BANK SYSTEM PRIVATE LIMITED
A Dissertation submitted in partial fulfillment of the requirements for the award of degree of
MASTER OF COMPUTER APPLICATIONS
By
YESUMALI AISHWARYA C
1NH17MCA58
Under the Guidance of
GOVINDARAJ M
Sr. Asst.Professor
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
2019-2020
BANK SYSTEM PRIVATE LIMITED
A Dissertation submitted in partial fulfillment of the requirements for the award of degree of
MASTER OF COMPUTER APPLICATIONS
By
YESUMALI AISHWARYA C
1NH17MCA58
Under the Guidance of
Internal Guide: External Guide: Govindaraj M Joseph. S. Kumar
Sr. Asst.Professor HR
Dept. of MCA, NHCE JMR Infotech
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
2019-2020
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
CERTIFICATE
This is to certify that YESUMALI AISHWARYA C, bearing USN
1NH17MCA58 has successfully completed her final year VI semester project
work entitled BANK SYSTEM PRIVATE LIMITED as a partial
fulfillment of the requirements for the award of MASTER OF
COMPUTER APPLICATIONS degree, during the Academic Year
2019-20 under my supervision. This report has not been submitted to any other
Organization/University for any award of degree.
Signature of the Internal Guide Head of the Department Principal
External Viva
Internal Examiner External Examiner
Date:
ACKNOWLEDGEMENT
I would like to thank Dr. Mohan Manghnani, Chairman of New Horizon College of
Engineering for providing good infrastructure and Hi-Tech lab facilities to develop and
improve student’s skills.
I sincerely express my gratitude to the college Principal Dr. Manjunatha for supporting
the students in all their technical activities and giving guidance to them. I would like
to thank Dr. V. Asha, Head, Department of MCA, New Horizon College of
Engineering for granting permission to undertake this project. I would like to express
my gratitude to the project guide Prof Govindaraj M for giving all the instructions and
guidelines at every stage of the Project work.
I thank all the staff members of the Department of Master of Computer Applications,
for extending their constant support to complete the project. I express my heartfelt
thanks to my parents and friends who were a constant source of support and inspiration
throughout the project.
COMPANY PROFILE
With delivery and development centers in India, a sizable global presence and
customers spread across 5 continents, JMR Infotech is a leading provider of information
technology and related services. We are committed to helping the world’s best companies to
build, run and grow their information technology landscape.
Founded in 2007, JMR Infotech is dedicated to help customers harness the power of
information technology to transform the way they work and maintain a strong competitive
edge. At JMR, we are driven by a strong passion to help our customers build stronger, agile
and more innovative businesses. We strive for client satisfaction and innovation with a global,
collaborative workforce backed by strategic insight, technology expertise, deep domain
knowledge and flawless business processes.
Since inception, our company has operated on the principle of bringing more value to
customers by building and executing effective technology solutions that fit their needs and
drive the progress they desire.
The title of world’s first Oracle Platinum Partner fully specialized in all financial
solutions, bears testimony to our comprehensive offerings, strong focus and unmatched
expertise.
In August 2014, Global Banking & Finance Review recognized JMR Infotech’s
thought leadership, technical prowess and customer focus by presenting the Best Core
Banking Technology Provider Award for the Middle East and Africa region.
Silicon Review, in 2015, recognized JMR Infotech as one of the 50 Fastest Growing
Tech Companies recognizing our creativity in innovation, customer orientation and domain
influence.
JMR Infotech was also awarded the title of ‘World Business Leader’ by World
Confederation of Businesses in November 2015. This award recognizes JMR Infotech for
innovation, knowledge & systematic approach.
JMR Infotech ed-tech solutions have been recognized as Best Innovation in Education
Technology for Schools at the 7th World Education Summit in August 2016.
TABLE OF CONTENTS
Chapter
No. Title Page No
ABSTRACT
LIST OF TABLES
LIST OF FIGURES
(i)
(ii)
(iii)
1 1.1
1.2
1.3
1.4
1.5
1.6
INTRODUCTION General Introduction
Problem Statement
Existing System
Objective of the Work
Proposed System with Methodology
Feasibility Study
1
3
4
5
6
7
2 2.1
REVIEW OF LITERATURE Review Summary
11
3 3.1
3.2
SYSTEM CONFIGURATION Hardware requirements
Software requirements
14
4 4.1
4.2
MODULE DESCRIPTION Module 1
Module 2
15
5 5.1
5.2
5.3
5.4
SYSTEM DESIGN DFD Diagram
Use Case Diagram
Sequence Diagram
Database Design
18
22
23
24
6 6.1
6.1.1
6.1.2
SYSTEM IMPLEMENTATION Implementation
Pre – Implementation Technique
Post – Implementation Technique
25
35
7
7.1
SYSTEM TESTING Test Cases
45
8
8.1
8.2
8.3
RESULTS AND DISCUSSIONS Conclusion
Limitations
Future Enhancements
53
53
54 9
9.1
9.2
REFERENCES Text Reference
Web Reference
55
ABSTRACT
Bank system private limited plays an important role in maintaining the record of
the users systematically. They provide various facilities to help the users and manage finances
better. They provide various services to the users like creating their new accounts, performing
various transactions like money deposit, withdraws, balance enquiry. They encourage various
schemes like saving money habits. The total money in their accounts is not only saved but
also grows. Bank system private limited also helps the users by providing loans with low
interests with maximum time limit.
Bank system private limited provides saving deposits to the users. They keep the
daily records of the users like overall information of daily transactions they performed. The
main aim of the project is to develop a software in order to reduce the paper work. This system
also deals with providing all information related to transactions and loans.
The project has been planned to have the view of distributed architecture, with
centralized storage of the database. The application for the storage of the data has been
planned. Using the constructs of database and all the user interfaces have been designed using
the JAVA. The database connectivity is planned using the “Database” methodology. The
standards of security and data protective mechanism have been given a big choice for proper
usage.
The entire project has been developed keeping in view of the distributed client server
computing technology, in mind. The specification has been normalized up to 3NF to eliminate
all the anomalies that may arise due to the database transaction that are executed by the general
users and the organizational administration. The user interfaces are browser specific to give
distributed accessibility for the overall system.
LIST OF TABLES
Sl. No. Table No. Title Page
No.
