0% found this document useful (0 votes)
35 views78 pages

Talib Report

The document is a project report on a Bank Management System. It was submitted by two students towards their Bachelor of Computer Application degree. The report provides an overview of the project, including the purpose and scope of the proposed system.

Uploaded by

farajahmads8881
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views78 pages

Talib Report

The document is a project report on a Bank Management System. It was submitted by two students towards their Bachelor of Computer Application degree. The report provides an overview of the project, including the purpose and scope of the proposed system.

Uploaded by

farajahmads8881
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 78

A PROJECT REPORT

ON
Bank Management System
Presented and Submitted By

MD TALIB MD MUSA
PRN No. 04421003676

ANSARI IBRHAIM MOHD RASHID


PRN No. 04421003651

Bachelor of Computer Application

Vikas College Study


Center, Vikhroli (East),

Tilak Maharashtra Vidyapeeth, Pune


Faculty of Distance Education
2023-2024
A PROJECT REPORT
ON
Bank Management System

Presented and Submitted By

MD TALIB MD MUSA
PRN No. 04421003676

ANSARI IBRHAIM MOHD RASHID


PRN No. 04421003651

Towards The Partial Fulfilment of the

Bachelor of Computer Application

Vikas College Study


Center, Vikhroli (East),

Tilak Maharashtra Vidyapeeth, Pune


Faculty of Distance Education
2023-2024

Vidya Vikas Education Society’s

VIKAS COLLEGE STUDY CENTRE


Vikas High School Marg, Kannamwar Nagar No.2, Vikhroli (East), Mumbai – 400 083.

Prof. Vikas P.Raut Shri.P.M.RAUT


Study Centre Co-ordinator Chairman, V.V.E. Society

CERTIFICATE
THIS IS TO CERTIFY THAT THE PROJECT

“BANK MANAGEMENT SYSTEM”

HAS BEEN SATISFACTORILY COMPLETED BY


MD TALIB MD MUSA (PRN NO :04421003676) SEAT NO : 2072

ANSARI IBRHAIM MOHD RASHID (PRN NO : 04421003651) SEAT NO : 2041

TOWARD THE PARTIAL FULFILMENT OF THE


“ BACHELOR OF COMPUTER APPLICATION ”,

FOR THE ACADEMIC YEAR [2024-2025] AT VIKAS COLLEGE,VIKHROLI

TILAK MAHARASHTRA VIDYAPEETH, PUNE


(FACULTY OF DISTANCE EDU CATION), AND IT IS APPROVED.
PROJECT GUIDE HEAD OF DEPARTMENT
DEPARTMENT EXAMINER VIKAS RAUT
MS.PRITI PAL

PREFACE

With the rapid globalization of the Indian economy, enterprises are facing with ever
changing competitive environment. Enterprises are adopting strategies aImedat
developing competitive advantage based on enhanced customer value in terms of
product differentiation, quality, speed, service and costs. In the post liberalizationera,
with the deregulation of Indian economy, the financial service sector witnessing a
complete metamorphosis and technology is playing a very signify
cantrole in this record. Over the last decade India has been one of the fastest
adopters of information technology, particularly because of its capability to provide
software solution to organizations around the world. This capability has provided a
tremendous impetuous to the domestic banking industry in India to deploy the latest
in technology, particularly in the Internet banking and e-commerce arenas. Banks are
growing in size by mergers and acquisitions, which have been driven by
communication and technology. Technology is playing a major role in increasing the
efficiency, courtesy and speed of customer service. It is said to be the age of E-
banking .Bank user is expected to perform at least one of the following transactions:

● Sign in
● Sign up
● Forgot Password
● Change Password
● Cash Withdraw
● Cash Deposit
● Balance Enquiry
● Logout
Modules for Admin
● Transaction Report
● All Accounts Report
● Update Account
● Delete Account

From a banks perspective, using the Internet is more efficient than using
otherdistribution mediums because banks are looking for an increased customer
base.Using multiple distribution channels increases effective market coverage by
enablingdifferent products to be targeted at different demographic segments. Also
Bankscannot risk losing customers to competitors within the aggressive competition
inthe banking industry around the world. Moreover bank delivery offers
customizedservice to suit the needs and the likes of each user. Mass customization
happenseffectively through Banking Management System. It reduces cost and
replacestime spent on routine errands with spending time on business errands.Bank
Management System means less staff members, smaller infrastructuredemands,
compared with other banking channels. From the custom
er’s perspective,
Bank Management System provides a convenient and effective way to
managefinances that is easily accessible 24 hours a day, seven days a week. In
additioninformation is up to date. Nevertheless Bank Management System has
disadvantages for banks like how to work the technology, set-up cost, legal issues,
and lack of personal contact with customers. And for customers there are security
and privacyissues.
ACKNOWLEDGEMENT
It is with great satisfaction and achievement that we have completed our MAJOR-
PROJECT of BANK MANAGEMENT SYSTEM. We take this opportunity
toacknowledge each and every one who contributed towards our work.I express my
sincere gratitude towards Prof DR. Rajeev kumar, Head of theDepartment, of DIMS,
for his guidance and support.I take this opportunity to thank our Project-coordinator
and Project Guide Mr.Munish Sharma Professor of Dept DIMS for her suggestions,
valuable support,encouragement and guidance throughout the project.I also convey
my gratitude to all other members in the Project panel and those whohave
contributed to this project directly or indirectly. Vivek Kashyap
Roll no.-169869662BCA-6
The sem
ABSTRACT
This project is aimed at developing Bank Management System for customer.
Thesystem is a windows application that can be accessed throughout the
organizationand outside as well with proper login provided.The project has been
planned to be having the view of distributedarchitecture, with centralized storage of
the database. The application for thestorage of the data has been planned. Using the
constructs of MySQL and all theuser interfaces have been designed using the JAVA.
The database connectivity is
planned using the “Database” methodology. The standards of security and data
protective mechanism have been given a big choice for proper usage.
Theapplication takes care of different modules and their associated reports, which
are produced as per the applicable strategies and standards that are put forwarded
bythe administrative staff.The entire project has been developed keeping in view of
the distributedclient server computing technology, in mind. The specification has
beennormalized up to 3NF to eliminate all the anomalies that may arise due to
thedatabase transaction that are executed by the general users and the
organizationaladministration. The user interfaces are browser specific to give
distributedaccessibility for the overall system. The internal database has been
selected asMySQL. The basic constructs of table spaces, clusters and indexes have
beenexploited to provide higher consistency and reliability for the data storage.
TheMySQL was a choice as it provides the constructs of high-level reliability
andsecurity. The total front end was dominated using the JAVA JDK 1.7. At all
properlevels high care was taken to check that the system manages the data
consistency with proper business rules or validations. The database connectivity was
planned using the latest “Database connection” technology provided by MySQL.
Theauthentication and authorization was crosschecked at all the relevant stages.
Theuser level accessibility has been restricted into two zones namely.
CHAPTER 1
OVERVIEW OF THE PROJECT
INTRODUCTION

