Project Report
Project Report
Submitted by
BSIT-E-19-29
2019-2023
Supervised by
DEPARTMENT OF INFORMATION
TECHNOLOGY BAHAUDDIN ZAKARIYA
UNIVERSITY MULTAN
i
ii
DEDICATED TO
My Loving Parents and Teachers Who Always
Encouraged Me To Work Hard And Guided Me
Towards Right Destination.
iii
Acknowledgement
It is a great pleasure for us to acknowledge all those who have contributed towards the
conception, origin and nurturing of this project that is on House Rent and Sale.The
way can’t walk itself. We have to walk on it. For that we must have a guide. Many
guides have contributed to the successful completion of the project. We would like to
place on record my grateful thanks to each one of them who help us in this project.
We truly acknowledge the cooperation and help make by Name of Dr. Tauqeer
Safdar, Lecturer of Bahauddin Zakariya University Multan. He has been a constant
source of guidance throughout the course of this project. Our grateful thanks go to our
Dept., which provides us an opportunity as a project subject in 6th Semester to
develop a report work skill in this System analyzing. We would like to thank our
parents & friends for giving us full feedback when we are in trouble. Our special
thanks go to Dr. Tauqeer Safdar. To give their expert guidance to us whenever
necessary.
iv
Final Approval
This is to certify that we have read this report Titled “House for rent and sale”
submitted by Dr. Tauqeer Safdar and it is our judgement that this report is of
sufficient standard to warrant its acceptance by Bahauddin Zakariya University,
Multan for the degree of BSIT (Bachelor Of Science In Information Technology).
External Examiner
Name:
Signature:
Supervisor
Dr. Tauqeer Safdar.
Department of Information
Technology Signature:
Head of Department
Dr. Maruf Pasha Signature:
v
PREFACE
model of process.
vi
ABSTRACT
We are stuck with technology when what we really want is just stuff that
works. With the current paradigm shift in technological field, there is an urgent need
to embrace and appreciate the power of technology. Housing sector remains vigilant
to face the challenges of change by employing a new strategy that facilitates easy
management of rental or selling houses in specific for city. Hence there is need to
develop a house rent and sale webapp that can simplify work for the rental or seller
managers so that all their work can be efficient and effective. Homes Rental and Sale
Hub is based on selling or buying houses in a city. Homes rental and sale hub is
Based on the Owners and the Customers. The Owner is updated the house details.
And the customer will sees the details of house for example: location, rooms, beds
etc. Homes rental and sale hub is used to easily identify the suitable home in save
time, and cost also. Homes rental and sale hub is best way to search the houses in a
city. Hence this system is best applicable for the above reasons making House rental
and sale an easy process through an on-line system
vii
Project Profile
viii
Table of Contents
PREFACE.....................................................................................................................vi
ABSTRACT.................................................................................................................vii
Project Profile.............................................................................................................viii
1. Introduction................................................................................................................1
1.1 Purpose.................................................................................................................1
1.2 Scope....................................................................................................................1
2. Project management...............................................................................................2
2.3 Estimation............................................................................................................9
3.3 Constraints:........................................................................................................11
4. System Analysis.......................................................................................................13
ix
4.6 Functions of System:..........................................................................................16
INTERACTION DIAGRAM:-....................................................................................21
CUSTOMER DISPLAY..........................................................................................27
PRINTOUT DISPENSER........................................................................................27
CASH DISPENSER.................................................................................................27
Prepare Command................................................................................................29
Update Display.....................................................................................................30
Prepare Message...................................................................................................30
Prepare Printout....................................................................................................30
5. Testing..................................................................................................................34
x
6. Limitation and Future Enhancement....................................................................42
Conclusion....................................................................................................................48
Bibliography.................................................................................................................49
xi
1. Introduction
An automated teller machine (ATM) or automatic banking machine (ABM) is
a computerized telecommunications device that provides the clients of a financial
institution with access to financial transactions in a public space without the need for
a cashier, human clerk or bank teller. On most modern ATMs, the customer is
identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart
card with a chip that contains a unique card number and some security information
such as an expiration date or CVVC (CVV). Authentication is provided by the
customer entering a personal identification number (PIN).
1.1 Purpose
Using an ATM, customers can access their bank accounts in order to make cash
withdrawals (or credit card cash advances) and check their account balances as well
as purchase cellphone prepaid credit. If the currency being withdrawn from the ATM
is different from that which the bank account is denominated in (e.g.: Withdrawing
Japanese Yen from a bank account containing US Dollars), the money will be
converted at a wholesale exchange rate. Thus, ATMs often provide the best possible
exchange rate for foreign travelers and are heavily used for this purpose as well.