1 5.4 Database Design 24
2 7.2 Advantage and Disadvantage 47
LIST OF FIGURES
Sl. No. Figure No. Title Page No.
1 1.6 Feasibility Association 8
2 5 System Architecture 17
3
5.1.1 Level-1 DFD 21
4 5.1.2 Level-2 DFD 21
5 5.2 Use Case Diagram 22
6 5.3 Sequence Diagram 23
7 6.2.1 Home Page 35
8 6.2.2 New account page 36
9 6.2.3
Deposit page 37
10 6.2.4 Withdraw Page 38
11 6.2.5 Print Record Page 39
12 6.2.6 Record Format Page 40
13 6.2.7 Delete account Page 41
14 6.2.8 Search Customer 42
15 6.2.9 About Page 43
16 6.2.10 View all Customers 44
17 7 Test strategy undertaken 46
18 7.4 Testing Process 49
19 7.7 Testing 51
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 1
CHAPTER 1
INTRODUCTION
1.1 GENERAL INTRODUCTION
Bank system private limited plays an important role in maintaining the record of
the users systematically. They provide various facilities to help the users and manage
finances better. They provide various services to the users like creating their new accounts,
performing various transactions like money deposit, withdraws, balance enquiry. They
encourage various schemes like saving money habits. The total money in their accounts is
not only saved but also grows. Bank system private limited also helps the users by providing
loans with low interests with maximum time limit.
Bank system private limited provides saving deposits to the users. They keep the
daily records of the users like overall information of daily transactions they performed. The
main aim of the project is to develop a software in order to reduce the paper work. This
system also deals with providing all information related to transactions and loans.
The project has been planned to have the view of distributed architecture, with
centralized storage of the database. The application for the storage of the data has been
planned. Using the constructs of database and all the user interfaces have been designed
using the JAVA. The database connectivity is planned using the “Database” methodology.
The standards of security and data protective mechanism have been given a big choice for
proper usage.
The entire project has been developed keeping in view of the distributed client server
computing technology, in mind. The specification has been normalized up to 3NF to
eliminate all the anomalies that may arise due to the database transaction that are executed by
the general users and the organizational administration. The user interfaces are browser
specific to give distributed accessibility for the overall system.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 2
PROJECT DESCRIPTION:
It manages all the transactions like new account entry, deposit as well as withdraw
entry of users, transactions of money for various processes, user loan entry, managing bills
like cash.
The system consists of 6 modules. First module is the create new account where
student opens his/her new account by providing all the details. The second module describes
the various transactions which are performed by the user like money deposit. Money deposit
describes the total amount deposited by the student to the his/her account. The third module
describes about the money withdraw. Withdraw describes total withdrawal amount of the
student from account. The fourth module describes about the records to be printed which has
been carried out till now. The fifth module Delete record is used to delete any record from
the database. The sixth module is the search customer which is used to search any customer
record from the database.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 3
1.2 PROBLEM STATEMENT
The primary goal of an BANK SYSTEM PRIVATE LIMITED is to record and store
all the information and data about the users who created a new bank account in a database.
This project deals with developing an easy software for admin to open the user accounts
easily and fast. But in the existing system it has various drawbacks like
Maintaining the details of all the users applied for opening new accounts is very
difficult.
Accounts are opened manually as and when needed to the users. Maintaining of all
users details manually is very hectic task.
To add the details of number of users applied for opening new account consumes
much time to record it manually.
There is no computer system for handling these tasks. Maintaining the record is
really a tedious task.
By developing an easy software, the users can easily apply for the pass.
Almost 60% of today’s information is still paper based.
30% of all office time is spent finding documents.
In the existing system the no. of staff required for completing the work is more, while
the new system requires only admin generally.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 4
1.3 EXISTING SYSTEM
The Existing system does not support for the following things:
There is no software present like ‘Bank system private limited.
The existing working of bank is officially offline procedure.
Offline process consumes much more time than online.
Existing system’s transactions are executed in offline mode, hence online data capture
and modification is not possible.
In Existing systems all the processes are carried out manually by the admin itself.
The admin has to keep all manual records.
It is very difficult to identify the particular record from all set of records.
Description of each record limits here.
It is a time-consuming process.
Each and every work should be done by the admin itself which leads to heavy
pressure.
Maintaining the details of all the users applied for opening new accounts is very
difficult.
The data entry process requires the data on the paper, which is then feed into the
application by the operator while doing so the data entry operator has to look into the
paper again & again and thus the chances of in accuracies in the typed contents
increases
Also the process includes higher transportation cost, increased handling cost, more
time delays, low accuracy, more usage of resources like registers, books, papers, etc.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 5
1.4 OBJECTIVE OF THE WORK
Enhancement:
The main objective of Bank system private limited is to enhance and upgrade
the existing system by increasing its efficiency and effectiveness. The software
improves the working methods by replacing the existing manual system with the
online web-based system.
Accuracy:
The Bank system private limited provides the uses a quick response with very
accurate information regarding the users etc. Any details or system in an accurate
manner, as and when required. This Project is based on real time application which
involves Database as information regarding user details and here user are people who
want to apply to the bus pass.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 6
1.5 PROPOSED SYSTEM
In the proposed system the admin of the Bank system private limited need not
maintain the user records manually. Bank system private limited project is mainly being
developed for the admin to finish the fast and easily. This Project is based on real time
application which involves Database as information regarding user details and here user are
people who want to apply for opening the new account. This project involves many modules
such as New account, Deposit, Withdraw, Print Record, Search for the users.
The main objective of the project is to reduce paper work, design a system and implement
the system.
Its aim is to develop a project with providing information’s with improved facilities.
This system is being implemented to minimize the manual data entry.
Reduced time consumption.
Provides easy transactions.
Provides information’s about transactions occurred.
Quick, authenticated access to accounts via the desktop.
Easily scalable to grow with changing system requirement.
Enterprise wide access to information.
Minimize Storage Space
The new system has:
Simple GUI, Attractive website designs.
It ends the burden of having large manual filing storage system.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 7
1.6 FEASIBILITY STUDY
Achievability study is significant as we need to know the unmistakable
comprehension pretty much all working references that is required for planning and keeping
up the proposed framework. Various kinds of contemplations dependent on speculations will
be examined under the financial possibility situation similarly the related Technology
varieties and the related operational varieties will be likewise talked about.