Bank Management System means banks provide comprehensive electronic


fundtransfer and payment solutions that enable thousands of Citizens,
FinancialInstitutions and hundreds of businesses the convenience of receiving
andtransferring their funds online.It's fast, easy and puts you in complete control you
decide who to transferfunds, checking of the account details. Receive and pay all
your paper bills at onesite at your bank, credit union.Plus, you can enhance the
convenience of transferring funds by receiving your bills electronically, checking
statuses of accounts and viewing the statements can possible with this system. You
can do this from one secure online location, in just afew minutes.Banking system
provides the greater opportunity to interact with Account holder.But in regular system
there are no more interactions with an account holder ortrustee. Authorities of Bank
Management System can Provides the greaterknowledge on Bank Management
System and they can effectively.This Bank System is windows software designed in
Java programming languagefor the purpose of effective Bank Management System .
It mainly aims at makingthe banking system easily accessible from anywhere and
improving and enhancingthe running banking process. With the use of this
software, bank customers don’t
need to go to bank to make inquiry regarding their balance or to transfer their
balance to other account or for any other banking services.

1.1 PURPOSE OF THE SYSTEM


1. SECURITY:
There is a lot of security of data on this content managementsystem. One cannot
open our system without knowing the password. Immediatelyafter opening login
screen will appear on screen. Only after entering the correctusername and
password user can operate our system.

2. REFERENTIAL INTEGRITY:
User cannot change the date in the transactionfiles. Addition of data can be done
only on the master files date in transaction filescannot be entered until addition is
done on the master files.

3. EASY RETRIEVAL OF DATA:


Data is retrieved easily and quick using sqlcommands. Online commands are used
to retrieve huge amount of data.

4. GENERATION OF AUTOMATIC VALUES:


In project in some screen somefields generated automatically like Profile detail,
Account number, etc.

1.2 SCOPE OF THE PROPOSED SYSTEM

Though there are many online systems available on internet but this can
competewith them with some advancement in its functionality and can be used by
any bankorganization to maintain their customers account and online transaction
process.The basic functionalities of the system are:

Modules For Customer:-


1. Sign up Module:-
Description- New customer can sign up in to the system. New customer shouldenter
personal details and password in the registration form and then click on
“submit” button. A new account will make in the system.

2. Sign in Module:-
Description- Existing customer must have user-id and password to login into
thesystem. Customer should enter user-id and password and click on sign in button
forlogin into the system.

3. Change Password Module:-


Description- Existing customer can change their existing password with new
password through the application by login into the system. Customer should
enteruser-Id and password into the login page and then click on sign in button. Now,
various services appear on screen from which user must click on “ChangePassword”
button. Now, enter the new password and then click on “Set Password”
button for reset the password.

4. Forgot Password Module:-


Description- If existing customer forgot his/her password then, customer canretrieve
their password by simply clicking on “Forgot Password”
.Now, new pagewill appear on screen where he/she can fill user-id and email-id
which is linked tothe account. In this way, we can retrieve their password.

5. Cash Withdraw Module:-


Description- Existing customer can withdraw money from their account throughthe
application by login into the system. Customer should enter user-Id and password
into the login page and then click on sign in button. Now, variousservices will appear
on screen from which user
must click on “Cash Withdraw”
button and then, new window will appear on screen to fill the required details
forwithdrawing money.
6. Cash Deposit Module:-
Description- Existing customer can deposit money in their account through
theapplication by login into the system. Customer should enter user-Id and
passwordinto the login page and then click on sign in button. Now, various services
willappear on screen from which user
must click on “Cash Deposit” bu
tton and then,new page will appear on screen to fill the required details for depositing
money.

7.Balance Enquiry Module:-


Description- Existing customer can see their account balance through theapplication
by login into the system. Customer should enter user-Id and passwordinto the login
page and then click on sign in button. Now, various services will appear on screen
from which user must click on “
Balance Enquiry
” button and
then existing account balance will appear on screen.

8. Logout Module:-
Description- Existing customers can logout from the system by simply clicking
onlogout button which was already login into the system.
Modules For Administrator:-

9. Transactions Report Module:-


Description- Administrator can see transactions report through the application
bylogin into the system. Administrator should enter user-Id and password into
thelogin page and then click on login button. Now, various services will appear on
screen from which admin must click on “Transactions Report” button and
then,transactions history will appear on screen.

10. All Accounts Report Module:-


Description- Administrator can see all accounts report through the application bylogin
into the system. Administrator should enter user-Id and password into thelogin page
and then click on sign in button. Now, various services will appear on screen from
which admin must click on “ All Accounts Report” button and then,report will appear
on screen.

11. Update Account Module:-


Description- Administrator can update accounts details through the application
bylogin into the system. Administrator should enter user-Id and password into
thelogin page and then click on sign in button. Now, various services will appear on
screen from which admin must click on “Update Account” button and then, update
account page will appear on screen.

12. Delete Account Module:-


Description- Administrator can delete any account through the application by
logininto the system. Administrator should enter user-Id and password into the login
page and then click on login button. Now, various services will appear on screen
from which admin must click on “Delete Account” button and then, delete account
page will appear on screen.

1.3 OVERVIEW OF PROPOSED SYSTEM

1. MENU DRIVEN:
The project uses menu throughout which we can chooserequired options. Menus
are self-explanatory, as they are very easy to use and user cango to any other
web page using the menu.

2. USER CONFIRMATION:
Whenever the user tries to delete or edit the data, thesystem asks for the
confirmation. This is used to avoid the accidental changes tothe database. A
confirmation is also provided for the exit of the application.
3. GRAPHICAL USER INTERFACE:
User is provided with a graphical interfacein which user can select from various
options and can perform desired operationswith perfect understanding of the
menu selected.

4. MULTIPLE DOCUMENT INTERFACE:


The package provides a multipledocument interface to the user. The user can
view more than one entry form or pages at the same time.

5. SECURITY AND ACCESS:


A password form has been provided at the beginningof the package. Entering the
correct password will take user to the main user page.

1.4 BUSINESS CONTEXT

Existing banking system is a manual system, which leads to a number of problemsin


maintaining proper records.

These are:
1. PAPER WORK:
All the activities that are performed by Management involve alot of paper work
involving register consultations and entries. A separate file has to be maintained
for each kind of activity and for different periods of time.

2. TIME CONSUMPTION:
A lot of time is consumed in referencing the registersinvolved for particular
activities and a lot of computation as well as reportverification activity is also
paper based and time consuming.

3. COMPLEXITY:
Complexity of information handling and the gathering anddetermination of
information is usually the most difficult problem faced.

4. REDUNDANCY:
Maintaining separate files for each department can lead toduplication of data
present in files. This can lead to:a) Inconsistencies b) Update anomaliesc)
Decentralization problems.

5. HUMAN ERRORS:
Human kind of errors may be generated in typing errors andslow arithmetic
calculations, fatigue and boredom.

6. ILLEGAL ACCESS:
The security of a lot of documents, which are paper, basedif difficult may be in
terms of illegal access or manipulation by malicious personalseither intentionally
or by accident.