ATMs are known by various other names including Automated Transaction Machine,
automated banking machine, cashpoint (in Britain),money machine, bank machine,
cash machine, hole-in-the-wall, Banco mat (in various countries in Europe and
Russia), Multibank (after a registered trade mark, in Portugal), and Any Time Money
(in India)
1.2 Scope
The main purpose of the ATM division and information service is to provide
the customers financial flexibility, worldwide acceptance and round-the clock
convenience. Bank issues only VISA Credit Cards, the renowned Credit Card brand.
Cardholders can purchase goods/services up to the credit limit and can reuse the
credit facility upon repayment. Credit Card is a safer substitute to cash and is the
major mode of payment worldwide. Standard Chartered Bank is the first to introduce
the TAKA CREDIT CARD. The card is issued basically to a person’s name and the
specific person can use the card in anywhere in Bangladesh. The business activity of
1
Premier Bank Credit Card section is to keep the records of all sales and customers’
requests, the information of cardholders and reports them to necessary documents.
2. Project management
In this chapter we will discuss about project planning and scheduling. Our
goal is to establish a pragmatic strategy for controlling, tracking, and monitoring a
complex technical project.
In project management following things must be done.
Risk Management
Estimation
In Project planning and scheduling, Planning of the project is done. In scheduling
different task are schedule according to the deadline of the project.
2
2.1.1 Project development approach
The Spiral model is an evolutionary software process model that couples the
iterative nature of prototyping with the controlled and systematic aspects of the
linear sequential model. It provides the potential for rapid development of
incremental versions of the software. Using the spiral model, software is developed
in series of incremental release.
A spiral model is divided into a number of framework activities, also called task
regions. There are between three and six task regions. Figure depicts a spiral model
that contains six task regions:
• Customer communication – tasks required to establish effective communication
between developer and customer.
• Planning – tasks required to define resources, timelines, and other project related
information.
• Risk analysis – tasks required to assess both technical and management risks.
3
• Engineering – tasks required to build one or more representations of the
application.
• Construction and release – tasks required to construct, test, install, and provide
user support.
• Customer evolution – tasks required to obtain customer feedback based on
evolution of the software representations created during the engineering stage and
implemented during the installation stage.
Each of the regions is populated by a set of work tasks, called a task set, that are
adapted to the characteristics of the project to be undertaken. For small projects, the
number of work tasks and their formality is low. For larger, more critical projects,
each task region contains more work tasks that are defined to achieve a higher level
of formality.
In our case, we have to provide medium level of formality for making a goosd
project report. We will take decision about cost, schedule and number of iterations
required to complete the software.
Design
Beginning once software requirements have been analyzed and specified, software
design is the first of three technical activities – design, code generation, and test –
that are required to build and verify the software.
4
Design is multi level process which defines following details:
Data Design
Architecture Design
Interface Design
Component level Design
Development
The design must be translated into a machine-readable form. The coding step
performs this task. In this stage, the developers will actually code the programs. The
specifications arrived at the design stage for each and every function will be
converted to code using tools that are finalized for the implementation of the
Software. At this stage the testing methodology to be adopted will be finalized. For
each program test cases will be prepared and for each of these test cases, test data
will also be prepared. The actual developers will do a first cur checking at this stage
to see that the programs written by them are error free.
Testing
In this stages the test group of the development team, using the cases and the test
data already prepared will test the programs. Only after all the functions are tested
singularly, an integrated testing will be performed to see that inter-function
dependability is satisfied. Separate test cases and test data will be worked out for the
integrated testing.
Acceptance Test
This round of testing will be performed by the test group formed by the users of
MLM software. This test group has to insure that the developed software is working
as per their requirements. If some problems are found then it should be immediately
communicated Development group so that the problem can be looked into and hence
rectified.
Data Creation
For software, data is most important part. Data is information which is handled by
software. So before coding software, all master table data will have to be created.
5
Implementation
Once we examine that the project is feasible, we undertake project planning. The
table below describes how we planned our project.
2 Project Plan
3 Risk Analysis
4 Effort Estimation
6 Feasibility Study
8 Testing
Possibility that the components are not available during the project period.
Possibility that products purchased was not compatible.
6
Possibility that the hardware resources are not available during the project
period.
Possibility that Ethernet connection between robot controller and computer
may not occur, to which we have to make the connection might not available.
Possibility that software inter-compatibility may not be there.