Specialized references are significant as when the framework is given in various
kinds of working situations it ought to give the related highlights so to model on the off
chance that it is required to be consolidated on a system it needs to help the related setup and
settings similarly on the off chance that it is required to be utilized in singular framework the
related virtualizations arrangements will be recognized.
The specialized Association that is required for recognizing the calculations will be
likewise reference as we need that particular calculation use must be elevated so as indicated
by the determination is the transformations will be checked reference as we need that
particular calculation use must be elevated so as indicated by the determination is the
transformations will be checked.
The references of the virtualizations will be likewise tried as it will be managed
without the client's information on the off chance that it is utilized on a focal machine so all
impression of virtualizations will be embraced. Achievement of various kinds of settings that
are given will be checked as the situation for various examples can be adjusted and can be
changed.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 8
Fig. 1.6 Feasibility Association
The operational practicality is related with the update that are required to recognize
that how the framework will be made to comprehend the clients about the highlights gave or
we can say that clients will be furnished with a specific example preparing so they ought to
comprehend that how in various situations the framework can be used. Various sorts off
documentations will be likewise given which can be recognized to better understanding
where various models will be additionally advanced.
Monetary possibility will be embraced to comprehend that how much speculation is
required for keeping up and for planning the framework. The assets will be given by the
governing body and friends won't take any sort of credits. A wide range of reserve
prerequisites will be examined by embraced various kinds of data examination and itemized
reports will be arranged and will be the confirmed by the governing body moreover.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 9
Possible credibility contemplates are possible to unite all the possible work
requirements to test all the major resources and threats present in the earth for the
improvement of our systems. The probability for orchestrating dynamically sifted through
information will be
disconnected into different sections of concentrate with the objective that the explanation can
be strengthened and the right technique for the information affiliation can be engineered
which will help us with settling on decisions and can be discussed.
The feasibility mull over is noteworthy for shielding of plausibility and associations
will more likely than not manage the errand profitably for the standard examinations that
should be discussed for the parametric structure.
• Technical feasibility
• Operational feasibility
• Economic feasibility
Fig. 1.5 Feasibility Study
1.6.1 Technical Feasibility
The particular credibility study will be considered for appraisal of the necessities of
the systems related to specific dominance, where all pieces of quick and dirty test-based
particular essentials and issues dealing with will be thought of. We will join all of the reasons
related to check and levels of leadership that are described for the use of various resources
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 10
available even by the system, considering various logins through different client structure
meanwhile on the individual reason.
The human factor will be related with the fundamental specialized necessities on the
grounds that various tasks will be incorporated with the framework to advance the general
framework where all unique business activities can be worked and diagrams can be custom-
made.
1.6.2 Operational Feasibility Every single related open door for improvement and the executives will be identified
with the activity, since we need every one of the procedures that are intended to be
legitimately sorted out in the advancement identified with usage. Successful corporate culture
and usage should be legitimately composed and important conditions for customer the
executive’s times.
The assets that singular partners give amid the activities will be considered for
genuine ongoing help required by the clients and at times it tends to befuddle keep up the
comprehension of combined resources that we need to characterize every single related
arrangement to counter and deal with the prerequisites.
1.6.3 Economic Feasibility
Assessed cost of the venture will be determined in light of the fact that we need all
important value proportions and will be determined with the proper sources that the
merchants ought to disperse among accomplices. This ought to be considered as the primary
wellspring of income and gainfulness in the undertaking, the fundamental objective of
legitimate income and the advancement of the framework is to think about that the benefits
ought to be considered in the proportion of improvement.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 11
CHAPTER 2
REVIEW OF LITERATURE
2.1 REVIEW OF SUMMARY
Dasgupta Siddhartha, Paul, Fuloria &Sanjay (2011). The study was conducted to
understand the behavioural intention of mobile banking usage of Indian customers. Research
methods like the Factor analysis and a multiple regression analysis were done in order to
determine the extent of impact the antecedents have over the behavioural intentions of
mobile banking usage. The results of the study showed that other than the traditional
variables like Perceived Usefulness and Perceived Ease of Use, factors like Perceived Image,
Perceived Value, Self-Efficacy, Perceived Credibility and Tradition all significantly affects
Behavioural Intentions towards mobile banking usage.
Palani and Yasodha P. (Apr 2012). The research paper is focused on customer’s
perceptions on mobile banking offered by Indian Overseas Bank and it also focuses on the
various drivers that drive mobile banking consumers. The results of this study showed that
gender, education and income of the consumers play an important role in usage of mobile
banking. Most of the researches are focused on the acceptance of the mobile banking
technology due to which not much research has been conducted on people. The research
reveals that if skills can be upgraded among the consumers there will be greater willingness
on the part of consumers toward the use of Mobile banking. Some the factors like security
trust, gender, education, religion, and price can have minimal effect on consumer mindset
towards Mobile banking compared to the other factors.
Thakur, Rakhi; Srivastava, Mala. (2013). The paper studies the factors influencing
the adoption intention of mobile commerce. Perceived usefulness, perceived ease of use and
social influence are found to be significant dimensions of technology adoption readiness to
use mobile commerce while facilitating conditions were not found to be significant. The
results of the research study also indicate the perceived credibility risk defined by security
risk and privacy risk are significantly associated with behavioural intention in negative
relation, which indicates that security and privacy concerns are important in deterring
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 12
customers from using mobile commerce. This research study developed an integrated model
for behavioural intention towards financial innovations. Practical implications of this study is
one of the few empirical studies which have investigated the adoption of mobile commerce in
India, which is considered one of the fastest growing countries in terms of mobile usage. The
study relates to inclusion of both utilitarian and credibility aspect of adoption intention. It
gives an empirical basis on which mobile and banking companies can base their mobile
payments marketing strategy.
Kumar, Reji G; Rejikumar, G; Ravindran, D Sudharani (2014). This research paper
examines the factors influencing the continuance decisions of the early adopters of m-
banking services in Kerala, India. The study used constructs adopted from Technology
Acceptance Model along with constructs of perceived service quality, perceived credibility
and perceived risk to empirically establish the influence on satisfaction and continuance
usage intentions. The study confirmed that after adoption of the technology, the customer
finds satisfaction in the quality parameters of the service. Perceptions about the risks
involved in m-banking had adverse impact on service quality and satisfaction.