Objective

To allow only authorized user (Bank Employee) to access variousfunctions available


in the system.
Open any account wanted by the user.
Reduce clerical work as most of the work done by computer.

Provide greater speed & reduced time consumption.

To increase the number of account and customer.


This will reduced the manual workload and give informationinstantly. The software
will maintain the list of A/C and customerrecord and Transaction record.

The software will be user friendly so that even a beginner canoperate the package
and thus maintain the status of A/C, do thetransaction and maintain balance status
easily.

The Project Banking system has been made to automate theBanking system being
followed by a banking company that deals incurrent account with or without check
facility.
Functionalities provided by Bank

Management System are as follow :

Provides the searching facilities based on various factor such as accountcustomer ,


user-id and email-id.

Bank Management System also manage the balance detail for transactionDetails,
banking detail, accounts.

It tracks all the information of bank, balance, transaction etc Manager the information
of bank.

Show the information and description of the account customer.


To increase efficiency of manage the accounts of bank.

It deals with monitoring the information and transaction of transaction.

Manage the information of transaction.

CHAPTER- 2
System Analysis

SYSTEM ANALYSIS:
System analysis is a process of gathering and interpreting facts, diagnosing
problems and the information about the Bank Management System to recommend
improvements on the system. It is problem solving activity that requires
intensivecommunication between the system users and system developers. System
analysisor study is an important phase of any system developments process. The
system isstudied to the minutest detail and analyzed. The system analyst plays the
role of theinterrogator and dwells deep into the working of the present system. The
system isviewed as a whole and the input to the system are identified. The outputs
from theorganizations are traced to the various processes, system analysis is b
concernedwith becoming aware of the problems , identifying the relevant and
decisionalvariables , analyzing and synthesizing the various factors and determining
anoptimal or at least a satisfactory solution or program of action. A detailed study
ofthe process must be made by various techniques like interview ,questionnairesetc.
the data collected by these sources must be scrutinized to arrive to aconclusion. The
conclusion is an understanding of how the system functions. Thissystem is called the
existing system. Now the existing system is subjected to closestudy and problems
areas are identified. The designers now function as a problemsolver and try to sort
out the difficulties that the enterprise faces. The solutions aregiven as proposals. The
proposal is than weighed with the existing systemanalytically and the best one is
selected. The proposal is presented to the user foran endorsement by the user. The
proposal is reviewed on user request and suitablechanges are made. This is loop
that ends as soon as the user is satisfied with proposal. Preliminary study is the
process of gathering and interpreting facts, usingthe information for further studies
on the system. Preliminary study is problemsolving activity that requires intensive
communication between the system usersand system developers. It does various
feasibility studies. In these studies a roughfigure of the system activities can be
obtained, from which the decision about thestrategies to be followed for effective
system study and analysis can be taken.
Existing system of Bank Management System
Existing system is the traditional banking, where customers have togo through the
long queue
, time wasted and still wouldn’t have access to
efficient and effective banking systemThe developed system is an innovation in the
area of private banking. In theexisting system the no. of staff required for completing
the work is more, while thenew system requires lesser staffs generally.The data
entry process requires the data on the paper, which is then feed into theapplication
by the operator while doing so; the data entry operator has to look intothe paper
again &again and thus the chances of in accuracies in the typed contentsincreases.
Also the process includes higher transportation cost, increased handlingcost, more
time delays, low accuracy, more usage of resources like registers, books, papers,
etc.

● Lack of security of data.


● More man power.

● Time consuming.

● Consumers large volume of pare work.

● Needs manual calculations.

● No direct role for the higher officials.

Proposed system of Bank Management System


The aim of process system is to develop a system of improved facilities. The
proposed system can overcome all the limitations of the existing system. Thesystem
provided security and reduces the manual world. Hence the requirement isto develop
a system that minimizes all these overheads included while giving themaximum
output for the organization.The basis for the project is to develop a fully automated
banking system thatincludes depositing of amount, withdrawal of amount and
exporting the outcome back to the client while considering all the tools and facilities
than a client mayneed for efficient and effective output.

● Security of data.

● Ensure data accuracy`s.


● Proper control of the higher officials.

● Minimize manual data entry.

● Minimum time needed for the various processing.

● Greater efficiency.

● Better service.

● User friendliness and interactive.

Benefits of the system

● quick, authenticated access to accounts via the desktop.

● Easily scalable to grow with changing system requirement.

● Enterprise wide access to information.

● Improved information security, restricting unauthorized access.

● Minimize Storage Space


In manual system, much storage space for data files is required so to overcome this
problem, on automated well managed database is developed for saving
storagespace. This s/w saves space and stores information efficiently. It ends the
burden ofhaving large manual filing storage system.

Banking System can be used extensively

● Withdrawal of amount by the client.

● Deposition of amount by the client.

● Faster balance enquiry

Analysis is also detailed study of the variousoperations performed by the system and
their relationship within andoutside the system

1. Data Dictionary: -
A Data Dictionary is a structure repository ofdata about data. It is a set of rigorous
definitions of all the data flowdiagram, data elements and data structure.There are
three classes of items to be defined:
Data element: smallest unit of data.
Data structure: group of data element handled as a unit.
Data flow and data stores: temporary location of data and permanent location
ofdata.

2.Decision tree:-

A decision tree is a diagram that presents condition andactions sequentially. It is a


method of showing relationship of eachcondition and its permissibleactions.
2. Decision table: -
A decisiontable is a table of contingencies for defining a problem and actions to
be taken single representation of the relationship between conditions and actions

3. Decision table: -
A decision table is a table of contingencies fordefining a problem and actions to
be taken single representation of therelationship between conditions and actions.
Following are some rules, which define the construction of data A dictionary entries:
Words should be define to understand for what they need and not thevariable need
by which the may be described in the program.
Each word must be unique .we cannot have two or more definition of thesame client.

FEASIBILITY ANALYSIS
Feasibility is the determination of whether or not a project is worthdoing. The
processes is followed in making this determination is called afeasibility study.
Feasibility study is the test of system proposal according to its work ability, Impact on
the organization ability to meet
user’s needs, and effective use of resources. The result of feasibility study is a formal
proposal. This is simplya report a formal document detailing the nature and scope of
the proposedsolution. The main objective of a feasibility study is to test thetechnical,
social and economic feasibility of developing a computersystem. This is done by
investigation the existing system in the areaunder investigation and generating ideas
about a new system. On studying thefeasibility of the system, three major
considerations are dealt with, to find whetherthe automation of the system is feasible.

Main task done during the feasibility study are:-


1. Evaluation of existing system and procedures. Our group went tovarious
Banking Professionals together information about thesoftware system. They
are using and evaluating those system and the proceduresinvoked in it during
the period of feasibility study.
2. Analysis of alternative candidate systems after studying thevarious systems we
derived various alternatives through which we develop our project and
evaluated the alternative. The most appropriate is selected.

