Académique Documents
Professionnel Documents
Culture Documents
EXECUTIVE SUMMARY
banks, schools, colleges, etc all make use of database to store huge amount of data.
queries. However, one database queries differ from another, so it becomes difficult to
keep all such queries in mind. lfa user works on multiple databases, it even becomes
cumbersome to learn all the queries even if it has to perform the same sort of work on
each database. Keeping these things in view, Database Independent Wizard &
Services" is an approach towards facilitating easy and smooth functioning on all the
databases.
for working out on data i.c. one can access any table located in any database with
'
much ease. This facility allows user/ organization to handle n number of databases
unauthorized access, login facility has been .provided, so that only authenticated
anyonewho has keen interest in databases must use this service and enjoy the
pleasure of database accessing and management. Also this service provides all
INTRODUCTION
need to handle numerous projects with great efficiency. While managing large
number
ofprojects
theorganization
have upwithmeny
tocope attributing
project
things. The statistical analysis is important as it helps the administrator of the
it in a bettermanner.Database
applicationto administrate Wizard
Independent
Manager provides the easy and simultaneous access to the different types of database.
2.] Introduction
organization, it needs developers to provide a tool that will provide all database
Sybase, db2, sqlscrver, Microsoft access etc. for all the operations. Our objective is to
build software which will help the user to make their work much simpler & easier.
tool'can
This tobrowse
beused database
any such
asOracle, access
etc.
SqlScrver, 50
user does not have to use different tools for different databases. This tool will
internally use JDBC to perform low level DBMS operations on database.It will use
metadata classes of JDBC to retrieve information about database. This tool will
initially ask for connect information such as driver name, DSN, USERID,
PASSWORD etc. and will connect will that database. Once it is connected we can
This project will provide integrationof all the databaseuses in one application
instead of using separate tool for every operation. Some of the featuresas follows:
0 Easy operation
This enterprise manager should be easy to operate and should be such that but this
manager maintains level ol'sccurity \Vhilc usim:Ithis manager we have needed to enter
drivcr name. dsn. It will be operated if only ildatahasc is installed in the system or the
connection establishment with the database should he done by setting the appropriate
path. thncvcr enterprise manager wanted or trying to establish connection with any
database, there is need ol prc installation of any database with the particular drivers in
the system.
0 Reliability
databasetypes and lets programmers quickly and easily build front ends for database
applications.
operation.
0' Butwhileimplementing
onanyLinuxplatform
thereis prerequisites
that
installation ofjclbc and odbc driver on it is required.
0 This project will manage and handle all the enterprise managers functions.
ORDBMS. SQL.
amount of data.
the respecteddatabase.
2.3 Organization of Report
the different components used in it and their necessity. Next chapter is Theory
information about Java, different types of databases like MS Access, Oracle, IBM
The next chapter is system analysis of the project. This explains software
the project. Analysis explains functional flow of the two major applications of
project. The Fourth focus on modules and the implementation of the complete
project using various aids like graphs and snapshots. There are four modules The
last chapter states the conclusion of the project i.e. the aim, objective and future
LITERATURE SURVEY
the organization that you work for and the project work in which you are involved.
Have you ever Worked on a custom application development project that where just
two days before the application is put into production someone higher up in the food
chain decides that your Oracle database must now be a SQL Server database. Does
the database vary from SQL Server. to Oracle. to DBZ. etc from project to project. If
you are one of the lucky souls who answered "no" to the above questions. you can
databases
simultaneously of databases.
withouthavingmuchknowledge
We need to look at the different databases that we need to access with our data
provider. Ideally, we would like to have our object be able to support any and all of
3.2 F unctionality
and database servers. It offers controls for connecting to MySQL and MS Access,
repositories.
The wizard prompts you to enter the administrator password for the server
before going on to main frame. Tables are listed in a tree structure on the left of the
manager window. T he-programhelps you set up and modify tables. SQL queries, and
database users.
simple. DIWM gives you several databaseaccesscontrols which you can simply drop
into a form.
