Visual Basic 6 allows developers to design graphical user interfaces and connect to databases. It uses an event-driven programming model where code executes in response to user and system events like button clicks. The document discusses connecting a VB application to a Microsoft Access database using ActiveX Data Objects (ADO). Developers add an ADO Data Control to the form, specify the database file path in its connection string, and select the table as the record source. Common ADO commands allow navigating and updating the recordset. Visual Basic provides a visual interface for building Windows applications and integrating with databases through controls like ADO.
Introduction to Visual Basic 6.0 FundamentalsSanay Kumar
A powerpoint presentation on Intoduction To Visual Basic 6.0. This ppt contains slides on variuos topics of visual programming, IDE, and COM based Microsoft's software VB 6.0.
Introduction to Visual Basic 6.0 FundamentalsSanay Kumar
A powerpoint presentation on Intoduction To Visual Basic 6.0. This ppt contains slides on variuos topics of visual programming, IDE, and COM based Microsoft's software VB 6.0.
This presentation is a part of the COP2272C college level course taught at the Florida Polytechnic University located in Lakeland Florida. The purpose of this course is to introduce students to the C++ language and the fundamentals of object orientated programming..
The course is one semester in length and meets for 2 hours twice a week. The Instructor is Dr. Jim Anderson.
Erik Wendel - Beyond JavaScript Frameworks: Writing Reliable Web Apps With El...Codemotion
In times where a jungle of JavaScript frameworks wants to solve every conceivable problem in web app development, Elm offers a different approach. Elm is a functional language that compiles to JavaScript. It has a user-friendly compiler, a sound type system, built-in immutability and lots of other features that come in handy when developing large, hopefully bug-free, single-page apps. While having fun in the process! In this talk you'll see how Elm works and learn how to use it to build a web app. More importantly, you'll learn the pros and cons of using it over a JavaScript-based solution.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Thesis Statement for students diagnonsed withADHD.ppt
01 Database Management (re-uploaded)
1. • Basics of Visual Basic 6 Programming
• Design and develop Information Systems with the help of Visual
Basic as front-end and MS Access as backend.
Visual Basic 6
2. What is Visual Basic?
It is an ―Event Driven Programming Language‖
The "Visual" part refers to the method used to create the graphical user interface (GUI).
Rather than writing numerous lines of code to describe the appearance and location of
interface elements, you simply add prebuilt objects into place on screen. If you've ever
used a drawing program such as Paint, you already have most of the skills necessary to
create an effective user interface.
The "Basic" part refers to the BASIC (Beginners All-Purpose Symbolic Instruction Code)
Visual Basic has evolved from the original BASIC language and now contains several
hundred statements, functions, and keywords, many of which relate directly to the
Windows GUI. Beginners can create useful applications by learning just a few of the
keywords, yet the power of the language allows professionals to accomplish anything
that can be accomplished using any other Windows programming language
3. Why Visual Basic??
Data access features allow you to create databases, front-end applications, and scalable
server-side components for most popular database formats, including Microsoft SQL
Server and other enterprise-level databases.
ActiveX™ technologies allow you to use the functionality provided by other
applications, such as Microsoft Word word processor, Microsoft Excel spreadsheet, and
other Windows applications. You can even automate applications and objects created
using the Professional or Enterprise editions of Visual Basic.
Internet capabilities make it easy to provide access to documents and applications across
the Internet or intranet from within your application, or to create Internet server
applications.
Your finished application is a true .exe file that uses a Visual Basic Virtual Machine that
you can freely distribute.
4. Interpreting and Compiling
The traditional application development process :
writing
compiling
testing code
Visual Basic uses an interactive approach to development, blurring the distinction
between the three steps.
Visual Basic interprets your code as you enter it, catching and highlighting most syntax
or spelling errors on the fly. It's almost like having an expert watching over your
shoulder as you enter your code.
In addition to catching errors on the fly, Visual Basic also partially compiles the code as it
is entered. When you are ready to run and test your application, there is only a brief
delay to finish compiling.
Compilation also possible to generate faster applications
5. Key Concepts
windows, events and messages.
Think of a window as simply a rectangular region with its own boundaries.
