master of computer applications - Apache Tomcat/9.0.41

67
BANK SYSTEM PRIVATE LIMITED A Dissertation submitted in partial fulfillment of the requirements for the award of degree of MASTER OF COMPUTER APPLICATIONS By YESUMALI AISHWARYA C 1NH17MCA58 Under the Guidance of GOVINDARAJ M Sr. Asst.Professor DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS 2019-2020

Transcript of master of computer applications - Apache Tomcat/9.0.41

BANK SYSTEM PRIVATE LIMITED

A Dissertation submitted in partial fulfillment of the requirements for the award of degree of

MASTER OF COMPUTER APPLICATIONS

By

YESUMALI AISHWARYA C

1NH17MCA58

Under the Guidance of

GOVINDARAJ M

Sr. Asst.Professor

DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS

2019-2020

BANK SYSTEM PRIVATE LIMITED

A Dissertation submitted in partial fulfillment of the requirements for the award of degree of

MASTER OF COMPUTER APPLICATIONS

By

YESUMALI AISHWARYA C

1NH17MCA58

Under the Guidance of

Internal Guide: External Guide: Govindaraj M Joseph. S. Kumar

Sr. Asst.Professor HR

Dept. of MCA, NHCE JMR Infotech

DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS

2019-2020

DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS

CERTIFICATE

This is to certify that YESUMALI AISHWARYA C, bearing USN

1NH17MCA58 has successfully completed her final year VI semester project

work entitled BANK SYSTEM PRIVATE LIMITED as a partial

fulfillment of the requirements for the award of MASTER OF

COMPUTER APPLICATIONS degree, during the Academic Year

2019-20 under my supervision. This report has not been submitted to any other

Organization/University for any award of degree.

Signature of the Internal Guide Head of the Department Principal

External Viva

Internal Examiner External Examiner

Date:

ACKNOWLEDGEMENT

I would like to thank Dr. Mohan Manghnani, Chairman of New Horizon College of

Engineering for providing good infrastructure and Hi-Tech lab facilities to develop and

improve student’s skills.

I sincerely express my gratitude to the college Principal Dr. Manjunatha for supporting

the students in all their technical activities and giving guidance to them. I would like

to thank Dr. V. Asha, Head, Department of MCA, New Horizon College of

Engineering for granting permission to undertake this project. I would like to express

my gratitude to the project guide Prof Govindaraj M for giving all the instructions and

guidelines at every stage of the Project work.

I thank all the staff members of the Department of Master of Computer Applications,

for extending their constant support to complete the project. I express my heartfelt

thanks to my parents and friends who were a constant source of support and inspiration

throughout the project.

COMPANY PROFILE

With delivery and development centers in India, a sizable global presence and

customers spread across 5 continents, JMR Infotech is a leading provider of information

technology and related services. We are committed to helping the world’s best companies to

build, run and grow their information technology landscape.

Founded in 2007, JMR Infotech is dedicated to help customers harness the power of

information technology to transform the way they work and maintain a strong competitive

edge. At JMR, we are driven by a strong passion to help our customers build stronger, agile

and more innovative businesses. We strive for client satisfaction and innovation with a global,

collaborative workforce backed by strategic insight, technology expertise, deep domain

knowledge and flawless business processes.

Since inception, our company has operated on the principle of bringing more value to

customers by building and executing effective technology solutions that fit their needs and

drive the progress they desire.

The title of world’s first Oracle Platinum Partner fully specialized in all financial

solutions, bears testimony to our comprehensive offerings, strong focus and unmatched

expertise.

In August 2014, Global Banking & Finance Review recognized JMR Infotech’s

thought leadership, technical prowess and customer focus by presenting the Best Core

Banking Technology Provider Award for the Middle East and Africa region.

Silicon Review, in 2015, recognized JMR Infotech as one of the 50 Fastest Growing

Tech Companies recognizing our creativity in innovation, customer orientation and domain

influence.

JMR Infotech was also awarded the title of ‘World Business Leader’ by World

Confederation of Businesses in November 2015. This award recognizes JMR Infotech for

innovation, knowledge & systematic approach.

JMR Infotech ed-tech solutions have been recognized as Best Innovation in Education

Technology for Schools at the 7th World Education Summit in August 2016.

TABLE OF CONTENTS

Chapter

No. Title Page No

ABSTRACT

LIST OF TABLES

LIST OF FIGURES

(i)

(ii)

(iii)

1 1.1

1.2

1.3

1.4

1.5

1.6

INTRODUCTION General Introduction

Problem Statement

Existing System

Objective of the Work

Proposed System with Methodology

Feasibility Study

1

3

4

5

6

7

2 2.1

REVIEW OF LITERATURE Review Summary

11

3 3.1

3.2

SYSTEM CONFIGURATION Hardware requirements

Software requirements

14

4 4.1

4.2

MODULE DESCRIPTION Module 1

Module 2

15

5 5.1

5.2

5.3

5.4

SYSTEM DESIGN DFD Diagram

Use Case Diagram

Sequence Diagram

Database Design

18

22

23

24

6 6.1

6.1.1

6.1.2

SYSTEM IMPLEMENTATION Implementation

Pre – Implementation Technique

Post – Implementation Technique

25

35

7

7.1

SYSTEM TESTING Test Cases

45

8

8.1

8.2

8.3

RESULTS AND DISCUSSIONS Conclusion

Limitations

Future Enhancements

53

53

54 9

9.1

9.2

REFERENCES Text Reference

Web Reference

55

ABSTRACT

Bank system private limited plays an important role in maintaining the record of

the users systematically. They provide various facilities to help the users and manage finances

better. They provide various services to the users like creating their new accounts, performing

various transactions like money deposit, withdraws, balance enquiry. They encourage various

schemes like saving money habits. The total money in their accounts is not only saved but

also grows. Bank system private limited also helps the users by providing loans with low

interests with maximum time limit.

Bank system private limited provides saving deposits to the users. They keep the

daily records of the users like overall information of daily transactions they performed. The

main aim of the project is to develop a software in order to reduce the paper work. This system

also deals with providing all information related to transactions and loans.

The project has been planned to have the view of distributed architecture, with

centralized storage of the database. The application for the storage of the data has been

planned. Using the constructs of database and all the user interfaces have been designed using

the JAVA. The database connectivity is planned using the “Database” methodology. The

standards of security and data protective mechanism have been given a big choice for proper

usage.

