Sie sind auf Seite 1von 20

Introduction

Speedy and efficient information processing is crucial to our socially and highly developed technology. Computer can help the intolerable burden of handling the ever increasing amount or information with government department, public services and business concerns expected to contain because of their ability to analyze information as well as to retain, update and reproduce it because of their versality to present it in a variety of forms. This may also to some extent lead to problems occurring due to information explosion.

About Project
POST O !C" wor#s in every wal# of our life. Through the automation of this system one can easily generate the information about the customer available and also about the old records. or this efficient software the first and the foremost thing is that all the re$uirements should be #nown before hand and the developer should devote its effort for the completion of that re$uirement which are demanded by the customer should be fulfilled. This system can be used in various education departments and can distribute the copies of the system among the management and staff members for the re$uired information of their customer. This very handy pro%ect for any user and includes following features& ' (aving customer information and total amount payable or the help of user it displays each and every detail about re$uired topics )aintains all the old record for later reference (ave provision for automatic update as per the status

Software Development Life Cycle


The Software *evelopment +ife Cycle, as outlined by "dward ,ourdon in his boo# modern structure analysis -./0/1 has been followed in this pro%ect with minor modifications. The modified life cycle is shown overleaf. The life cycle consists of the following activities& ' .. SURVEY - This activity is also #nown as feasibility study. !t begins with a re$uest from the user for a new system. !t involves the following& ' !dentify the responsible user for a new system Clarify the user re$uest !dentify deficiencies in the current system "stablish goals and ob%ectives of new system *etermine the feasibility for new system Prepare the pro%ect charter which will guide about the remainder of the pro%ect 2. SYSTEM ANALYSIS The ob%ective of the system analysis activity is to develop structured system specification for the proposed system. The structured system specification should describe what the proposed system would do3 independent of the technology, which will be used to implement these re$uirements. The structured system specification will be used to implement these re$uirements. The structured system specification will be called the essential model -also #nown as logical model1. The essential model may itself consist of multiple models, modeling different aspect of the system. 4enerally three models used for such purpose are& '

DATA FLOW DIAGRAM (DFD) !t models the functioning of the system.


* * may consist of following .. Context diagram 2. +eveled *ata low *iagram 5. Process specification for "lementary 6ubble 7. *ata dictionary for the flows and stores on the * *

ENTITY RELATIONSHIP DIAGRAM !t models the functioning of the data and their relationship. STATE TRANSITION DIAGRAM !t models the time dependent behavior of the system.

PRLIMINARY DESIGN 8 This activity deals with certain design issues, which are to be finalized in consultation with user. The two most common design issues of relevance to the user are the automation boundary and the human machine interface. The output of the activity is the user implementation model. The ma%or part of the user implementation model is the specification for the user interface of the proposed system. The user implementation model is also referred to as the physical model of the proposed system. The model, in addition to the essential model, defines the following for the proposed system& .. 2. 5. 7. ;. 9utomation boundary :eport layouts +ayouts of the source documents Screen +ayouts for the data entry form )enu

SYSTEM DESIGN System design involves transformation of the user implementation model into software design. The design specifications of the proposed system consist of mainly database schema. IMPLEMENTATION This activity includes programming, testing and integration of modules into a progressively more complete system. ACCEPTANCE TEST GENERATION This activity generates a set of data that can be used to test the new system before accepting it. QUALITY ASSURANCE 9ssurance is also #nown as final testing. This activity re$uires, as its input acceptance test data generated in acceptance test generation and an integrated system produced by implementation.

About the current system


Advanta !" #$ t%! &'((!nt ")"t!*+ The pro%ect P#"t #$$,&! *ana !*!nt ")"t!* is created in 74+ 4<! based system so that it is easy to handle. !t also increases the efficiency of the end user, because it will reduce the reluctant %obs, which are tedious to complete. The P#"t #$$,&! *ana !*!nt ")"t!* also has automated capability to complete %ob.

Advanta !" #$ POST OFFICE MANAGEMENT SYSTEM+ .. This system will improve the performance of the company. 2. !t reduces the tedious %obs li#e reluctant wor#, long procedures, automated report generation, up to date information. 5. !t will improve the Post Office )anagement, since all the information is available whenever re$uired. 7. !t provides $uic# processing thus helps in transaction and updating in master records can be performed in few records. ;. !t provides accurate output. =. !t gives fast answer of $ueries. >. The amount of paper is reduced. 0. 6etter security /. "conomical. .?. 6etter Control.

