0% found this document useful (0 votes)
35 views62 pages

Sanju

The document outlines a project report for a 'Bank Management System' developed by Gamni Sahu as part of the PG Diploma in Computer Application at Shaheed Nandkumar Patel University. It includes sections on project evaluation, declaration, acknowledgments, system analysis, and requirements, emphasizing the need for efficient bank management software to address existing system issues. The project aims to automate banking processes, improve data management, and enhance customer satisfaction.

Uploaded by

jaycomputer.net
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views62 pages

Sanju

The document outlines a project report for a 'Bank Management System' developed by Gamni Sahu as part of the PG Diploma in Computer Application at Shaheed Nandkumar Patel University. It includes sections on project evaluation, declaration, acknowledgments, system analysis, and requirements, emphasizing the need for efficient bank management software to address existing system issues. The project aims to automate banking processes, improve data management, and enhance customer satisfaction.

Uploaded by

jaycomputer.net
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 62

SHAHEED NANDKUMAR PATEL UNIVERSITY RAIGARH (C.G.

)
GOVT. LOCHAN PRASAD PANDEY COLLEGE SARANGARH DIST-RAIGARH (C.G.)

Center code No.-708


A Project on
“BANK MANAGEMENT SYSTEM”
By
“GAMNI SAHU”
Class- PGDCA
A Project report submitted in partial fulfillment of
requirement
For the diploma of
P.G. DIPLOMA IN COMPUTER APPLICATION
(Session: 2021-22)
Of Shaheed Nandkumar Patel University Raigarh(C.G.)

[1]
SHAHEED NANDKUMAR PATEL UNIVERSITY RAIGARH (C.G.)

PROJECT WORK EVALUATION

1. Project Title: Bank Management System


2. Software Base: C++
3. Submitted for the Course& Year: PGDCA (2021-22)
4. Individual Evaluation: Maximum 100

NAME ROLL INDIVIDUAL


NUMBER EVALUATION (M.G.)
(MAX.100)

GAMNI SAHU

5. CENTER NAME - GOVT. LOCHAN PRASAD PANDEY COLLEGE


SARANGARH (C.G.) 708

(EXTERNAL EXAMINER) (INTERNAL EXAMINER)

[2]
SHAHEED NANDKUMAR PATEL UNIVERSITY RAIGARH (C.G.)

DECLARATION

This is to certified that I“GAMNI SAHU” student of PGDCA of


GOVT. LOCHAN PRASAD PANDEY COLLEGE
SARANGARH RAIGARH (C.G) Have completed Major Project
entitled “BANK MANAGEMENT SYSTEM” at “GOVT.
LOCHAN PRASAD PANDEY COLLEGE SARANGARH(C.G).
I assure that this outdoor project is carried out by me and the data is
collected from the concerned department.

Student Name – GAMNI SAHU


Roll No. :-
Signature:-

[3]
SHAHEED NANDKUMAR PATEL UNIVERSITY RAIGARH (C.G.)

CENTER CERTIFICATE

This is to certify that the Major Project, “BANK


MANAGEMENT SYSTEM” is being submitted by
“GAMNI SAHU”. For the partial fulfillment of the PGDCA
at 2021-22. “GOVT. LOCHAN PRASAD PANDEY
COLLEGE SARANGARH (C.G)”. All work carried out by
them under my supervision and has not been submitted
anywhere else for the award of any diploma.

प्रभारी
प्राचार्य

[4]
SHAHEED NANDKUMAR PATEL UNIVERSITY RAIGARH (C.G.)

PROJECT GUIDE CERTIFICATE

This is to certify that the work embodied in this project,


“BANK MANAGEMENT SYSTEM” has been satisfactorily
completed by “GAMNI SAHU”. It is a bonafide piece of
work carried out under my guidance the POST
GRADUCATION DIPLOMA IN COMPUTER
APPLICATION, GOVT. LOCHAN PRASAD PANDEY
COLLEGE SARANGARH (C.G.) for the partial fulfillment
of the POST GRADUCATION DIPLOMA IN
COMPUTER APPLICATION during the session 2021-
2022.

Project Guide

[5]
ACKNOWLEDGMENT

“TASK successful makes everyone happy, but the happiness


will not be gold without glitter if we didn’t state the persons how have
supported us to make it a success

Success will be crowned to people how made it a reality but the


people whose constants guidance and encouragement it possible will
be crowned first on the eve of success.
This acknowledgement transcends the reality of formality when
we would like to express deep gratitude and respect to all those
people behind the screen who guided, inspired and happened me for
the compilation of our project work.

I consider myself lucky in enough to get such a good project.


This project would add as an asset to my academic profile.

I would like to express my thankfulness HOD of GOVT.


LOCHAN PRASAD PANDEY COLLEGE SARANGARH, HOD
of IT and my project Guide Mr. ISHWAR CHAND WAREN, and
guided by Mr. SUMAN PAINKRA for his constant motivation and
valuable help through the project work.
I also extend my thanks to my team members and family
members for their co-operation during my course

! Thank you

[6]
INDEX

S.N. TABLE OF CONTENT PAGE NO.


