, GWBASIC ,IBM
BASICA and so on. However, people prefer
to use Microsoft Visual Basic today, as it is
a well developed programming language
and supporting resources are available
everywhere. Now, there are many
versions of VB exist in the market, the
most popular one and still widely used by
many VB programmers is none other than
Visual Basic 6. We also have VB.net,
VB2005, VB2008 and the latest VB2010.
Both Vb2008 and VB2010 are fully object
oriented programming (OOP) language. If
you wish to learn VB2008, click on the
VB2008 Tutorial. VB2010 tutorial will be
available soon.
VISUAL BASIC is a VISUAL and events
driven Programming Language. These are
the main divergence from the old BASIC.
In BASIC, programming is done in a text-
only environment and the program is
executed sequentially. In VB,
programming is done in a graphical
environment. In the old BASIC, you have
to write program code for each graphical
60
object you wish to display it on screen,
including its position and its color.
However, In VB , you just need to drag and
drop any graphical object anywhere on the
form, and any graphical object anywhere
on the form, and you can change its color
any time using the properties windows.
On the other hand, because the user may
click on a certain object randomly, so each
object has to be programmed
independently to be able to response
VISUAL BASIC (VB) IS THE THIRD-GENERATION EVENT-
DRIVEN PROGRAMMING LANGUAGE AND INTEGRATED
DEVELOPMENT ENVIRONMENT (IDE) FROM MICROSOFT FOR
ITS COM PROGRAMMING MODEL. VB IS ALSO CONSIDERED
A RELATIVELY EASY TO LEARN AND USE PROGRAMMING
LANGUAGE, BECAUSE OF ITS GRAPHICAL DEVELOPMENT
FEATURES AND BASIC HERITAGE.
61
A PROGRAMMER CAN PUT TOGETHER AN APPLICATION USING
THE COMPONENTS PROVIDED WITH VISUAL BASIC ITSELF.
PROGRAMS
WRITTEN IN VISUAL BASIC CAN ALSO USE THE WINDOWS
API, BUT DOING SO REQUIRES EXTERNAL FUNCTION
DECLARATIONS.
VB Sample Programs
The Visual Basic 6 Integrated
Development Environment
Before you can program in VB 6, you need
to install Visual Basic 6 in your computer.
If you do not own a copy of Visual Basic 6
software yet , you can purchase it from
Amazon.com by clicking the link below:
CONTENTS
• 1 LANGUAGE FEATURES
• 2 CHARACTERISTICS
• 3 HISTORY
o3.1 TIMELINE
• 4 DERIVATIVE LANGUAGES
64
• 5 PERFORMANCE AND
OTHER ISSUES
• 6 LEGACY DEVELOPMENT
AND SUPPORT
• 7 EXAMPLE CODE
• 8 SEE ALSO
• 9 REFERENCES
10 EXTERNAL LINKS
L ANGUAGE FEATURES
65
FOR MORE FUNCTIONALITY. SINCE DEFAULT ATTRIBUTES AND
ACTIONS ARE DEFINED FOR THE COMPONENTS, A SIMPLE
PROGRAM CAN BE CREATED WITHOUT THE PROGRAMMER
HAVING TO WRITE MANY LINES OF CODE. PERFORMANCE
PROBLEMS WERE EXPERIENCED BY EARLIER VERSIONS, BUT
WITH FASTER COMPUTERS AND NATIVE CODE COMPILATION
THIS HAS BECOME LESS OF AN ISSUE.
67
THE LANGUAGE IS GARBAGE COLLECTED USING REFERENCE
COUNTING, HAS A LARGE LIBRARY OF UTILITY OBJECTS, AND
HAS BASIC OBJECT ORIENTED SUPPORT. SINCE THE MORE
COMMON COMPONENTS ARE INCLUDED IN THE DEFAULT
PROJECT TEMPLATE, THE PROGRAMMER SELDOM NEEDS TO
SPECIFY ADDITIONAL LIBRARIES.
