Internet Banking Java
Internet Banking Java
On
Internet Banking
INTRODUCTION AND OVERVIEW OF
PROJECT
It is the standalone feature. This must be in the menu after clicking the option it
shows the dialog box, after filling the data it gives the resultafter calculating the interest.
REQ 2: It must also calculate the educational loan interest for the running
account. In this the search for the running account and the amount and
field.
REQ 2: entering the amount paid by the customer the entry corresponding to
REQ 3: The installments must not increase from the specified installments.
REQ 1: It includes the list of all due installment customers. And also
include how many Installments.
REQ 2: it also includes that when a new entry is added to the software it
immediately Show the message about new entry.
REQ 3: It also includes the facility of deleting the entry from the due
record for the employee.
3.7 Search, Update, Delete and Report generate features
The system should be highly user friendly so the user interface mut be Graphical
user interface. Every option should in the menus of the GUI.
In the security requirements we require that each user has the authentication for the
usage of the system. Each user has its user name and password for access the system.
There should be different privileges for each type of user. The customer can only see the
information of their account. They have no privilege to change any information in his
account. The employee can’t do any technical change but have the permissions of change
the account information. The administrator have permissions to change the technical
things in the system.
6 Other Requirements
There are some Objectives, which are Envisaged under the Project:-
Practicality: The system should be sable and can be operated with average
intelligence.
Cost: It is desirable to aim for the system with a minimum cost subject to the condition
that it must satisfy the entire requirement.
Flexibility: The system should be modifiable depending on the changing needs of the
employee or department. Such modifications should entail extensive reconstructing. It
should also be portable to different computer systems.
The development of the proposed system is done keeping in view the problems in the
existing system. The proposed system will not only overcome the limitations of the
present system but will also provide the following characteristics.
After firming the requirements of the system, the summary chart or data flow diagram
(DFD) of the proposed system is prepared. This gives the brief of the system with respect
to the inputs being considered, the outputs reports, the data being transformed and the
main processed involved in the system.
STUDY OF EXITING SYSTEM
It was difficult to get the comprehensive information about any user. Moreover it was a
time consuming affair.
It was difficult to solve the problems those were arising during a particular interface to
the administrator to maintain the different user rights for various users.
Moreover there are updates issues concerned with the maintenance of the information
about the users/employees of the organization. It was required to check for the updates
on a regular basis.
This system will also provide information concerned with all users, which will be very
helpful to the users for getting knowledge about any particular user.
Significance Of Project
1. Most current systems have a physical foundation that is the root
cause to quite a number of problems. By maintaining multiple store
fronts, itself being an expensive proposition, store prices are forced
to rise. Thus, by using our product, our clients’ competitors are at a
disadvantage because their costs are significantly higher than our
costs, allowing our clients to sell the same goods at a lower price.
As people become more accustomed to using the internet, they view
ordering products and services online as a time-saving and cost-
saving experience, which is the very essence of our online shopping
system.
2. This project envisages bridging the gap between the seller, the
retailer and the customer. A very high flexibility is being
maintained in the design process so that this project can take the
following path : -
Product Definition:
Problem Recognition:
A problem is well defined very rarely. It corps out with a vague feeling of some
statements that lead to vague conclusions. So the first task is to get more crucial
information by interviewing and meeting concerned people. It clarifies how the problem
is felt, how often it occurs, how it affects the business and which departments are
suffering with this. This phase consists of the following tasks.
This was a preliminary investigation done with a view to have a “feel” of the working of
the proposed system. This phase has been identified the end-user directly involved in the
system who were the managers, assistant officer and database administrator, and the
development department. By understanding the working of database, its flow and also
after conducting meetings and interviews with the concerned persons of the department, a
clear idea about the working was obtained. A flexible approach is adapted towards people
who are interviewed. Short hand written notes are prepared based on the response of the
employees. The interviews are preferably conducted at the work place of the person being
interviewed. Detailed investigation is done in order to define the scope of the problem
.The interview is concluded with a quick resume of the ground covered during the
interview .The Questionnaire technique is combined with interviews to get the best result.