CHAPTER-1
1. INTRODUCTION
1.1INTRODUCTION TO PROJECT
1.2PURPOSE OF THE SYSTEM
1.3PROBLEM OF THE EXISTENCE SYSTEM
1.4SOLUTION OF THESE PROBLEM
CHAPTER -2
2. SYSTEM ANALYSIS
2.1 INTRODUCTION
2.2 ANALYSIS MODEL
2.3 STUDY OF THE SYSTEM
2.4 SYSTEM REQUIREMENT SPECIFICATION
2.5 PROPOSED SYSTEM
2.6 INPUT AND OUTPUT
2.7 PROCESS MOULES USED WITH
JUSTIFICATION
CHAPTER -3
3. FEASIBILITY STUDY
3.1 TECHNICAL FEASIBILITY
3.2 OPERATIONAL FEASIBILITY
3.3 ECONOMICAL FEASIBILITY
CHAPTER -4
4. SOFTWARE REQUIREMENT
SPECIFICATION
4.1 FUNCTIONAL REQUIREMENT
4.2 PERFORMANCE REQUIREMENT
CHAPTER-5
5. SYSTEM DESIGN
5.1 INTRODUCTION
5.2 NORMALIZATION
5.3 E-R DIAGRAM
5.4 DATA FLOW DIAGRAM
5.5 DATA DICTIONARY
5.6 UML DIAGRAM
CHAPTER -6
6. SYSTEM TESTING AND IMPLEMENTATION
6.1 INTRODUCTION
6.2 STRATEGIC APPROACH OF SOFTWARE
TESTING

[7]
6.3 UNIT TESTING
CHAPTER -7
7. SYSTEM SECURITY AND MAINTENANCE
7.1 INTRODUCTION
7.2 SECURITY AND SOFTWARE
CHAPTER - 8
8. CODING
CHAPTER - 9
9. OUTPUT SCREEN
CHAPTER -10
10. CONCLUSION
10.1 FUTURE SCOPE
10.2 USER MANUAL
10.3 CONCLUSION
10.4 FUTURE ENHACEMENT
CHAPTER - 11
11. BIBIOGRAPHY

[8]
[9]
INTRODUCTION

INTRODUCTION TO PROJECT

A bank is a financial institution which accepts deposits, pays interest on pre-


defined rates, clears checks, makes loans, and often acts as an intermediary in
financial transactions. It also provides other financial services to its customers.
Bank management governs various concerns associated with bank in order to
maximize profits. The concerns broadly include liquidity management, asset
management, liability management and capital management.

Bank is the place where customers feel the sense of safety for their
property. In the bank, customers deposit and withdraw their money.
Transaction of money also is a part where customer takes shelter of the bank.
Now to keep the belief and trust of customers, there is the positive need for
management of the bank, which can handle all this with comfort and ease.
Smooth and efficient management affects the satisfaction of the customers and
staff members, indirectly. And of course, it encourages management committee
in taking some needed decision for future enhancement of the bank.

Now days, managing a bank are tedious job up to certain limit. So


software that reduces the work is essential. Also today’s world is a genuine
computer world and is getting faster and faster day-by-day. Thus, considering
above necessities, the software for bank management has became necessary
which would be useful in managing the bank more efficiently.

1.1 PURPOSE OF THE PROJECT

A bank is a financial institution which is involved in borrowing and


lending money. Banks take customer deposits in return for paying customers an
annual interest payment. The bank then uses the majority of these deposits to
lend to other customers for a variety of loans. The difference between the two
interest rates is effectively the profit margin for banks. Banks play an important
role in the economy for offering a service for people wishing to save. Banks
also play an important role in offering finance to businesses who wish to invest
and expand. These loans and business investment are important for enabling
economic growth.

[10]
1.2 PROBLEM OF EXISTING SYSTEM

Although the basic type of services offered by a bank depends upon


the type of bank and the country, services provided usually include: Taking
deposits from their customers and issuing current or checking accounts and
savings accounts to individuals and business. Extending loans to individuals and
business, Cashing cheque. Facilitating money transactions such as wire transfer
and cashiers cheque, Consumer & commercial financial advisory services,
financial transaction can be performed through many different channels.

 PROBLEM IN EXISTING SYSTEM


 Risk of mismanagement and of data when the job is under development.
 Manual system needs main electric power a lot.
 Communication between customer and owner is in a roundabout way.
 The complete hierarchy is don’t execute in manually.
 Cannot Upload and download the latest posts.
 Application dependency.
 Multiplatform and multi-language development.
 Missing Roles departments.

1.3 SOLUTION OF EXISTING SYSTEM PROBLEM


The trends of the new system encompass the following activities,
which try to automate the complete process keeping in view of the data source
integration procedure.

 User responsiveness is offered in the get with various organizes.


 The coordination makes the more often than not project organization
much easier and supple.
 Readily upload the latest updates, allows customer to download the alerts
by clicking the URL.
 There is not any threat of data misconduct at any level as the project
progress is under treatment.
 User friendly.
 Easy to access and modify data system.