3.3 Features
0 Graphical editing
. Custom data types for the databasethatare mapped into real DBMS data types
Databaseschemabrowsing to see the tables,views, and stored
procedures
defined in a database
SQL and DDL command execution to help you write and execute more
Revision and
history automati;increment
build
'
Tableeditingfacility
Automatic
tablelocalization
formL-llti-language
applications
and more
Chapter 4
RESEARCH METHODOLOGY
This chapter includes the technologies used in our project, i.e. about JAVA,
JDBC, and various methods and features provided by them. Database Independent
Wizard Manager is the application which provides the user friendly environment to
toworksimhltaneously
user databases.
onmultiple So,thischapter the
alsoincludes
overview of databases which are frequently used in many organizations.
4.1 Java
4.1.1 Introduction
features. Success of Java over the Internet is just amazing. Java has made a never
4.1.2 Features
0 Simple and Object Oricntcdz- The programming style of Java is very simple as
management.
o T ry: [t is a block olcodc which possibly can give rise to a runtime error and
association with Hyper Text Markup Language. An HMTL page is used to call the
output of a java program in a web browser. Applet is the actual Internet programming
securedtoo. These can be transportedover the internet from one computer to another
for execution. Java Applets have made a significant impact on the worldwide web.
The most common GUI components used in applet programming are Label,
JavaJang It is the main java language support. It is the root oljava class
hierarchy.
java.awt.event It provideseventhandlingclasses.
java. Applet For internet programming and web support.
on AWT components.
1] Import _iava.awt.cvent package for the event handling support to our program.
is a kindof
2] ImplementtheListenerclasswith theprogramclass.Implementing
Inheritance.
4] Writecodein theappropriate
eventmethod. 13V
ThiscodeistheaCtiOD a takes in
This is used mostly with command buttons to recognizeand react to click event.
0 ItemListener
0 MouseListener
In this listener mouse events are trapped and actions are taken accordingly.
0 MouseMotionListcner
o KeyListener
tabular data sources, such as spreadsheetsor flat tiles. The main feature is that an
Viltual Machine.
1. Create database
name of DSN.
4.3 Databases
4.3.l MS Access
management system from Microsoft that combines the relational Microsoft Jet
Access stores data in its own formal basedon the AccessJet Databaselingine. It can
includes a query interface, forms to display and enter data, and reportsfor printing.
Users can create tables, queries, forms and reports, and connect them together
with macros. Advanced users can use VBA to write rich solutions with advanced data
manipulation and user control. Access also has report creation features that can work
with any data source that Access can "access". The original concept of Access was for
queries and Access tables can be referenced from other programs like VB6 and .NET.
Microsoft Access is a file server-based database. Non-programmers can use the macro
4.3.2 Oracle
stores data logically in the form oftable spacesand physically in the form of data tiles
Table spaces can contain various types of memory segments, such as Data Segments,
Index Segments, etc. Segments in turn comprise one or more extents. Extents
comprise groups olcontiguous data blocks. Data blocks from the basic units of data
database, which allows tables to be partitioned based on diti'erent set of keys. Specific
partitions can then be easily added or dropped to help manage large data sets.