Proper care has been taken in the design of such questionnaires so that the persons
answering these questions dose not feel hesitant. An explanatory note that serves to gain
cooperation and avoid misunderstanding by setting out the purpose of the exercise clearly
accomplishes each questionnaire.
Observation technique is also used for fact finding. The work described at the time of
interview is observed personally ads it reduces the chances of misunderstanding and
omissions. Some important things observed are like the flow of information through the
system and important data transactions, the data being maintained and the frequency of
their updating.
By the end of this phase, idea as to how the information enters the system, how it is
stored, how it is processed, how information changes affects the working of the system
and finally the output format required by the end-user was collected. All the information
generated from this phase acted as an input to the next phase.
Function to be Provided:
This phase provides the overall requirement for the system what is to be done. Input for
this phase is the information collected through several data collecting schemes such as
survey, cross-questioning-answering etc and the raw data obtained which is not properly
ordered and not in the precise manner. So here this raw data is converted into useful
information written in precise manner and thus output is a formal document. After
collecting all the information and requirements, they were verified from the concerned
persons by presenting a diagrammatic version of the proposed system. The points missing
were added to the system specifications for the desired system. So this final document
provides the system requirement specifications for the desired system. It helps in
reducing the total development cost and also establishes the various points for validation
and verification.
User Requirements
Since end users are the ones who are finally going to use the system, their requirements
need to be identified. This involves questioning the end users what their expectations
were. The main requirement of the end user is that the system should be easy to use and
take less time. In addition to these another important factor was to eliminate the need for
database conversion and migration that had to be carried out presently. After conducting
interviews with the users a document called the software requirement specification was
created. This is the most important document that forms the basis for system
development. It should be consistent, complete, unambiguous, traceable and inter-related.
Performance Requirements
This section includes performance of the product that are set by user interaction and
studying the existing system of the organization. These are stated in complete measurable
terms, so that they can be verified during system evaluation phase. Some of the
performance requirements are stated below.
User Friendly: the system produced is user friendly, understandable and easy to use so
that the users of the system can easily learn to use the system. For this the system is made
menu-driven with well-documented programs.
Time Element (response and processing time): the response time of the system is very
less and takes less time to execute queries and triggers.
Maximum Throughput: the system gives maximum throughput with relevant output
Robustness: the system will be able to handle undesirable situations and errors
encountered at various levels e.g. if the user supplies invalid input for processing, the
system gracefully halts, displaying a message to the user indicating the cause of the error
and prompting him it enter the correct input.
Flexibility: the system is flexible in nature so that likely changes and alterations can
easily be made.
Information Security: records in the system must be safe, confidential and must be
prevented from unauthorized access.
Moral and User Satisfaction: system will be able to satisfy the user requirements; this is
the main and conspicuous measure of the system performance. Also the system must raise
the moral of the user. The higher the moral, greater the expected work performance level.
Methodology Adopted:
Prototyping Model has been used for Software Development according o which a
throwaway prototype of the proposed system, based on the currently known requirements
is given to the user so that he has a fair idea about how the proposed system is going o be.
This will help in deciding the interface, I/O requirements. It can be easily adjudged that
I/O are big in number, can increase exponentially and may create a big chaos if not
restricted properly. As the user spends some time on the prototype, he will become more
precise about his own requirements. This prototype will provide him environment
analogous to the proposed system’s environment. Because of object oriented support in
J2EE, various concepts like (reusability, polymorphism, isolation etc) are already there
but for the efficient management of system components, component based software
engineering will also be exercised, which will help in resultant library of components,
benefiting fast development. Because of lack of hierarchical structure in object oriented
approach, there is no meaning of Bottom-up or Top-down testing. Testing will begin from
the most rudimentary levels of the system and will move towards higher level
components which will be based on design face rather than coding face. In little words it
can be aid that “Cluster Testing” will be exercised to scrutinize all the parts and their
associative functionality.