[11]
[12]
SYSTEM ANALYSIS

INTRODUCTION

After examining the necessities of the duty to be performed,


the next thing is to analyze the problem and understand its context. The first
activity in the period is studying the prevailing system and other is to understand
the requirements and site of the new system. Both behavior are evenly
significant, but the first motion serves as a basis of providing the purposeful
requirements and then winning design of the proposed system. Understanding
the properties and essentials of a new system is more challenging and requires
creative thinking and understanding of existing working system is also difficult,
incorrect knowledge of present system can lead diversion from solution.

2.1 ANALYSIS MODEL

The model that is basically being used is this particular WATER FALL
MODEL. To begin with the viability analysis is completed. Once that part is
over the responsibility psychoanalysis and job preparation gets started. If system
is available one and adjustment and addition of new component is needed,
research of present system can be utilized as basic model.

The design start following the obligation evaluation is total and the coding
starts after the mean is full. After the indoctrination is completed, the difficult is
performed. Within this model the series:

 Requirement Analysis
 Project Planning
 System design
 Detail design
 Coding
 Unit testing
 System integration & testing

Here the linear purchasing of these activities is critical. End of the period the
end result of one stage is suggestions of other stage. The output of each phase is
usually result of one stage is the suggestions of other stage. The output of each
phase is usually to be consistent with the entire necessity of the machine. Some
of the figure of twisting model is also integrated like following the people
worried with the job review completion of each of the period the work done.

[13]
WATER FALL MODEL was being chosen because all essential were known
beforehand and the objective of our software development is the
computerization / automation associated with an already existing manual
working system.

2.2 STUDY FOR THE SYSTEM

In the flexibility of the uses the intrerface has been developed a


design concept in mind, linked by using a browses user interface. The GUI’S at
the very top level have been classified as:

 Administrative consumer interface.


 The functional or generic end user interface.

The administrative user interface concentrates on the constant


data that is nearly,area of the organizational activities and which needs proper
authentication for the data collection. The interfaces help the aadministrations
with all the current transactional claims like Data insertion, Data deletion and
Day updating along with the intensive data search functions. The functional or
generic interface helps the users after the system in dealings through the existing
data and needed services. The operational user interface also helps the ordinary
users in managing their own data helps the normal users in controlling their own
data in a custom-made manner according to the aided flexibilities.

2.3 SYSTEM REQUIRMENT SPECIFICATION

 HARDWARE REQUIRMENTS:
 Processor: Pentium 3.0 GHz or higher
 RAM: 1GB or MORE
 Hard Drive: 250 GB or MORE
 Type: Laptop or Desktop
 SOFTWARE REQUIRMENTS:
 Turbo C++
 Dev C++
 MS Office
2.4 PROPOSED SYSTEM

To debug the existing system, remove procedure those cause data


redundancy, make navigational sequence proper. To provide data about audits
on dissimilar level and also to reflect the current work status depending on
business/auditor or particular date. To develop strong password mechanism.
[14]
 NEED FOR COMPUTERIZATION
We all know the value of computerization. The earth is
touching in advance at lighten momentum and each organization less
than time. One forever needs to have the in order and perform a
payment he/she/they wish(s) in the short phase of time and too with
amount of efficiency and exactness. The application form areas for the
computerization have been determined on the basis of following
factors:
 Minimizing the manual details placed at dissimilar location.
 There could be more data honesty.
 Facilitating desired data screen, very quickly, by retrieving data from
users.
 Facilitating various statistical data which helps in decision -making?
 To decrease labour-intensive labours in patterns that occupied boring
work.
 Update and remove of such an eenormous level of data will grow to
be easier.

 FUNCTIONAL TOP FEATURES OF THE MODEL

As considerably as the job is developed the operation is simple, the


aim of the proposal is to strengthen the functioning of Audit Position
Monitoring and make sure they are effective and better. The complete scope
has been classified into five streams knows as Coordinator Level,
management Level, Auditor Level, User Level and State Web Coordinator
Level. The suggested software will cover the info needs With respect to each
demand of an individual group viz. receiving the need, providing
vulnerability doc report and the current status of the audit.

2.5 INPUT AND OUTPUT


 INPUT

Input design is an integral part of overall system design. The primary objective
tthrough the input design is as listed below:
 To produce a cost-effective approach to input.
 To archive optimum level of precision.

[15]
 To ensure that the type is suitable and grasped by the user.

 OUTPUT

Outputs from personal computers are needed primarily to communicate the


results of finalizing to users. They are also used to offer a permanent duplicate
of the outcome for later consultation. The many types of outputs generally
speaking are:

 External Outputs whose vacation spot is outside the organisation.


 Internal outputs whose destination has been in organization and they’re
the User’s main user interface with the computer.
 Operational output whose use is purely within the computer department.
 Interface outputs, which entail an individual in communicating
immediately with output.

2.6 PROCRSS MODULES USED IN JUSTIFICATION

 ACCESSORGANIZE FOR DATA WHICH REQUIRE USER


AUTHENT:

The following orders specify access organize identifiers and they’re


typically used to authorize and authenticate the user (command rules are
shown in Parentheses)

 USER NAME (CUSTOMER): The user recognition is that which is


needed by the server for usage of its data file system. This specialist will
usually be the first power transmit by the user after the organize relations
are created (some servers may necessitate this).
 PASSWORD (PASS): This demand must be immediately preceded by
the user name demand, and, for a few sites, completes the user’s id for
access organize. Since code expression to be able is quite sensitive, it is
attractive generally speaking to “mask “it or hold back type out

[16]
FEASIBILITY REPORT

Beginning examination analyses task viability, the possibility the


machine will be useful to the business. The main purpose of the viability review
[17]
is to test the technological, prepared and Economical probability for adding new
module and debugging old from system. All system is possible if they are
uncontrolled resources and never ending time.