Risk analysis is the important aspect of the project planning, whenever planning the
software, programmer always has to consider the risks of the projects which he
might face in the future during designing the software.
Risks are of two types
• Proactive Risk.
• Reactive Risk.
Risk Impact
Risk Effect
Possibility of getting illness.
Serious.
Component not available. Catastrophic
Possibility of component not effective. Serious.
Possibilities of hardware resources are not Catastrophic
. Available.
7
8
Risk Effect
Possibility that because of some problem we Serious have lost the backup of
days some days
The intent if these steps are to consider risks in a manner that leads to prioritization.
No software team has the resources to address every possible risk with the same
degree of rigor. By prioritizing risks, the team can allocate resources where they will
have the most impact.
9
2.2.3 Risk Planning
After estimating all the risks and risk effects, we will look how to manage this kind of
risks:
With the kind of proactive risks we will prepare the plan for how to manage these
risks, we will think about their options, if their kinds of risks are facing and if they are
reactive risks we have to manage them on the spot to avoid their dangerous effects:
2.3 Estimation
10
with acceptable risk. To achieve reliable cost and effort estimates, a number of
options arise:
Software Sizing
Function point sizing
Standard component sizing
Problem-Based Estimation
LOC and FP data are used in two ways during software project Estimation:-
Quality
Quantify the impact on defect rates of building to deadlines or reducing staff.
Risk
Fine tune risk levels for all the major types of risk: size, requirements, technology,
maintenance, ystems integration, and defects.
11
3. System Requirements Study
3.1 User Characteristics
User A? Administrator
User B? Employee
Anonymous User: Anyone who visits website. And any person applying for the
User D? Client
Client: This is the registered user. Who come to know about his/her project’s progress
3.3 Constraints:
General Constraints
1. This system will not take care of any virus problem that might occur on the
computer with which it is installed. Avoiding the use of pirated/illegal
12
software and ensuring that floppies and other removable media are scanned
for viruses before use could minimize the possibility of viral infection.
2. Recovery of data after a system crash will be possible only if backups are
taken at regular intervals.
3. Manual interfaces cannot be fully avoided. Documented proofs like dates etc.
will have to be verified by the concerned staff before entering it into the
computerized system
Hardware Constraints
The performance of the system will be dependent on the machine conditions.
The primary memory (RAM) and the secondary memory (Hard Disk Space)
requirement of the system will be the same as that required by the normal
application and the operating system. And the space required storing the data. The
space required to store the data would increase as more and more records are added
to the system.
13
4. System Analysis
4.1 Study of Current System
The proposed system provides detail general information about the employee
along with Educational, Certification, Skill and Project details. It enhances the OBS
Management in adding, viewing and updating employees’ details and generates
various reports regarding employee’s skill and experience. Suggestions and
Grievances posted by the employees are upheld for taking care of the necessary
steps in forwarding company’s obligation.
14
No fever of data loss.
Just need a little knowledge to operate the system.
Doesn’t require any extra hardware device.
At last very easy to find the employees.
Once the problem is clearly understood, the next step is to conduct feasibility study,
which is high-level capsule version of the entered systems and design process. The
objective is to determine whether or not the proposed system is feasible. The tOBSee
tests of feasibility have been carried out.
Technical Feasibility
Economic Feasibility Operational Feasibility
TECHNICAL FEASIBILITY
In Technical Feasibility study, one has to test whether the proposed system can be
developed using existing technology or not. It is planned to implement the proposed
system using java technology. It is evident that the necessary hardware and software
are available for development and implementation of the proposed system. Hence,
the solution is technically feasible.
ECONOMICAL FEASIBILITY
As part of this, the costs and benefits associated with the proposed system
compared and the project is economically feasible only if tangible or
intangible benefits outweigh costs. The system development costs will be
significant. So the proposed system is economically feasible.
OPERATIONAL FEASIBILITY
It is a standard that ensures interoperability without stifling competition and
innovation among users, to the benefit of the public both in terms of cost and
service quality. The proposed system is acceptable to users. So the proposed
system is operationally feasible.
15
4.5 Requirements Validation:
There are many requirements from user perspective and taken care while designing a
system, are as follows:
16
4.6 Functions of System:
Use Case:
Place Order
ACTIVITY DIAGRAM:
An Activity Diagram is essentially a flow chart showing flow of control from activity
to activity. They are used to model the dynamic aspects of as system. They can also
be used to model the flow of an object as it moves from state to state at different
points in the flow of control.