D!$,&,!n&,!" #$ t%! *an'a- ")"t!*


.. La&. #$ ,**!d,at! (!t(,!va- #$ ,n$#(*at,#n - !n manual system, lot of time is wasted in retrieving information. )uch searching is re$uired before re$uired is found. This wastes a lot of time of the user as well as the person. 2. La&. #$ ,**!d,at! ,n$#(*at,#n "t#(a ! !n manual system, it is difficult to store information at proper place at that very moment. This is because the person is unable to $uic#ly locate the place where the information is to be stored. 5. P(#*/t" '/dat,n n#t /#"",0-! Changes are $uite natural in all wal#s of life. !nformation and stored data also changes from time to time. These changes should be incorporated in the wor#ing also to #eep the information up to date. (owever, bringing about changes through the manual system is a slow and tedious process because of which inaccurate information storage occurs. 7. Un/-ann!d 1#(.,n The manual system lac#s the element of planned wor#ing. :ecords are not properly maintained. This creates a lot of problems at times li#e during information retrieval and storage. ;. A&&'(a&) The manual system lac#s accuracy in wor#ing and a number of operations may be performed incorrectly, the computations that are done in the organization may be incorrect and whatever is generated in the system may be inaccurate. =. R!-,a0,-,t) The reliability of the manual system is considered to be low because of the above given reasons including the fact that @TO error is humanA. 9ny tas# that is performed by men, always contain the ris# of errors. >. R!d'ndan&) #$ ,n$#(*at,#n !n manual system, particular information may be stored at a number of places, lending to redundancy. :edundancy of data or information creates a number of problems storage space is wasted3 changes at one place are to be made at a number of places and so on.

G#a-" #$ t%! /(#/#"!d ")"t!*


.. I**!d,at! (!t(,!va- #$ ,n$#(*at,#n The main ob%ective of the new system is to provide for $uic# and efficient retrieval of information, any type of information would be available to the user whenever he re$uires. acility would be provided for online $uery to cut down on the response time greatly. 2. I**!d,at! "t#(a ! #$ ,n$#(*at,#n !n the proposed system, it will be easy to store information at any given time at the correct places. The location of storage would be easily available and user will face no difficulty. 5. P(#*/t '/dat,n #$ ,n$#(*at,#n !n the proposed system, the information will always remain up to date as the updating will be prompt and without any efforts. This factor will be of great importance in the proposed system as it determines the integrity of the information stored. 7. Fa"t &#*/'tat,#n #$ ,n$#(*at,#n The computation of information will be $uite fast in the proposed system. Bot only mathematical calculations, but also logical comparisons will be $uic# in the new system. ;. P-ann!d a//(#a&% t#1a(d 1#(.,n The wor#ing is the service center information system will be well planned and organized. The data will be stored properly in the data store, which will help in retrieval of information as well as in its storage. =. A&&'(a&) The level of accuracy in the new proposed system would be higher. 9ll operations and computations would be done correctly and this will ensure that whatever information is coming from the center, it is accurate. >. R!-,a0,-,t) The reliability of the proposed system would be high due to the above stated reasons. The reason for the increased reliability of the system is that now there would be proper storage of information, its maintenance would be well managed and retrieval would be possible in the desired manner. 0. N#n-R!d'ndant In$#(*at,#n !n the new system, utmost care be ta#en that no information is repeated, any usage of storage or otherwise. This would assure economic usage of storage or space and consistency in the data stored. This will also help ma#e those changes easily as the change would have to be made only at that very place and no where else.

HARDWARE AND SOFTWARE REQUIREMENTS


To ma#e the application smoothly and can be used to its optimum level following (ardware and Software re$uirements are re$uired& .20 )6 of :9) P"BT!<) !!! processor or e$uivalent or higher versions 9t least ;46 of (ard dis# Cava :un Time "nvironment -C:"1 8 %d#..; -9s ront "nd Tool1 O:9C+" .?g onwards 8 -9s 6ac# "nd Tool1

T##-" and P-at$#(*"


Stay with us on academic presentation on DPOST OFFICE MANAGEMENT SYSTEME. This pro%ect is developed on Cava Platform using the database technology at its core. 9s the images and graphics give more appealing effect to the eyes of the user then the other conventional format, so as to ma#e pro%ect more effective and to ma#e the pro%ect to able to store the information about various entities involved. The pro%ect incorporates the use of software tools li#e& ' 2AVA Lan 'a ! F(#nt End ORACLE 3a&. End The ront end is the software, which manages the logical representation of data, which 6ac# end manages to manipulate and store data.