 Technical Feasibility
 Operational Feasibility
 Economical Feasibility

3.1 TECHNICAL FEASIBILITY

Technical concern typically raised during the possibility level of the assessment
includes the next:

 Do the prepared equipment’s have the industrial capacity to carry the


carry the info obligatory to work with the new system?
 Will the near future system offer plenty respond to research, not
considering of the quantity or environment of users?
 Can the business be update if developed?
 Are there scientific guarantee of correctness, dependability, ease of
access and data basic safety?

Early no system been around to focus on the needs of


‘Secure Infrastructure Implementation System. Today’s system urbanized is
firmly reasonable. It right is a web based user boundary for audit workflow at
NIC-CSD. Thus it affords a simple right of admission. The database’s purpose
is to create and continue a workflow between various entities to be able to
facilitate all alarmed. Users in their various capacities or roles. Authorization to
an individual would be decided predicated on the job particular. Therefore, it
affords the complex declaration of rightness, trustworthiness and security. The
work for the task is absolute by means of the current handle and existing
software technology. Indispensable bandwidth is out there for only if a criticism
to the users regardless of the figure of users using the machine

3.2. OPERATIONAL FEASIBILITY

The system analysis is beneficial only if they can be twisted out into data
system. Which will get together the organizations in commission requirements?

[18]
Ready feasibility facet of the task. As a significant part of the scheme
conclusion. Some of the significant issues lifted are to test the operational
feasibility of a project.

 Will the system be used and work appropriately if it is being urbanized


and put into action?
 Will there be any hostility from an individual that will undermine the
promising program benefits?
 This system is under episode to maintain agreement with the
aforementioned issues. In advance, the organization issues and end user
essentials have been.
 Taken under consideration. So there is absolutely no question of
confrontation from the users that can weaken the possible need benefits.
 The well-planned design would ensure the perfect intake of the computer
capital and would help in the introduction of presentation status.

3.3. ECONOMIC FEASIBILITY

A system can be developed to be correct and that will be used if install must still
be a good speculation for the business. In the affordable viability, the
development cost in creating the system is evaluate in opposition to the
unlimited advantage derived from the new system , financial benefits must
equal or go beyond the costs.

The system is inexpensively possible. It generally does not necessitate any


adding hardware or software. Since the border because of this system is
urbanized using the existing possessions and technologies accessible at NIC,
There may be nominal costs and cost-effective feasibility for several.

[19]
SOFTWARE REQUIREMENT SPECIFICATION

INTRODUCTION

[20]
Purpose: The main purpose for getting ready this report is to provide general
perception into the evaluation and requirements of the prevailing system or
situation and then for identifying the operating characteristics of the machine.

Scope: This File plays a vital role in the development life pattern (SDLC) and it
describes the entire requirement of the machine. It is designed for use by the
coders and will be the basic during testing period. Any changes designed to the
necessities in the future will have to proceed through formal change
endorsement process.

4.1 FUNCTIONAL REQUIREMENTS

In Functional stage it is usually to be decided whatever medium is the most


appropriate for the productivity. The Main things to consider when deciding
about the output media are:

 The suitability for the device to this application.


 The require intended for a hard copy.
 The answer time necessary.
 The located area of the users.
 The software and hardware available.

Keeping because the above description the job is to have outputs


mainly arriving under the group of internal outputs. The primary outputs desired
according to the requirement standards are:
 The outputs were needed to be produced as a hot duplicate and as well as
questions to be viewed on the display.
 Keeping because these outputs, the format for the result are extracted
from the Outputs, which are currently being obtained after manual
processing.
 The standard printer is usually to be used as result mass media for hard
copies.

4.2 PERFORMANCE REQUIREMENTS

Presentation is measured in conditions of the productivity offered by


the application form. Requirement specification plays an important part in the
[21]
evaluation of something. Only when the necessity requirements are properly
given you’ll be able to design a system, which will fit into needed environment.
It rests typically in the part of the users of the prevailing system to provide the
requirement technical specs because they’re the people who finally use the
machine. It is because the necessities have to be known through the initial
stages so the system can be designed regarding to those essentials. It’s very
difficult to change the machine once it has been designed and on the other hands
designing something, which will not focus on the requirements of the user, is
useless.

The requirement specification for any system can be broadly mentioned as


listed below:
 The system should be able to interface with the existing system.
 The system should be accurate.
 The system should be much better than the existing system.
 The existing system is completely dependent on the user to perform all
the duties

[22]
SYSTEM DESIGN

INTRODUCTION

Software design sits at the complex kernel of the program


engineering process and is also applied whatever the development paradigm and
[23]
region of the application. The importance can be explained with an individual
expression “QUALITY”. Design affords us with representation of software that
can examine for quality. Design is the only way that we can effectively translate
a customer’s view into a done software product or system. Without a strong
design we risk building an unstable system, one that will be difficult check, one
whose quality cannot be assessed before last level.