Three aspects in which the system has to be feasible are:-

ECONOMICAL FEASIBILITY
The economical analysis checks for the high investment incurred on the system.
Itevaluates development &
implementing charges for the proposed “BankingProject”. The S/W used for the
development is easily available at minimal cost
&the database applied is freely available hence it results in low cost implementation.
The only tangible benefit provided by the proposed system is that the paper work is
reduced to the minimum and hence the reduction in cost incurred on Stationary and
its storage. The system provides many benefits that can’t be measured in terms of
Money for e.g. user’s friendliness, more user response being more efficient.

TECHNICAL FEASIBILITY:
This aspect concentrates on the concept of using Computer Meaning,
“Mechanization” of human works. Thus the automated solution leads to the need
for a technical feasibility study.The focus on the platform used database
management &users for that S/W.The
proposed system doesn’t require an in depth technical knowledge as the
system development is simple and easy to understand. The result obtain should
betrue in the real time conditions.

Minimum requirement for execution of the project is a java supporting operating


system since the connection to the databasewill be made using JSP and
SERVLETS, minimum of 64 MB of RAM, a databasesoftware, a server and a web
browser with which we were previously equipped.

Operational feasibility:

Now almost all Banks branches are connected through the Bank
ManagementSystem facilities. The transactions of a particular bank are transmitted
through theMicro-Bank software from INFLEX Solutions to the Head Office, where
everydata is stored in the database .Real-time On-line any branch banking for the
clientsis used to facilitate the clients to deposit /draw or remit funds to and from
theiraccounts, from one bank to another. Meanwhile, for the Smooth operation and
efficientfunctioning of the system they have completed the proper training to the
related personnel
CHAPTER- 3
Software Requirement&
Specification
Software requirement specification:
The software requirements specification is a produced at the culmination of thea
task. The function and performance allocated to software as a part of
systemengineering are refined by establishing a complete information description ,
adetailed functional and behavioral ,an indication of performance requirements
anddesign constraints, appropriate validation criteria and other data pertinent
torequirements.The proposed system has the following requirements:

System needs store information about new entry of accounts.

System needs to help the internal staff to keep information of bank and findthem as
per various queries.

System need to maintain quantity record.

System need to keep the record of customer.

System need to update and delete the record.

System also needs a search area.

It also needs a security to prevent data.The reason behind it is that there is lot of
information to be maintained and haveto be kept in mind while running the business
.for this reason we have providedfeatures present stem is partially
automated(computerized) , actually existingsystem is quite; abprious as one has to
enter same information at three different places.Following points should be well
considered:
Documents and reports that must be provided by the new system, therecan also be
few report , which can help management in decision makingand cost controlling, but
since these report do not get required attention,

such kind of reports and information were also identified and givenrequired attention.

Details of the information needed for each document and report.

The required frequency and distribution for each document and report.

With the implementation of computerized system, the task of keepingrecords in an


organized manner will be solved. The greatest of all is theretrieval of information
which will be at the click of the mouse.
Software Required:
The project is implemented in Core Java as it provides the implementation of awt
package
that are used to connect distinct applications, hence the software’s
required in the creation and execution of the project are JAVA JDK 1.7 .As weknow
JAVA is a platform independent language so this software runs with JREenvironment
on any desired platform i.e. Linux ,windows 9x, XP, or 2000 or anyoperating system.

Hardware Required:
As the project involve database, its hardware requirements are minimal. AnySystem
with Pentium P2 or above processor, 32MB RAM, 1GB Hard Disk, a LANCard, and a
CDROM is sufficient. Its network based software so computersconnected with any
kind of mode (wireless, LAN connected etc) will suit itsrequirements. . . . It can also
be run on a single machine for its demo use.Best suited in laboratory where we can
run its server on any machine and manyclients can use it simultaneously.

Technologies and Requirements

● Front End: JAVA JDK 1.7


● Programming Language: JAVA
● Back End: MySQL

Non-functional Requirements

Secure access of require data.

24X7 availability

user friendly

Intelligent user interfaces


Chapter - 4
IntroductiontoTool /
Language
JAVA:-
Platform independent:
The concept of Write-once-run-anywhere (known asthe Platform independent) is one
of the important key feature of java language thatmakes java as the most powerful
language. Not even a single language is idle tothis feature but java is closer to this
feature. The programs written on one platformcan run on any platform provided the
platform must have the JVM.

Simple:
There are various features that make the java as a simple language.Programs are
easy to write and debug because java does not use the pointersexplicitly. It is much
harder to write the java programs that can crash the system but we cannot say about
the other programming languages. Java provides the bugfree system due to the
strong memory management. It also has the automaticmemory allocation and de-
allocation system.

Object Oriented:
To be an Object Oriented language, any language mustfollow at least the four
characteristics.

Inheritance:
It is the process of creating the new classes and using the behavior of the existing
classes by extending them just to reuse the existingcode and adding the additional
features as needed.

Encapsulation:
It is the mechanism of combining the information and providing the abstraction.
Polymorphism:
As the name suggest one name multiple form,Polymorphism is the way of providing
the different functionality bythe functions having the same name based on the
signatures of the methods.

Dynamic binding:
Sometimes we don't have the knowledge of objectsabout their specific types while
writing our code. It is the way of providingthe maximum functionality to a program
about the specific type atruntime.As the languages like Objective C, C++ fulfills the
above four characteristics yetthey are not fully object oriented languages because
they are structured as well asobject oriented languages. But in case of java, it is a
fully Object Orientedlanguage because object is at the outer most level of data
structure in java. Nostand alone methods, constants, and variables are there in java.
Everything in javais object even the primitive data types can also be converted into
object by usingthe wrapper class.

Robust:
Java has the strong memory allocation and automatic garbage collectionmechanism.
It provides the powerful exception handling and type checkingmechanism as
compare to other programming languages. Compiler checks the program whether
there any error and interpreter checks any run time error andmakes the system
secure from crash. All of the above features makes the javalanguage robust.

Distributed:
The widely used protocols like HTTP and FTP are developed in java. Internet
programmers can call functions on these protocols and can get accessthe files from
any remote machine on the internet rather than writing codes on theirlocal system.

Portable:
The feature Write-once-run-anywhere makes the java language portable provided
that the system must have interpreter for the JVM. Java alsohave the standard data
size irrespective of operating system or the processor. Thesefeatures make the java
as a portable language.

Dynamic:
While executing the java program the user can get the required filesdynamically from
a local drive or from a computer thousands of miles away fromthe user just by
connecting with the Internet.

Secure:
Java does not use memory pointers explicitly. All the programs in javaare run under
an area known as the sand box. Security manager determines theaccessibility
options of a class like reading and writing a file to the local disk. Javauses the public
key encryption system to allow the java applications to transmitover the internet in
the secure encrypted form. The byte code Verifier checks theclasses after loading.

Performance:
Java uses native code usage, and lightweight processcalled threads. In the
beginning interpretation of byte code resulted the performance slow but the advance
version of JVM uses the adaptive and just intime compilation technique that
improves the performance.