Content:
Activity diagrams commonly contain: Fork, Start & End Symbol
17
ACTIVITY DIAGRAM:-
18
CLASS DIAGRAM:-
Verify_pin()
Check_balance()
Cash_withdrawal()
19
Ministatement()
Print_receipt()
Another_transaction()
ATM card related with ATM through many to many relationship.
It does following operations:
Insert_card_into_ATM()
Insert_Pin_code()
Remove_card_after_transaction()
Account holder related with ATM through many to many relationship.
It performs following operations:
Withdrawal()
Transfer()
Balance_inquiry()
ATM is not related with this class, but dependent on this class. So there
is a dependent relationship assigned to them. Bank Manager does
following tasks:
Managing_different_accounts()
Maintaining_sufficient_balance_in_ATM()
Access_to_the_ATM_server()
Here, a class Bank not related to any of the class, but some classes are
dependent on these classes which are shown as dependent
relationship with it.
20
Normally this class performs following operations:
Create Account()
Accessing_Account()
Providing_ATM_card()
21
INTERACTION DIAGRAM:-
22
4.7.4 Data Dictionary:
A Data Dictionary is a Catalogue – a repository of element in a system. As
the name suggest, these elements center around data and the way these are structured
to meet the user requirement and system needs. In Data Dictionary we find list of all
the elements are data flows, data stores, and process. The Data Dictionary stores
details and description of these elements.
If anybody wants to know how many characters are in a data item, by what
other names it is referenced in the system, or where it is used in the system, they
should be able to find the answer in a property developed data dictionary.
The Data Dictionary is developed during data flow analysis and assists the system
development in determining the user requirement.
Importance of Data Dictionary:-
Analysis use data dictionary for five important reasons:
1. ATM ::
23
Branch Code Integer Bank_Manager Code of particular Branch
Name
ATM_Code String
Integer Nameofofparticular
Code Manager ATM
2. ATM_Card :
ATM_server
Account_holder
4. ATM_server ::
24
5. Bank_Manager ::
It contains data of managers who set and manage the server of ATM.
6. Bank ::
Bank
25
diagram defines the system that will be studied in the sense that it determines the
boundaries. Anything that is not inside the process identified in the context diagram
will not be part of the system study.
1. PHYSICAL DFD:
Structured analysis states that the current system should be first understand correctly.
The physical DFD is the model of the current system and is used to ensure that the
current system has been clearly understood. Physical DFDs shows actual devices,
departments, and people etc., involved in the current system.
2. LOGICAL DFD:
Logical DFDs are the model of the proposed system. They clearly should show the
requirements on which the new system should be built. Later during design activity
this is taken as the basis for drawing the system’s structure charts.
Data Flow Diagram(Level-0):-
26
This diagram shows the Automatic Teller System Software and the hardware that it
interacts with. The arrows show the direction and type of data flowing between the
software and each hardware element.
External Entities:-
CONTROL SYSTEM
This system enables and disables the customer interface and receives customer
requests and system reports. A suitable Control System would be a personal computer
linked to a central computer system with access to the Accounts Database. The
customer interface (keypad, display, etc.) is controlled by enabling and disabling the
Card Reader, which is the customer's entry-point to the system. Requests for
statements and chequebooks are posted to the Control System. It also receives status
reports for low printer-paper and cash levels.
27
ACCOUNTS DATABASE
This is a database containing account numbers, balances and other account
information. Data is retrieved from the database when a customer requests a balance
report or a cash withdrawal.
The database is updated after a withdrawal.
CARD READER
The Card Reader receives the customer's card and retrieves the PIN and account
number stored on it. This information is transmitted to the software system which
enables the Customer Keypad and initiates the PIN verification procedure. When
business is completed the Card Reader is instructed to return the card. If the customer
enters an incorrect PIN, a fixed number of retries is permitted, after which the Card
Reader is instructed to confiscate the card.
CUSTOMER KEYPAD
The Customer Keypad allows a customer to enter a PIN number, select options and
enter cash values. The keypad is only enabled when a card is detected in the Card
Reader.
CUSTOMER DISPLAY
The Customer Display presents messages, options and reports to the customer. The
display is active at all times.
PRINTOUT DISPENSER
This provides the customer with a printed balance or receipt. The Printout Dispenser
reports to the system if the paper level is low.
CASH DISPENSER
This assembles and delivers cash to the customer. The dispenser receives information
about the values and quantities of notes to dispense (1 x $20, 2 x $5, etc). The Cash
Dispenser reports to the system if the cash levels are low.