During design, progressive refinement of data frame work, program


composition and procedural detail are developed reviewed and documented.
Through the technical point of view, design is made up of four activities –
architectural design, data structure design, software design and procedural
design.

5.1 NORMALIZATION

Normalization is a process of organizing the data in database to


avoid data redundancy, insertion anomaly, update anomaly & detection
anomaly. Let’s discuss about anomalies first then we will discuss normal form
with examples.

The above table is not normalizes. We will see the problems that we
face when a table is not normalized.

UPDATE ANOMALY: In the above table we have two rows for employee
Rick as he belongs to two departments of the company. If we want to update the
address of Rick then we have to update the same the same in two rows or the
data will become inconsistent. If somehow, the correct address gets update in
one department but not in other then as per the database, Rick would be having
two different addresses, which is not correct and would lead to inconsistent
data.

INSERT ANOMALY: Suppose a new employee joins the company, who is


under training and currently not assigned to any department then we would not
be able to insert the data into the table if emp-field doesn’t allow nulls.

DELETE ANOMALY: Suppose, if at a point of the company closes the


department D890 then deleting the rows that are having emp-dept as D890
would also delete the information of employee Maggie since she is assigned
only to this department.

[24]
To overcome these anomalies, we need to normalize the data. In the next
section we will discuss about normalization.

5.2 E-R
DIAGRAM

[25]
5.3 DATA FLOW DIAGRAM

DFD LEVEL 0 (CUSTOMER)

ADD CUSTOMER CHECK LIST

USER INFORMATION

ACCOUNT

DFD LEVEL 1 (ADMIN)

CUSTOMER REGISTRATION UPDATE

ADMIN INFORMATION

DISPLAY CUSTOMER RECORD

[26]
DFD LEVEL 2 (REGISTRATION)

REGISTRATION

DISPLAY REGISTRATION
USER REGISTRATION
RECORD
DISPLAY REGISTRATION

RECORD

5.4 DATA DICTIONARY

At this point, everyone would have an idea of what is data dictionary.


It is dictionary about the data what we store in the database. It contains all the
information about the data object. IT is like strong all up-to-date information
about the data object like tables, columns, index, constraints, functions etc. Why
do we need all these information’s?

In the case of table, data dictionary provides information’s about


 It’s name
 Security information’s like who is the owner of the table, when was created and
when it was last accessed.
 Physical information like where is the data stored for this table.

5.5 UML DIAGRAM

Unified Modelling Language (UML) is a general purpose modelling


language. The main aim of UML is to define a standard way to visualize the way a
system has been designed. It is quite similar blueprint used in other field of
engineering.

UML is not a programming language it is rather a visual language. We use UML


diagram to portray the behaviour and structure of a system. UML helps software
engineers, businessmen and system architects with modelling, design and analysis.
The Object Management Group (OMG) adopted Unified Modelling Language as a

[27]
standard in 1997. It’s been managed by UML as an approved standard in 2005.
UML has been revised over the years and is reviewed periodically.

[28]
SYSTEM TESTING AND IMPLEMENTATION

INTRODUCTION

System testing is one of most important phases in testing process.

 This phase starts after the completion of phases like Unit Testing and
Integration testing.
 System testing is the testing performed on completely developed and
integrated system.
 Once complete system has been built then it has to be tested against
system specifications to verify whether it delivers the required features
and quality standards.
 System testing verifies the entire product, after integrating all software
and hardware components and validating/testing it according to project
requirement specifications.
 System testing comprises of two types of testing: Functional testing and
Non- Functional testing.
 Functional Testing: involves testing of business requirements and
product features.
 Non-functional Testing: involves testing features that are not directly
related to business functionality but are essential.

6.1 STRATEGIC APPROACH। TO SOFTWARE TESTING

[29]
Testing commences at the vertex of the spiral and specializes in each
device of the program as implemented in source code. Screening improvement
by moving outward across the spiral to integration assessment, where the focus
is on the design and the structure of the software architecture. Communicating
another start outward on the spiral we face validation evaluation where
necessities proven as part of software necessities examination are validated
towards the software that is constructed.

 Unit testing
 Module testing
 Sub-system testing
 System testing
 Acceptance testing
 Component testing
 Integration testing

6.2 UNIT TESTING

Unit testing concentrates confirmation work on the negligible unit of software


design, the unit. The unit evaluation we have is white field leaning plus some
steps are carry out in similar.

 BLACK BOX TESTING

It is also known as Functional Testing. It tests the overall


functional requirements of product. Inputs are supplied to product and output
are verified if the output obtained are the same as expected ones then the
product meets the functional requirements. In this, the internal procedures
are not considered. In this the tester would only know the “legal” inputs and
what the expected outputs should be, but not how the program actually
arrives at those outputs. This Testing is more effective on larger units of
code. In this test‘s are done from user point of view.