Multithreaded:
Java is also a multithreaded programming language.Multithreading means a single
program having different threads executingindependently at the same time. Multiple
threads execute instructions according tothe program code in a process or a
program. Multithreading works the similar wayas multiple processes run on one
computer.Multithreading programming is a very interesting concept in Java. In
multithreaded programs not even a single thread disturbs the execution of other
thread. Threads

are obtained from the pool of available ready to run threads and they run on
thesystem CPUs. This is how Multithreading works in Java which you will soon
cometo know in details in later chapters.
Interpreted:
We all know that Java is an interpreted language as well. With aninterpreted
language such as Java, programs run directly from the source code.The interpreter
program reads the source code and translates it on the fly intocomputations. Thus,
Java as an interpreted language depends on an interpreter program.The versatility of
being

platform independent:
makes Java to outshine from otherlanguages. The source code to be written and
distributed is platform independent.Another advantage of Java as an interpreted
language is its error debuggingquality. Due to this any error occurring in the program
gets traced. This is how it isdifferent to work with Java.

Architecture Neutral:
The term architectural neutral seems to be weird, butyes Java is an architectural
neutral language as well. The growing popularity ofnetworks makes developers think
distributed. In the world of network it is essentialthat the applications must be able to
migrate easily to different computer systems. Not only to computer systems but to a
wide variety of hardware architecture andoperating system architectures as well. The
Java compiler does this by generating byte code instructions, to be easily interpreted
on any machine and to be easilytranslated into native machine code on the fly.

The compiler generates anarchitecture-neutral object file format to enable a Java


application to executeanywhere on the network and then the compiled code is
executed on many processors, given the presence of the Java runtime system.

Hence Java wasdesigned to support applications on network. This feature of Java


has thrived the programming language.

JDK:-
The Java Development Kit (JDK) is aSun Microsystems product aimed
atJavadevelopers. Since the introduction of Java, it has been by far the most widely
usedJava SDK. On 17 November 2006, Sun announced that it would be released
undertheGNU General Public License(GPL), thus making itfree software.
Thishappened in large part on 8 May 2007
and the source code was contributed to theOpen JDK. The primary components of
the JDK are a selection of programming tools,including:

Java–
Theloaderfor Java applications. This tool is an interpreter and caninterpret the class
files generated by the javaccompiler. Now a singlelauncher is used for both
development and deployment. The old deploymentlauncher, jre, is no longer
provided with Sun JDK.

javac –
The compiler, which converts source code into Java bytecode

Jar –
The archiver, which packages related classlibrariesinto a single JARfile. This tool
also helps manage JAR files.

javadoc –
The documentation generator, which automatically generatesdocumentation from
source codecomments

jdb –
The debugger

javap –
The class file disassembler

Appletviewer –
This tool can be used to run and debug Java applets withouta web browser.

javah –
The C header and stub generator, used to write native methods

Extcheck –
This utility can detect JAR-file conflicts.

apt–
The annotation processing tool

jhat –
(Experimental) Java heap analysis tool

Jstack –
(Experimental) This utility prints Java stack traces of Java threads.

jstat –
(Experimental) Java Virtual Machinestatistics monitoring tool

jstatd –
(Experimental) jstat daemon

Jinfo –
(Experimental) This utility gets configuration information from arunning Java process
or crash dump.

jmap –
(Experimental) This utility outputs the memory map for Java and can print shared
object memory maps or heap memory details of a given processor core dump.

idlj–
The IDL-to-Java compiler. This utility generates Java bindings from agiven IDL file.

policy tool –
The policy creation and management tool, which can determine policy for a Java
runtime, specifying which permissions are available forcode from various sources

VisualVM –
visual tool integrating several command line JDK tools andlightweight performance
and memory profiling capabilities.
The JDK also comes with a completeJava Runtime Environment, usually called a
private
runtime. It consists of a Java Virtual Machineand all of the class librariesthat will be
present in the production environment, as well as additional librariesonly useful to
developers, such as theinternationalizationlibraries and theIDLlibraries.Also included
is a wide selection of example programs demonstrating the use ofalmost all portions
of the Java API.

INTRODUCTION TO BACK END TOOL:


Introduction to SQL: -
• SQL is a standard language for accessing and manipulating databases.
•SQL stands for Structured Query language.
• SQL allows you to access a database.
• SQL is an ANSI standard computer language.
• SQL can execute queries against a database.
• SQL can retrieve data from a database.
• SQL can insert new records in a database.
• SQL can delete records from a database.
• SQL can update records in a database.
• SQL is easy to learn.

SQL is an ANSI (American National Standards Institute) standard foraccessing and


manipulating database systems. SQL statements are usedto retrieve and update
data in a database. SQL works with database programs like MS Access, DB2,
Informix, MS SQL Server, Oracle,Sybase, etc.
CHAPTER-5
System Design

5.1 INTRODUCTION:
Software design sits at the technical kernel of the software engineering process
andis applied regardless of the development paradigm and area of application.
Designis the first step in the development phase for any engineered product or
system.
The designer’s goal is to produce a model or representation of an entity that will
later be built. Beginning, once system requirement have been specified andanalyzed,
system design is the first of the three technical activities -design, codeand test that is
required to build and verify software.
The importance can be stated with a single word “Quality”. Design is the place
where quality is fostered in software development. Design provides us
withrepresentations of software that can assess for quality. Design is the only way
that
we can accurately translate a customer’s view into a finished software product or
system. Software design serves as a foundation for all the software engineeringsteps
that follow. Without a strong design we risk building an unstable system
– one that will be difficult to test, one whose quality cannot be assessed until the
laststage.During design, progressive refinement of data structure, program structure,
and procedural details are developed reviewed and documented. System design can
beviewed from either technical or project management perspective. From
thetechnical point of view, design is comprised of four activities
– architecturaldesign, data structure design, interface design and procedural
design.

Data base design:


Database Design is a collection of processes that facilitate the
designing,development, implementation and maintenance of enterprise data
managementsystems. It helps produce database systems.1.

That meet the requirements of the users2.

Have high performance.The main objectives of database designing are to produce


logical and physicaldesigns models of the proposed database system.The logical
model concentrates on the data requirements and the data to be storedindependent
of physical considerations. It does not concern itself with how the datawill be stored
or where it will be stored physically.The physical data design model involves
translating the logical design of thedatabase onto physical media using hardware
resources and software systems suchas database management systems
(DBMS).For developing an efficient data base, we will have to full fill certain
conditionsuch as:
*Control Redundancy.
*Ease of use.
*Accuracy and integrity.
*Avoiding inordinate delays.
*Recovery from failure.
*Privacy and security.
*Performance.
There are 6 major steps in design process. The first 5 steps are usually done on
paper and finally the design is implemented.

*Identify the tables and relationship.


*Identify the data that is needed for each table and relationship.
*Resolve the relationship.
*Verify the design.
*Implement the design.