Explorer window
document window within your word processing program,
dialog box ,Icons, text boxes, option buttons and menu bars are all windows
OS manages all of these many windows by assigning each one a unique id number
(window handle or hWnd). The system continually monitors each of these windows for
signs of activity or events. Events can occur through user actions such as a mouse click or
a key press, through programmatic control, or even as a result of another window's
actions.
Each time an event occurs, it causes a message to be sent to the operating system. The
system processes the message and broadcasts it to the other windows. Each window can
then take the appropriate action based on its own instructions for dealing with that
particular message (for example, repainting itself when it has been uncovered by another
window).
Visual Basic insulates you from having to deal with all of the low-level message
handling.
6. Event Driven Programming
In traditional or "procedural" applications, the application itself controls which portions
of code execute and in what sequence. Execution starts with the first line of code and
follows a predefined path through the application, calling procedures as needed.
In an event-driven application, the code doesn't follow a predetermined path — it
executes different code sections in response to events. Events can be triggered by the
user's actions, by messages from the system or other applications, or even from the
application itself. The sequence of these events determines the sequence in which the
code executes, thus the path through the application's code differs each time the program
runs.
Your code can also trigger events during execution. For example, programmatically
changing the text in a text box cause the text box's Change event to occur. This would
cause the code (if any) contained in the Change event to execute. If you assumed that this
event would only be triggered by user interaction, you might see unexpected results. It is
for this reason that it is important to understand the event-driven model and keep it in
mind when designing your application.
14. D A T A T Y P E S A N D V A R I A B L E S
W R I T I N G S T A T E M E N T S
M A T H O P E R A T I O N S
C O N T R O L S T A T E M E N T S
F U N C T I O N S
Language Basics
15. Data Types
A Data Type is a set of values ,together with a set of
operations on those values having certain properties.
Built in Type
User Defined Types
16. Built in Type
Type Stores Memory(byte) Range
Integer Whole Number 2 -32,768 to +32,767
Long Whole Number 4 +/- 2 billions
Single Decimal 4 +/- 1E45 to 3E-38
Double Decimal 8 +/- 5E324 to 1.8E308
Currency 8 +/- 9E14
String Text 1/char <= 65400 char
Byte Whole Number 1 0-255
Boolean Logical 2 True/False
Date Date & Time 8 1/1/100 to 12/31/9999
Object Instance of Classes 4 N/A
Variant Any of above 16 + 1/char N/A
17. Variables
Variables are used to store information in
Computer‘s memory while programs are running.
Three Components that define a variable:
The Variable‘s Name
The Type of information being stored
The actual information itself
18. Naming Variable
Rules:
The name must be start with a letter not number or other character.
The remainder of name can contain numbers, letters and/or
underscore character. Space ,Punctuation are not allowed.
Name should be unique within variable scope.
The name can be no longer than 255 character.
No reserve words.
Syntax:
Dim Var_name As Datatype
Example:
Dim X As Integer
Dim S_Name As String
Dim Sname As String * 25
19. Constants
Constants are values which remains unchanged.
Ex.
Const MeterToFeet = 3.3
Public const ProgTitle = ―My Application Name‖
Public const ProgVersion = ―3.1‖
20. User Defined Types
In addition to Built in Types we can also create User
Defined Data Types as follows :-
Ex.
Private Type Point
x As Integer
y As Integer
End Type
USES:
Private Sub Command1_Click()
Dim MyPoint As Point
MyPoint.x = 3
MyPoint.y = 5
End Sub
21. Writing Statements
Statement Type Example
Assign a value to a variable sName= ―Ankit‖
Call a Predefined Function MsgBox (―Good Morning‖)
Call your own function A=fun(―hello‖)
Assign Object Property Command1.visible = True
Make decisions If height > 1000 then MoveOn
22. Using Assignment Statements
Assignments statements are used to assign values to
a variable.
Assignment Statements Type of Expression
S1 = 25 Numeric Literal
Str1 = ―John‖ String literal
AvgScore = TotScore / n Mathematical Expression
Sname = ―Mrs. ― & ― Tina‖ String Expression
Cname = Ucases$(― Chris‖) Return value of function
24. Strings
Strings can be defined as array of characters.