Oracle databases control simultaneous access to data resources with locks .The
Features of Oracle may include Active Session History (ASI-l), the collection of data
for immediate monitoring of very recent database activity, Clusterware, Data Pump
utilities, which aid in importing and exporting data and metadata between databases,
Fast-startparallel rollback etc. The size and content of the PGA dependson the
private SQL-mea, sorting area. The Oracle RDBMS typically relies on a group of
runningsimultaneously
processes to monitorand
in the backgroundand interacting
4.3.3 MySQL
for accessing MySQL databases.T hcsc include MySQL Connector/Net for integration
with Microsoft's Visual Studio (languages such as C# and VB are most commonly
used)and the JDBC driver for Java. In addition,an ODBC interfacecalled MyODBC
URL-based query method also ships with a MySQL adapter, allowing direct
createtable table_name(attribute_name
datatypc,.....);
4.3.4 Sybase
Rather than having a vast central bank oldala stored in a large mainframe computer,
the SYBASli System provided for a client/scrvcr computer. Sybasc introduced the
the various parts ola computer network, enabling users at any point to gain access to
changes being made anywhere on the system Sybase remains committed to its data
You must connect to the Sybase IQ Opcn Server each time you run the client
application. The method for connecting varies depending on the application being
used. For most graphical front ends. you select the Sybase IQ Open Server from a list
of available servers. The application prompts you for the username and password of
1. Ensure that the SQL scripts for creating sample data sources are installed on
install them.
2. Create a Sybase database for each of the four sample data sources. Name the
databases gosales, govendors, gomarket, and gosalesdw .Create a user for each
database and grant each new user access to the corresponding database. with
create table privileges. Name the new users gosalcs.govcndors, gomarkct. and
gosalcsdw.
developed by IBM. lt primarily runs on Unix (namely AIX), Linux, IBM 1 (formerly
08/400). 2108 and Windows servers. DBZ can be administered from either the
product but can be 'more easily scripted and automated. The GUI is a multi-platform
Java client that contains a variety of wizards suitable for hovice users. DB2 supports
both SQL and XQuery. DBZ has native implementation of XML data storage, where
communications area (SQLCA) structure was once used exclusively within a DB2
program to return error information to the application program aher every SQL
statement was executed. The primary, but not singularly useful, error diagnostic is
which means a lock timeout (or deadlock) has occurred. triggering a rollback.
.
4.3.6 PostgreSQLPlus
operators, and indexes. The vast majority of Linux distributions have PostgreSQL
used in ad hoc "DO" blocks. Tables can be set to inherit their characteristics from a
foreign key constraints, column constraints, and row checks Views. Although views
are by default not updatable, they can be made so by creating "insert", "update",
and/or "delete" Query Re-Write Rules on the view. Inner, outer (full, left and right),
connections via SSL , Binary and textual large-object storage , Onlinc backup,
The first test to see whether you can access the database server is to try to create a
separate database is used for each project or for each user. Possibly. your site
administrator has already created a database for your use. He should have told you
what the name of your database is. In that case you can omit this step and skip ahead
T 0 create a new database, in this example named mydb, you use the following
command:
0 $ crcaledb mydb
CREATE DATABASE
If so, this stepwas successful and you can skip over the remainderof this section.
then PostgreSQL was not installed properly. Either it was not installed at all or the
search path was not set correctly. Try calling the command with an absolute path
The path at your site might be different. Contact your site administrator or check
creatcdb: could not connect to database template]: FATAL: user "joe" does not
has not created a PostgreSQl. user account for you. (PostgreSQL user accounts are
distinct from operating system user accounts.) You will need to become the operating
system user under which lostgrcSQL was installed to create the lirst user account. It
could also be that you were assigned a lostgrcSQL user name that is different from
your operating system user name; in that case you need to use the -U switch or set the
user account but it does not have the privileges required to create a database. you will
Not every user has authorization to create new databases.ll lostgreSQL refuses to
create databases for you then the site administrator needs to grant you permission to
PROJECT ANALYSIS
This chapter includes the step in development of software i.e. software design
life cycle and their phases. Thus following the SDLC the system design of our
follows:
developed are captured in this phase. Requirements are set of functionalities and
constraints that the end-user (who will be using the system) expects from the system.
The requirements are gathered from the cnd-user by consultation. these requirements
are analyzed for their validity and the possibility ofincorporating the requirements in
document is created which serves the purpose of guideline for the next phase of the
model.