The entire project has been developed keeping in view of the distributed client server

computing technology, in mind. The specification has been normalized up to 3NF to eliminate

all the anomalies that may arise due to the database transaction that are executed by the general

users and the organizational administration. The user interfaces are browser specific to give

distributed accessibility for the overall system.

LIST OF TABLES

Sl. No. Table No. Title Page

No.

1 5.4 Database Design 24

2 7.2 Advantage and Disadvantage 47

LIST OF FIGURES

Sl. No. Figure No. Title Page No.

1 1.6 Feasibility Association 8

2 5 System Architecture 17

3

5.1.1 Level-1 DFD 21

4 5.1.2 Level-2 DFD 21

5 5.2 Use Case Diagram 22

6 5.3 Sequence Diagram 23

7 6.2.1 Home Page 35

8 6.2.2 New account page 36

9 6.2.3

Deposit page 37

10 6.2.4 Withdraw Page 38

11 6.2.5 Print Record Page 39

12 6.2.6 Record Format Page 40

13 6.2.7 Delete account Page 41

14 6.2.8 Search Customer 42

15 6.2.9 About Page 43

16 6.2.10 View all Customers 44

17 7 Test strategy undertaken 46

18 7.4 Testing Process 49

19 7.7 Testing 51

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 1

CHAPTER 1

INTRODUCTION

1.1 GENERAL INTRODUCTION

Bank system private limited plays an important role in maintaining the record of

the users systematically. They provide various facilities to help the users and manage

finances better. They provide various services to the users like creating their new accounts,

performing various transactions like money deposit, withdraws, balance enquiry. They

encourage various schemes like saving money habits. The total money in their accounts is

not only saved but also grows. Bank system private limited also helps the users by providing

loans with low interests with maximum time limit.

Bank system private limited provides saving deposits to the users. They keep the

daily records of the users like overall information of daily transactions they performed. The

main aim of the project is to develop a software in order to reduce the paper work. This

system also deals with providing all information related to transactions and loans.

The project has been planned to have the view of distributed architecture, with

centralized storage of the database. The application for the storage of the data has been

planned. Using the constructs of database and all the user interfaces have been designed

using the JAVA. The database connectivity is planned using the “Database” methodology.

The standards of security and data protective mechanism have been given a big choice for

proper usage.

The entire project has been developed keeping in view of the distributed client server

computing technology, in mind. The specification has been normalized up to 3NF to

eliminate all the anomalies that may arise due to the database transaction that are executed by

the general users and the organizational administration. The user interfaces are browser

specific to give distributed accessibility for the overall system.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 2

PROJECT DESCRIPTION:

It manages all the transactions like new account entry, deposit as well as withdraw

entry of users, transactions of money for various processes, user loan entry, managing bills

like cash.

The system consists of 6 modules. First module is the create new account where

student opens his/her new account by providing all the details. The second module describes

the various transactions which are performed by the user like money deposit. Money deposit

describes the total amount deposited by the student to the his/her account. The third module

describes about the money withdraw. Withdraw describes total withdrawal amount of the

student from account. The fourth module describes about the records to be printed which has

been carried out till now. The fifth module Delete record is used to delete any record from

the database. The sixth module is the search customer which is used to search any customer

record from the database.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 3

1.2 PROBLEM STATEMENT

The primary goal of an BANK SYSTEM PRIVATE LIMITED is to record and store

all the information and data about the users who created a new bank account in a database.

This project deals with developing an easy software for admin to open the user accounts

easily and fast. But in the existing system it has various drawbacks like

Maintaining the details of all the users applied for opening new accounts is very

difficult.

Accounts are opened manually as and when needed to the users. Maintaining of all

users details manually is very hectic task.

To add the details of number of users applied for opening new account consumes

much time to record it manually.

There is no computer system for handling these tasks. Maintaining the record is

really a tedious task.

By developing an easy software, the users can easily apply for the pass.

Almost 60% of today’s information is still paper based.

30% of all office time is spent finding documents.

In the existing system the no. of staff required for completing the work is more, while

the new system requires only admin generally.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 4

1.3 EXISTING SYSTEM

The Existing system does not support for the following things:

There is no software present like ‘Bank system private limited.

The existing working of bank is officially offline procedure.

Offline process consumes much more time than online.

Existing system’s transactions are executed in offline mode, hence online data capture

and modification is not possible.

In Existing systems all the processes are carried out manually by the admin itself.

The admin has to keep all manual records.

It is very difficult to identify the particular record from all set of records.

Description of each record limits here.

It is a time-consuming process.

Each and every work should be done by the admin itself which leads to heavy

pressure.

Maintaining the details of all the users applied for opening new accounts is very

difficult.

The data entry process requires the data on the paper, which is then feed into the

application by the operator while doing so the data entry operator has to look into the

paper again & again and thus the chances of in accuracies in the typed contents

increases

Also the process includes higher transportation cost, increased handling cost, more

time delays, low accuracy, more usage of resources like registers, books, papers, etc.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 5

1.4 OBJECTIVE OF THE WORK

Enhancement:

The main objective of Bank system private limited is to enhance and upgrade

the existing system by increasing its efficiency and effectiveness. The software

improves the working methods by replacing the existing manual system with the

online web-based system.

Accuracy:

The Bank system private limited provides the uses a quick response with very

accurate information regarding the users etc. Any details or system in an accurate

manner, as and when required. This Project is based on real time application which

involves Database as information regarding user details and here user are people who

want to apply to the bus pass.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 6

1.5 PROPOSED SYSTEM

In the proposed system the admin of the Bank system private limited need not

maintain the user records manually. Bank system private limited project is mainly being

developed for the admin to finish the fast and easily. This Project is based on real time

application which involves Database as information regarding user details and here user are

people who want to apply for opening the new account. This project involves many modules

such as New account, Deposit, Withdraw, Print Record, Search for the users.

The main objective of the project is to reduce paper work, design a system and implement

the system.

Its aim is to develop a project with providing information’s with improved facilities.

This system is being implemented to minimize the manual data entry.

Reduced time consumption.

Provides easy transactions.

Provides information’s about transactions occurred.

Quick, authenticated access to accounts via the desktop.

Easily scalable to grow with changing system requirement.

Enterprise wide access to information.

Minimize Storage Space

The new system has:

Simple GUI, Attractive website designs.

It ends the burden of having large manual filing storage system.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 7

1.6 FEASIBILITY STUDY

Achievability study is significant as we need to know the unmistakable

comprehension pretty much all working references that is required for planning and keeping

up the proposed framework. Various kinds of contemplations dependent on speculations will

be examined under the financial possibility situation similarly the related Technology

varieties and the related operational varieties will be likewise talked about.