 WHITE BOX TESTING

It is also known as Structure Testing. It focuses on the internal


functioning of the product. It tests the loops of the Procedure, Decision points,

[30]
execution paths etc. White box testing uses specific knowledge of programming
code to examine output. The test is accurate only if the tester knows what the
program is supposed to do. He or she can then see if the program diverges from
its intended goal. White box testing does not account for errors caused by
omission, and all visible code must also be readable. As the knowledge of
internal coding structure is prerequisite, it becomes very easy to find out which
type of input/data can help in testing the application effectively. The other
advantage of white box testing is that it helps in optimizing the code. It helps in
removing the extra lines of code, which can bring in hidden defects.

 SMOKE TESTING

Smoke testing, also known as build verification testing, is a type of


software testing that comprise of a non-exhaustive set of tests that aim at
ensuring that the most important functions works. The results of this testing is
used to decide if a build is stable enough to proceed with further testing.

 REQUIREMENT TESTING

Requirement-based testing is a testing in which test cases, condition


and data are derived from requirement. It includes functional tests and also
not – functional attribute such as performance, reliability or usability.

 PARTITION TESTING

A tester divides a system input domain according to some rules and


then test within the sub domain.

 TEST PROCESS

Testing is a process rather than a single activity. Testing must be


planned and it requires discipline to act upon it. The quality and
effectiveness of software testing are primary determine by the quality of
test.

 CONDITIONAL TESTING

In this part of the testing each of the conditions were examined to both
true and phony aspects. And all the resulting pathways were examined.

 DATA FLOW TESTING

[31]
This kind of testing selects the path of this program in line with the
location of definition and use of factors. This kind of trials was used only
once some local variable were declared. These were mostly useful in nested
claims.

 LOOP TESTING

In this kind of examining all the loops are analysed to all or any the
limitations possible. The following exercise was used for these loops:

 All the loops were experienced at their boundaries, just exceeding


them and slightly below them.
 All the loops were omitted at least once.
 For nested loops test the inner most loops first and them work
outwards.
 For concatenated loops the worth of reliant loops were arranged by
using connected loop.
 Unstructured loops were resolute into nested loops or concatenated
loops and experienced as above.
 Each product has been separately examined by the development
team itself and everything the type have been validated.

IMPLEMENTATION

The application can be uploaded in BANK MANAGEMENT


SYSTEM to access it, the user will just require running the executable file of
the software. System must have Turbo C++. Basically, the application is for the
recording of their Stars sort’s records. As implementation of Student attendance
management software fully automates the existing system. In the designed
system implementation was done to replace manual system with the
computerized one. The objective was to put the tested system in to operation.
Critical aspects of conversion are not disrupting the functioning of the
organization.

This phase gives us the clears pictures of our new system and all
the points that have been carefully looked in when designing the computerized
system.

Sincere efforts were taken for the implementation of the following goals.

 Maximizing the output reliability.

[32]
 Maximizing the source test readability.
 Minimizing the development.

[33]
SYSTEM SECUIRITY AND MAINTENANCE

INTRODUCTION

Security and Maintenance (formerly known as action Center, and


Security Center in earlier version) is a component of the Windows NT family of
operating systems that monitors the maintenance status of the computer. Its
monitoring criteria includes optimal operation of antivirus software, personal
firewall, as well as the working status of backup and Restore , Network Access
Protection(NAP), User Account Control(UAC), Window Error Reporting
(WER), and Windows Update. It notifies the user of any problem with the
monitored criteria, such as when an antivirus program is not up –to-date or is
offline.

Security and Maintenance is charge of the following:

 Querying the status of the person of the person firewall and turning it on.
 Querying the status of the anti-malware program, turning it on and
instructing it to update itself.
 Querying the status of the Internet security setting and asking the user to
change them if are not optimal.
 Querying the status of the automatic maintenance tasks, which includes a
quick scan for malware, disk defragmentation, power efficiency
diagnostics?
 Querying the status of Backup and restore and prompting the user to
schedule a backup if one is not in place.
 Querying the status of file history; however, the user is not alerted about
it.

[34]
 Querying the status of Home Group; no alerts are issued about it.
 Managing problems logged by Windows Error Reporting: The user can
see their detail, send them to Microsoft if they are not automatically sent,
query a solution for them (although most of the times, there is none) or
selectively delete them.

7.1 SECURITY IN SOFTWARE


Security and maintenance are important with any computer and
Window 7& more has made several improvements that make it easier
than ever to keep your computer in good shape.
In this chapter, you will learn how to use the Action Center,
User Account Control Settings, and Troubleshooting to keep your
computer running as smoothly as possible. You will also learn how to
recover your system settings with System Restore to fix more serious
issues.

[35]
[36]
CODING

#include<iostream>

#include<fstream>

#include<cctype>

#include<iomanip>

using namespace std;

class account

int accountnumber;

char name[50];

int deposit;

char type;

public:

void create_account();

void show_account();

void modify_account();

void deposit_funds(int);

[37]
void draw_funds(int);

void get_report();

int get_accountnumber();

int get_funds();

char get_accounttype();

};

void account::create_account()

cout<<"\nEnter The account Number: ";

cin>>accountnumber;

cout<<"\nEnter The Name of The account Holder : ";

cin.ignore();

cin.getline(name,50);

cout<<"\nEnter account type (enter s - saving or c - credit): ";

cin>>type;

type=toupper(type);

cout<<"\nEnter The Initial amount(500 or more for Saving and 1000 or


more for current ): ";

cin>>deposit;

cout<<"\n\n\nAccount Created Successfully...";

void account::show_account()

