CHAPTER ONE
1.0 INTRODUCTION
The computerization of the banking/financial sector of the
economy has really helped to eliminate the manual operation of the
sector including the innovation of paperless activities.
Following this, is the introduction of development of the ATM
(Automated teller Machine) which had the most laudable effect in
the sector? However, the ATM has really terminated most of the
stressful work in the banking sector like queuing to check account
balance, delay in cash withdrawing and cash transfer, etc.
The ATM gained acceptance due to its Mechanism like
dispensing Mechanism (to provide cash on often items of value),
deposit mechanism including cheques processing module and batch
not acceptor (to allow the customer to make deposits), security
sensor and locks (to ensure controlled access to the contents of the
vault).
In this work, we examined our overview of the ATM and its record
printer.
The emergency of the ATM brought about the transformation in
the banking sector giving rise to inter-banking services. However,
the ATMs inability to generate a hard copy of the operations carried
out it has been a concern over the years. In a bid develop a receipt
generating system for the ATM to enhance its user-friendliness and
1
flexibility, this study was carried out at some of the major banks
within Yola Metropolis.
1.1 STATEMENT OF THE PROBLEM
Notwithstanding the effective and excellent performance of ATM, its
inability to solve the problems of users adequately before and after
usage has posed a challenge to users. Base on the research we
conducted with some of banks, we asked the customers, about
some of the problems they encounter, and they were kind enough to
give us some of the problems listed below.
Some of the problems are:-
1. Debit but not paid
2. Inadequate manpower
3. Insufficient fund
4. Poor Network coverage.
5. Inability to work 24hours
1.2 OBJECTIVE OF THE STUDY
The objective of this study which is the automated teller
machine of a transactions receipt generating system for an ATM is
as follows:-
1. Design and restructure the ATM in a way that it will not only
give softcopy of the transaction rather be capable of
3
generating a hardcopy of the business transactions carried
out on it.
2. Enhance the user’s with the machine since the machine
gives him/her a valid update of the account detail each time
he/her uses the machine
1.3 SCOPE OF THE STUDY
The scope of this study which bothers on automated teller
machine.
- Payment, or cash withdrawal.
- Change of pin.
- Balance inquiring
- Cash transfer
- Recharging of mobile phones
However, other companies may maintain different sources of receipt
or teller, but this study, concentrates only on payment and
withdrawal receipt system for fidelity bank plc, Jimeta Yola
Adamawa state.
1.4 SIGNIFICANCE OF THE STUDY
The development of a system for an ATM to enhance the
user’s/customer’s knowledge of his/her account details (a complete
up to date statement of account) since the system produces a
4
receipt for the transactions he/she made. This also eliminates
conflicts over statement of account between the customer and the
bank’s operators and also helped transformed our economy from its
cash driven nature to a more electronic way of cash conveyance and
withdrawal.
1.5 LIMITATIONS OF THE STUDY
This section discloses restriction of the study that cannot be
exceeded after implementing this study. The study is limited to
activities that is concern with automated transaction system of a
banking sector.
5
CHAPTER TWO
LITERATURE REVIEW
INTRODUCTION
2.1. HISTORY OF ATM
The first mechanical cash dispenser was developed and built by
Luther George Simjian and installed in 1939 in new York City by the
City Bank of New York, but removal after six (6) Months due to the
lack of customer acceptance. Orjir J. (1996)
Therefore, the history of ATMS pursed for over 25 years, until De La
Rue developed the first electronic ATM, which was installed first in
fulfilled town in North London, United Kingdom on 27 June 1967 by
Barclays Bank. Lederman E. (1990)
This instance of the invention is credited to John Shepard Barron,
although various other engineers were awarded patents for related
technologies at the time John Shepard Baron was awarded an OBE.