Kalaiarasi, H & Srividya, V. 3 (Jul-Sep 2012). Mobile banking as a new channel to
the existing banking channels provides convenient and cost efficient banking services
anytime anywhere. It is observed that, though India has strong potential for mobile banking
only 5% of mobile subscribers are registered users of mobile banking. Attracting the new
customers may not be easy than retaining the existing mobile banking customers 2009).
Hence the current research focuses on the factors influencing actual usage of mobile banking
services. The results show that, Indians mobile banking usage is influenced by ease of mobile
banking technology, its suitability to the user’s lifestyle and the benefits like mobility and
mobile transactions. However, customer’s perception towards security of mobile transactions
and privacy fears demotivates actual usage.
Tenkasi Taluk &Devasena, S Valli, (Jan 2012). Banking system is the backbone of
the economy and Information Technology (IT) in turn has become the backbone of banking
activities. Technology, which was playing a supportive role in banking, has come to the
forefront with the ever-increasing challenges and requirements. Technology to start with was
a business enabler and now has become a business driver. The Banks cannot think of
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 13
introducing a financial product without IT support. Be it customer service, transactions,
remittances, audit, marketing, pricing or any other activity in the Banks, IT plays an
important role not to complete the activity with high efficiency but also has the potential to
innovate and meet the future requirements. The Banking Sector was early adopter of
technology and in that way set an example to the other industries the need to opt for
automation for taking full advantage in operational efficiency.
Prerna Sharma Bamoriya(2011).The study was conducted to identify certain issues
relating to banks, mobile handsets and telecom operators, mobile handset operability,
security/privacy, standardization of services, customization, Downloading & installing
application software and Telecom services quality. For this purpose, a descriptive design was
adopted to empirically explore the selected issues. Study suggested that from consumers
‘perspective mobile handset operability security or privacy and standardization of services
are the critical issues. The objective of the research is to study the selected issues in mobile
banking form urban customers’ perspective and to explore the perceived utility of mobile
banking in comparison to retail banking and online banking among the mobile banking users
and non-users. The study is aimed to evaluate perceptions and opinions of urban mobile
banking users. For this purpose, a cross sectional descriptive design was adopted with ad-hoc
quota sampling. Sample for the study comprised of 50 mobile banking users and 50 non-
users in Indore city, India.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 14
CHAPTER 3
SYSTEM CONFIGURATION
3.1 HARDWARE REQUIREMENTS
NAME SPECIFICATIONS
Central Processing Unit Pentium 2.66 GHZ
Hard Disk Capacity 20GB
Memory 512MB RAM
Monitor HP
Mouse Logitech Mouse
Table 3.1: Hardware Requirements
3.2 SOFTWARE REQUIREMENTS
NAME SPECIFICATIONS
Operating System Windows XP/7/8/10
Frontend Java
Design Html, CSS
Backend MySQL
Table 3.2: Software Requirements
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 15
CHAPTER 4
MODULE DESCRIPTION
Modules:
The system Consists of six modules:
1. Create new account
2. Deposit
3. Withdraw
4. Print record
5. Delete record
6. Search customer
CREATE NEW ACCOUNT MODULE:
The admin will create new account of the user.
The admin will fill all the details required for opening a new account.
Then all the transactions are performed by the admin itself.
DEPOSIT MODULE:
The admin will check the user account.
The admin will put the details in order to deposit the money to the users
account.
The admin will check the details of the application whether filled correctly.
The admin will then deposit money to the account.
WITHDRAW MODULE:
The admin will check the user account.
The admin will put the details in order to withdraw the money to the users
account.
The admin will check the details of the application whether filled correctly.
The admin will then withdraw money from the account.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 16
PRINT RECORD MODULE:
Once the transactions are performed by the admin the record has to be printed
to provide for the customer as a proof
The record which is printed consists of details such as account number,
account holder name, date of transaction and the total balance in the account.
DELETE RECORD MODULE:
The admin will check the user account which is to be deleted.
The admin will put the account number in order to delete the users account.
The admin will check in the database to confirm the account deleted.
SEARCH CUSTOMER MODULE:
The admin will search for the customer by putting the account number.
Once the admin puts the account number all the details of the particular
searched customer gets displayed.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 17
CHAPTER 5
SYSTEM DESIGN
Design is the initial phase in the advancement stage for any procedures and standards
to define a gadget, a procedure or framework in adequate detail to allow its physical
acknowledgment. When the product prerequisites have been breaking down and determined
the product configuration includes three specialized exercises - plan, coding, execution and
testing that are required to manufacture and confirm the product.
The structure rehearses are of head criticalness at this moment, light of the way that at
the present time, at last influencing the accomplishment of the thing use and its
straightforwardness of upkeep are made. These choices have the last bearing in the wake of
determined quality and sensibility of the framework. Arrangement is the best way to deal
with certainly make a comprehension of the client's necessities into completed the process of
programming or a framework.
Fig. 5 System Architecture
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 18
Examination can be characterized as separating of any entire in order to discover their
temperament, work and so on. It defines configuration as to make fundamental portrayals of;
to draw an example or framework for plan. Framework examination and design can be
portrayed as a lot of methods and procedures, a network of interests, a culture and a scholarly
direction.
5.1 Data Flow Diagram:
In the traditional S.D.L.C data flow diagrams were generated in the analysis
phase and structure charts were used in the design phase. Designing with the Data Flow
Diagrams involves creating a model of the system. The entities and attributes are a model, of
the states of the system. Processes model the rules of a System. The stimuli and response are
modeled by Data Flows. All of these models are combined into one graphic model called a
Data Flow Diagram.
Designing with the Data Flow Diagrams involves creating a model of the system.
The entities and attributes are a model, of the states of the system. Processes model the rules
of a System. The stimuli and response are modeled by Data Flows. All of these models are
combined into one graphic model called a Data Flow Diagram.
DFD’s have a notation for each of the components of the system. They also have
a notation for representing different levels in a hierarchy of detailed used to describe the
system. This notation makes it possible to represent an overall view of a large complex
system and a detailed view of a part of a system using the same notation. Parts of the system
can be isolated into independent sub-system. These work together as a unit to perform a set
of processes that must be done together at same time.
PROCESSES:
Processes show what the system does. Each process has one or more inputs and one
or more outputs. If a process does not have an output \then it is considered to a Black Hole.