Int(#d'&t,#n W%at ," 4ava5


Cava is a general'purpose ob%ect oriented programming language. !t is the first programming language that is not tied to any particular hardware or operating system. The language is based on the concept of an ob%ect. Cava is highly derived from CFF. )ost stri#ing feature of the language is that it is platform neutral language. There were five primary goals in the creation of the Cava language& !t should use the ob%ect'oriented programming methodology. !t should allow the same program to be executed on multiple operating systems. !t should contain built'in support for using computer networ#s. !t should be designed to execute code from remote sources securely. !t should be easy to use and borrow the good parts of older ob%ect'oriented languages li#e CF F.

2ava t##-"
!n order to write %ava application or applets, one needs more than a language. The tools that lets one to write, test, debug programs.

2ava $!at'(!"
Compiler and !nterpreted Platform independent

Simple Secure amiliar Portable Ob%ect'Oriented :obust )ultithreaded (igh performance *istributed *ynamic

C#*/,-!( and Int!(/(!t!d - There is a %ava compiler, named %avac. The %ava compiler ta#es input source code files -these files typically have the ext.%ava1 and converts them into compiled bytecode files. The %ava !nterpreter #nown as %avac can be used to execute %ava application .The interpreter translates bytecode directly into program actions. P-at$#(* ,nd!/!nd!nt - Cava programs can be easily moved from one computer to another, anywhere and anytime. Changes and upgrades made in operating systems, processors and system resources will not force any changes in %ava programs. S,*/-! - Cava is designed to be easy for programmer to learn and use efficiently. S!&'(!- Ghen we use a %ava compatible web browser, we can safely download %ava applets without fear of virus infection. Cava achieves this protection by confining a %ava program to %ava execution environment and not allowing it access to other parts of the computer. Fa*,-,a(- !t is modeled on C, CFF languages. Cava code loo#s li#e CFF. P#(ta0-!- Cava compiler generates bytecode instructions that can be implemented on any machine and also the size of the primitive data types are machine independent. O04!&t-O(,!nt!d - Cava is a true ob%ect'oriented language. 9ll program code and data reside within ob%ects and classes. R#0'"t -!t provides many safeguards to ensure reliable code. !t has strict compile time and run time chec#ing for data types. *esigned as a garbage'collected language relieving the programmers and also incorpates the concept of exception handling which captures series errors. )ultithreaded ' Cava supports handling multiple tas#s simultaneously, this greatly improves the interactive performance of graphical applications. H, % /!($#(*an&! - Cava performance is impressive for an interpreted language, mainly due to use of immediate bytecode. <se of multithreaded and further its architecture are also designed to reduce overheads during runtime.

D,"t(,0't!d - !t has ability to share both data and programs. Cava applications can open and access remote ob%ects on !nternet, which enables multiple programmers at multiple remote locations to collaborate and wor# together on single pro%ect. D)na*,& - Cava is capable of dynamically in new class libraries, methods and ob%ects .!t supports functions written in other languages li#e C, CFF called as native methods. A't#*at,& a(0a ! &#--!&t,#n - One idea behind CavaHs automatic memory management model is that programmers should be spared the burden of having to perform manual memory management. !n some languages the programmer allocates memory to create any ob%ect stored on the heap and is responsible for later manually reallocating that memory to delete any such ob%ects. !f a programmer forgets to reallocate memory or writes code that fails to do so in a timely fashion, a memory lea# can occur& the program will consume a potentially arbitrarily large amount of memory. !n addition, if a region of memory is de allocated twice, the program can become unstable and may crash. !n Cava, this potential problem is avoided by automatic garbage collection. The programmer determines when ob%ects are created and the Cava runtime is responsible for managing the ob%ectsH lifecycle. The program or other ob%ects can reference an ob%ect by holding a reference to it -which, from a low'level point of view, is its address on the heap1. Ghen no references to an ob%ect remain, the Cava garbage collector automatically deletes the unreachable ob%ect, freeing memory and preventing a memory lea#. )emory lea#s may still occur if a programmerHs code holds a reference to an ob%ect that is no longer neededIin other words, they can still occur but at higher conceptual levels. Comparing Cava and CFF, it is possible in CFF to implement similar functionality -for example, a memory management model for specific classes can be designed in CFF to improve speed and lower memory fragmentation considerably1, with the possibly cost of extra development time and some application complexity. !n Cava, garbage collection is built in and virtually invisible to the developer. That is, developers may have no notion of when garbage collection will ta#e place as it may not necessarily correlate with any actions being explicitly performed by the code they write. *epending on intended application, this can be beneficial or disadvantageous& the programmer is freed from performing low'level tas#s but at the same time lose the option of writing lower level code.