UNLIKE MANY OTHER
PROGRAMMING LANGUAGES, VISUAL BASIC IS GENERALLY
NOT CASE SENSITIVE, ALTHOUGH IT WILL TRANSFORM
KEYWORDS INTO A STANDARD CASE CONFIGURATION AND
FORCE THE CASE OF VARIABLE NAMES TO CONFORM TO THE
CASE OF THE ENTRY WITHIN THE SYMBOL TABLE. STRING
COMPARISONS ARE CASE SENSITIVE BY DEFAULT, BUT CAN
BE MADE CASE INSENSITIVE IF SO DESIRED.
C HARACTERISTICS
VISUAL BASIC HAS THE FOLLOWING TRAITS WHICH DIFFER
FROM C-DERIVED LANGUAGES:
68
THE RESULT STORED IN A WOULD THEREFORE BE
EITHER FALSE OR TRUE.
•
69
SET THE DEFAULT LOWER BOUND. USE OF THE
OPTION BASE STATEMENT CAN LEAD TO CONFUSION
WHEN READING VISUAL BASIC CODE AND IS BEST
AVOIDED BY ALWAYS EXPLICITLY SPECIFYING THE
LOWER BOUND OF THE ARRAY. THIS LOWER BOUND IS
NOT LIMITED TO 0 1, BECAUSE IT CAN ALSO BE
OR
SET BY DECLARATION. IN THIS WAY, BOTH THE LOWER
AND
•
H ISTORY
VB 1.0 WAS INTRODUCED IN 1991. THE DRAG AND
DROP DESIGN FOR CREATING THE USER INTERFACE IS
DERIVED FROM A PROTOTYPE FORM GENERATOR DEVELOPED
BY ALAN COOPER AND HIS COMPANY CALLED TRIPOD.
MICROSOFT CONTRACTED WITH COOPER AND HIS
ASSOCIATES TO DEVELOP TRIPOD INTO A PROGRAMMABLE
FORM SYSTEM FOR WINDOWS 3.0, UNDER THE CODE
71
NAME RUBY (NO RELATION TO THE TRIPOD DID NOT
INCLUDE A PROGRAMMING LANGUAGE AT ALL. MICROSOFT
DECIDED TO COMBINE RUBY WITH THE BASIC LANGUAGE TO
CREATE VISUAL BASIC.
THE RUBY INTERFACE GENERATOR PROVIDED THE "VISUAL"
PART OF VISUAL BASIC AND THIS WAS COMBINED WITH THE
"EB" EMBEDDED BASIC ENGINE DESIGNED FOR
MICROSOFT'S ABANDONED "OMEGA" DATABASE SYSTEM.
RUBY ALSO PROVIDED THE ABILITY TO LOAD DYNAMIC LINK
LIBRARIES CONTAINING ADDITIONAL CONTROLS (THEN
CALLED "GIZMOS"), WHICH LATER BECAME THE VBX
INTERFACE.
TIMELINE
• PROJECT 'THUNDER' WAS INITIATED
• VISUAL BASIC 1.0 (MAY 1991) WAS RELEASED
FOR WINDOWS AT THE COMDEX/WINDOWS WORLD
TRADE SHOW IN ATLANTA, GEORGIA.
72
CHARACTERS TO SIMULATE THE APPEARANCE OF A
GUI.
73
• VISUAL BASIC 3.0 WAS RELEASED IN THE SUMMER OF
1993 AND CAME IN STANDARD AND PROFESSIONAL
VERSIONS. VB3 INCLUDED VERSION 1.1 OF THE
MICROSOFT JET DATABASE ENGINE THAT COULD READ
AND WRITE JET (OR ACCESS) 1.X DATABASES.
• VISUAL BASIC 4.0 (AUGUST 1995) WAS THE FIRST
VERSION THAT COULD CREATE 32-BIT AS WELL AS
16-BIT WINDOWS PROGRAMS. IT ALSO INTRODUCED
THE ABILITY TO WRITE NON-GUI CLASSES IN VISUAL
BASIC. INCOMPATIBILITIES BETWEEN DIFFERENT
RELEASES OF VB4 CAUSED INSTALLATION AND
OPERATION PROBLEMS. WHILE PREVIOUS VERSIONS OF
VISUAL BASIC HAD USED VBX CONTROLS, VISUAL
BASIC NOW USED OLE CONTROLS (WITH FILES
NAMES ENDING IN .OCX) INSTEAD. THESE WERE
LATER TO BE NAMED ACTIVEX CONTROLS.