Specialized references are significant as when the framework is given in various

kinds of working situations it ought to give the related highlights so to model on the off

chance that it is required to be consolidated on a system it needs to help the related setup and

settings similarly on the off chance that it is required to be utilized in singular framework the

related virtualizations arrangements will be recognized.

The specialized Association that is required for recognizing the calculations will be

likewise reference as we need that particular calculation use must be elevated so as indicated

by the determination is the transformations will be checked reference as we need that

particular calculation use must be elevated so as indicated by the determination is the

transformations will be checked.

The references of the virtualizations will be likewise tried as it will be managed

without the client's information on the off chance that it is utilized on a focal machine so all

impression of virtualizations will be embraced. Achievement of various kinds of settings that

are given will be checked as the situation for various examples can be adjusted and can be

changed.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 8

Fig. 1.6 Feasibility Association

The operational practicality is related with the update that are required to recognize

that how the framework will be made to comprehend the clients about the highlights gave or

we can say that clients will be furnished with a specific example preparing so they ought to

comprehend that how in various situations the framework can be used. Various sorts off

documentations will be likewise given which can be recognized to better understanding

where various models will be additionally advanced.

Monetary possibility will be embraced to comprehend that how much speculation is

required for keeping up and for planning the framework. The assets will be given by the

governing body and friends won't take any sort of credits. A wide range of reserve

prerequisites will be examined by embraced various kinds of data examination and itemized

reports will be arranged and will be the confirmed by the governing body moreover.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 9

Possible credibility contemplates are possible to unite all the possible work

requirements to test all the major resources and threats present in the earth for the

improvement of our systems. The probability for orchestrating dynamically sifted through

information will be

disconnected into different sections of concentrate with the objective that the explanation can

be strengthened and the right technique for the information affiliation can be engineered

which will help us with settling on decisions and can be discussed.

The feasibility mull over is noteworthy for shielding of plausibility and associations

will more likely than not manage the errand profitably for the standard examinations that

should be discussed for the parametric structure.

• Technical feasibility

• Operational feasibility

• Economic feasibility

Fig. 1.5 Feasibility Study

1.6.1 Technical Feasibility

The particular credibility study will be considered for appraisal of the necessities of

the systems related to specific dominance, where all pieces of quick and dirty test-based

particular essentials and issues dealing with will be thought of. We will join all of the reasons

related to check and levels of leadership that are described for the use of various resources

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 10

available even by the system, considering various logins through different client structure

meanwhile on the individual reason.

The human factor will be related with the fundamental specialized necessities on the

grounds that various tasks will be incorporated with the framework to advance the general

framework where all unique business activities can be worked and diagrams can be custom-

made.

1.6.2 Operational Feasibility Every single related open door for improvement and the executives will be identified

with the activity, since we need every one of the procedures that are intended to be

legitimately sorted out in the advancement identified with usage. Successful corporate culture

and usage should be legitimately composed and important conditions for customer the

executive’s times.

The assets that singular partners give amid the activities will be considered for

genuine ongoing help required by the clients and at times it tends to befuddle keep up the

comprehension of combined resources that we need to characterize every single related

arrangement to counter and deal with the prerequisites.

1.6.3 Economic Feasibility

Assessed cost of the venture will be determined in light of the fact that we need all

important value proportions and will be determined with the proper sources that the

merchants ought to disperse among accomplices. This ought to be considered as the primary

wellspring of income and gainfulness in the undertaking, the fundamental objective of

legitimate income and the advancement of the framework is to think about that the benefits

ought to be considered in the proportion of improvement.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 11

CHAPTER 2

REVIEW OF LITERATURE

2.1 REVIEW OF SUMMARY

Dasgupta Siddhartha, Paul, Fuloria &Sanjay (2011). The study was conducted to

understand the behavioural intention of mobile banking usage of Indian customers. Research

methods like the Factor analysis and a multiple regression analysis were done in order to

determine the extent of impact the antecedents have over the behavioural intentions of

mobile banking usage. The results of the study showed that other than the traditional

variables like Perceived Usefulness and Perceived Ease of Use, factors like Perceived Image,

Perceived Value, Self-Efficacy, Perceived Credibility and Tradition all significantly affects

Behavioural Intentions towards mobile banking usage.

Palani and Yasodha P. (Apr 2012). The research paper is focused on customer’s

perceptions on mobile banking offered by Indian Overseas Bank and it also focuses on the

various drivers that drive mobile banking consumers. The results of this study showed that

gender, education and income of the consumers play an important role in usage of mobile

banking. Most of the researches are focused on the acceptance of the mobile banking

technology due to which not much research has been conducted on people. The research

reveals that if skills can be upgraded among the consumers there will be greater willingness

on the part of consumers toward the use of Mobile banking. Some the factors like security

trust, gender, education, religion, and price can have minimal effect on consumer mindset

towards Mobile banking compared to the other factors.

Thakur, Rakhi; Srivastava, Mala. (2013). The paper studies the factors influencing

the adoption intention of mobile commerce. Perceived usefulness, perceived ease of use and

social influence are found to be significant dimensions of technology adoption readiness to

use mobile commerce while facilitating conditions were not found to be significant. The

results of the research study also indicate the perceived credibility risk defined by security

risk and privacy risk are significantly associated with behavioural intention in negative

relation, which indicates that security and privacy concerns are important in deterring

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 12

customers from using mobile commerce. This research study developed an integrated model

for behavioural intention towards financial innovations. Practical implications of this study is

one of the few empirical studies which have investigated the adoption of mobile commerce in

India, which is considered one of the fastest growing countries in terms of mobile usage. The

study relates to inclusion of both utilitarian and credibility aspect of adoption intention. It

gives an empirical basis on which mobile and banking companies can base their mobile

payments marketing strategy.

Kumar, Reji G; Rejikumar, G; Ravindran, D Sudharani (2014). This research paper

examines the factors influencing the continuance decisions of the early adopters of m-

banking services in Kerala, India. The study used constructs adopted from Technology

Acceptance Model along with constructs of perceived service quality, perceived credibility

and perceived risk to empirically establish the influence on satisfaction and continuance

usage intentions. The study confirmed that after adoption of the technology, the customer

finds satisfaction in the quality parameters of the service. Perceptions about the risks

involved in m-banking had adverse impact on service quality and satisfaction.