In the 2005 New Year’s Honors List: The First person to use the
machine was the British Variety artist and actor Red Varney. The
first ATMs accepted only a single use token or voucher which was
retained by the machine. Prager R. (2001)
This worked on various principle including radiation and low-
Coercively Magnetism that was wiped by the card reader to make
6
fraud move difficult. The machine dispensed pre-packed envelopes
containing ten pounds sterling. The idea of a PIN (personal
Identification number) stored on the card was developed by the
British Engineer James Good fellow in 1965.
However, Donald Wetzel a departmental head at an automated
baggage- handling company called docutel, Networked and
pioneered the ATM in Dallas, Texas in 1968. Then in 1995, the
Smithsonian’s National Museum of American History recognized
docutel and Wetzel as the inventors of the Networking ATM.
ATMs first come into wide UK use in 1973; the IBM 2984 was
designed at the request of Lloyd’s banks. Humphery D. (1991)
The 2984 CIT (cash Insuring Terminal) was the first cash point is
still in function to today’s machine; cash point is still a registered
trademark of Lloyds TSB in the UK. All were on line and issued a
variable amount. A small number of 2984s were supplied to a US
bank. Notable Historical model of ATMs includes the IBM 3624 and
473x Series, die bold 10xx and TABs 9000 series and NCR 5xxx
series. JOHN P. (2001)
ATMs are placed not only near or inside the premises of banks but
also in locations such as shopping centers/smalls, airports, grays
stores, petrol/gas stations, restaurants, schools in any places large
7
numbers of people may gather. There are two types of ATM
installation. On and off promise. Salop S. (1990)
On premise ATMs are typically move advanced multifunction
machines that complement an actual bank branches capacities and
thus more expensive off premise machines are deployed by
financial institutions and also (independents sales organizations)
where there is usually just a straight need for cash, so they
typically are the cheaper mono function devices.
Many ATMs have a sign above them indicating the name of the bank
or organization owing the ATM and possible including the list of ATM
networks to which that machine is connected to this type of sign is
called a topper. Luther Klein (2004).
FINANCIAL NETWORKS
Most ATMs are connected to Inter-bank networks, enabling people
to withdraw and deposit money from machines not belonging to the
bank where they have their account or in the country where their
accounts are held (enabling cash withdrawals in the Local Currency).
Some examples of inter-bank networks include PULSE, PLUS,
CIRRUS, Integral and LINK ATMs rely on other authorizing institution
via the communications network. This is often performed through an
ISO 8583 messaging system. MC Adrews, James (1991)
8
Many banks charges ATM usage fees. In some cases these fees are
changed solely to users who are not customer of the bank were the
ATMs are installed. In other cases, they apply to all users. Thomsom
Bolton D (1996)
ATM typically connect directly to their ATM Controller via either a
dial-up modern over a telephone line or directly via a leased line.
Leased lines are preferable to POTS lines because the required less
time to establish a connection. Lease lines may be comparatively
expensive to operate versus a POTS line, meaning less-trafficked
machines will usually rely on dial-up modern. Orjir J (1996)
That dilemma may be solved as high speed internet VPH
connection become more ubiquitous. Common lower-level layer
communication protocols used by ATMs to communication back to
the bank include SHA over SDLC. TC500 over syne, X.25 and Tcp/Ip
over ether net.
The use of ATM machine in Nigeria by banks to enhance
transaction started in early 2002. Although, it took a lot of
orientation of the customers before the ATM could gain wide
acceptance. Today people still see the ATM as an avenue for bank to
exploit them. Tony Gunton (1988)
2.2. ATM
9
ATM is an acronym for automated teller machine, it is a
computerized telecommunication device that provides the customers
of a financial institution with access to financial transaction in a
public space without the need for a human clerk or bank teller. On
most modern ATMs, the customers is identified by inserting a
plastic ATM card with a magnetic strip or a plastic smartcard with a
chip, that contains a unique card number and some security
information such as an expiration date. Security information such is
provided by the customer entering a personal identification number
(PIN). Akin B.S. (2004).
Using an ATM, customers can access their bank account in order to
make cash withdrawn (or credit card cash advances) and check their
account balance as well as purchasing mobile cell phones prepaid
credit.