System & Software Design: Before a starting for actual coding, it is highly important
to understand what we are going to create and what it should look like? The
requirement specifications from first phase are studied in this phase and system design
Implementation & Unit Testing: On receiving system design documents, the work
is divided in modules/units and actual coding is started. The system is first developed
in small programs called units, which are integrated in the next phase. Each unit is
developed and tested for its functionality; this is referred to as Unit Testing. Unit
Integration & System Testing: As specified above, the system is first divided in
units which are developed and tested for their functionalities. These units are
integrated into a complete system during Integration phase and tested to check if all
modules/units coordinate between each other and the system as a whole behaves as
per the spccilications. After successfully testing the software. it is delivered to the
customer.
Operations & Maintenance: This phase ol "The Waterfall Model" is virtually never
ending phase (Very long). (icncrzllly. pmblcms with the system developed (which are
not found during the development life cycle) come up ullcr its practical use starts. so
the issues related lo the system are sulvcd nI'tcr deployment nlthc system. Not all the
problems come in picture directly but they arise time to time and needs to be solved:
System Design consists ofcomplctc How ol'our project with the help of Data
Flow Diagram. System Designof the projectis used to analyzethe working with
different variables and conditions. The DIWM is divided into Four main modules:
betweendifferenttablesanddisplaysappropriateoutput.
3- T able Wizard: Create table directly by accepting column name and other
preliminary data.
ODBCDriver(ANSI)
PosrgreSQL
PostgreSQLPlus
'-_......
Anywhere SQLAnywhere12
Sybase-SQL
Chapter 6
FEASIBILTY STUDY
FEASIBILITY ANALYSIS
system.
feasible, and operationally Feasible. Feasibility study is required to carry out before
requirement analysis.
ECONOMIC FEASIBILITY
Economic analysis is the most licqucntly used method for evaluating the
procedure is to determine the benefits and savings that are expected from a candidate
System and compare them with costs. If benctits outweigh costs, then the decision is
made to design and implement the system. An entrepreneur must accurately weigh the
cost versus benefits before taking an action. Time Based: Contrast to the manual
training is required for employeesto use the tool. Investmentrequiresonly once at the
time of installation. The software used in this project is freeware so the cost of
both the short and long-temi. An economic feasibility study (EFS) should consider
investment and operating costs, the time value of money, risk and uncertainty, quality
should demonstrate the net benefit of the proposed course of action in the context of
direct and indirect benefits and costs to the organization and to the general public as a
whole. An EFS makes a business case. prepares analytical worksheets and other
necessary supporting documentation. An EFS should be required for both pilot and
OPERATIONAL FEASIBILITY
Is a measure ol~ how well a proposed system solves the problems. and takes
advantages of the opportunities identified during scope detinition and how it satisfies
systemare following.
Doesmanagementsupportthe project?
Are the users not happy with current business practices? Will it reduce the
time (operation) considerably? If yes, then they will welcome the change and the new
system.
Have the users been involved in the planning and development of the project?
Early involvement reduces the probability of resistance towards the new system.
SCHEDULE FEASIBILITY
Schedule feasibility is used to display total scheduled time vs. the activities
represent schedule feasibility. Gantt chart displays the activities against the time as a
horizontal bar only whereas PERT chart also displays the interaction among the
'limc overlapping activities can be seen using the Gantt chart whereas which activities
can be completed in a given time period using some methods like payback period.
This involves questions such as how much time is available to build the new
TECHNICAL FEASIBILITY
whether the new system will perform adequately or not this means that feasibility is
are available
Whetherthe requiredresources
testers& debuggers
Manpower- programmers,
S°nwarcandhardware
Once the technical feasibility is established, it is important to consider the
monetary factors also. Since it might happen that developing a particular system may
be technically possible but it may require huge investmentsand benefits may be less.
FUNCTIONAL RE 0 UIREMENTS
User Interfaces:
a bridge between the user and the software. It also makes the user interactionwith the
system easy.
be displayed which allows the user to log in using their id and password.
then the information pertaining to that topic will be displayed in a new window.
which will allow multiple windows to be available on the screen. and the user can
End Message: When there are some exceptions, error messages will be
successfully.