Kalaiarasi, H & Srividya, V. 3 (Jul-Sep 2012). Mobile banking as a new channel to

the existing banking channels provides convenient and cost efficient banking services

anytime anywhere. It is observed that, though India has strong potential for mobile banking

only 5% of mobile subscribers are registered users of mobile banking. Attracting the new

customers may not be easy than retaining the existing mobile banking customers 2009).

Hence the current research focuses on the factors influencing actual usage of mobile banking

services. The results show that, Indians mobile banking usage is influenced by ease of mobile

banking technology, its suitability to the user’s lifestyle and the benefits like mobility and

mobile transactions. However, customer’s perception towards security of mobile transactions

and privacy fears demotivates actual usage.

Tenkasi Taluk &Devasena, S Valli, (Jan 2012). Banking system is the backbone of

the economy and Information Technology (IT) in turn has become the backbone of banking

activities. Technology, which was playing a supportive role in banking, has come to the

forefront with the ever-increasing challenges and requirements. Technology to start with was

a business enabler and now has become a business driver. The Banks cannot think of

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 13

introducing a financial product without IT support. Be it customer service, transactions,

remittances, audit, marketing, pricing or any other activity in the Banks, IT plays an

important role not to complete the activity with high efficiency but also has the potential to

innovate and meet the future requirements. The Banking Sector was early adopter of

technology and in that way set an example to the other industries the need to opt for

automation for taking full advantage in operational efficiency.

Prerna Sharma Bamoriya(2011).The study was conducted to identify certain issues

relating to banks, mobile handsets and telecom operators, mobile handset operability,

security/privacy, standardization of services, customization, Downloading & installing

application software and Telecom services quality. For this purpose, a descriptive design was

adopted to empirically explore the selected issues. Study suggested that from consumers

‘perspective mobile handset operability security or privacy and standardization of services

are the critical issues. The objective of the research is to study the selected issues in mobile

banking form urban customers’ perspective and to explore the perceived utility of mobile

banking in comparison to retail banking and online banking among the mobile banking users

and non-users. The study is aimed to evaluate perceptions and opinions of urban mobile

banking users. For this purpose, a cross sectional descriptive design was adopted with ad-hoc

quota sampling. Sample for the study comprised of 50 mobile banking users and 50 non-

users in Indore city, India.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 14

CHAPTER 3

SYSTEM CONFIGURATION

3.1 HARDWARE REQUIREMENTS

NAME SPECIFICATIONS

Central Processing Unit Pentium 2.66 GHZ

Hard Disk Capacity 20GB

Memory 512MB RAM

Monitor HP

Mouse Logitech Mouse

Table 3.1: Hardware Requirements

3.2 SOFTWARE REQUIREMENTS

NAME SPECIFICATIONS

Operating System Windows XP/7/8/10

Frontend Java

Design Html, CSS

Backend MySQL

Table 3.2: Software Requirements

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 15

CHAPTER 4

MODULE DESCRIPTION

Modules:

The system Consists of six modules:

1. Create new account

2. Deposit

3. Withdraw

4. Print record

5. Delete record

6. Search customer

CREATE NEW ACCOUNT MODULE:

The admin will create new account of the user.

The admin will fill all the details required for opening a new account.

Then all the transactions are performed by the admin itself.

DEPOSIT MODULE:

The admin will check the user account.

The admin will put the details in order to deposit the money to the users

account.

The admin will check the details of the application whether filled correctly.

The admin will then deposit money to the account.

WITHDRAW MODULE:

The admin will check the user account.

The admin will put the details in order to withdraw the money to the users

account.

The admin will check the details of the application whether filled correctly.

The admin will then withdraw money from the account.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 16

PRINT RECORD MODULE:

Once the transactions are performed by the admin the record has to be printed

to provide for the customer as a proof

The record which is printed consists of details such as account number,

account holder name, date of transaction and the total balance in the account.

DELETE RECORD MODULE:

The admin will check the user account which is to be deleted.

The admin will put the account number in order to delete the users account.

The admin will check in the database to confirm the account deleted.

SEARCH CUSTOMER MODULE:

The admin will search for the customer by putting the account number.

Once the admin puts the account number all the details of the particular

searched customer gets displayed.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 17

CHAPTER 5

SYSTEM DESIGN

Design is the initial phase in the advancement stage for any procedures and standards

to define a gadget, a procedure or framework in adequate detail to allow its physical

acknowledgment. When the product prerequisites have been breaking down and determined

the product configuration includes three specialized exercises - plan, coding, execution and

testing that are required to manufacture and confirm the product.

The structure rehearses are of head criticalness at this moment, light of the way that at

the present time, at last influencing the accomplishment of the thing use and its

straightforwardness of upkeep are made. These choices have the last bearing in the wake of

determined quality and sensibility of the framework. Arrangement is the best way to deal

with certainly make a comprehension of the client's necessities into completed the process of

programming or a framework.

Fig. 5 System Architecture

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 18

Examination can be characterized as separating of any entire in order to discover their

temperament, work and so on. It defines configuration as to make fundamental portrayals of;

to draw an example or framework for plan. Framework examination and design can be

portrayed as a lot of methods and procedures, a network of interests, a culture and a scholarly

direction.

5.1 Data Flow Diagram:

In the traditional S.D.L.C data flow diagrams were generated in the analysis

phase and structure charts were used in the design phase. Designing with the Data Flow

Diagrams involves creating a model of the system. The entities and attributes are a model, of

the states of the system. Processes model the rules of a System. The stimuli and response are

modeled by Data Flows. All of these models are combined into one graphic model called a

Data Flow Diagram.

Designing with the Data Flow Diagrams involves creating a model of the system.

The entities and attributes are a model, of the states of the system. Processes model the rules

of a System. The stimuli and response are modeled by Data Flows. All of these models are

combined into one graphic model called a Data Flow Diagram.

DFD’s have a notation for each of the components of the system. They also have

a notation for representing different levels in a hierarchy of detailed used to describe the

system. This notation makes it possible to represent an overall view of a large complex

system and a detailed view of a part of a system using the same notation. Parts of the system

can be isolated into independent sub-system. These work together as a unit to perform a set

of processes that must be done together at same time.

PROCESSES:

Processes show what the system does. Each process has one or more inputs and one

or more outputs. If a process does not have an output \then it is considered to a Black Hole.

The notation for the process is

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 19

ID

Process Name

FILE / DATA STORE:

A file or Data store indicates a respiratory of data. Process can Enter and Retrieve

Data from Data Store. Each Data Source has a unique name. The notation for the Data Store

is:

ID File Name

EXTERNAL ENTITIES:

External entities are outside the system but they either supply input data into the

system or make use of the system output. They are entities on which the designer has no

control. They may be an organizations customer or others with which the system interacts.