The notation for the process is
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 19
ID
Process Name
FILE / DATA STORE:
A file or Data store indicates a respiratory of data. Process can Enter and Retrieve
Data from Data Store. Each Data Source has a unique name. The notation for the Data Store
is:
ID File Name
EXTERNAL ENTITIES:
External entities are outside the system but they either supply input data into the
system or make use of the system output. They are entities on which the designer has no
control. They may be an organizations customer or others with which the system interacts.
External entities, which supply the data into the system, are called as sinks. The notation for
external entity is
ENTITY NAME
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 20
DATA FLOWS:
Data flows model the flow of data in the system. It is indicated by line joining the
system components. An arrowhead indicates the direction of data flow and the labels above
the line indicates the name of the data-flow. The notation for the Data Flows is:
Data Flow Name
A Data Flow could indicate any of the following:
Flow from a Data Store to a process.
Flow from a process to Data store.
Flow from a Process to another Process.
Flow from an entity to a process or vice-versa.
SALIENT FEATURES OF DFD’S:
1. The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether the
dataflow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 21
LEVEL -1
Figure. 5.1.1
LEVEL -2
Figure 5.1.2
BANK MANAGEMENT SYSTEM
Create User Account
User Information
User database
User Account
BANK MANAGEMENT SYSTEM
Deposit Money
Withdraw Money
Print Receipt
Delete Record
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 22
5.2. Use Case Diagram:
A use case diagram is a dynamic or behavior diagram in UML. Use case diagrams
model the functionality of a system using actors and use cases. A use case diagram at its
simplest is a representation of a user’s interaction with the system that shows the relationship
between the user and the different use cases in which the user is involved. Use cases are a set
of actions, services, and functions that the system needs to perform.
Figure 5.2
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 23
5.3. Sequence Diagram:
A sequence diagram depicts interaction between objects in a sequential order i.e. the
order in which these interactions take place. We can also use the terms event diagrams or
event scenarios to refer to a sequence diagram. Sequence diagrams describe how and in what
order the objects in a system function.
Figure 5.3
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 24
5.4. Database Design:
The general point behind a database is to oversee data as a sorted out aggregate. A
database is a blend of interrelated informational collection aside with least excess to serve
different clients rapidly and effectively. Coming about to masterminding information and
yield, the ace must focus on database structure or how data ought to be filtered through
around client fundamentals. The general target is to make information get to, direct keen,
unassuming and flexible for different clients.
During database structure the going with objectives are concerned: -
• Controlled Redundancy
• Information self-administration
• Precise and combining
• More data with no issue
• Recuperation from disappointment
• Protection and security
Column name Data type Nullable Primary key
ACCOUNTNO Number No Yes
PERSON NAME Varchar2 Yes No
DEPOSIT DATE Date Yes No
DEPOSIT
AMOUNT
Number Yes No
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 25
CHAPTER 6
SYSTEM IMPLEMENTATION
6.1 PRE-IMPLEMENTATION
When the plan organizes has been finished the designer can begin composing the
code and really build up the framework. The framework could either be totally bespoke with
each code line composed by the authority software engineer or it very well may be created by
the off-the rack application which is redone later. The engineers will follow the framework
necessity details precisely. On the off chance that it is said to set a catch 500 PX in the upper
left corner with shading red then the very same thing will be finished by the engineer. They
ought not to go astray from the detail at any expense without talking with the investigator.
6.1.1 ECLIPSE IDE:
In the context of computing, Eclipse is an integrated development environment (IDE)
for developing applications using the Java programming language and other programming
languages such as C/C++, Python, PERL, Ruby etc.
The Eclipse platform which provides the foundation for the Eclipse IDE is composed
of plug-ins and is designed to be extensible using additional plug-ins. Developed using Java,
the Eclipse platform can be used to develop rich client applications, integrated development
environments and other tools. Eclipse can be used as an IDE for any programming language
for which a plug-in is available.
The Java Development Tools (JDT) project provides a plug-in that allows Eclipse to
be used as a Java IDE, PyDev is a plugin that allows Eclipse to be used as a Python IDE,
C/C++ Development Tools (CDT) is a plug-in that allows Eclipse to be used for developing
application using C/C++, the Eclipse Scala plug-in allows Eclipse to be used an IDE to
develop Scala applications and PHP eclipse is a plug-in to eclipse that provides complete
development tool for PHP.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 26
The major visible parts of an eclipse window are −
Views
Editors (all appear in one editor area)
Menu Bar
Toolbar
An eclipse perspective is the name given to an initial collection and arrangement of views
and an editor area. The default perspective is called java. An eclipse window can have
multiple perspectives open in it but only one perspective can be active at any point of time.
A user can switch between open perspectives or open a new perspective. A perspective
controls what appears in some menus and tool bars.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 27
A perspective has only one editor area in which multiple editors can be open. The
editor area is usually surrounded by multiple views. In general, editors are used to edit the
project data and views are used to view the project metadata. For example the package
explorer shows the java files in the project and the java editor is used to edit a java file.
The eclipse window can contain multiple editors and views but only one of them is
active at any given point of time. The title bar of the active editor or view looks different
from all the others.
The UI elements on the menu bar and tool bar represent commands that can be
triggered by an end user.
6.1.2 JDK:
The Java Development Kit (JDK) is a Sun Microsystems product aimed at Java
developers. Since the introduction of Java, it has been by far the most widely used Java SDK.
On 17 November 2006, Sun announced that it would be released under the GNU General
Public License (GPL), thus making it free software. This happened in large part on 8 May
2007 and the source code was contributed to the OpenJDK.