PERFORMANCE REQUIREMENTS
The software will run on a machine with a minimum of lGHz and 16B RAM.
SAFETY REQUIREMENTS
The data handled in this system is very vital. The system should always be
conlinncd to run properly and the data are saved to the database at consecutive
intervals. Power is a significant feature and the power supply should be always taken
day Should the user Icavcl the program running whilst sitting at the machine. and
0 OlIERABlLlI'Y: The system will allow lhc user to operate it with a mouse, unless
0 LEARN ABILITY: The system will be delivered with a user manual which will
detail the use of the system to the user. 'lcam Respectwill also provide a tutorial
a cycleof testing
Byusing andresolutioh thelevelofrisk,
youcanidentify
make informed decisionsand ultimately reduceuncertaintyandeliminate
errors.
Planning, design and QA can reduce the number of defects which enter a
product, but they can't eliminate any that are already there.
And any kind of coding will introduce more errors since it involves changing
often than not (as in the waterfall model) it is simply tacked onto the back end.
If the purpose of testing is to reduce risk. this means piling up risk throughout
But as the lag between development and resolution increasesso does the
development project this lag is far too long. Better to spreaddifferent phases
SOFTWARE QUALITY:
4. Product View: In this case, quality is viewed as tied to the inherent characteristics
ROLE OF TESTING:
software Product. 0n the one hand, we improve the quality of the products as we
releasing a product.
. The software testingis a verificationprocessfor softwarequality
andimprovement.
assessment Generally theactivities
speaking, forsoftware
correctness. It does not involve actual execution of the code under development.
Instead, it examines code and reasons over all possible behaviors that might arise
Programs are executed with both typical and carefully chosen input values.
'
However. for practical considerations. a futile subset ol the input set can be
hcltaviors
andreacha conclusionaboutthequalityof thesystem.
o Careful selectionof a finite testsetis crucialto reachinga reliable
0 Static analysis and dynamic analysis are complementary in nature, and for
andalternated.
bettereffectiveness,bothmustbeperformedrepeatedly
and dynamic analysis and create a hybrid analysis that combines the strengths
ofboth approaches.
0 Verilication: Testers often make the mistake of not keeping their eye on the end
They ensure that the product meets the specilication; the speciticationmeets the
requirements zmd so on. The majority oltcsting tasksare verilication - with the final
expected.
For test
example,
hlans written
arenomially from
the documents
requirements and
from the specification. This verilies that the sonware delivers the requirementsas laid
out in the technical and requirement speciiications. It does not however address the
satisfiesthe requirements established before the start of that phase.One may note
Validation
0 Validation is the use of external sources of reference to ensure that the internal
0 By
using external references (such as the direct involvementof end-users)the test
team can validate design decisions and ensure the project is heading in the correct
direction.
°
Usability testing is a prime example ota useful validation technique.Verification
specification. design, codc and user manual. during a project life cycle to ensuretheir
quality.
' The
quality attributes sought by verilicution activities are consistency,
unittesting.
hamesses which simulate the context into which the unit will be integrated.The test
exist.
0 In integration testing smaller units are integrated into larger units and larger units
into the overall system. This differs from unit testingin thatunitsare no longertested
At this point "stubs" and "drivers" take over from test harnesses. .-\ stub is a
simulation 0le particular suh-unit which can he used to sinmlatc that unit in a larger
assembly. For example if units A. I! and ( constitute the major parts utunit I) then
the overall :Isscmhl y could he tested by assembling units :\ and I3 and a simulation of
integrated into the overall project. Without integration testing you are limited to
prone. Much
ensure that the product respondscorrectly to all possible input conditions and
System testing is often the most formal stageof testing and more structured.
of qualityprior to it being
that the productmeetsminimum dctincdstandards
or UAT). Often UAT tests processesoutside of the software itself to make sure the
0 While other forms of testing can be more free form, the acceptance test phase
should represent a planned series of tests and release procedures to ensure the output
from the production phase reaches the end-user in an Optimal state, as free of defects
as is humanly possible.