2ava Ma ,&+ T%! 3)t!&#d!

O04!&t O(,!nt!d P(# (a**,n


Ob%ect Oriented Programming is an approach that provides a way of modularizing programs by creating partitioned memory area for both data and functions that can be used as templates for creating copies of such modules on demand. O04!&t" and C-a""!" - 9n ob%ect is a software bundle of variables and related methods. Ob%ects are #ey to understanding ob%ect'oriented technology. :eal'world ob%ects share two characteristics& They all have state and behavior. Software ob%ects are modeled after real'world ob%ects in that they too have state and behavior. 9 software ob%ect maintains its state in one or more variables. 9 variable is an item of data named by an identifier. 9 software ob%ect implements its behavior with methods. 9 method is a function -subroutine1 associated with an ob%ect. !n the Cava programming language, an ob%ect can specify one of four access levels for each of its variables and methods. 9 class is a blueprint that defines the variables and the methods common to all ob%ects of a certain #ind. 9fter youHve created the class, you can create any number of ob%ects from that class. Ghen you create an instance of a class, the system allocates enough memory for the ob%ect and all its instance variables. "ach instance gets its own copy of all the instance variables defined in the class. Classes can also define class variables. 9 class variable contains information that is shared by all instances of the class .9 class can also declare class methods. ,ou can invo#e a class method directly from the class, whereas you must invo#e instance methods on a particular instance. En&a/"'-at,#n - Grapping of data and methods into a single unit is #nown as encapsulation. !t is the most stri#ing feature of class. The data is not accessible to outside world and only those methods which are wrapped in the class can access it. The insulation of the data from direct access by the program is called data hiding.

In%!(,tan&! - !nheritance is the process by which ob%ects of one class ac$uire the property of ob%ects of another class. "ach subclass inherits state .(owever, subclasses are not limited to the states and behaviors provided to them by their superclass.Subclasses can add variables and methods to the ones they inherit from the superclass. !t supports the concept of hierarchical classification it also provides the use of reusability. P#-)*#(/%,"* - This means the ability to ta#e more than one form. 9n operation may exhibit different behavior in different instances. The behavior depends upon the types of data used in the operation. !t plays an important role in allowing ob%ects having different internal structures to share external interface.

2ava SE - 2ava Data0a"! C#nn!&t,v,t) (2D3C)


The Cava *atabase Connectivity -C*6C1 9P! is the industry standard for database independent connectivity between the Cava programming language and a wide range of databases 8 SJ+ databases and other tabular data sources, such as spreadsheets or flat files. The C*6C 9P! provides a call'level 9P! for SJ+'based database access. C*6C technology allows you to use the Cava programming language to exploit KGrite Once, :un 9nywhereK capabilities for applications that re$uire access to enterprise data. Gith a C*6C technology'enabled driver, you can connect all corporate data even in a heterogeneous environment. The C*6C 9P! is the industry standard for database'independent connectivity between the Cava programming language and a wide range of databases. The C*6C 9P! provides a call'level 9P! for SJ+'based database access. C*6C technology allows you to use the Cava programming language to exploit KGrite Once, :un 9nywhereK capabilities for applications that re$uire access to enterprise data.

2D3C API Ov!(v,!1


The C*6C 9P! ma#es it possible to do three things& "stablish a connection with a database or access any tabular data source Send SJ+ statements Process the results

2D3C A(&%,t!&t'(!
The C*6C 9P! contains two ma%or sets of interfaces& the first is the C*6C 9P! for application writers, and the second is the lower'level C*6C driver 9P! for driver writers. C*6C technology

drivers fit into one of four categories. 9pplications and applets can access databases via the C*6C 9P! using pure Cava C*6C technology'based drivers, as shown in this figure&

Left side, Type 4: Direct-to-Database Pure Java Driver This style of driver converts C*6C calls into the networ# protocol used directly by *6)Ss, allowing a direct call from the client machine to the *6)S server and providing a practical solution for intranet access. Right side, Type 3: Pure Java Driver for Database Middle are This style of driver translates C*6C calls into the middleware vendorHs protocol, which is then translated to a *6)S protocol by a middleware server. The middleware provides connectivity to many different databases. The graphic below illustrates C*6C connectivity using O*6C drivers and existing database client libraries.