• WITH VERSION 5.0 (FEBRUARY 1997), MICROSOFT
RELEASED VISUAL BASIC EXCLUSIVELY FOR 32-BIT
VERSIONS OF WINDOWS. PROGRAMMERS WHO
PREFERRED TO WRITE 16-BIT PROGRAMS WERE ABLE
TO IMPORT PROGRAMS WRITTEN IN
75
• SPYWARE OFFERING,MICROSOFT ANTISPYWARE (PART
OF THE GIANT COMPANY SOFTWARE PURCHASE),
WAS CODED IN VISUAL BASIC 6.0. ITS
REPLACEMENT, WINDOWS DEFENDER, WAS
REWRITTEN AS C++ CODE.
D ERIVATIVE LANGUAGES
76
• VISUAL BASIC FORAPPLICATIONS (VBA) IS
INCLUDED IN MANY MICROSOFT APPLICATIONS
(MICROSOFT OFFICE), AND ALSO IN MANY THIRD-
PARTY PRODUCTS LIKE SOLIDWORKS, AUTOCAD,
WORDPERFECT OFFICE 2002, ARCGIS, SAGE
ACCPAC ERP, AND BUSINESS OBJECTS DESKTOP
INTELLIGENCE. THERE ARE SMALL INCONSISTENCIES IN
THE WAY VBA IS IMPLEMENTED IN DIFFERENT
APPLICATIONS, BUT IT IS LARGELY THE SAME LANGUAGE
AS VB6 AND USES THE SAME RUNTIME LIBRARY.
• VBSCRIPT IS THE DEFAULT LANGUAGE FOR ACTIVE
SERVER PAGES. IT CAN BE USED IN WINDOWS
SCRIPTING AND CLIENT-SIDE WEB PAGE SCRIPTING.
ALTHOUGH IT RESEMBLES VB IN SYNTAX, IT IS A
SEPARATE LANGUAGE AND IT IS EXECUTED BY
VBSCRIPT.DLL AS OPPOSED TO THE VB RUNTIME.
ASP AND VBSCRIPT SHOULD NOT BE CONFUSED
WITH WHICH USES THE FOR COMPILED WEB PAGES.
• VISUAL BASIC .NET IS MICROSOFT'S DESIGNATED
SUCCESSOR TO VISUAL BASIC 6.0, AND IS PART OF
MICROSOFT'S PLATFORM. VISUAL BASIC.NET
COMPILES AND RUNS USING THE .NET FRAMEWORK.
IT IS NOT BACKWARDS COMPATIBLE WITH VB6. AN
AUTOMATED CONVERSION TOOL EXISTS, BUT FULLY
AUTOMATED CONVERSION FOR MOST PROJECTS IS
IMPOSSIBLE.
• STAROFFICE BASIC VISUAL BASIC COMPATIBLE
IS A
INTERPRETER INCLUDED IN STAROFFICE SUITE,
DEVELOPED BY SUN MICROSYSTEMS.
77
• GAMBAS VISUAL BASIC INSPIRED FREE SOFTWARE
IS A
PROGRAMMING LANGUAGE. IT IS NOT A CLONE OF
VISUAL BASIC,
78
INSTALLER OF WHICHEVER DLL WAS NEEDED BY THE
PROGRAM.
79
THIRD PARTY COMPONENTS THAT SHIPPED WITH VISUAL
STUDIO 6.0 ARE NOT INCLUDED IN THIS SUPPORT
STATEMENT. SOME LEGACY VISUAL BASIC COMPONENTS
MAY STILL WORK ON NEWER PLATFORMS, DESPITE BEING
UNSUPPORTED BY MICROSOFT AND OTHER VENDORS.