NORMALIZATION:
Normalization is a technique that is more applicable to record based data
models.Each of the process can be carried out independently to arrive at normalized
tables. Normalization refines the data structure and data are group in simple way as
possible.So later changes can be bring about the least impact on database structure
andeliminates data redundancy.

DATA INTEGRITY

Data integrity refers to the procedure that ensures correctness of the data entered
inthe database. Functions have been provided in the software, which check
datawhile being entered. Integrity problems are occurred due to hardware or
softwaremalfunctions such as power failure and disk crashes.Side effect from the
program development may also be the reason.
DATA CONSISTENCY

Problem with data consistency occur when adding records without first checkingfor
records with same key or deleting records without deleting other related
records. Likewise the software is coded such that primary keys can’t be duplicated.
For developing an efficient database, we have to fulfill certain conditions such as :

*Control redundancy.
*Ease of use .
*Data independence.
*Privacy and security.

Performance for achieving the above criteria’s we have to make use of various
features that are available with DBMS such as:
*Enforcing integrity constraints to ensure data integrity and to reduce
datainconsistency.
*Recovery from failures using backup facility

5.2 NORMALIZATION:
It is a process of converting a relation to a standard form. The process is used
tohandle the problems that can arise due to data redundancy i.e. repetition of datain
the database, maintain data integrity as well as handling problems that canarise due
to insertion, updation, deletion anomalies.
Decomposing is the process of splitting relations into multiple relations toeliminate
anomalies and maintain anomalies and maintain data integrity. To dothis we use
normal forms or rules for structuring relation.

Insertion anomaly: Inability to add data to the database due to absence of otherdata.

Deletion anomaly: Unintended loss of data due to deletion of other data.

Update anomaly: Data inconsistency resulting from data redundancy and


partialupdate

Normal Forms: These are the rules for structuring relations that eliminateanomalies.

FIRST NORMAL FORM:


A relation is said to be in first normal form if the values in the relation are atomicfor
every attribute in the relation. By this we mean simply that no attribute valuecan be a
set of values or, as it is sometimes expressed, a repeating group.

SECOND NORMAL FORM:


A relation is said to be in second Normal form is it is in first normal form and itshould
satisfy any one of the following rules.
1) Primary key is a not a composite primary key
2) No non key attributes are present
3)Every non key attribute is fully functionally dependent on full set of primarykey.

THIRD NORMAL FORM:


A relation is said to be in third normal form if their exits no transitivedependencies.
Transitive Dependency: If two non key attributes depend on each other as wellas on
the primary key then they are said to be transitively dependent.
The above normalization principles were applied to decompose the data inmultiple
tables thereby making the data to be maintained in a consistent state.
5.3 DATA FLOW DIAGRAMS:
A data flow diagram is graphical tool used to describe and analyze movement ofdata
through a system. These are the central tool and the basis from which theother
components are developed. The transformation of data from input to output,through
processed, may be described logically and independently of physicalcomponents
associated with the system. These are known as the logical data flowdiagrams. The
physical data flow diagrams show the actual implements andmovement of data
between people, departments and workstations. A fulldescription of a system actually
consists of a set of data flow diagrams. Using twofamiliar notations Yourdon, Gane
and Sarson notation develops the data flowdiagrams. Each component in a DFD is
labeled with a descriptive name. Process isfurther identified with a number that will
be used for identification purpose. The
development of DFD’S is done in several levels. Each process
in lower leveldiagrams can be broken down into a more detailed DFD in the next
level. The lop-level diagram is often called context diagram. It consists a single
process bit, which plays vital role in studying the current system.
The process in the context leveldiagram is exploded into other process at the first
level DFD.The idea behind the explosion of a process into more process is that
understandingat one level of detail is exploded into greater detail at the next level.
This is doneuntil further explosion is necessary and an adequate amount of detail is
describedfor analyst to understand the process.Larry Constantine first developed the
DFD as a way of expressing systemrequirements in a graphical from, this lead to the
modular design.

A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs
insystem design. So it is the starting point of the design to the lowest level of detail.A
DFD consists of a series of bubbles joined by data flows in the system.

DFD SYMBOLS:

In the DFD, there are four symbols


1. A square defines a source(originator) or destination of system data
2. An arrow identifies data flow. It is the pipeline through which the informationflows
3. A circle or a bubble represents a process that transforms incoming data flowinto
outgoing data flows.
4. An open rectangle is a data store, data at rest or a temporary repository of
dataProcess that transforms data flow.Source or Destination of dataData flowData
Store
CONSTRUCTING A DFD:
Several rules of thumb are used in drawing DFD’S:
1. Process should be named and numbered for an easy reference. Each
nameshould be representative of the process.
2. The direction of flow is from top to bottom and from left to right. Datatraditionally
flow from source to the destination although they may flow back tothe source. One
way to indicate this is to draw long flow line back to a source.An alternative way is to
repeat the source symbol as a destination. Since it isused more than once in the
DFD it is marked with a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters.
Processand dataflow names have the first letter of each work capitalizedA DFD
typically shows the minimum contents of data store. Each data storeshould contain
all the data elements that flow in and out.Questionnaires should contain all the data
elements that flow in and out. Missinginterfaces redundancies and like is then
accounted for often through interviews.
SAILENT FEATURES OF DFD’S
1. The DFD shows flow of data, not of control loops and decision are
controlledconsiderations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether
thedataflow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.

TYPES OF DATA FLOW DIAGRAMS


1. Current Physical
2. Current Logical
3. New Logical
4. New Physical

CURRENT PHYSICAL:
In Current Physical DFD 45recess label include the name of people or their positions
or the names of computer systems that might provide some of the overallsystem-
processing label includes an identification of the technology used to process the
data. Similarly data flows and data stores are often labels with thenames of the
actual physical media on which data are stored such as file folders,computer files,
business forms or computer tapes.

CURRENT LOGICAL:
The physical aspects at the system are removed as mush as possible so that
thecurrent system is reduced to its essence to the data and the processors
thattransform them regardless of actual physical form.This is exactly like a current
logical model if the user were completely happy withhe user were completely happy
with the functionality of the current system but had problems with how it was
implemented typically through the new logical modelwill differ from current logical
model while having additional functions, absolutefunction removal and inefficient
flows recognized.

NEW PHYSICAL:
The new physical represents only the physical implementation of the new system.

RULES GOVERNING THE DFD’S PROCESS


1) No process can have only outputs.
2) No process can have only inputs. If an object has only inputs than it must be
asink.
3) A process has a verb phrase label.

E–R DIAGRAMS:
The relation upon the system is structure through a conceptual ER-Diagram,which
not only specifics the existential entities but also the standard relationsthrough which
the system exists and the cardinalities that are necessary for thesystem state to
continue.

The entity Relationship Diagram (ERD) depicts the relationship between thedata
objects. The ERD is the notation that is used to conduct the date modelingactivity the
attributes of each data object noted is the ERD can be describedresign a data object
descriptions.