Left side, Type !: JD"#-$D"# "ridge plus $D"# Driver This combination provides C*6C access via O*6C drivers. O*6C binary code 8 and in many cases, database client code '' must be loaded on each client machine that uses a C*6C'O*6C 6ridge. Sun provides a C*6C'O*6C 6ridge driver, which is appropriate for experimental use and for situations in which no other driver is available. Right side, Type %: & 'ative &P( partly Java tech'ology-e'abled driver This type of driver converts C*6C calls into calls on the client 9P! for Oracle, Sybase, !nformix, *62, or other *6)S. Bote that, li#e the bridge driver, this style of driver re$uires that some binary code be loaded on each client machine.

Pa(tn!(,n $#( P(# (!""


Sun wor#ed with an array of companies in the industry to create and rapidly establish the C*6C 9P! as the industry'standard, open interface for Cava applications to access databases.

Ind'"t() M#*!nt'*
+eading database, middleware and tool vendors have been building support for C*6C technology into many new products. This ensures that customers can build portable Cava applications while choosing from a wide range of competitive products for the solution best suited to their needs.

Advanta !" #$ 2D3C T!&%n#-# )


Leverage Existing Enterprise Data
Gith C*6C technology, businesses are not loc#ed in any proprietary architecture, and can continue to use their installed databases and access information easily '' even if it is stored on different database management systems.

Simplified Enterprise Development


The combination of the Cava 9P! and the C*6C 9P! ma#es application development easy and economical. C*6C hides the complexity of many data access tas#s, doing most of the Kheavy lifting Dfor the programmer behind the scenes. The C*6C 9P! is simple to learn, easy to deploy, and inexpensive to maintain.

Zero Configuration for Network Computers


Gith the C*6C 9P!, no configuration is re$uired on the client side. Gith a driver written in the Cava programming language, all the information needed to ma#e a connection is completely defined by the C*6C <:+ or by a *ata Source ob%ect registered with a Cava

Baming and *irectory !nterface -CB*!1 naming service. Lero configurations for clients support the networ# computing paradigm and centralize software maintenance.

R!-at,n 2D3C t# OD3C


There is a very close relationship between 9P! and C*6C architecture and -open database connectivity1 O*6C counterparts. The C*6C 8O*6C 6ridge enables you to access databases using O*6C drivers from C*6C. C*6C 8O*6C 6ridge effectively translate the C*6C 9P! calls into the corresponding O*6C calls. O*6C drivers are available for almost all types of databases. C*6C can access almost all databases. 6ecause of their common ancestry they share some important components&' D(,v!( Mana !(+ +oads database drivers and manages the connections between the application and the driver D(,v!(+ Translates 9P! call into operations for a specific data source C#nn!&t,#n+ 9 session between an application and a database Stat!*!nt+ 9 SJ+ statement to perform a $uery or update operation R!"'-tS!t+ +ogical set of columns and rows of data returned by executing a statement SQLE6&!/t,#n+ handles any errors that occur in a database application M!tadata+ !nformation about returned data, database and driver

7!) F!at'(!"

Full Access to Metadata The C*6C 9P! provides metadata access that enables the
development of sophisticated applications that need to understand the underlying facilities and capabilities of a specific database connection.

No !nstallation 9 pure C*6C technology'based driver does not re$uire special


installation3 it is automatically downloaded as part of the applet that ma#es the C*6C calls.

Data"ase Connection !dentified "# $%L C*6C technology exploits the


advantages of !nternet'standard <:+s to identify database connections. The C*6C 9P! includes an even better way to identify and connect to a data source, using a *ataSource ob%ect that ma#es code even more portable and easier to maintain.

!n addition to this important advantage, *ata Source ob%ects can provide connection pooling and distributed transactions, essential for enterprise database computing. This functionality is provided transparently to the programmer.

In&-'d!d ,n t%! 2ava P-at$#(*


9s a core part of the Cava 2 Platform, the C*6C 9P! is available anywhere that the platform is. This means that your applications can truly write database applications once and access data anywhere. The C*6C 9P! is included in the Cava 2 Platform, Standard "dition -C2S"1 and the Cava 2 Platform, "nterprise "dition -C2""1, providing server'side functionality for industrial strength scalability.