External entities, which supply the data into the system, are called as sinks. The notation for

external entity is

ENTITY NAME

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 20

DATA FLOWS:

Data flows model the flow of data in the system. It is indicated by line joining the

system components. An arrowhead indicates the direction of data flow and the labels above

the line indicates the name of the data-flow. The notation for the Data Flows is:

Data Flow Name

A Data Flow could indicate any of the following:

Flow from a Data Store to a process.

Flow from a process to Data store.

Flow from a Process to another Process.

Flow from an entity to a process or vice-versa.

SALIENT FEATURES OF DFD’S:

1. The DFD shows flow of data, not of control loops and decision are controlled

considerations do not appear on a DFD.

2. The DFD does not indicate the time factor involved in any process whether the

dataflow take place daily, weekly, monthly or yearly.

3. The sequence of events is not brought out on the DFD.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 21

LEVEL -1

Figure. 5.1.1

LEVEL -2

Figure 5.1.2

BANK MANAGEMENT SYSTEM

Create User Account

User Information

User database

User Account

BANK MANAGEMENT SYSTEM

Deposit Money

Withdraw Money

Print Receipt

Delete Record

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 22

5.2. Use Case Diagram:

A use case diagram is a dynamic or behavior diagram in UML. Use case diagrams

model the functionality of a system using actors and use cases. A use case diagram at its

simplest is a representation of a user’s interaction with the system that shows the relationship

between the user and the different use cases in which the user is involved. Use cases are a set

of actions, services, and functions that the system needs to perform.

Figure 5.2

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 23

5.3. Sequence Diagram:

A sequence diagram depicts interaction between objects in a sequential order i.e. the

order in which these interactions take place. We can also use the terms event diagrams or

event scenarios to refer to a sequence diagram. Sequence diagrams describe how and in what

order the objects in a system function.

Figure 5.3

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 24

5.4. Database Design:

The general point behind a database is to oversee data as a sorted out aggregate. A

database is a blend of interrelated informational collection aside with least excess to serve

different clients rapidly and effectively. Coming about to masterminding information and

yield, the ace must focus on database structure or how data ought to be filtered through

around client fundamentals. The general target is to make information get to, direct keen,

unassuming and flexible for different clients.

During database structure the going with objectives are concerned: -

• Controlled Redundancy

• Information self-administration

• Precise and combining

• More data with no issue

• Recuperation from disappointment

• Protection and security

Column name Data type Nullable Primary key

ACCOUNTNO Number No Yes

PERSON NAME Varchar2 Yes No

DEPOSIT DATE Date Yes No

DEPOSIT

AMOUNT

Number Yes No

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 25

CHAPTER 6

SYSTEM IMPLEMENTATION

6.1 PRE-IMPLEMENTATION

When the plan organizes has been finished the designer can begin composing the

code and really build up the framework. The framework could either be totally bespoke with

each code line composed by the authority software engineer or it very well may be created by

the off-the rack application which is redone later. The engineers will follow the framework

necessity details precisely. On the off chance that it is said to set a catch 500 PX in the upper

left corner with shading red then the very same thing will be finished by the engineer. They

ought not to go astray from the detail at any expense without talking with the investigator.

6.1.1 ECLIPSE IDE:

In the context of computing, Eclipse is an integrated development environment (IDE)

for developing applications using the Java programming language and other programming

languages such as C/C++, Python, PERL, Ruby etc.

The Eclipse platform which provides the foundation for the Eclipse IDE is composed

of plug-ins and is designed to be extensible using additional plug-ins. Developed using Java,

the Eclipse platform can be used to develop rich client applications, integrated development

environments and other tools. Eclipse can be used as an IDE for any programming language

for which a plug-in is available.

The Java Development Tools (JDT) project provides a plug-in that allows Eclipse to

be used as a Java IDE, PyDev is a plugin that allows Eclipse to be used as a Python IDE,

C/C++ Development Tools (CDT) is a plug-in that allows Eclipse to be used for developing

application using C/C++, the Eclipse Scala plug-in allows Eclipse to be used an IDE to

develop Scala applications and PHP eclipse is a plug-in to eclipse that provides complete

development tool for PHP.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 26

The major visible parts of an eclipse window are −

Views

Editors (all appear in one editor area)

Menu Bar

Toolbar

An eclipse perspective is the name given to an initial collection and arrangement of views

and an editor area. The default perspective is called java. An eclipse window can have

multiple perspectives open in it but only one perspective can be active at any point of time.

A user can switch between open perspectives or open a new perspective. A perspective

controls what appears in some menus and tool bars.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 27

A perspective has only one editor area in which multiple editors can be open. The

editor area is usually surrounded by multiple views. In general, editors are used to edit the

project data and views are used to view the project metadata. For example the package

explorer shows the java files in the project and the java editor is used to edit a java file.

The eclipse window can contain multiple editors and views but only one of them is

active at any given point of time. The title bar of the active editor or view looks different

from all the others.

The UI elements on the menu bar and tool bar represent commands that can be

triggered by an end user.

6.1.2 JDK:

The Java Development Kit (JDK) is a Sun Microsystems product aimed at Java

developers. Since the introduction of Java, it has been by far the most widely used Java SDK.

On 17 November 2006, Sun announced that it would be released under the GNU General

Public License (GPL), thus making it free software. This happened in large part on 8 May

2007 and the source code was contributed to the OpenJDK.

The primary components of the JDK are a selection of programming tools, including:

java – The loader for Java applications. This tool is an interpreter and can interpret

the class files generated by the javac compiler. Now a single launcher is used for both

development and deployment. The old deployment launcher, jre, is no longer

provided with Sun JDK.

javac – The compiler, which converts source code into Java bytecode

jar – The archiver, which packages related class libraries into a single JAR file. This

tool also helps manage JAR files.

javadoc – The documentation generator, which automatically generates

documentation from source code comments

jdb – The debugger

javap – The class file disassembler

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 28

appletviewer – This tool can be used to run and debug Java applets without a web

browser.

javah – The C header and stub generator, used to write native methods

extcheck – This utility can detect JAR-file conflicts.

apt – The annotation processing tool

jhat – (Experimental) Java heap analysis tool

jstack – (Experimental) This utility prints Java stack traces of Java threads.

jstat – (Experimental) Java Virtual Machine statistics monitoring tool

jstatd – (Experimental) jstat daemon

jinfo – (Experimental) This utility gets configuration information from a running Java

process or crash dump.

jmap – (Experimental) This utility outputs the memory map for Java and can print

shared object memory maps or heap memory details of a given process or core dump.

idlj – The IDL-to-Java compiler. This utility generates Java bindings from a given

IDL file.

policy tool – The policy creation and management tool, which can determine policy

for a Java runtime, specifying which permissions are available for code from various

sources

VisualVM – visual tool integrating several command line JDK tools and lightweight

performance and memory profiling capabilities

The JDK also comes with a complete Java Runtime Environment, usually called a

private runtime. It consists of a Java Virtual Machine and all of the class libraries that will be

present in the production environment, as well as additional libraries only useful to

developers, such as the internationalization libraries and the IDL libraries.