The set of primary components that are identified by the ERD are
Data object
Relationships
Attributes
Various types of indicators.The primary purpose of the ERD is to represent data
objects and theirrelationships

User case diagram:


A use case diagram is a dynamic or behavior diagram in UML. Use case
diagramsmodel the functionality of a system using actors and use cases. Use cases
are a setof actions, services, and functions that the system needs to perform. In this
context,a "system" is something being developed or operated, such as a web site.
The"actors" are people or entities operating under defined roles within the
system.Use case diagrams are valuable for visualizing the functional requirements of
asystem that will translate into design choices and development priorities.They also
help identify any internal or external factors that may influence thesystem and should
be taken into consideration.They provide a good high level analysis from outside the
system. Use casediagrams specify how the system interacts with actors without
worrying about thedetails of how that functionality is implemented.
Basic Use Case Diagram Symbols and Notations System

Draw your system's boundaries using a rectangle that contains use cases.
Placeactors outside the system's boundaries.

Use case
Draw use cases using ovals. Label the ovals with verbs that represent the
system'sfunctions.

Actors
Actors are the users of a system. When one system is the actor of another
system,label the actor system with the actor stereotype.

Relationships
Illustrate relationships between an actor and a use case with a simple line.
Forrelationships among use cases, use arrows labeled either "uses" or "extends

Use Case Diagram


6.4 WATERFALL MODEL

The Waterfall Model was first Process Model to be introduced. It is also referred to
as a linear-sequential life cycle model. It is very simple to understand and use. In a
waterfall model, each phase must be completed fully before the next phase can
begin. At the end of each phase, a review takes place to determine if the project is
on the right path and whether or not to continue or discard the project. In waterfall
model phases do not overlap.
● Simple and easy to understand and use.
● Easy to manage due to the rigidity of the model – each phase has specific
deliverables and a review process.
● Phases are processed and completed one at a time.
Works well for smaller projects where requirements are very well understood
When to use the waterfall model:
● Requirements are very well known, clear and fixed.
● Product definition is stable.
● Technology is understood.
● There are no ambiguous requirements.
● Ample resources with required expertise are available freely.
WATERFALL MODEL
CHAPTER- 6
Coding

public class Login1 extends JFrame implements ActionListener{


JButton login, signup, reset;
JTextField AccountTextField;
JPasswordField pinTextField;

Login1() {
setTitle("AUTOMATED TELLER MACHINE");
setLayout(null);

ImageIcon i1 = new
ImageIcon(ClassLoader.getSystemResource("icons/loggn.jpg"));
Image i2 = i1.getImage().getScaledInstance(700, 700,
Image.SCALE_DEFAULT);
ImageIcon i3 = new ImageIcon(i2);
JLabel label11 = new JLabel(i3);
label11.setBounds(750, 50, 700, 700);
add(label11);

ImageIcon l1 = new
ImageIcon(ClassLoader.getSystemResource("icons/bankinglogo1.jpg"));
Image l2 = l1.getImage().getScaledInstance(100, 100,
Image.SCALE_DEFAULT);
ImageIcon l3 = new ImageIcon(l2);
JLabel label = new JLabel(l3);
label.setBounds(70, 10, 100, 100);
add(label);

ImageIcon j1 = new
ImageIcon(ClassLoader.getSystemResource("icons/loginpage1.jpg"));
Image j2 = j1.getImage().getScaledInstance(700, 200,
Image.SCALE_DEFAULT);
ImageIcon j3 = new ImageIcon(j2);
JLabel label6 = new JLabel(j3);
label6.setBounds(20, 580, 700, 200);
add(label6);

ImageIcon h1 = new
ImageIcon(ClassLoader.getSystemResource("icons/log_login.png"));
Image h2 = h1.getImage().getScaledInstance(70, 70,
Image.SCALE_DEFAULT);
ImageIcon h3 = new ImageIcon(h2);
JLabel label5 = new JLabel(h3);
label5.setBounds(300, 190, 70, 70);
add(label5);
JLabel text1 = new JLabel("LOGIN");
text1.setFont(new Font("Osward", Font.BOLD, 20));
text1.setForeground(Color.black);
text1.setBounds(300, 260, 450, 40);
add(text1);

JLabel text = new JLabel("WELCOME TO THE BANK ");


text.setFont(new Font("Osward", Font.BOLD, 32));
text.setForeground(Color.black);
text.setBounds(200, 50, 450, 40);
add(text);

JLabel AccountNo = new JLabel("Account no");


AccountNo.setFont(new Font("Raleway", Font.BOLD, 24));
AccountNo.setBounds(100, 320, 200, 40);
add(AccountNo);

AccountTextField = new JTextField();


AccountTextField.setBounds(250, 325, 300, 33);
AccountTextField.setFont(new Font("Arial", Font.BOLD, 15));
AccountTextField.setCaretColor(Color.blue);
add(AccountTextField);

JLabel pin = new JLabel("Password");


pin.setFont(new Font("Raleway", Font.BOLD, 24));
pin.setBounds(110, 390, 200, 40);
add(pin);

pinTextField = new JPasswordField();


pinTextField.setBounds(250, 395, 300, 33);
pinTextField.setFont(new Font("Arial", Font.BOLD, 15));
pinTextField.setCaretColor(Color.blue);
add(pinTextField);

login = new JButton("LOGIN");


login.setBounds(250, 480, 120, 30);
login.setBackground(Color.black);
login.setForeground(Color.white);
login.addActionListener(this);
add(login);

signup = new JButton("SIGNUP");


signup.setBounds(390, 480, 120, 30);
signup.setBackground(Color.black);
signup.setForeground(Color.white);
signup.addActionListener(this);
add(signup);

reset = new JButton("RESET");


reset.setBounds(250, 520, 260, 30);
reset.setBackground(Color.black);
reset.setForeground(Color.white);
reset.addActionListener(this);
add(reset);

getContentPane().setBackground(new Color(204, 229, 255));

setSize(1600, 1200);
setVisible(true);
}

@Override
public void actionPerformed(ActionEvent ae) {
/// perform sign-in , signUp, reset

if (ae.getSource() == reset) {
AccountTextField.setText(" ");
pinTextField.setText("");
} else if (ae.getSource() == login) {
ConnectionSql c = new ConnectionSql();
String Accountno = AccountTextField.getText();
String pin = pinTextField.getText();
String query = "select *from login where Account_No = '" + Accountno + "'
and Login_Password = '" + pin + "'";
try {
ResultSet rs = c.s.executeQuery(query);
if (rs.next()) {
setVisible(false);
new Transactions(pin,Accountno).setVisible(true);
} else {
JOptionPane.showMessageDialog(null, "Wrong Password or Account
Number");
}
} catch (Exception e) {
System.out.println(e);
}
} else if (ae.getSource() == signup) {
setVisible(false);
new Signup1().setVisible(true);

}
}

public static void main(String[] args) {


new Login1();

}
}
CHAPTER- 8
Testing
Testing:
Software testing is a critical element of software quality assurance and representsthe
ultimate review of specification, design and coding. In fact, testing is the onestep in
the software engineering process that could be viewed as destructiverather than
constructive.
A strategy for software testing integrates software test case design methods into
awell-planned series of steps that result in the successful construction of
software.Testing is the set of activities that can be planned in advance and
conductedsystematically. The underlying motivation of program testing is to affirm
softwarequality with methods that can economically and effectively apply to both
strategicto both large and small-scale systems.