ATM are known by various other names including automated
banking machine, money machine, bank machine, cash machine,
hole-in the wall, cash point, bank comet (in various countries in
Europe and Russia), multibank (after a registered trade mark, in
Portugal). And any time money (in India). Luther K. (2004)
2.3. COMPONENTS OF ATM
10
An ATM is typically made up of the following component
Battery back-up.
Card reader
Communications
GPIO
LCD Display Control
Machine Control.
Motion detectors
Power supply
Real-time clock
Rs-232
RS-485
Secure Micro Controller
Temperature Sensors
USB
Video
Warranty
Watchdog time. Akin Bowale S. (2004)
An ATM is typically made up of the following devices;
CPU (to control user interface and transaction device)
11
Magnetic and (or chip card reader (to identify the
customer.
PIN pad (similar in layout to a secure enclosure
Secure crypto processor, general written a secure
enclosure.
Display (used by the customer for performing the
transaction).
Function key buttons (usually close to the display) or a
touch screen (used to select various aspect if the
transaction record printer (to provide the customer with a
record of their transaction).
Vault (to store the parts of the machinery requiring
restricted access).
Housing (for aesthetics and to attach signage to). Tony
Gunton (1988).
Recently, due to heavier computing demands and the falling price of
computer like architectures using microcontrollers and/or
application-specific integrated circuits to adopting a hardware
architecture that is very similar to a personal computer – many
ATMs are now able to use operating systems such as Microsoft
window and limit. Although it is undoubtedly cheaper to use
12
commercial off the shelf hardware, it does make ATMs vulnerable to
the same sort of problems exhibited by conventional computers.
Prager R. (2001)
2.4 FUNCTIONS OF ATM
Although ATMs were originally developed as just cash
dispensers, they have evolved to include many other bank related
functions. In some countries, especially those which benefit from a
fully integrated cross-bank ATM network (e.g. Multibank in
Portugal), ATMs include many functions which are not directly
related to the management of one’s own bank account such as:
o Deposit currency recognition, acceptance and recycling.
o Paying routine bills, fees and taxes (utilities, phone bills,
social security, legal fees, taxes etc).
o Printing bank statements
o Updating passbooks
o Loading monetary value into stored value cards
o Purchasing postage stamps.
o Lottery tickets
o Train ticket
o Concept ticket
13
o Shopping small gift certificates
o Games and promotional features
o Donating to charities
o Cheque processing module
o Adding prepaid cell phone credit.
Increasing banks are seeking to use the ATM as a sales devices to
deliver pre-approved loans and targeted advertising using product
such as ITM (Intelligent Teller Machine)
From CRz or Aptra Relate from NCR. ATMs can also act as an
advertising channel for companies to advertise their own products or
third party products and services. Orjir J. (1996)
14
CHAPTER THREE
METHODOLOGY
3.1. RESEARCH METHODOLOGY
Research is an objective, systematic controlled and critical
activity planned and directed toward discovery and development of
dependable knowledge. It is primarily concerned with the
investigation of the present or existing system, its mode of
operation and working procedure. It also contain information on how
data was collected; it defines how the objectives of the study will be
accomplished and how problems encountered will be solved.
Research methodology is a set or series of methods and procedures
used for data collection of the study and the statistical techniques
used for the analysis. It is basically a fact finding exercise.
3.2. METHODS OF DATA COLLECTION
There exist various methods of gathering facts about a
situation. This includes interview, questionnaire, record inspection
and observation. Each of these methods has advantages and
disadvantages. For the purpose of this study, the following facts
finding methods are employed for data collection:-
15
OBSERVATION: Observation method provides first-hand
information about the system. It involves systematically watching
the operations, procedures and personnel of the organization over a
Period of time and recording things as they happen.
We employed this method as we observed banking activities in the
deposit and withdrawal section of the bank (Fidelity Bank Plc Yola).
INVESTIGATION: - the researchers were able to carry out this
method by reading newspaper, magazines journals and annual
report annual with related information about the bank. The
researchers also visit the banks website, other sites with related
information to the bank and libraries in search of already written
text, journals or software diagnosis to serve as a guide to the study.