[38]
cout<<"\nAccount Number: "<<accountnumber;

cout<<"\nAccount Holder Name: "<<name;

cout<<"\nType of Account: "<<type;

cout<<"\nBalance amount: "<<deposit;

void account::modify_account()

cout<<"\nAccount Number: "<<accountnumber;

cout<<"\nModify Account Holder Name: ";

cin.ignore();

cin.getline(name,50);

cout<<"\nModify Type of Account: ";

cin>>type;

type=toupper(type);

cout<<"\nModify Balance amount: ";

cin>>deposit;

void account::deposit_funds(int x)

deposit+=x;

void account::draw_funds(int x)

[39]
{

deposit-=x;

void account::get_report()

cout<<accountnumber<<setw(10)<<" "<<name<<setw(10)<<"
"<<type<<setw(6)<<deposit<<endl;

int account::get_accountnumber()

return accountnumber;

int account::get_funds()

return deposit;

char account::get_accounttype()

return type;

[40]
void write_account();

void display_sp(int);

void modify_account(int);

void delete_account(int);

void display_all();

void deposit_withdraw(int, int);

int main()

char opt;

int num;

for(;;)

system("color 05");

system("cls");

cout<<"\t\t\t\t******\t******";

cout<<"\t\t\t\tNAME\tGAMNI SAHU";

cout<<"\t\t\t\tCLASS\tPGDCAA";

cout<<"\t\t\t\tCOLLEGE-GOVT. LOCHAN PRASAD\tPANDEY


COLLEGE SARANGARH(C. G.)";

cout<<"\t\t\t\t*****\t*****";

cout<<"\t\t\t\t****\t****";

cout<<"\t\t\t\t***\t***";

[41]
cout<<"\t\t\t\t**\t**";

cout<<"\t\t\t\t*\t*";

cout<<"\t\
t@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@";

cout<<"\n\t\tPress 1 to Create New Account";

cout<<"\n\t\tPress 2 to Deposit Funds";

cout<<"\n\t\tPress 3 to Withdraw Funds";

cout<<"\n\t\tPress 4 to Check Balance";

cout<<"\n\t\tPress 5 to View All Account Holder";

cout<<"\n\t\tPress 6 to Close an Account";

cout<<"\n\t\tPress 7 to Modify an Account";

cout<<"\n\t\tPress 8 to Exit the Program";

cout<<"\n\t\
t@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@\n";

cout<<"\n\t\tOption: ";

cin>>opt;

system("cls");

switch(opt)

case '1':

system("color 02");

write_account();

break;

[42]
case '2':

system("color 03");

cout<<"\n\n\tEnter The account No. : "; cin>>num;

deposit_withdraw(num, 1);

break;

case '3':

system("color 06");

cout<<"\n\n\tEnter The account No. : "; cin>>num;

deposit_withdraw(num, 2);

break;

case '4':

system("color 08");

cout<<"\n\n\tEnter The account No. : "; cin>>num;

display_sp(num);

break;

case '5':

system("color 9");

display_all();

break;

case '6':

system("color 10");

cout<<"\n\n\tEnter The account No. : "; cin>>num;

delete_account(num);

break;

[43]
case '7':

system("color 11");

cout<<"\n\n\tEnter The account No. : "; cin>>num;

modify_account(num);

break;

case '8':

system("color 04");

cout<<"\n\n\tThanks for using Bank Managemnt System";

break;

default :cout<<"Invalid Option\n";

cin.ignore();

cin.get();

if(opt=='8')

break;

return 0;

void write_account()

account ac;

ofstream outFile;

outFile.open("account.dat",ios::binary|ios::app);

ac.create_account();
[44]
outFile.write(reinterpret_cast<char *> (&ac), sizeof(account));

outFile.close();

void display_sp(int n)

account ac;

bool flag=false;

ifstream inFile;

inFile.open("account.dat",ios::binary);

if(!inFile)

cout<<"File could not be open !! Press any Key...";

return;

cout<<"\nBALANCE DETAILS\n";

while(inFile.read(reinterpret_cast<char *> (&ac), sizeof(account)))

if(ac.get_accountnumber()==n)

ac.show_account();

flag=true;

[45]
inFile.close();

if(flag==false)

cout<<"\n\nAccount number does not exist";

void modify_account(int n)

bool found=false;

account ac;

fstream File;

File.open("account.dat",ios::binary|ios::in|ios::out);

if(!File)

cout<<"File could not be open !! Press any Key...";

return;

while(!File.eof() && found==false)

File.read(reinterpret_cast<char *> (&ac), sizeof(account));

if(ac.get_accountnumber()==n)

ac.show_account();

cout<<"\n\nEnter The New Details of account: "<<endl;

ac.modify_account();

int pos=(-1)*static_cast<int>(sizeof(account));
[46]
File.seekp(pos,ios::cur);

File.write(reinterpret_cast<char *> (&ac), sizeof(account));

cout<<"\n\n\t Record Updated...";

found=true;