8.2. UNIT TESTING

Unit testing involves test planning, test case development andmeasurement of test
unit against the requirement specifications. Planninginvolves designing the schedule,
determining the resourcesrequired and determining the features to be tested. Test
case developmentinvolves designing test cases that are to be tested; the test cases
are prepared so asto test the system exhaustively to find the bugs present in the
system. Measurementof test unit against specification involves testing the system by
giving the test casesas input and checking the systems adherence to its
specification. The followingfeatures were tested:
•Test to
see if the requirements specified are taken care of.
•Test to see if all the inputs are handled effectively.

•Test the system by traversing all paths to discover any surprises.

•Check if the errors and exceptions have been handled properly.

•See if the va
lidations of input data are all taken care off. Test cases weredesigned to check the
results retrieved from the database and the validationof all user inputs. All the
modules were tested thoroughly. The moduleinterface was also tested to ensure that
information flows into and out of the program units.

8.3.INTEGRATION TESTING

This testing is performed after all individual modules are developedand ready for the
integration. The objective of this testing is to build a program structure as dictated in
the design by taking unit tested modules.
REQUIREMENT TO BE TESTED
The following requirements will be tested1. Verify if valid users are identified.2. Verify
if invalid users are blocked from logging into the application.
GET REPORTGENERATION DETAILS
This service validates fetches the account details given an account Id
downintegration is an incremental approach to the construction of programstructure.
Modules are integrated by moving downward through the controlhierarchy, beginning
with the main module. Modules subordinate to the mainmodule are incorporated into
the structure in depth first manner. In thisway, interfacing between the various
modules was also thoroughly tested.In this System, the integration testing is done by
checking all possibleworkflows of the analysis and cleaning process.

8.4. SYSTEM TESTING

System Testing is a series of test, which have to be performed to fullyexercise the


computer- based system. It ensures that all the systemelements are fully integrated
and each element performs its allocatedfunction.
Chapter-9
Screen Layouts

Welcome Page:
Balance Page:
Welcome Bank:
Customer Welcome:

Withdraw Page
Change PIN:

Additional Details:
Account Details:
Chapter-9

Maintenance
Maintenance

Software maintenance is widely accepted part of SDLC. It stands for all


themodifications and updation done after the delivery of software product. There
arenumber of reasons, why modifications are required, some of them are
brieflymentioned below:

Market Conditions- Policies, which changes over the time, such as taxation andnewly
introduced constraints like, how to maintain bookkeeping, may trigger needfor
modification.

Client Requirements - Over the time, customer may ask for new features or functions
in the software.

Host Modifications- If any of the hardware and/or platform (such as operating


system) of the target host changes, software changes are needed to keep
adaptability.

Organization Changes - If there is any business level change at client end, such
asreduction of organization strength, acquiring another company,
organizationventuring into new business, need to modify in the original software may
arise.

Types of Maintenance

In a software lifetime, type of maintenance may vary based on its nature. It may be
just a routine maintenance tasks as some bug discovered by some user or it may be
a large event in itself based on maintenance size or nature. Following are some
types of maintenance based on their characteristics:

Corrective Maintenance - This includes modifications and update ions done in order
to correct or fix problems, which are either discovered by user or concluded by user
error reports.
Adaptive Maintenance - This includes modifications and update ions applied to keep
the software product up-to date and tuned to the ever changing world of technology
and business environment.

Perfective Maintenance - This includes modifications and updates done in orderto


keep the software usable over long period of time. It includes new features, newuser
requirements for refining the software and improve its reliability and performance.

Preventive Maintenance - This includes modifications and updations to preventfuture


problems of the software. It aims to attend problems, which are notsignificant at this
moment but may cause serious issues in future.

Maintenance Activities

IEEE provides a framework for sequential maintenance process activities. It can


beused in iterative manner and can be extended so that customized items and
processes can be included.

These activities go hand-in-hand with each of the following phase:

Identification & Tracing - It involves activities pertaining to identification


ofrequirement of modification or maintenance. It is generated by user or system
mayitself report via logs or error messages. Here, the maintenance type is
classifiedalso.

Analysis - The modification is analyzed for its impact on the system includingsafety
and security implications. If probable impact is severe, alternative solution islooked
for. A set of required modifications is then materialized into
requirementspecifications. The cost of modification/maintenance is analyzed and
estimation isconcluded.

Design - New modules, which need to be replaced or modified, are designedagainst


requirement specifications set in the previous stage. Test cases are createdfor
validation and verification.
Implementation - The new modules are coded with the help of structured
designcreated in the design step. Every programmer is expected to do unit testing in
parallel.

System Testing - Integration testing is done among newly created


modules.Integration testing is also carried out between new modules and the
system. Finallythe system is tested as a whole, following regressive testing
procedures.

Acceptance Testing - After testing the system internally, it is tested for


acceptancewith the help of users. If at this state, user complaints some issues they
areaddressed or noted to address in next iteration.

Delivery - After acceptance test, the system is deployed all over the
organizationeither by small update package or fresh installation of the system. The
final testingtakes place at client end after the software is delivered.Training facility is
provided if required, in addition to the hard copy of usermanual.

Maintenance management - Configuration management is an essential part


ofsystem maintenance. It is aided with version control tools to control versions,semi-
version or patch management.
CHAPTER-10

CONCLUSION &SCOPE
FORFUTRUREDEVLOPMENT
Limitation of Project on Bank Management System:

Although I have put my best efforts to make the software flexible easy to operate but
limitation cannot be ruled out even by me .Though the software present a
broadrange of operations to its users intricate option could not covered into it; party
because of logistic and party due to lack of sophistication .Paucity of time was
alsomajor constraint, thus it was not possible to make the software foolproof
anddynamic lack of time also compelled me to ignore some part such as storing
oldresult of the candidate etc.Considerable efforts have made the software easy to
operate even for the peoplenot related to the field of component but it is
acknowledgement that a layman mayfind it a bit problematic at the first instance. The
user is provided help at each stepfor his
.

10.1 Conclusion

This project was successfully completed within the time span allotted. The
projectBank Management System has been developed in core java. All the modules
aretested separately and put together to form the main system. Finally the system
istested with real data and everything worked successfully. Thus the system
hasfulfilled the entire objective identified. The system had been developed in
anattractive dialogs fashion.So user with minimum knowledge about computers can
also operate the systemeasily. It will make easy interactions between users and
store. The speed andaccuracy are maintained in proper way.

10.2 SCOPE FOR FUTURE DEVELOPMENT

This project was developed to fulfill user requirement. However thereare lots of
scope to improve the performance of the Banking System inthe area of user
interface, database performance and query processingtime. So there are many
things for future enhancement of this project.The future enhancements that are
possible in the project are as follows.

You might also like