0 In theory Acceptance Testing should also be fast and relatively painless. Previous
phases of testing will have eliminated any issues and this should be a formality.
In immature software development, the Acceptance Test becomes a last trap for
outside the software itself. A solution often has many elements outside of the software
itself.
o T hcse are typically not tested in previous phases oltcsting which focus on
functional aspects of the software itself. But the correct delivery of these other
elements is important for the success of the solution as a whole. They are
typically not evaluated until the software is complete because they require a
fully functional piece of software, with its new workflows and new data
requirements, to evaluate.
TESTLEVELS
isperfOrmedatdifferentlevels thecomplete
involving orparts
system of
Tesling
thelife ofa sonareproduct.
itthroughom cycle A software
system through
goes
oftestingbefore
it isactually
deployed.
fourstages
areknown
fourstages
These asunit,integration, level
andacceptance
system,
Thefirstthreelevelsoftesting
testing. areperformed ofdifferent
byanumber
inthedevelopment
stakeholders where
organization, asacceptance is
testing
Thefour
bythecustomers. oftesting
stages been
have inthe
illustrated
performed
V model.
formofwhatiscalledtheclassical
In unit testing, programmers test individual program units, such as a procedures,
'
subsystemsby following integration testing techniques.
testing, security testing, robustness testing, load testing, stability testing, stress
schedule todelivery
close todiscover
date, most andtoverifythat
ofthefaults,
fixes are working and have not resulted in new faults.
Chapter 8
8.1 Results
This cha'pter includes the result of our project with snapshots and a brief
discussion of each output. The complete flow of project through screen shots is
represented here.
" jJ-J;
-
. hat;
.
-115?
' "
"m rir. Mu ink"
inf.
nN"?
.~ gt:
\ . 42:39:}?~.\ mm: Jwr:-:.
1:
3??» W331:2:
a:Vzw
.
. V!
< \K
'g;;§£
.
>-3,142,: -'
lmamqm
3". th '
' ". if)?»
x ~vvyor'q'5p'5 1
a:livhzg";
W
.
ma
.1 - ,
\h *4 \
5!
.0
K v
i3\x
§§3
r
j.
91?:-
,- 39::
'a;.
n
.w
.; :3 Q. 3er}
3
,1;
.A
W:
.\
.-~.' é":{?J-w;r1:2 >
'n& m:
§;\ .M«xfaih y
3:3
4 C
,Wfilzsgém 1 rd
\
\
I
F3 .
LW W@[O I.4.." .VJ. ..
I 1..4. . .e..\...-.-.4_-.-.2.m=
Lemma
and
whichasksfor uscrname
This form is for useraulhcnlizuion purpose
password theDatabase
in orderto access The'08!"
WizardManager-
Independent
form is designedto maintainthesecurityandavoidtheaccessfrom anon)moususers
This is the main window of the project whichcontainfive buttons
namely
Connect, ConnectDSN, Close Connection, Help and Exit _ Clicking on
CreateDSN button. The ODBC Data source administrator dialog box appearsand
Doing this step the DSN is created and we can use the DSN whenever
3 033:DanSam:Ad'rinimatar 3
. _ _ __.. .
|__i a_x:
; MS- '2ng <<....____.'.
Tmimvmma;
: LkaLmSuutes
gm Dim : 44- EE
£5433909m:D
- ~
z a r-v-
~~FM:
.'
[ Eaaaas
'
ace] Slew): AXE: [merm -
; '
] weal Mavi was man») $.33 . s'
1 Mb! .5".5:32 U
ODBCERWEF
l ,
I :5: _ 1 . 'A '
CreateNruCaraSame . 5353
l! _
.
55d .
. .
.