The primary components of the JDK are a selection of programming tools, including:
java – The loader for Java applications. This tool is an interpreter and can interpret
the class files generated by the javac compiler. Now a single launcher is used for both
development and deployment. The old deployment launcher, jre, is no longer
provided with Sun JDK.
javac – The compiler, which converts source code into Java bytecode
jar – The archiver, which packages related class libraries into a single JAR file. This
tool also helps manage JAR files.
javadoc – The documentation generator, which automatically generates
documentation from source code comments
jdb – The debugger
javap – The class file disassembler
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 28
appletviewer – This tool can be used to run and debug Java applets without a web
browser.
javah – The C header and stub generator, used to write native methods
extcheck – This utility can detect JAR-file conflicts.
apt – The annotation processing tool
jhat – (Experimental) Java heap analysis tool
jstack – (Experimental) This utility prints Java stack traces of Java threads.
jstat – (Experimental) Java Virtual Machine statistics monitoring tool
jstatd – (Experimental) jstat daemon
jinfo – (Experimental) This utility gets configuration information from a running Java
process or crash dump.
jmap – (Experimental) This utility outputs the memory map for Java and can print
shared object memory maps or heap memory details of a given process or core dump.
idlj – The IDL-to-Java compiler. This utility generates Java bindings from a given
IDL file.
policy tool – The policy creation and management tool, which can determine policy
for a Java runtime, specifying which permissions are available for code from various
sources
VisualVM – visual tool integrating several command line JDK tools and lightweight
performance and memory profiling capabilities
The JDK also comes with a complete Java Runtime Environment, usually called a
private runtime. It consists of a Java Virtual Machine and all of the class libraries that will be
present in the production environment, as well as additional libraries only useful to
developers, such as the internationalization libraries and the IDL libraries.
Also included are a wide selection of example programs demonstrating the use of almost all
portions of the Java API.
6.1.3 HTML:
HTML means Hypertext Markup Language. HTML is a method of describing the
format of documents which allows them to be viewed on computer screens. The global
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 29
publishing format of the Internet is HTML. It allows authors to use not only text but also
format that text with headings, lists, and tables, and to include still images, video, and sound
within text. Readers can access pages of information from anywhere in the world at the click
of a mouse-button. Information can be downloaded to the reader’s own PC or workstation.
HTML pages can also be used for entering data and as the front-end for commercial
transactions.
Features of HTML:
It is not a programming language
It is not data description language
It is simple to understand and implement
HTML constructs a very easy to comprehend, and can be used effectively by anybody
The methodology used by HTML to mark-up information is independent of its
representation on a particular hardware or software architecture
HTML syntax is worldwide standard
6.1.4 JAVA:
Java is a high-level programming language originally developed by Sun
Microsystems and released in 1995. Java runs on a variety of platforms, such as Windows,
Mac OS, and the various versions of UNIX. This tutorial gives a complete understanding of
Java. This reference will take you through simple and practical approaches while learning
Java Programming language.
Features of java:
Object Oriented − In Java, everything is an Object. Java can be easily extended
since it is based on the Object model.
Platform Independent − Unlike many other programming languages including C
and C++, when Java is compiled, it is not compiled into platform specific machine,
rather into platform independent byte code. This byte code is distributed over the
web and interpreted by the Virtual Machine (JVM) on whichever platform it is being
run on.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 30
Simple − Java is designed to be easy to learn. If you understand the basic concept of
OOP Java, it would be easy to master.
Secure − With Java's secure feature it enables to develop virus-free, tamper-free
systems. Authentication techniques are based on public-key encryption.
Architecture-neutral − Java compiler generates an architecture-neutral object file
format, which makes the compiled code executable on many processors, with the
presence of Java runtime system.
Portable − Being architecture-neutral and having no implementation dependent
aspects of the specification makes Java portable. Compiler in Java is written in
ANSI C with a clean portability boundary, which is a POSIX subset.
Robust − Java makes an effort to eliminate error prone situations by emphasizing
mainly on compile time error checking and runtime checking.
Applications of java:
Multithreaded − With Java's multithreaded feature it is possible to write programs
that can perform many tasks simultaneously. This design feature allows the
developers to construct interactive applications that can run smoothly.
Interpreted − Java byte code is translated on the fly to native machine instructions
and is not stored anywhere. The development process is more rapid and analytical
since the linking is an incremental and light-weight process.
High Performance − With the use of Just-In-Time compilers, Java enables high
performance.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 31
6.1.4 JAVA SWINGS:
Java Swing is a GUI (graphical user Interface) widget toolkit for Java. Java Swing is
a part of Oracle’s Java foundation classes. Java Swing is an API for providing graphical user
interface elements to Java Programs. Swing was created to provide more powerful and
flexible components than Java AWT (Abstract Window Toolkit).
Swing provides a look and feel that emulates the look and feel of several platforms,
and also supports a pluggable look and feel that allows applications to have a look and feel
unrelated to the underlying platform. It has more powerful and flexible components than
AWT. In addition to familiar components such as buttons, check boxes and labels, Swing
provides several advanced components such as tabbed panel, scroll panes, trees, tables, and
lists. Unlike AWT components, Swing components are not implemented by platform-specific
code. Instead, they are written entirely in Java and therefore are platform-independent. The
term lightweight is used to describe such an element.
6.1.5 JAVA APPLETS:
An applet is a Java program that can be embedded into a web page. It runs inside the
web browser and works at client side. An applet is embedded in an HTML page using the
APPLET or OBJECT tag and hosted on a web server.
Important points:
• All applets are sub-classes (either directly or indirectly) of java.applet.Applet class.
• Applets are not stand-alone programs. Instead, they run within either a web browser
or an applet viewer. JDK provides a standard applet viewer tool called applet viewer.
• In general, execution of an applet does not begin at main() method.
• Output of an applet window is not performed by System.out.println(). Rather it is
handled with various AWT methods, such as drawString().
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 32
Life cycle of an applet:
Fig. 6.1.5 Applet Life Cycle
It is important to understand the order in which the various methods shown in the above
image are called. When an applet begins, the following methods are called, in this sequence:
• init( )
• start( )
• paint( )
When an applet is terminated, the following sequence of method calls takes place:
• stop( )
• destroy( )
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 33
6.1.6 MY SQL:
MySQL is the most popular Open Source Relational SQL Database Management
System. MySQL is one of the best RDBMS being used for developing various web-based
software applications. MySQL is developed, marketed and supported by MySQL AB, which
is a Swedish company. This tutorial will give you a quick start to MySQL and make you
comfortable with MySQL programming.
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed and supported by MySQL AB, which is a Swedish
company. MySQL is becoming so popular because of many good reasons −
MySQL is released under an open-source license. So you have nothing to pay to use
it.
MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.
MySQL uses a standard form of the well-known SQL data language.
MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.
MySQL works very quickly and works well even with large data sets.
MySQL is very friendly to PHP, the most appreciated language for web
development.
MySQL supports large databases, up to 50 million rows or more in a table. The
default file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).