80
E XAMPLE CODE
81
82
LOGIN FORM CODING
Private Sub Command1_Click()
Adodc1.Recordset.MoveFirst
Do Until Adodc1.Recordset.EOF
If Combo1 = Adodc1.Recordset.Fields(0) And Text1 =
Adodc1.Recordset.Fields(1) Then
Load MDIForm1
MDIForm1.Show
MsgBox "WELCOME TO BANKING SYSTEAM"
Exit Sub
Else
Adodc1.Recordset.MoveFirst
End If
Loop
MsgBox "INVALID PASSWORD"
End Sub
_____________________________________________________________
Private Sub Command2_Click()
If MsgBox("ARE U SURE U WANT TO EXIT", vbYesNo) = vbYes
Then
End
Else
MsgBox "AGAIN CONTINUE IN THIS PROJECT"
End If
End Sub
_____________________________________________________________
Private Sub Form_Load()
Adodc1.Recordset.MoveFirst
Do Until Adodc1.Recordset.EOF
Combo1.AddItem Adodc1.Recordset.Fields(0)
Adodc1.Recordset.MoveNext
83
Loop
End Sub
_____________________________________________________________
Private Sub Timer1_Timer()
Label2.Caption = Date
Label4.Caption = Time
End Sub
84
_____________________________________________________________
85
Private Sub Text1_Change()
Adodc1.Recordset.MoveFirst
Do Until Adodc1.Recordset.EOF
If Combo1 = Adodc1.Recordset.Fields(0) And Text1 =
Adodc1.Recordset.Fields(1) Then
Label4.Visible = True
Label5.Visible = True
Text2.Visible = True
Text3.Visible = True
Command1.Enabled = True
Exit Sub
Else
Label4.Visible = False
Label5.Visible = False
Text2.Visible = False
Text3.Visible = False
Command1.Enabled = False
Adodc1.Recordset.MoveNext
End If
_____________________________________________________________
Adodc1.Recordset.Fields(9) = Combo5
Adodc1.Recordset.Fields(10) = Combo6 + "/" + Combo7 +
"/" + Combo8
Adodc1.Recordset.Fields(11) = Text6
Adodc1.Recordset.Fields(12) = Combo9
Adodc1.Recordset.Fields(13) = Text7
Adodc1.Recordset.Fields(14) = Combo10
Adodc1.Recordset.Update
_____________________________________________________________
87
Private Sub Command2_Click()
Adodc1.Recordset.Delete
Adodc1.Recordset.MovePrevious
End Sub
_____________________________________________________________
Private Sub Form_Load()
Combo1.AddItem "MALE"
Combo1.AddItem "FEMALE"
Combo2.AddItem "MATRIC"
Combo2.AddItem "INTER"
Combo2.AddItem "GRADUCATION"
Combo2.AddItem "POST GRADUCATION"
Combo3.AddItem "SC/ST"
Combo3.AddItem "GENRAL"
Combo4.AddItem "MARIED"
Combo4.AddItem "NON-MARID"
Combo5.AddItem "INDIAN"
Combo5.AddItem "CHINA"
Combo5.AddItem "PAKISTAN"
Combo5.AddItem "AMERICAN"
Combo5.AddItem "GERMAN"
Combo5.AddItem "FRANCH"
Combo5.AddItem "AUSTRLIYA"
Combo5.AddItem "AFRICI"
FOR A = 1 to 31
Combo6.AddItem a
Next
FOR A = 1 to 12
Combo7.AddItem a
Next
88
FOR A = 1950 to 2000
Combo8.AddItem a
next
Combo9.AddItem "current"
Combo9.AddItem "deposit"
FORA = 1 - 31
Combo10.AddItem a
Next
FORA = 1 - 12
Combo11.AddItem a
Next
FORA = 1950 - 2000
Combo12.AddItem a
End Sub
-
_____________________________________________________________
90