INTERVIEW: - As part of the procedures for gathering data, series
of interview were conducted on the ATM Operators and users of the
machine at random, it involves conversation, discussing system
characteristics with respondents carefully selected for their
knowledge of the system. Interview method is more advantages
because it can quickly uncover misunderstanding, false
expectations, or even potential resistance to applications under
development. Below are some of the question that were asked
during the interviewing of some of the customers.
16
1. What are the problems you encounter while using ATM.
2. As an ATM operator/user what do you think is the major
problem of ATMs.
3. What do think make the ATM to gain general acceptance by the
customers.
4. What are the difficulties you encounter while making
transactions.
5. What makes you afraid of using ATMs for making transactions?
3.3. SOURCES OF DATA
Two major sources of data involved in this study they include
the internal and external sources of data.
INPUT, PROCESS AND OUTPUT ANALYSIS
INPUT ANALYSIS
The input to the ATM is a plastic card called the ATM card which
contains the customer’s account number and gives him access to his
account. When the customer inserts the ATM card, the machine
prompts him for his pin number. If the PIN is correct, the machine
displays options like withdrawal, inquiry, change PIN etc. when the
user select withdrawal, the machine displays other options to select
the types of account.
17
PROCESS ANALYSIS
After the customer has selected the necessary option, the
machine processes the data by checking the bank’s database for the
account number and the amount payable from the account.
OUTPUT ANALYSIS
After the machine completes the processing, it dispenses the
money through it dispenser.
JUSTIFICATION FOR THE NEW SYSTEM
After studying the system and the problem encountered by
customers when using it a justification for the design of a system
was made as a justification for the design of a system was made as
listed below.
1. The existing system has failed to meet the need of the
growing population in the society which called for the
designed a new system.
2. There is need to design a system which will help make
cash transaction error-free, reliable and flexible.
3. It is justified that a system to develop which will be
capable of generating of general receipts for business
transactions performed on it.
18
3.4. PROGRAMMING LANHUAGES USED
The Microsoft visual Basic 6.0 is the programming language
used for the design. The problem to be solved requires large volume
if file and enormous base for the file accessing, updating, storage
and retrieval and since VB can handle these look with ease, it held
the most attraction for the design moreover, visual basics is an
object oriented programming language (OOP) and an event driven
language and it provides the features needed for this design.
3.5. INPUT SPECIFICATION
All activities, procedure and specification the prepare data into
a useable form for processing make-up the input design. Here, the
ATM card is first inserted into the machine, the PIN is entered
through the keyboard, and the special character buttons, are used
to select options like WITHDRAWAL, INQUIRY, CHANG PIN,
RECHARGE AND TRANSFER on the key in user’s password and to
specify the amount of money to withdraw.
19
Below is an overview of the input design.
Pleases Enter your pin
PRESS CANCEL TO TERMINATE TRANSACTION
PROCEED>
ENTER PIN >XXXX
CANCEL
In the pin is correct it displays the next page for customer to select
transaction, if not it displays invalid pin.
SELECT YOUR TRANSACTION
WITHDRAWAL INQUIRIES
TRANSFER CHANGE PIN
RECHARD CANCEL
If withdrawal is selected is it asked for the account type?
SELECT ACCOUNT TYPE
SAVINGS
CURRRENT
CANCEL
20
Sub withdrawal form.
PLAESES ENTER AMONUT
#1000 #10000
#2000 #20000
#3000 #30000
OTHERS CANCEL
Once an amount is selected, if there is enough money it pay the
customer or rollback the transaction by displaying insufficient fund.
Sub inquiry form
ENTER ACCOUNT NUMBER
XXXXXXXXXX
CANCEL
Select account type
SAVINGS
CURRENT
CANCEL
If the account number and account type is current it displays the
statement of account or rollback transaction.
21
Sub change pin
Sub change pin
Enter current pin xxxxx
Enter new pin xxxxx
Confirm new pin xxxxx
Proceed cancel
If the current pin you enter is correct it takes in your new pin and
change the pin.