SQL-STRUCTURED QUERY LANGUAGE


SJ+ is not a procedural language. !t is not used to define complex processes3 we can use SJ+ to use commands that define and manipulate data. SJ+ is different from other languages. SJ+ is very readable. !n SJ+ we always issue commands. SJ+ statements fall into two groups&'

Data D!$,n,t,#n Lan 'a ! (DDL) **+ statements are used to describe the tables
and the data they contain. The subset of SJ+ statements used for modeling the structure -rather than the contents1 of a database or cube. The **+ gives you the ability to create, modify, and remove databases and database ob%ects.

Data Man,/'-at,#n Lan 'a ! (DML) *)+ statements that are used to operate on
data in the database. These are statements that allow you to create or alter ob%ects -such as tables, indexes, views, and so on1 in the database. The subset of SJ+ statements used to retrieve and manipulate data. *)+ can be further divided into 2 groups&' Select Statements 8 Statements that return a set of results. "verything else 8 Statements that donAt return a set of results.

(ere are some of the $ueries defined&' Select - SJ+ statement used to re$uest a selection, pro%ection, %oin, $uery, and so on, from a SJ+ Server database8

P(,*a() .!) Primary #ey constraints identify the column or set of columns whose values uni$uely identify a row in a table. Bo two rows in a table can have the same primary #ey value. ,ou cannot enter a B<++ value for any column in a primary #ey. In"!(t - The !nsert logical operator inserts each row from its input into the ob%ect specified in the 9rgument column. To insert the data into a relation we either specify a tuple to be inserted or write a $uery. D!-!t! - The *elete logical operator deletes from an ob%ect rows that satisfy the optional predicate in the 9rgument column. Ge can delete only whole tuples3 we cannot delete values on only particular attributes8 U/dat! - The <pdate logical operator updates each row from its input in the ob%ect specified in the 9rgument column. !t provides a way of modifying existing data in a table update statement do not return a result set, they merely modify data in the database.

A0"t(a&t W,nd#1,n T##-.,t


T%! 1,nd#1,n /a&.a !
The 9GT is a very portable windowing library. !t is a standard part of %ava environment and provides all the basic functionality one would expect to use in a modern windowing system .The 9GT defines windows according to a class hierarchy that adds functionality and specificity with each level. The 9GT pac#age allows you to develop window'li#e applications. !t allows your applications to run on different windowing systems. The classes in 9GT pac#age will allow you to&' 4enerate Colors. *raw graphics. 9dd 4<! components li#e push buttons, scrollbars etc to your applications. (andle user input from mouse and #eyboard. Create Containers. Classes li#e +ayout )anagers helps in automatically positioning a 4<! ob%ect when we add it to the container.

SWING
SG!B4 is a set of classes that provides powerful and flexible functionality. !n addition with several components provided by 9GT, swing supplies several exciting additions, including tabbed panes, scroll panes, trees and tables. !t also changes the images as the state of any component changes. Swing is built upon the foundation of the 9GT. Swing components are written entirely in Cava and

therefore are Platform'independent .Swing is also termed also light'weight and provide pluggable loo# and feel. There are 2 Swing classes that are $uite important& 2$(a*! and C#*/#n!nt Cframe extends the 9GT class rame. !t contains additional features that enable it to support Swing components. CComponent extends the 9GT component and Container classes. !t is the top level class for all Swing components and provides Swing pluggable loo# and feel. (ere are some of the Swing component classes& S(8 N#8 . 2 5 7 ; = > 0 / .? C#nt(#- 9 D!"&(,/t,#n C+abel 9 C+abel ob%ect is a component for placing text in a container. C6utton This class creates a labeled button. CChec#6ox 9 CChec#6ox is a graphical component that can be in either an on -true1 or off -false1 state. C:adio6utton The C:adio6utton class is a graphical component that can be in either an on -true1 or off -false1 state. !n a group. C+ist 9 C+ist component presents the user with a scrolling list of text items. CCombox 9 CCombo6ox component presents the user with a to show up menu of choices. CText ield 9 CText ield ob%ect is a text component that allows for the editing of a single line of text. CPassword ield 9 CPassword ield ob%ect is a text component specialized for password entry. CText9rea 9 CText9rea ob%ect is a text component that allows for the editing of a multiple lines of text. !mage!con 9 !mage!con control is an implementation of the !con interface that paints !cons from !mages CScrollbar 9 Scrollbar control represents a scroll bar component in order to enable user to select from range of values. COptionPane COptionPane provides set of standard dialog boxes that prompt users for a value or informs them of something.

..

.2

Das könnte Ihnen auch gefallen