Also included are a wide selection of example programs demonstrating the use of almost all

portions of the Java API.

6.1.3 HTML:

HTML means Hypertext Markup Language. HTML is a method of describing the

format of documents which allows them to be viewed on computer screens. The global

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 29

publishing format of the Internet is HTML. It allows authors to use not only text but also

format that text with headings, lists, and tables, and to include still images, video, and sound

within text. Readers can access pages of information from anywhere in the world at the click

of a mouse-button. Information can be downloaded to the reader’s own PC or workstation.

HTML pages can also be used for entering data and as the front-end for commercial

transactions.

Features of HTML:

It is not a programming language

It is not data description language

It is simple to understand and implement

HTML constructs a very easy to comprehend, and can be used effectively by anybody

The methodology used by HTML to mark-up information is independent of its

representation on a particular hardware or software architecture

HTML syntax is worldwide standard

6.1.4 JAVA:

Java is a high-level programming language originally developed by Sun

Microsystems and released in 1995. Java runs on a variety of platforms, such as Windows,

Mac OS, and the various versions of UNIX. This tutorial gives a complete understanding of

Java. This reference will take you through simple and practical approaches while learning

Java Programming language.

Features of java:

Object Oriented − In Java, everything is an Object. Java can be easily extended

since it is based on the Object model.

Platform Independent − Unlike many other programming languages including C

and C++, when Java is compiled, it is not compiled into platform specific machine,

rather into platform independent byte code. This byte code is distributed over the

web and interpreted by the Virtual Machine (JVM) on whichever platform it is being

run on.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 30

Simple − Java is designed to be easy to learn. If you understand the basic concept of

OOP Java, it would be easy to master.

Secure − With Java's secure feature it enables to develop virus-free, tamper-free

systems. Authentication techniques are based on public-key encryption.

Architecture-neutral − Java compiler generates an architecture-neutral object file

format, which makes the compiled code executable on many processors, with the

presence of Java runtime system.

Portable − Being architecture-neutral and having no implementation dependent

aspects of the specification makes Java portable. Compiler in Java is written in

ANSI C with a clean portability boundary, which is a POSIX subset.

Robust − Java makes an effort to eliminate error prone situations by emphasizing

mainly on compile time error checking and runtime checking.

Applications of java:

Multithreaded − With Java's multithreaded feature it is possible to write programs

that can perform many tasks simultaneously. This design feature allows the

developers to construct interactive applications that can run smoothly.

Interpreted − Java byte code is translated on the fly to native machine instructions

and is not stored anywhere. The development process is more rapid and analytical

since the linking is an incremental and light-weight process.

High Performance − With the use of Just-In-Time compilers, Java enables high

performance.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 31

6.1.4 JAVA SWINGS:

Java Swing is a GUI (graphical user Interface) widget toolkit for Java. Java Swing is

a part of Oracle’s Java foundation classes. Java Swing is an API for providing graphical user

interface elements to Java Programs. Swing was created to provide more powerful and

flexible components than Java AWT (Abstract Window Toolkit).

Swing provides a look and feel that emulates the look and feel of several platforms,

and also supports a pluggable look and feel that allows applications to have a look and feel

unrelated to the underlying platform. It has more powerful and flexible components than

AWT. In addition to familiar components such as buttons, check boxes and labels, Swing

provides several advanced components such as tabbed panel, scroll panes, trees, tables, and

lists. Unlike AWT components, Swing components are not implemented by platform-specific

code. Instead, they are written entirely in Java and therefore are platform-independent. The

term lightweight is used to describe such an element.

6.1.5 JAVA APPLETS:

An applet is a Java program that can be embedded into a web page. It runs inside the

web browser and works at client side. An applet is embedded in an HTML page using the

APPLET or OBJECT tag and hosted on a web server.

Important points:

• All applets are sub-classes (either directly or indirectly) of java.applet.Applet class.

• Applets are not stand-alone programs. Instead, they run within either a web browser

or an applet viewer. JDK provides a standard applet viewer tool called applet viewer.

• In general, execution of an applet does not begin at main() method.

• Output of an applet window is not performed by System.out.println(). Rather it is

handled with various AWT methods, such as drawString().

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 32

Life cycle of an applet:

Fig. 6.1.5 Applet Life Cycle

It is important to understand the order in which the various methods shown in the above

image are called. When an applet begins, the following methods are called, in this sequence:

• init( )

• start( )

• paint( )

When an applet is terminated, the following sequence of method calls takes place:

• stop( )

• destroy( )

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 33

6.1.6 MY SQL:

MySQL is the most popular Open Source Relational SQL Database Management

System. MySQL is one of the best RDBMS being used for developing various web-based

software applications. MySQL is developed, marketed and supported by MySQL AB, which

is a Swedish company. This tutorial will give you a quick start to MySQL and make you

comfortable with MySQL programming.

MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.

MySQL is developed, marketed and supported by MySQL AB, which is a Swedish

company. MySQL is becoming so popular because of many good reasons −

MySQL is released under an open-source license. So you have nothing to pay to use

it.

MySQL is a very powerful program in its own right. It handles a large subset of the

functionality of the most expensive and powerful database packages.

MySQL uses a standard form of the well-known SQL data language.

MySQL works on many operating systems and with many languages including PHP,

PERL, C, C++, JAVA, etc.

MySQL works very quickly and works well even with large data sets.

MySQL is very friendly to PHP, the most appreciated language for web

development.

MySQL supports large databases, up to 50 million rows or more in a table. The

default file size limit for a table is 4GB, but you can increase this (if your operating

system can handle it) to a theoretical limit of 8 million terabytes (TB).