~ 4;
"I ,.. m f _ ;. f
wamiculvd'wwatuwwacaamug
f
3:
I M I, I
i! ha». .' 3
a.
I: lit die
61:96 2de F
aojrmuwreaic
:r ODK'M :etaream: rlomxon
wvsn
Davids XL;law I
or), LN?
m.
,h..kl, Pam
._ _ ,,
II 1 ydmMJHueimLecM'a-eu -34, E
. x
E i
3,
E
§
'3
' i
1
5
' 4'
i
=
I
i
x
" mam
I: _
(137" ; 4531' Elm
m-H
DSN
the whichwehave
created
inearlier with
step specific be
can
driver
Now
on
clickingConnect Then
Option. W1
window
the as
appear
todatabase
connected by
shown in fig 8.3. Connection will establishby providing sameDSN namewhichwe
It will give the error if DSN is not createdearlieror enteredthe wrong DSN
name.
miiLJ .n-Aom
open with seven buttons as shown in flg.8.4. In addition to this query browser (SQL
query) and query result browser will appear and also hierarchy tree will be shown on
left.
lagallows
'lhcquery theuser
Ioperform
appropriate such
opéralionsas
showing tables.inserting.uptlalinganddeletingrecordsby lIring querieslikc select.
select, inscrl etc. in the SQL Query. On liring queries, the result is displayed in the
name and providing constraintsand size. After that table name is provided and the
8.2.1 Benefits:
onlyneed
tochange
theconnection toswitch
parameters data'basc
types.
0 You gain fme grained control over the database. You control the detail oleach
8.2.2 Drawbacks
0 There are some features ol'the underlying database that you cannot access.
0 You need more careful error handling to catch SQL errors. Debugging the
CONCLUSION
9.1 Objective
This enterprise manager should be easy to operate and should be such that but this
manager maintains level of security while using this manager we have needed to enter
driver name, DSN. It will be operated if only if database is installed in the system or
the connection establishment with the database should be done by setting the
9.2 Conclusion
have grown overly complex, dillicult to manage, and are struggling today to take full
automatically tuned and optimized, and highly scalable database services appear
use almost the same code to communicate with a MySQL or MS-Access or IBM DB2
Oracle etc.
computing resources that are affordable and instantly available. Clouds provide
straightforward access to IT resources. You just accessas much resourceas you need,
underlying mechanisms that provide the resources. Life is suddenly a lot simpler and
BIBLIOGRAPHY
Publication,1997
Publication,2010
ToJavaByHerbert
Reference
Complete Schill,Ol-Dec-2006
REFERENCES
x
htt P://s
earchmysql.com/search/srearch?q=javamomemor.html
2018
SeptO4
' '
htt p:
Jan14,2017
//w1k1.lunarpages.com/Setup_MySQL_DaIabases,
www.imdb.com/title/tt0032l38/, Jan 14,2017
l 10|/en/uladmin_enl
l/uliniI-ulcs-mi
IitichIIml.
Jan28,2012
51cx.sybase.com/
F ch 18,2016
www.cnterpriscdb.com/products-services...lpostgrcsql-overview,
www.sybase.com/producIs/databasemanagement. F eh 18.2016
http:.//www.codeprojcct.com/Articlcs/167714/Copy-Database-Wizard-M
Feb18.2016
SQL-ScI'ver-2008-zmd-Iatcr,
htt ://www.zlculcsl.co.uk
WWVVSL c.c0m
\x'ww.inckvmin515.com
www.lcstinginstilulc.c0m
\"l
)illILJLIg.
___._5l__51
5:5)m/('5)III5:IIl/|-'cullII'53/l)I
cncl.
//www.
L_Itlp: v/uuluhlm
mu5.515I/usus/lmg/uN/UmlgllIm
cs.
hu://www.
hu )://ww»\. c 5.5)m/s5Ill5I/In5l5.\.l
33.
lhcIid.ncl/lccl1/35Ill5s5
hll://www.
I/3 5:31
l._|I_lI