Sub recharging of mobile phone
Select network
MTN GLO
AITEL ETISLAT
CANCEL
Once you select the network it gives you the option to enter your
phone no.
ENTER PNONE NO
081636234577
22
Enter amount to recharge
#100 #200
#400 #500
#1000 #3000
Others cancel
Once you enter the amount your account will be credited
automatically.
3.6. OUTPUT SECIFICATION
Often the most important feature of an information system for
users is the output it produces. The term output refers to any
information produced by a system whether printed on paper,
displayed on the screen or produced as audio sound.
The output of the project is shown in the form of report as printed at
the below with regards to data entered as input.
PENTIUM (IV) AND ABOVE
PROCESSOR SPEED: [Link] and above
SYSTEM MEMORY 512 megabyte and above
HAND DISK 20gigabyte and above.
3.7. SOFTWARE REQUIREMENT
23
For the system to be functional standard commercial off the
shelf operating system and programming environments can be used
inside the ATM. Typical platforms used in ATM development include
Rmx, OS/2. And Microsoft operate systems (such as Ms-Dos, and
window NT, Windows 2000, widow XP Professional or Window XP
professional or window XP embedded). Java, Linux and UNIX may
also be used in these environments.
WOSA/XFS, now known as CEN XFS provides a common API
(Application Programming Interface) for accessing and manipulating
the various devices of an ATM.
24
CHAPTER FOUR
4.0 IMPLEMENTATION
Here, the network of processes (design) is transformed into a
sequential machine that is executable by a conventional machine.
This is done to cause the ATM to work as an expert system using
instruction given to it.
4.1. PROGRAM DESIGN
Before a computer program is coded into the computer. It
should be designed on paper and organized in a logical order. When
the design is completed, a test is performed to see if the system is
flexible and if it will produce the desired result. On completion of
the program once it run below is the output of the program.
Welcome page
25
Login page
Transaction selection
26
Sub Withdrawal form
Sub Inquiries form
Sub Transfer form
27
Recharge phones (sub network selection)
Sub change pin
28
4.3 INSTALLATION AND TESTING
Software testing is a critical element of software quality
assurance based on the fact that software is a system element and
the cost of software failure is enormous. The program developed is
installed on a PC (personal Computer) and tested. During the
testing, wrong data were inputted in the ATM and the ATM rejected
them, this shows the ability of the new system, a complete
transaction was performed and the system working perfectly.
4.4. DOCUMENTATION
29
Documentation is a dear and elaborates specifications of details
considered in a work written down using appropriate documents.
The program is designed in Microsoft visual Basic 6.0. To access the
program design open the CD copy the folder “Link bank” to the hard
disk, double click to open, locate the Icon “project 1” and click to
open. When it opens, click on the run icon to run the program.
30
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 SUMMARY
The aim of this project is to develop an automated transaction
system which will enhance the operation of the ATM in order to
be more flexible and user friendly. By the design of this new
system, the aim was achieved as the new system was able to
generate a receipt after business transaction was successfully
performed on it.
5.2. CONLUSION
In conclusion, it is necessary that a printer which generates a
receipt of every transaction performed on it be built into every
ATM used in the financial institution.
5.3 RECOMMENDATION
I recommend that organization that are yet to implement the
transaction receipt generating system should do so because of its
advantage over the ATMs without the Printers it creates a more
friendly environment for transaction operations of the ATM.
Finally, awareness should be made among user of ATM to educate
them on the need to be conversant between customers and bank
operators.
31
In addition, ATM manufacturers should incorporate the printer on
the newer ATMs the manufacture.
32
REFERENCES
Akin Bowale. S. (2004); Introduction to winner mixdorf, ATM
Products (Unpublished material) corpareti printing publishers
Lagos
ATM & Debit News (2001) EFT Data Book 2002 Edition, 1, 44,
September, Chicago:
ATM Pricing,” Review of Economics and Statistics, forthcoming.