Strings Functions
Ucase and Lcase
InStr and InStrRev
Left and Right
Mid
Ltrim, Rtrim and Trim
Len
Chr and Asc
Str ,CStr and Val
StrReverse
26. Decision Making
Using If Statements:
Syntax:
If <condition> Then command
Example:
If cSal > cMaxSale Then msgbox(―Greater‖)
Syntax:
If condition Then
………
Else
………
End If
Example:
If Deposit > 0 Then
total = total + Deposit
End If
27. Decision Making
Using Multiple If Statements:
Syntax:
If condition Then
………
ElseIf condition Then
………
Else
………..
End If
Example:
If Bsal > 12000 Then
tSal = 2.5 * Bsal
ElseIf Bsal > 10000 Then
tSal = 2* Bsal
Else
tSal = 1.8 * Bsal
End If
28. Decision Making
Select Case Examples
Syntax:
avgNum = total / n
Select Case Round(avgNum)
Case Is = 100
grade = ―EX‖
Case 80 To 99
grade = ―A‖
………
End Select
29. Control Statements
For Loop
Ex:
sum = 0
For i = 1 To 10
sum = sum + i
Next i
Do While Loop
Ex:
sum = 0
i = 1
Do
sum = sum + i
i = i + 1
Loop While i <= 10
32. Built in Functions
These are the functions that are the provided with
the Visual Basic Package. Some Examples are:
Abs(num)
Left(string, n)
Val(Text1.Text)
Combo1.AddItem
Combo1.Clear
Date
33. User Defined Functions
Visual Basic allows to create user defined functions.
User defined functions that are created by the users for
specific operations.
Ex 1:
Public Function Fun()
msgBox(―Hello‖)
End Function
Ex 2:
Public Function AddNum(num1 As Integer, num2 As Integer) As Integer
AddNum = num1 + num2
End Function
34. Procedures
Procedures can be defined in either of two ways.
Public procedures
Private procedure
These two keywords ( Public and Private )
determines which other programs or procedures
have access to your procedures.
Procedures are by default Private.
35. Procedure
Examples:
Sub CalRect(nWidth As Integer, nHeight As Integer, nArea As Integer, nPerimeter As
Integer)
If nWidth <= 0 Or nHeight <= 0 Then
Exit Sub
End If
nArea = nWidth * nHeight
nPerimeter = 2 * ( nWidth + nHeight )
End Sub
36. Visual Basic forms and controls are objects which expose their own properties, methods and
events. Properties can be thought of as an object's attributes, methods as its actions, and
events as its responses.
The common events related to several controls are as follows:-
Change – The user modifies the text in a text box or combo box.
Click- The user clicks an object with the primary mouse button( usually the left button).
Dblclick- The user double-clicks an object with the primary mouse button.
DragDrop- The user drags a control to another location.
DragOver- An object is dragged over a control.
GotFocus – An object receives a focus.
KeyDown- A key is pressed while an object has the focus.
KeyPress- A key is pressed and released while an object has the focus.
KeyUp- A key is released while an object has the focus.
MouseDown- A mouse button is pressed while the mouse pointer is over an object.
MouseMove- A mouse cursor is moved over an object.
MouseUp- A mouse button is released while the mouse pointer is over an object.
Events
38. T H I S P A R T E X P L A I N S W H A T I S A D A T A B A S E
A N D H O W C A N I T B E C O N N E C T E D T O O U R V B
A P P L I C A T I O N .
Database connectivity
39. Database
A database is a structured collection of meaningful information stored over
a period of time in machine-readable form for subsequent retrieval.
Tables(Tuples or relations) are used to represent collections of objects or
events in the real world.
A row in a table represents a record consisting of values relative to an entity
by its attribute field.
A column ,also known as field represents an attribute of the entity.
A primary key is defined as a field or a group of fields which uniquely
defines a single row or record in a table.
40. Ways to connect
DAO(Data Access Objects)
RDO(Remote Data Objects)
ADODC(ActiveX Data Objects Data Control)
41. ADODC
The most recent method of data access that
Microsoft has introduced.
As compared to RDO and DAO ,ADODC provides
several options to access data.
To start using ADODC ,we have to add its control
using the components options in the project menu.
42. How to connect
Create a database using MS Access.
Create a ADODC control in your form.
In the connection string property of the ADODC control
,select the use connection string option and click on build
button.
In the provider list select the Microsoft Jet OLE DB provider.
In the connection tab specify the path of the existing database.
In the record source tab ,in the command type list select
adCmdTable.
Select the table name from the list of tables now available.
Press OK.