Feasibility Analysis:
1) Economic Feasibility: Economic Analysis is the most frequently used method for
evaluating the effectiveness of a system. Most commonly known as cost/benefit analysis,
the procedure is to determine the benefit and savings that are expected from a system and
compare them with costs. If benefits outweigh costs, then the decision is made to design
and implement the system.
HARDWARE REQUIREMENTS:
PHP
What is PHP?
PHP stands for PHP: Hypertext Preprocessor
PHP is a server-side scripting language, like ASP
PHP scripts are executed on the server
PHP supports many databases (MySQL, Informix, Oracle, Sybase, Solid,
PostgreSQL, Generic ODBC, etc.)
PHP is an open source software
PHP is free to download and use
What is MySQL?
MySQL is a database server
MySQL is ideal for both small and large applications
MySQL supports standard SQL
MySQL compiles on a number of platforms
MySQL is free to download and use
Why PHP?
PHP runs on different platforms (Windows, Linux, Unix, etc.)
PHP is compatible with almost all servers used today (Apache, IIS, etc.)
PHP is FREE to download from the official PHP resource: www.php.net
PHP is easy to learn and runs efficiently on the server side
A PHP scripting block always starts with <?php and ends with ?>. A PHP scripting block
can be placed anywhere in the document.
On servers with shorthand support enabled you can start a scripting block with <? and
end with ?>.
For maximum compatibility, we recommend that you use the standard form (<?php)
rather than the shorthand form.
Comments in PHP
Variables in PHP
Variables are used for storing a values, like text strings, numbers or arrays.
When a variable is declared, it can be used over and over again in your script.
$var_name = value;
In PHP, a variable does not need to be declared before adding a value to it.
In the example above, you see that you do not have to tell PHP which data type the
variable is.
PHP automatically converts the variable to the correct data type, depending on its value.
In a strongly typed programming language, you have to declare (define) the type and
name of the variable before using it.
Conditional Statements
Very often when you write code, you want to perform different actions for different
decisions.
PHP Loops
Often when you write code, you want the same block of code to run over and over again
in a row. Instead of adding several almost equal lines in a script we can use loops to
perform a task like this.
Form Validation
User input should be validated on the browser whenever possible (by client scripts).
Browser validation is faster and reduces the server load.
You should consider server validation if the user input will be inserted into a database. A
good way to validate a form on the server is to post the form to itself, instead of jumping
to a different page. The user will then get the error messages on the same page as the
form. This makes it easier to discover the error.
The built-in $_GET function is used to collect values from a form sent with
method="get".
Information sent from a form with the GET method is visible to everyone (it will be
displayed in the browser's address bar) and has limits on the amount of information to
send (max. 100 characters).
The $_POST Function
The built-in $_POST function is used to collect values from a form sent with
method="post".
Information sent from a form with the POST method is invisible to others and has no
limits on the amount of information to send.However, there is an 8 Mb max size for the
POST method, by default (can be changed by setting the post_max_size in the php.ini
file).
The include() function takes all the content in a specified file and includes it in the
current file.
If an error occurs, the include() function generates a warning, but the script will continue
execution.
PHP Sessions
A PHP session variable is used to store information about, or change settings for a user
session. Session variables hold information about one single user, and are available to all
pages in one application.
When you are working with an application, you open it, do some changes and then you
close it. This is much like a Session. The computer knows who you are. It knows when
you start the application and when you end. But on the internet there is one problem: the
web server does not know who you are and what you do because the HTTP address
doesn't maintain state.
A PHP session solves this problem by allowing you to store user information on the
server for later use (i.e. username, shopping items, etc). However, session information is
temporary and will be deleted after the user has left the website. If you need a permanent
storage you may want to store the data in a database.
Sessions work by creating a unique id (UID) for each visitor and store variables based on
this UID. The UID is either stored in a cookie or is propagated in the URL.
Before you can store user information in your PHP session, you must first start up the
session.