File.close();

if(found==false)

cout<<"\n\n Record Not Found ";

void delete_account(int n)

account ac;

ifstream inFile;

ofstream outFile;

inFile.open("account.dat",ios::binary);

if(!inFile)

cout<<"File could not be open !! Press any Key...";

return;

outFile.open("Temp.dat",ios::binary);

inFile.seekg(0,ios::beg);

while(inFile.read(reinterpret_cast<char *> (&ac), sizeof(account)))


[47]
{

if(ac.get_accountnumber()!=n)

outFile.write(reinterpret_cast<char *> (&ac), sizeof(account));

inFile.close();

outFile.close();

remove("account.dat");

rename("Temp.dat","account.dat");

cout<<"\n\n\tRecord Deleted...";

void display_all()

account ac;

ifstream inFile;

inFile.open("account.dat",ios::binary);

if(!inFile)

cout<<"File could not be open !! Press any Key...";

return;

[48]
cout<<"\n\n\t\tACCOUNT HOLDER LIST\n\n";

cout<<"===================================================
=\n";

cout<<"Account No. Name Type Balance\n";

cout<<"===================================================
=\n";

while(inFile.read(reinterpret_cast<char *> (&ac), sizeof(account)))

ac.get_report();

inFile.close();

void deposit_withdraw(int n, int option)

int amt;

bool found=false;

account ac;

fstream File;

File.open("account.dat", ios::binary|ios::in|ios::out);

if(!File)

cout<<"File could not be open !! Press any Key...";

return;

[49]
}

while(!File.eof() && found==false)

File.read(reinterpret_cast<char *> (&ac), sizeof(account));

if(ac.get_accountnumber()==n)

ac.show_account();

if(option==1)

cout<<"\n\n\tTO DEPOSITE AMOUNT ";

cout<<"\n\nEnter The amount to be deposited: ";

cin>>amt;

ac.deposit_funds(amt);

if(option==2)

cout<<"\n\n\tTO WITHDRAW AMOUNT ";

cout<<"\n\nEnter The amount to be withdraw: ";

cin>>amt;

int bal=ac.get_funds()-amt;

if((bal<500 && ac.get_accounttype()=='S') || (bal<1000 &&


ac.get_accounttype()=='C'))

cout<<"Insufficience balance";

else

ac.draw_funds(amt);

[50]
}

int pos=(-1)*static_cast<int>(sizeof(ac));

File.seekp(pos,ios::cur);

File.write(reinterpret_cast<char *> (&ac), sizeof(account));

cout<<"\n\n\t Record Updated";

found=true;

File.close();

if(found==false)

cout<<"\n\n Record Not Found ";

[51]
[52]
OUTPUT SCREENSHOOT

1. MAIN MENU

2. TO CREATE NEW A/C

3. TO DEPOSITE FUNDS

[53]
4. TO WITHDRAW FUNDS

5. TO CHECK BALANCE

[54]
6. TO VIEW ALL A/C HOLDER

7. TO CLOSE AN A/C

8. TO MODIFY AN A/C

9. TO EXIT THE PROGRAM

[55]
[56]
CONCLUSION AND SCOPE

10.1 FUTURE SCOPE

 We can add new feature like video tutorials.


 We can also provide live sessions in between user and professional
mentors. Notes can be provided in pdf format.
 User can create an account where they can save notes.

There are many possible ways to improve these results in terms of


performance and computation cost. In future work, it may involve developing
additional heuristics combined with other techniques like genetic algorithms,
neural networks to increase the accuracy and improve the response time of the
application.

10.2 USER MANUAL

This project is used on the user on the basic terms:

1. Customer Login
2. Admin Login
3. Add record customer
4. Delete record
5. Modify account
6. View customer account
7. View balance
8. Withdraw / Transaction
9. Go Back

[57]
10.3 CONCLUSION

Healthcare industry should be changed and upgrade with the time,


Solution Dots System is providing leading services with innovation in this
sector of healthcare in the form of hospital management system. Solution Dots
Systems has divided the whole system of hospital management system in
different manners. It is categorized in different modules and provide all features
for the easy of the user. Solution Dots System has offered its excellent services
of the hospital management system to their valuable clients that come up to
their requirements and demands.

Solution Dots System always pays attention to customer’s


satisfaction and requirements. It is our priority of seeking for the customer’s
interest and keep them satisfied with our product with our products and
services.

10.4 FUTURE ENHACEMENT

The project has a very good scope in future. The


project can be implemented on intranet in future. Project can be update in near
future as when requirement for the same arises, as it is very flexible in terms of
expansion. With the proposed software of database Space Manager ready and
fully functional the client is now able to manage and hence run the entire work
in a much better, accurate and error free manner.

The following are the future scope for the project.


Discontinue of particular user eliminate potential attendance. Excel sheet
Reader based Student Attendance Management System. Individual Student
Attendance Management with photo using User Registration.

[58]
[59]
BIBLIOGRAPHY

BOOK REFERENCE

 The C++ Programing Language (BJARNE STROUSTRUP)


 Practical C++ Programing (O’RELLIY)
 Practical C++ Programing (D.S.MALIK)

WEB REFERENCE

 www.Tutorialspoint.com/ C++
 www.Javapoint.com/ C++
 www.w3school.in
 www.youtube.com

[60]
[61]
[62]

You might also like