MySQL is customizable. The open-source GPL license allows programmers to
modify the MySQL software to fit their own specific environments.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 34
6.1.7 JDBC:
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database
access mechanism that provides a consistent interface to a variety of RDBMSs. This
consistent interface is achieved through the use of “plug-in” database connectivity modules,
or drivers. If a database vendor wishes to have JDBC support, he or she must provide the
driver for each platform that the database and Java run on. To gain a wider acceptance of
JDBC, Sun based JDBC’s framework on ODBC. As you discovered earlier in this chapter,
ODBC has widespread support on a variety of platforms. Basing JDBC on ODBC will allow
vendors to bring JDBC drivers to market much faster than developing a completely new
connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public review
that ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was
released soon after. The remainder of this section will cover enough information about JDBC
for you to know what it is about and how to use it effectively. This is by no means a
complete overview of JDBC. That would fill an entire book.
JDBC Goals Few software packages are designed without goals in mind. JDBC is one that,
because of its many goals, drove the development of the API. These goals, in conjunction
with early reviewer feedback, have finalized the JDBC class library into a solid framework
for building database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to
why certain classes and functionalities behave the way they do.
The design goals for JDBC are as follows:
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 35
6.2 POST-IMPLEMENTATION
6.2.1 Home page:
Figure 6.2.1: Home Page
This is the home page of the application which provides many options for the
admin to open the new accounts of the users and perform transactions.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 36
6.2.2 New Account page:
Figure 6.2.2: New account Page
This page of the application is used by the admin to create new account of the
users requested.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 37
6.2.3 Deposit page:
Figure 6.2.3: Deposit Page
This is the Deposit page of the application which is used by the admin to deposit
the money to the users account who has requested.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 38
6.2.4 Withdraw page:
Figure 6.2.4: Withdraw Page
This is the withdraw page of the application where admin will withdraw the
money from the users account whoever requested.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 39
6.2.5 Print Record page:
Figure 6.2.5: Print Record Page
This is the Print record page of the application where admin will use it to print the
record of the users of the present transactions to show it as a proof.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 40
6.2.6 Record Format page:
Figure 6.2.6: Record Format Page
This is the record format page of the application where admin will use it to print
the record of the users of the present transactions to show it as a proof.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 41
6.2.7 Delete Account page:
Figure 6.2.7: Delete account Page
This is the delete account page of the application where admin will use it to delete
the accounts of the non-existing users.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 42
6.2.8 Search Customer page:
Figure 6.2.8: Search Customer Page
This is the search customer page of the application where admin will use it to
search the customers.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 43
6.2.9 About page:
Figure 6.2.9: About Page
This is the about page of the application where it displays about the bank and
admin details.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 44
6.2.10 View All Customers page:
Figure 6.2.10: View all customers Page
This is the view all customers page of the application where admin will use it to
view all the existing customers with all their details.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 45
CHAPTER 7
SYSTEM TESTING
The explanation behind the progression structure is to give commendable yield
pondering the data given by the customers, with the objective that we need an item testing
methodology to test and consolidate all the fragments of the substance and arrange substance.
The item will expect a noteworthy activity in giving structure utilizing of the test system
where we should achieve the inspiration driving the system where all the related activities
can be practiced and administered. We have set up a couple of various approaches to test
various areas of the structure so all the overhauls are suitably orchestrated and implemented.
The correct key understanding code should be used to check the code with the
objective that the program can be affirmed for yield when it is returned. In any occasion,
during the evaluation, the association and collaboration in various social occasions should in
like manner be cultivated for the right results. By then there will be real motorized
programming associated with the utilization of various test frameworks and help with testing
cases.
Programming testing depends on the quality watch that must be kept up when various
kinds of references are required to be cultivated in the ongoing or we can say that when we
are giving the framework which bolsters various sorts of similarity working it must be first
check for various sorts of situations before it is given to the customers. A wide range of
references dependent on the check will be advanced. Programming testing should be possible
with the assistance of various sorts of systems so every single kinds of strategy that is
required will be appropriately comprehended and the one which is reasonable will be
executed so for instance that we will utilize the unit testing and the reference discovery
testing as the significant methods.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 46
Programming testing is especially significant for a framework usage as before the
execution if the blunders are discovered it will be reasonable for the organization since when
the mistakes are discovered later in the working stage it requires more investment. Multiple
sorts of experiments will be composed with the goal that we can comprehend later on that
how the highlights have reflected for the functionality. Programming testing must be finished
with cooperation where all specialist’s dependent on testing office and improvement office
will relate.
Fig. 7 Test strategy undertaken
7.1 Unit testing
Different units are required to be checked first so the mix testing can be performed
and with the assistance of unit testing we can appropriately recognize the definite references
of various kinds of highlights The references of the security systems that is incorporated will
be given to the utilization of such a way, that various sorts of exemptions can be chosen and
it very well may be altered and it tends to be used appropriately. The reference
contemplations that will be included will be checked for the client direction or we can say
that we need to watch that when various kinds of modes are gathered every hub works
appropriately with point by point similarity
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 47
The unit references that will be viewed as will be checked with appropriate convenience as
we necessitate that a wide range of prerequisites for various kinds of area association ought
to be fulfilled and each extraordinary sort of clients will have diverse thought of security
7.2 Discovery Testing
Discovery testing will be founded on the client testing whether client ought to be
given a lot of assets dependent on beta working so the customer can check the functionality
from their side. For playing out the discovery testing the necessary record information isn't
required it is done on to the customer side. Discovery testing will be performed with point by
point situation check as in the continuous the related functionality will be tried by the client
them self.
Advantages Disadvantages
Well suited and efficient for large code
segments
Limited coverage since only a selected
number of test scenarios are actually
performed.
Code Access not required Inefficient testing, due to the fact that
the tester only has limited knowledge
about an application.
Clearly separate user's perspective from
the developer's perspective through
visibly defined roles.
Blind Coverage, since the tester cannot
specific code segments or error prone
areas
Large number of moderately skilled
testers can test the application with no
knowledge of implementation,
programming language or operating
systems.
The test cases are difficult to design.
Fig. 7.2 Advantage and Disadvantage
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 48
7.3 Integration Testing
Programming coordination testing is the gradual combination testing of at least two
incorporated programming segments on a solitary stage to create disappointments brought
about by interface surrenders.
The errand of the incorporation test is to watch that segments or programming
applications, for example parts in a product framework or – one stage up – programming
applications at the organization level – associate without blunder.
