Not directly a solution to your question, but another problem you have.
Never build an SQL query by concatenating with user inputs, it is a vulnerability named "SQL injection", it is dangerous for your database and error prone.
A single quote in a name and your program crash. If a user input a name like "Brian O'Conner" can crash your app, it is an SQL injection vulnerability, and the crash is the least of the problems, a malicious user input and it is promoted to SQL commands with all credentials.
SQL injection - Wikipedia[
^]
SQL Injection[
^]
Secondary problem of the way you build the query:
You are given a very precise error message, but since we have no way to know what is your exact query, we can't use the error message.
SqlCeCommand stock_in_command = new SqlCeCommand("INSERT INTO stock_in(name,code,type,category,price,packing,power,quantity)VALUES('" + comboBox1.SelectedText + "','" + comboBox2.SelectedText + "','" + comboBox3.SelectedText + "','" + comboBox4.SelectedText + "','" + textBox1.Text + "','" + textBox2.Text + "','" + textBox3.Text + "','" + textBox4.Text + "',)",stock_in);
But sometimes one can get lucky when the error is so huge. Have a mppl at the end of query and remove the comma.