28
Data Flow Diagram(Level-1):-
This diagram shows data entering and leaving the system. Input data is received from
the hardware elements on the left. Various types of data are processed by different
parts of the software system. Output data is sent to the elements of hardware on the
right.
29
DFD Level 1 Processes:-
Interact With Operator
This process deals with commands from the system operator. These are the
commands which enable or disable the customer interface by controlling the Card
Reader. The operator may issue these commands from another computer system or
by using a switch on a control panel.
Prepare Command
This process handles communication with the Card Reader hardware. The system
requires that the Card Reader is able to receive the following commands:
The Card Reader is enabled and disabled by commands from the system operator. A
card is returned or retained in response to interactions with the customer.
30
Update Display
This process deals with the Customer Display screen. When no card is in the Card
Reader, the Customer Display shows general information (such as 'Insert Card').
When a card is detected the display is updated in response to customer interactions. If
the system is disabled by the system operator, the display is updated to indicate the
system status.
The following is a list of screens which are shown on the Customer Display.
Prepare Message
This process prepares and transmits messages to the Control System. These messages
can be requests from customers for statements and chequebooks or reports concerning
the levels of printer-paper and cash.
Prepare Printout
This process prepares and controls the use of the Printout Dispenser to produce
balance reports and receipts. The customer's balance is retrieved from the Accounts
Database (if required). If the printer-paper level becomes low options which involve
printouts are disabled and a warning message is sent to the Control System.
31
Manage Withdrawal
This process receives requests for withdrawals of specific amounts from a certain
account and operates the Cash Dispenser. Before proceeding, the customer's details in
the Accounts Database are checked. If the request exceeds the customer's balance (or
agreed overdraft) the withdrawal is denied. The system uses a denomination selection
algorithm based on the notes available and the amount required. The Accounts
Database is updated after each withdrawal. If the cash level becomes low, options
providing cash withdrawals are disabled and a warning message is sent to the Control
System.
32
update in
database
Else
Show error message
End if
5. Generate reports
If parameter for
report =
valid Then
view the
records
Else
Show
error message
End if
33
4.8.4 Control Flow Diagram:-
34
5. Testing
Any system, to be successful, must be thoroughly tested, and well managed test plan
should be prepared before actual testing is being performed. “Modules” have been
developed and need to be tested in a manner that can reduce occurring of defects as
low as possible. Following are the activities we planned to test the system.
CONTENT TESTING:
35
Content Testing attempt to uncover this and many other problems before the user
encounter them.
When a user interacts with a system, the interaction occurs through one or
more interface mechanisms.
Forms: -
36
At a microscopic level, tests are performed to ensure that
1. Labels correctly identified fields within the form and that mandatory fields
are identified visually for the user.
2. The server receives all information content within the form and their no data
are lost in the transmission between client and server.
3. Appropriate defaults are used when the user does not select from a pull down
menu or set of buttons.
4. Browsing functions don’t corrupt data entered in the form.
5. Scripts that perform error checking on data entered work.
6. Properly and provide meaningful error message. Client side scripting:-
Dynamic XML:-
Here the data transfer between the systems occurs in the form of xml file. The
formatting of the XML file should remain unaltered. Changes in the internal attribute
structure can also lead to an error. Hence for this XML parsing functionalities are
provided on the client side.
37
1. Define a set of usability testing categories and identify goal for each.
2. Design test that will enable each goal to be evaluated.
3. Select participants who will conduct test.
4. Instrument participant’s interaction with system while testing is conducted.
5. Develop a mechanism for assessing the usability of the system.
The following test categories and objective illustrate establish testing:
Layout- Are navigation mechanism, content and function place in a manner that
allows the user to find them quickly?
Aesthetics- Do layout color, typeface, and related characteristics lead to ease of use?
Display Characteristics- Does the system make optimal use of screen size and
resolution?
Time Sensitivity- Can important features, functions and content be used in a timely
manner?
Analyze and check system representation such as the requirement document, design
diagrams and the program source code. They may be applied at all stages of the
process.
38
Unit Testing
Module Testing
Sub-system
Testing
System Testing
Acceptance
Testing
There are different Models of testing. On the basis of testing methods there are two
types of testing:
1. White-box testing.
2. Black-box testing
1). WHITE-BOX TESTING
White-box testing sometimes called glass-box testing, is a test case design method
that users the control structure of the procedural design to drive the test case.
39
We often believe that a logical path is not likely to be executed when in fact it
may be executed on a regular basis. The logical flow of a program times counter
intuitive.