7.4 Verification and Validation Testing
The Verification is the technique for checking the product and indicating the client's
prerequisites. The way toward assessing the product to decide if the result of the given
prerequisite is met by the client's particular necessities. It incorporates all the movement
related with delivering top notch programming. Kinds of confirmation.
• Static testing.
• Walkthrough testing.
• Inspection testing.
• Review.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 49
Fig. 7.4 Testing Process
Approval is the way toward assessing the last item, to check the last item meets the
client prerequisites as referenced previously. It is a technique for checking the real item.
Confirmation: - Are we are doing the item right Validation: - Are we are doing the
correct item. Check and endorsement have been settled that the activity of the paid activity
ensures the necessities and is legitimate for its usage, to review the activities to keep up a key
good ways from disorder, or static testing and authenticity suggests the genuine testing
practicality and dynamic evaluation money. Central purposes of affirmation and endorsement
• It helps in identifying the blunders and adjusting the mistake at the early stages.
• Encourages and improves in overseeing process and product risks.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 50
• Acts as supporting device for the product life for keep up the nature of the item in
organization.
7.5 White Box Testing
White Box Testing is a trying where wherein the product analyzer knows about the inward
activities, structure and language of the product, or if nothing else its motivation. It is reason.
It is utilized to test zones that can't be reached from a discovery level.
7.6 Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of
tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document.
It is a testing in which the software under test is treated, as a black box .you cannot “see” into
it. The test provides inputs and responds to outputs without considering how the software
works.
7.7 Test cases
The rule focus of testing is to uncover an enormous gathering of botches, proficiently and
with least effort and time.
• A productive test is one that uncovers an up to this point undiscovered error.
• Testing is a system of executing a program with the desire for finding a bungle.
Method to perceive testing mess up. Testing quality confirmations and anticipate a colossal
action in guaranteeing the undaunted idea of the thing. The test outcomes are then utilized
during help. The objective of the test is reliably indicated that the program shows that there is
no blunder in it.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 51
The central employment of the evaluation sort out is to perceive the blunder that might be
open in the program. Fittingly, it ought not to be a test to show the clarification behind a
program, at any rate it ought to be needed to show that a program doesn't work. The way
toward executing a program to perceive the test error.
Fig. 7.7 Testing
7.8 SYSTEM SECURITY
The protection of computer based resources that includes hardware, software, data,
procedures and people against unauthorized use or natural. Disaster is known as System
Security.
System Security can be divided into four related issues:
Security
Integrity
Privacy
Confidentiality
SYSTEM SECURITY refers to the technical innovations and procedures applied to the
hardware and operation systems to protect against deliberate or accidental damage from a
defined threat.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 52
DATA SECURITY is the protection of data from loss, disclosure, modification and
destruction.
SYSTEM INTEGRITY refers to the power functioning of hardware and programs,
appropriate physical security and safety against external threats such as eavesdropping and
wiretapping.
PRIVACY defines the rights of the user or organizations to determine what information they
are willing to share with or accept from others and how the organization can be protected
against unwelcome, unfair or excessive dissemination of information about it.
CONFIDENTIALITY is a special status given to sensitive information in a database to
minimize the possible invasion of privacy. It is an attribute of information that characterizes
its need for protection.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 53
CHAPTER 8
RESULTS AND DISCUSSION
8.1 CONCLUSION
This project is being mainly developed to reduce the manual work and less
time consumption. It provides all necessary information to the management as well as the
user with the use of this system. The admin can simply sit in front of the system and monitor
all the activities without any physical movement of the file. Admin can service the users
request best in time.
The system provides quickly and valuable information. These modules have been integrated
for effective use of the management for future forecasting and for the current need.
8.2 Limitations
Legitimate validation is required for the working. Point by point preparing is
additionally required for the filling in as different references of letters are required to be
incorporated. A definite comprehension pretty much all various kinds of approaches in
various sorts of calculations are required with the goal that it very well may be tweaked in
utilized. The framework depends on new systems where numerous kinds of data is required
to be recognized and if any flawlessness is being distributed not with appropriate
understanding the information may be lost which is quite difficult in terms of retrieval.
Genuine approval is required for the working Point by point getting ready is
moreover required for the filling in as various references of letters are required to be
consolidated
An unmistakable appreciation essentially all different sorts of approaches in different
sorts of figuring are required with the objective that it might be changed in used. The
structure relies upon new frameworks where various sorts of information is required to be
perceived and if any faultlessness is being dispersed not with suitable understanding the data
might be lost which is very troublesome as far as recovery.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 54
8.1 FUTURE ENHANCEMENT
We have to refer the future enhancement as we want that system can be utilized in the
future also when there will be different types of technological will be available so we have to
maintain the consistency of working with proper requirement of future enhancement
prospective. New techniques or technologies can be required for the security purpose and can
be added in the future based on the requirement.
In Future we wish to improvise the system in various aspects:
Detailed information gathering has to be done. Without that the purpose for using the
software won’t be satisfied properly.
Implementing the software requires change in the business practices.
We will be also improving the efficiency of the application.
We may also make more reliable to the users.
We also have planned to add extra features in all the modules.
However, it can give good profits in the long run.
BANK SYSTEM PRIVATE LIMITED 1NH17MCA58
Department of MCA, NHCE 2019-2020 55
CHAPTER 9
REFERENCES
8.1 TEXT REFERENCE
[1] Java The Complete Reference (9th Edition) By- Herbert Scheldt, Tata McGraw
Hill, Edition 2014.
[2] Elmasri and Navathe: Fundamentals of Database Systems, 7th Edition, Pearson
Education, 2015.
[3] Ali Bahrami (1999) ‘Object Oriented Systems Development’, McGraw-Hill
International Editions.
[4] Vivek Chopra ‘Professional Apache Tomcat 6’.
[5] Roger S. Pressman: Software Engineering – A Practitioners approach, 7th Edition,
Mc-Graw Hill Education, 2012
8.2 WEB REFERENCE [6] https://stackoverflow.com
[7] http://clan fundamentals blogspot.in/
[8] https://github.com/
[9] https://www.codeacademy.com/
[10] https://www.wikipedia.org/
[11] https://www.webopedia.com
[12] https://www.tutorialspoint.com
[13] https://www.mysql.com/
Top Related