MySQL is customizable. The open-source GPL license allows programmers to

modify the MySQL software to fit their own specific environments.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 34

6.1.7 JDBC:

In an effort to set an independent database standard API for Java; Sun Microsystems

developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database

access mechanism that provides a consistent interface to a variety of RDBMSs. This

consistent interface is achieved through the use of “plug-in” database connectivity modules,

or drivers. If a database vendor wishes to have JDBC support, he or she must provide the

driver for each platform that the database and Java run on. To gain a wider acceptance of

JDBC, Sun based JDBC’s framework on ODBC. As you discovered earlier in this chapter,

ODBC has widespread support on a variety of platforms. Basing JDBC on ODBC will allow

vendors to bring JDBC drivers to market much faster than developing a completely new

connectivity solution.

JDBC was announced in March of 1996. It was released for a 90 day public review

that ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was

released soon after. The remainder of this section will cover enough information about JDBC

for you to know what it is about and how to use it effectively. This is by no means a

complete overview of JDBC. That would fill an entire book.

JDBC Goals Few software packages are designed without goals in mind. JDBC is one that,

because of its many goals, drove the development of the API. These goals, in conjunction

with early reviewer feedback, have finalized the JDBC class library into a solid framework

for building database applications in Java.

The goals that were set for JDBC are important. They will give you some insight as to

why certain classes and functionalities behave the way they do.

The design goals for JDBC are as follows:

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 35

6.2 POST-IMPLEMENTATION

6.2.1 Home page:

Figure 6.2.1: Home Page

This is the home page of the application which provides many options for the

admin to open the new accounts of the users and perform transactions.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 36

6.2.2 New Account page:

Figure 6.2.2: New account Page

This page of the application is used by the admin to create new account of the

users requested.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 37

6.2.3 Deposit page:

Figure 6.2.3: Deposit Page

This is the Deposit page of the application which is used by the admin to deposit

the money to the users account who has requested.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 38

6.2.4 Withdraw page:

Figure 6.2.4: Withdraw Page

This is the withdraw page of the application where admin will withdraw the

money from the users account whoever requested.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 39

6.2.5 Print Record page:

Figure 6.2.5: Print Record Page

This is the Print record page of the application where admin will use it to print the

record of the users of the present transactions to show it as a proof.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 40

6.2.6 Record Format page:

Figure 6.2.6: Record Format Page

This is the record format page of the application where admin will use it to print

the record of the users of the present transactions to show it as a proof.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 41

6.2.7 Delete Account page:

Figure 6.2.7: Delete account Page

This is the delete account page of the application where admin will use it to delete

the accounts of the non-existing users.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 42

6.2.8 Search Customer page:

Figure 6.2.8: Search Customer Page

This is the search customer page of the application where admin will use it to

search the customers.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 43

6.2.9 About page:

Figure 6.2.9: About Page

This is the about page of the application where it displays about the bank and

admin details.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 44

6.2.10 View All Customers page:

Figure 6.2.10: View all customers Page

This is the view all customers page of the application where admin will use it to

view all the existing customers with all their details.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 45

CHAPTER 7

SYSTEM TESTING

The explanation behind the progression structure is to give commendable yield

pondering the data given by the customers, with the objective that we need an item testing

methodology to test and consolidate all the fragments of the substance and arrange substance.

The item will expect a noteworthy activity in giving structure utilizing of the test system

where we should achieve the inspiration driving the system where all the related activities

can be practiced and administered. We have set up a couple of various approaches to test

various areas of the structure so all the overhauls are suitably orchestrated and implemented.

The correct key understanding code should be used to check the code with the

objective that the program can be affirmed for yield when it is returned. In any occasion,

during the evaluation, the association and collaboration in various social occasions should in

like manner be cultivated for the right results. By then there will be real motorized

programming associated with the utilization of various test frameworks and help with testing

cases.

Programming testing depends on the quality watch that must be kept up when various

kinds of references are required to be cultivated in the ongoing or we can say that when we

are giving the framework which bolsters various sorts of similarity working it must be first

check for various sorts of situations before it is given to the customers. A wide range of

references dependent on the check will be advanced. Programming testing should be possible

with the assistance of various sorts of systems so every single kinds of strategy that is

required will be appropriately comprehended and the one which is reasonable will be

executed so for instance that we will utilize the unit testing and the reference discovery

testing as the significant methods.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 46

Programming testing is especially significant for a framework usage as before the

execution if the blunders are discovered it will be reasonable for the organization since when

the mistakes are discovered later in the working stage it requires more investment. Multiple

sorts of experiments will be composed with the goal that we can comprehend later on that

how the highlights have reflected for the functionality. Programming testing must be finished

with cooperation where all specialist’s dependent on testing office and improvement office

will relate.

Fig. 7 Test strategy undertaken

7.1 Unit testing

Different units are required to be checked first so the mix testing can be performed

and with the assistance of unit testing we can appropriately recognize the definite references

of various kinds of highlights The references of the security systems that is incorporated will

be given to the utilization of such a way, that various sorts of exemptions can be chosen and

it very well may be altered and it tends to be used appropriately. The reference

contemplations that will be included will be checked for the client direction or we can say

that we need to watch that when various kinds of modes are gathered every hub works

appropriately with point by point similarity

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 47

The unit references that will be viewed as will be checked with appropriate convenience as

we necessitate that a wide range of prerequisites for various kinds of area association ought

to be fulfilled and each extraordinary sort of clients will have diverse thought of security

7.2 Discovery Testing

Discovery testing will be founded on the client testing whether client ought to be

given a lot of assets dependent on beta working so the customer can check the functionality

from their side. For playing out the discovery testing the necessary record information isn't

required it is done on to the customer side. Discovery testing will be performed with point by

point situation check as in the continuous the related functionality will be tried by the client

them self.

Advantages Disadvantages

Well suited and efficient for large code

segments

Limited coverage since only a selected

number of test scenarios are actually

performed.

Code Access not required Inefficient testing, due to the fact that

the tester only has limited knowledge

about an application.

Clearly separate user's perspective from

the developer's perspective through

visibly defined roles.

Blind Coverage, since the tester cannot

specific code segments or error prone

areas

Large number of moderately skilled

testers can test the application with no

knowledge of implementation,

programming language or operating

systems.

The test cases are difficult to design.

Fig. 7.2 Advantage and Disadvantage

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 48

7.3 Integration Testing

Programming coordination testing is the gradual combination testing of at least two

incorporated programming segments on a solitary stage to create disappointments brought

about by interface surrenders.