During the programming stages each and every form, modules and class treated unit
has been put into the test data. Every module is tested independently. The steps are
follows:
1. Manually code is tested like spelling checks, logic and errors.
2. Once the manual checking is over the complication has been done. Syntactical
errors if any have to be corrected.
3. After the clean complication the program, some dummy data, as specification,
has been used for testing of the module to see if it works as specified.
Integration Testing
After our individual’s modules were tested out we go the integrated to create a
complete system. This integration process involves building the system and testing
the resultant system for problems that arise from component interaction.
Performance Testing
Performance testing is designed to test the runtime performance of the system within
the context of the system. These tests were performed as module level as well as
system level. Individual modules were tested for required performance.
Condition Testing
Performance testing is a test case design method that exercises the logical conditions.
Interface Testing
Interface sting is integral part of integration. We examined the code to be tested and
explicitly list each call to an external component. In the system standards tests for
GUIs have been performed, which are as follows:
40
The position and related labels for all controls were checked.
Validations for all inputs were done.
Pull down controls was verified for proper functionality.
Whether the non-editable text controls disabling and it was also verified that it
doesn’t exceed the maximum allowed length.
Test Case:-
If the cameras are calibrated in a wrong manner, then the values derived from the
images would be incorrect.
Solution
Solution of this case is that we have to check the values from the .CSV file and see to
that they are within the permissible range or not.
Test Case:-
If the cameras are disconnected from the computer the initialization of the process
will not occur.
Solution:-
Solution of this case is that user has to be aware of all the hardware has been correctly
connected to the system before initialization. User has to keep a checklist of all the
system before initializing the system.
(4)If a proper base is not taught.
41
Test Case:-
If the user teaches an invalid base then there remain chances of the robot to collide
with the surrounding.
Solution
Solution of this case is that user is not aware about the base, and then the user should
execute the robot motion in T1 testing mode.
(5)Communication error between controller and computer.
Test Case:-
If user is unable to connect the computer to the controller, then user would not be able
to pass on the co-ordinate values.
Solution
Solution of this case is that user has to first establish the connectivity by configuring
the ApiConfig file, and check the connecting Ethernet cable. Successful connection
can be known by using the PING command.
42
6. Limitation and Future Enhancement
Limitation:
Although I have tried to add all the related features to this online Bus
Reservation System but there are also some limitation.
This system is stand alone system so data saved during different processes are
stored in the machine in which that process was executed. So there is the
problem of distributed database.
Future Enhancement:
As discussed the limitation of this system, we can implement this as
client/server system. So all the data will be stored in the single machine, and
for any purpose all the data will be retrieved from this central database.
So there will be no human work require for the employee. There will be only
one person required who will maintain this central database.
43
Functionality of ATM Management.
1. Loading Form.
2. Account Form
44
3. Login Form.
4. Home Form.
45
5. Deposit
6. Withdraw.
46
7. Balance.
8. Fast Cash.
47
9. Change Pin.
48
10. Account Table.
11.Transaction Table
Conclusion
Back in 1969, Chemical Bank announced that a new form of banking was being
launched. With that, customers were provided with plastic cards designed with a
magnetic strip that could be used with a machine built into a wall. Gone were the
days of having to stand in line for a teller or not having money on hand after normal
banking hours. Almost everyone has heard of and used an ATM machine.
Interestingly, some of people feel that ATM machines are the best thing to happen in
the banking world while other people consider them a curse. The main complaint
heard about ATM machines is that while they are convenient, they are expensive to
use. However, if we look at it from a banking perspective, business is business.
49
Regardless of what we think of ATM machines, there is no doubt that they have
changed the world and the way in which we do things. For example, think how many
times we have been out somewhere only to discover we have no cash and we are out
of checks, ah, but in the corner, there is an ATM machine. In the blink of an eye, we
swipe the card and now have cash on hand. In addition to pulling money out, the
ATM machine also makes it convenient to deposit money, transfer money, and check
balances. Best of all, to use an ATM machine, we do not have to go to the bank. We
will find ATM machines at other banks, grocery stores, shopping malls, along the
roadside, Buckingham Palace, airports, in casinos, and even on the South Rim of the
Grand Canyon. For this reason, ATM machines are extremely helpful!
50
Bibliography
Book Reference
Fundamentals of Software Engineering
By Rajib Mall
Software Engineering
By Ian Somerville
Analysis and Design of Information
Systems
By James Senn
Website Reference
www.google.com
www.ask.com
www.microsoft.com
www.it.edu.com
51