Balto, D. and J. Mc Andrews (1998) “Joint Venture Payment
Networks and Public Policy,”
Bank of Philadelphia Business Review, (May/June).
Current Issues in Economics and Finance, 4: 1-6.
Cyrnak, T. and J. Mc Andrews (1999) “Results of a Conference on
ATM Network Routing Rules,” mimeo, Federal Reserve Bank of
New York.
Donze, J. and I. Dubec (2002) “The Role of Interchange Fees in
Shared ATM Networks,” mimeo, University of Toulouse.
Economides, N. and S. Salop (1992). “Competition and Integration
among Complements, and Network Market Structure,” Journal
of Industrial Economics, 40: 105-130.
Gilbert, R. (1991) “On the Delegation of Pricing Authority in Shared
Automatic Teller.
Hannan, T. (2002) “Retail Fees of Depository Institutions, 1997-
2001,” Federal Reserve Bulletin, September: 405-413.
Hannan, T., E. Kiser, R. Prager and J. McAndrews (2003) “To
Surcharge or Not to Surcharge: An Empirical Investigation of
ATM Pricing,” Review of Economics and Statistics, forthcoming.
33
Horvitz, P. (1988) “ATM Surcharges: Their Effect on Competition and
Efficiency,” Journal of Retail Banking Services, 18: 57-62.
Humphrey, D. (1993) “Delivering Deposit Services: ATMs Versus
Branches,” mimeo, Florida State University.
Laffont, J., P. Rey, and J. Tirole (1998) “Network Competition:
Overview and Nondiscriminatory Pricing,” RAND Journal of
Economics, 29: 1-37.
Lederman, E. (1990) “The Public Policy Implications of State Laws
Pertaining to Automated Teller Machines,” Federal Reserve
Bank of San Francisco Economic Review, 1: 43-58.
Luther Klein (2004) Automated Teller Machine
Machine Networks,” In M. Guerrin-Calvert and S. Wildman (eds.),
Electronic Services Networks: A Business and Public Policy
Callenge. New York: Praeger Publishing.
Mc Andrews, James (1991) “The Evolution of Shared ATM
Networks,” Federal Reserve.
Massoud, M. and D. Bernhardt (2001) “Endogenous ATM
Concentration,” mimeo, University of Alberta.
Massoud, M. and D. Bernhardt (2002) “‘Rip-Off’ ATM Surcharges,”
RAND Journal of Economics, 33: 96-115.
Matutes, C. and A. J. Padilla (1994) “Shared ATM Networks and
Banking Competition,” European Economic Review, 38: 1113-
38.
Okoh sc (2004); Software methology, principle and practice
Orji. J (1996); Business Research Methology, Enugu Meteston
publicity Co. (revised edition) pg. 325
Tony Gunton (1988, A Dictionary of IT and Computer science,
Blackwell oxford.
34
APPENDIXS
Imports [Link]
Imports [Link]
' Form Load
Public Class Form1
Private Sub Form1_Load(ByVal sender As [Link], ByVal e
As [Link]) Handles [Link]
CurrentRow = 0
[Link]()
Dad = New OleDbDataAdapter("SELECT * FROM empinfo
ORDER BY Id", Con)
[Link](Dst, "employee")
ShowData(CurrentRow)
[Link]()
End Sub
' To display data on form
Private Sub ShowData(ByVal CurrentRow)
Try
[Link] = [Link]("employee").Rows(CurrentRow)("Id")
[Link] = [Link]("employee").Rows(CurrentRow)
("FName")
[Link] = [Link]("employee").Rows(CurrentRow)
("LName")
[Link] =
[Link]("employee").Rows(CurrentRow)("account_type")
[Link] = [Link]("employee").Rows(CurrentRow)
("balance")
[Link] = ""
Catch ex As Exception
End Try
End Sub
' To Navigate to Last Record
35
'To select the data in Id field
Private Sub Id_GotFocus(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
[Link]()
End Sub
' To clear all fields : Id, First Name, Last Name, Designation,
Salary
Private Sub Clear()
[Link] = ""
[Link] = ""
[Link] = ""
[Link] = ""
[Link] = ""
End Sub
' To search a record in database
Private Sub Search_Click(ByVal sender As [Link], ByVal
e As [Link]) Handles [Link]
Dim SearchId As Integer
Dim i, j As Integer
If CheckId() = False Then
MsgBox("Please inter your pin!!!")