FUND FORM CODING
Private Sub Command1_Click()
Adodc1.Recordset.Fields(0) = Text1
Adodc1.Recordset.Fields(1) = Combo1
Adodc1.Recordset.Fields(2) = Text2
Adodc1.Recordset.Fields(3) = Text3
Adodc1.Recordset.Fields(4) = Text4
Adodc1.Recordset.Fields(5) = Combo2
Adodc1.Recordset.Fields(6) = Combo3
Adodc1.Recordset.Fields(7) = Text5
Adodc1.Recordset.Fields(8) = Option1.Caption
Else
Adodc1.Recordset.Fields(8) = Option2.Caption
Adodc1.Recordset.Fields(9) = Combo4 + "/" + Combo5 + "/"
+ Combo6
Adodc1.Recordset.Update
End Sub
_____________________________________________________________
-
_____________________________________________________________
Adodc1.Recordset.Fields(0) = Text1
Adodc1.Recordset.Fields(1) = Text2
Adodc1.Recordset.Fields(2) = Combo1
Adodc1.Recordset.Fields(3) = Combo2
Adodc1.Recordset.Fields(4) = Text3
Adodc1.Recordset.Fields(5) = Text4
Adodc1.Recordset.Fields(6) = Text5
Adodc1.Recordset.Fields(7) = Text6
Adodc1.Recordset.Fields(8) = Combo3
Adodc1.Recordset.Fields(9) = Text7
Adodc1.Recordset.Fields(10) = Text8
Adodc1.Recordset.Fields(11) = Text9
Adodc1.Recordset.Fields(12) = Text10
Adodc1.Recordset.Fields(13) = Text11
Adodc1.Recordset.Fields(14) = Text12
Adodc1.Recordset.Fields(15) = Text13
Adodc1.Recordset.Fields(16) = Text14
Adodc1.Recordset.Fields(17) = Text15
Adodc1.Recordset.Update
End Sub
_____________________________________________________________
94
Combo1.AddItem "MATRIC"
Combo1.AddItem "INTER"
Combo1.AddItem "GRADUCATION"
Combo1.AddItem "POST GRADUCATION"
Combo2.AddItem "EDUCATIONAL"
Combo2.AddItem "PERSONAL"
Combo2.AddItem "BUSINESS"
End Sub
DETAIL FO LOAN
Private Sub Command1_Click()
Adodc1.Recordset.AddNew
Adodc1.Recordset.Fields(0) = Text1
Adodc1.Recordset.Fields(1) = Text2
If Option1.Enabled = True Then
Adodc1.Recordset.Fields(2) = Option1.Caption
End If
If Option2.Enabled = True Then
Adodc1.Recordset.Fields(2) = Option2.Caption
End If
Adodc1.Recordset.Fields(3) = Combo1
Adodc1.Recordset.Fields(4) = Text3
Adodc1.Recordset.Fields(5) = Combo2
Adodc1.Recordset.Fields(6) = Text4
Adodc1.Recordset.Fields(7) = Text5
Adodc1.Recordset.Fields(8) = Text6
Adodc1.Recordset.Fields(9) = Text7
Adodc1.Recordset.Fields(10) = Text8
Adodc1.Recordset.Update
Text1 = ""
Text2 = ""
Combo1.Text = ""
96
Text3 = ""
Combo2.Text = ""
Text4 = ""
Text5 = ""
Text6 = ""
Text7 = ""
Text8 = ""
MsgBox "Record Added Successfully"
End Sub
End Sub
97
Adodc1.Recordset.MoveNext
End If
Loop
MsgBox "Record Not Found"
End Sub
99
DU.Enabled = False
End If
End Sub
__________________________________________________________
LOGIN FORM
100
MDI FORM
101
ACCOUNT OPENING FORM
102
WITHDRAWL FORM
103
FUND FORM
104
DETAIL OF LOAN
105
STUDENT LOAN
106
DETAIL OF PAYMENT FORM
107
ADD NEW LOGIN USER FORM
108
DELETE USER FORM
109
CHANGE PASSWORD FORM
110
CALCULATER
111
NOTEPAD
112
CALENDER
113
114
115