Note: The session_start() function must appear BEFORE the <html> tag:
The correct way to store and retrieve session variables is to use the PHP $_SESSION
variable
$_SESSION['views']=1;
Destroying a Session
If you wish to delete some session data, you can use the unset() or the session_destroy()
function.
<?php
unset($_SESSION['views']);
?>
You can also completely destroy the session by calling the session_destroy() function:
<?php
session_destroy();
?>
MySQL
MySQL is a database.
A table is a collections of related data entries and it consists of columns and rows.
Before you can access data in a database, you must create a connection to the database.
Syntax
mysql_connect(servername,username,password);
JAVASCRIPT
JavaScript is used in millions of Web pages to add functionality, validate forms, detect
browsers, and much more.
What is JavaScript?
JavaScript was designed to add interactivity to HTML pages
JavaScript is a scripting language
A scripting language is a lightweight programming language
JavaScript is usually embedded directly into HTML pages
JavaScript is an interpreted language (means that scripts execute without
preliminary compilation)
Everyone can use JavaScript without purchasing a license
JavaScript Functions
To keep the browser from executing a script when the page loads, you can put your script
into a function.
A function contains code that will be executed by an event or by a call to the function.
You may call a function from anywhere within a page (or even from other pages if the
function is embedded in an external .js file).
Functions can be defined both in the <head> and in the <body> section of a document.
However, to assure that a function is read/loaded by the browser before it is called, it
could be wise to put functions in the <head> section.
Syntax
function functionname(var1,var2,...,varX)
{
some code
}
The return statement is used to specify the value that is returned from the function.
So, functions that are going to return a value must use the return statement.
JavaScript Events
Events
By using JavaScript, we have the ability to create dynamic web pages. Events are actions
that can be detected by JavaScript.
Every element on a web page has certain events which can trigger a JavaScript. For
example, we can use the onClick event of a button element to indicate that a function will
run when a user clicks on the button. We define the events in the HTML tags.
Examples of events:
A mouse click
A web page or an image loading
Mousing over a hot spot on the web page
Selecting an input field in an HTML form
Submitting an HTML form
A keystroke
onSubmit
The onSubmit event is used to validate ALL form fields before submitting it.
Below is an example of how to use the onSubmit event. The checkForm() function will
be called when the user clicks the submit button in the form. If the field values are not
accepted, the submit should be cancelled. The function checkForm() returns either true or
false. If it returns true the form will be submitted, otherwise the submit will be cancelled:
JavaScript can be used to validate data in HTML forms before sending off the content to
a server.
Java Script gives you the ability to perform the following functions:
Control document appearance and contents.
Control the Browser.
Interact with document content.
Interact with user. Java Script gives you the ability to perform the following
functions
Read and write Client state with cookies.
Interact with applets.
Manipulate embedded Images.
In our DFD, we give names to data flows, processes, and data stores. Although the
names are descriptive of the data, they do not give details. So the following the
DFD, our interest is to build some structured place to keep details of the contents
of data flow, processes, and data store. A data dictionary is a structured repository
of data about data. It is a set of rigorous definition of all DFD data element and
data structure
DFD Symbols
DFD Symbols
DATAFLOW DIAGRAMS
1) Data Flow Diagram: Level 0
Member Users
s
Add Post
custo Feedback
mer Logi
Admin Custome
n r
Emails
username
Modify/d &
elete Empl password
Custo. oyee
Reply to
Questions Register
Dep/with
draw
Acce
ploa Website
n Reques
ts
Loans
View
loa-ns
Emp
info
Request
Loan
View Cusotmer
Forums
3) Diagram which shows the working of the Site
Un-Registered
USER Reply
by E-
mail
Post
Query
SITE Post
Solution
s
Registered Users
Administrator
Verifies and
Assigns ID
and Password
4) DATA FLOW DIAGRAM OF E-BANKING SYSTEM
Registe User
red Database
User (storage)
If valid
User
Master
Database)
E-
Banking Admin
Details
Employee
Registered
Requests Users
Loans
Master
Database
BIBLIOGRAPHY
MYSQL