Exit Sub
End If
If [Link] = "1234" Then
MsgBox("Please inter Your PIN")
Else
Try
SearchId = [Link]
j = [Link]("employee").[Link] - 1
i=0
While i <> j + 1
If SearchId = [Link]("employee").Rows(i)("Id")
Then
ShowData(i)
[Link] = True
[Link] = True
accouunt_type.[Link] = [Link]
36
Exit While
ElseIf i = j Then
Clear()
MsgBox("INvalid PIN")
ShowData(CurrentRow)
Exit While
End If
i += 1
End While
CurrentRow = i
Catch ex As Exception
MsgBox([Link])
End Try
End If
End Sub
' To select the data in First Name Field
Private Sub FName_GotFocus(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
[Link]()
End Sub
' To select the data in Last Name Field
Private Sub LName_GotFocus(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
[Link]()
End Sub
' To select the data in Designation Field
Private Sub Designation_GotFocus(ByVal sender As Object, ByVal
e As [Link]) Handles [Link]
[Link]()
End Sub
' To select the data in Salary Field
Private Sub Salary_GotFocus(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
[Link]()
End Sub
' To check the data in Id field : whether numeric or not
Private Function CheckId()
37
Try
If IsNumeric([Link]) = False Then
ShowData(CurrentRow)
[Link]()
Return False
End If
Catch ex As Exception
End Try
Return True
End Function
' To check the data in salary field : whether numeric or not
Private Function CheckSalary()
Try
If IsNumeric([Link]) = False Then
ShowData(CurrentRow)
[Link]()
Return False
End If
Catch ex As Exception
End Try
Return True
End Function
' To check the data in First Name Field : whether a string or not
Private Function CheckFName()
Try
If [Link] = "" Or ValidateString([Link]) = False
Then
ShowData(CurrentRow)
[Link]()
Return False
End If
Catch ex As Exception
End Try
Return True
End Function
' To check the data in Last Name Field : whether a string or not
Private Function CheckLName()
Try
If [Link] = "" Or ValidateString([Link]) = False
Then
ShowData(CurrentRow)
38
[Link]()
Return False
End If
Catch ex As Exception
End Try
Return True
End Function
' To check the data in Designation Field : whether a string or not
Private Function CheckDesignation()
Try
If [Link] = "" Or ValidateString([Link])
= False Then
ShowData(CurrentRow)
[Link]()
Return False
End If
Catch ex As Exception
End Try
Return True
End Function
' To check the string for numeric values
Private Function ValidateString(ByVal Str)
Dim i As Integer
Dim ch As Char
i=0
While i < [Link]()
ch = [Link](i)
If IsNumeric(ch) = True Then
Return False
End If
i += 1
End While
Return True
End Function
' To check whether Id exist in database
Private Function IsIdExist()
Dim Str, Str1 As String
Dim i As Integer
Str = [Link]
i=0
39
While i <> [Link]("employee").[Link]
Str1 = [Link]("employee").Rows(i)("Id")
If Str = Str1 Then
Return True
End If
i += 1
End While
Return False
End Function
Private Sub btnCancel_Click(ByVal sender As [Link],
ByVal e As [Link]) Handles [Link]
[Link]()
End Sub
Private Sub Timer1_Tick(ByVal sender As [Link], ByVal e
As [Link]) Handles [Link]
please_wait.Show()
End Sub
Private Sub Timer2_Tick(ByVal sender As [Link], ByVal e
As [Link]) Handles [Link]
please_wait.Hide()
accouunt_type.Show()
[Link] = False
[Link] = False
End Sub
End Class
40