The errand of the incorporation test is to watch that segments or programming

applications, for example parts in a product framework or – one stage up – programming

applications at the organization level – associate without blunder.

7.4 Verification and Validation Testing

The Verification is the technique for checking the product and indicating the client's

prerequisites. The way toward assessing the product to decide if the result of the given

prerequisite is met by the client's particular necessities. It incorporates all the movement

related with delivering top notch programming. Kinds of confirmation.

• Static testing.

• Walkthrough testing.

• Inspection testing.

• Review.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 49

Fig. 7.4 Testing Process

Approval is the way toward assessing the last item, to check the last item meets the

client prerequisites as referenced previously. It is a technique for checking the real item.

Confirmation: - Are we are doing the item right Validation: - Are we are doing the

correct item. Check and endorsement have been settled that the activity of the paid activity

ensures the necessities and is legitimate for its usage, to review the activities to keep up a key

good ways from disorder, or static testing and authenticity suggests the genuine testing

practicality and dynamic evaluation money. Central purposes of affirmation and endorsement

• It helps in identifying the blunders and adjusting the mistake at the early stages.

• Encourages and improves in overseeing process and product risks.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 50

• Acts as supporting device for the product life for keep up the nature of the item in

organization.

7.5 White Box Testing

White Box Testing is a trying where wherein the product analyzer knows about the inward

activities, structure and language of the product, or if nothing else its motivation. It is reason.

It is utilized to test zones that can't be reached from a discovery level.

7.6 Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner workings,

structure or language of the module being tested. Black box tests, as most other kinds of

tests, must be written from a definitive source document, such as specification or

requirements document, such as specification or requirements document.

It is a testing in which the software under test is treated, as a black box .you cannot “see” into

it. The test provides inputs and responds to outputs without considering how the software

works.

7.7 Test cases

The rule focus of testing is to uncover an enormous gathering of botches, proficiently and

with least effort and time.

• A productive test is one that uncovers an up to this point undiscovered error.

• Testing is a system of executing a program with the desire for finding a bungle.

Method to perceive testing mess up. Testing quality confirmations and anticipate a colossal

action in guaranteeing the undaunted idea of the thing. The test outcomes are then utilized

during help. The objective of the test is reliably indicated that the program shows that there is

no blunder in it.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 51

The central employment of the evaluation sort out is to perceive the blunder that might be

open in the program. Fittingly, it ought not to be a test to show the clarification behind a

program, at any rate it ought to be needed to show that a program doesn't work. The way

toward executing a program to perceive the test error.

Fig. 7.7 Testing

7.8 SYSTEM SECURITY

The protection of computer based resources that includes hardware, software, data,

procedures and people against unauthorized use or natural. Disaster is known as System

Security.

System Security can be divided into four related issues:

Security

Integrity

Privacy

Confidentiality

SYSTEM SECURITY refers to the technical innovations and procedures applied to the

hardware and operation systems to protect against deliberate or accidental damage from a

defined threat.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 52

DATA SECURITY is the protection of data from loss, disclosure, modification and

destruction.

SYSTEM INTEGRITY refers to the power functioning of hardware and programs,

appropriate physical security and safety against external threats such as eavesdropping and

wiretapping.

PRIVACY defines the rights of the user or organizations to determine what information they

are willing to share with or accept from others and how the organization can be protected

against unwelcome, unfair or excessive dissemination of information about it.

CONFIDENTIALITY is a special status given to sensitive information in a database to

minimize the possible invasion of privacy. It is an attribute of information that characterizes

its need for protection.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 53

CHAPTER 8

RESULTS AND DISCUSSION

8.1 CONCLUSION

This project is being mainly developed to reduce the manual work and less

time consumption. It provides all necessary information to the management as well as the

user with the use of this system. The admin can simply sit in front of the system and monitor

all the activities without any physical movement of the file. Admin can service the users

request best in time.

The system provides quickly and valuable information. These modules have been integrated

for effective use of the management for future forecasting and for the current need.

8.2 Limitations

Legitimate validation is required for the working. Point by point preparing is

additionally required for the filling in as different references of letters are required to be

incorporated. A definite comprehension pretty much all various kinds of approaches in

various sorts of calculations are required with the goal that it very well may be tweaked in

utilized. The framework depends on new systems where numerous kinds of data is required

to be recognized and if any flawlessness is being distributed not with appropriate

understanding the information may be lost which is quite difficult in terms of retrieval.

Genuine approval is required for the working Point by point getting ready is

moreover required for the filling in as various references of letters are required to be

consolidated

An unmistakable appreciation essentially all different sorts of approaches in different

sorts of figuring are required with the objective that it might be changed in used. The

structure relies upon new frameworks where various sorts of information is required to be

perceived and if any faultlessness is being dispersed not with suitable understanding the data

might be lost which is very troublesome as far as recovery.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 54

8.1 FUTURE ENHANCEMENT

We have to refer the future enhancement as we want that system can be utilized in the

future also when there will be different types of technological will be available so we have to

maintain the consistency of working with proper requirement of future enhancement

prospective. New techniques or technologies can be required for the security purpose and can

be added in the future based on the requirement.

In Future we wish to improvise the system in various aspects:

Detailed information gathering has to be done. Without that the purpose for using the

software won’t be satisfied properly.

Implementing the software requires change in the business practices.

We will be also improving the efficiency of the application.

We may also make more reliable to the users.

We also have planned to add extra features in all the modules.

However, it can give good profits in the long run.

BANK SYSTEM PRIVATE LIMITED 1NH17MCA58

Department of MCA, NHCE 2019-2020 55

CHAPTER 9

REFERENCES

8.1 TEXT REFERENCE

[1] Java The Complete Reference (9th Edition) By- Herbert Scheldt, Tata McGraw

Hill, Edition 2014.

[2] Elmasri and Navathe: Fundamentals of Database Systems, 7th Edition, Pearson

Education, 2015.

[3] Ali Bahrami (1999) ‘Object Oriented Systems Development’, McGraw-Hill

International Editions.

[4] Vivek Chopra ‘Professional Apache Tomcat 6’.

[5] Roger S. Pressman: Software Engineering – A Practitioners approach, 7th Edition,

Mc-Graw Hill Education, 2012

8.2 WEB REFERENCE [6] https://stackoverflow.com

[7] http://clan fundamentals blogspot.in/

[8] https://github.com/

[9] https://www.codeacademy.com/

[10] https://www.wikipedia.org/

[11] https://www.webopedia.com

[12] https://www.tutorialspoint.com

[13] https://www.mysql.com/