Project Netbanking
Project Netbanking
S U B M I TT E D F O R
PGDCA
PROJECT 2021-2022
GUIDED BY SUBMITED BY
Mr. DHEERAJ SHUKLA SEEMA SINGH
HOD Principal
(Mr. SATENDRA GAUTAM) (Mr. S. R. AHIRVAR)
MAHATMA GANDHI COLLEGE, SATNA (M.P.)
SELF CERTIFICATE
the partial fulfillment of the requirements for the award of the degree
Seema singh
Roll No………………
MAHATMA GANDHI COLLEGE, SATNA (M.P.)
INTRODUCTION
It is application s/w of “SBI BANK“ this s/w is user friendly which is made in
java there are database files which is created in ms access environment .All the
Bank Management based on we are made on this project .this projects provided
the facility of the Staff ,Customer , Fees and Course record with help of this
project .any user access the accurate fees information of customer . User faced
various problems and difficulty in manually maintenance and also find many
changes of mistake in the handling of register.
This project facilitate the simply adding ,editing and deleting and displaying the
records or report in various manner for the Bank and their reports .this project
mainly based on customer fees calculation and report of the customer and
staff.There are many problems which are face by the user/teachers at the time
of fees calculations and keeping all sorts of record related to Bank record
manually .there might be many mistakes during calculating monthly feeses.
And the process is also very slow . by the help of this project only one computer
operator create the customer, staff and fees and all the related records without
any problems .The one operator worked as a 6 employee personal . The very
useful of display and print the record of customer, staff and fees successfully .
Computer become versatile enough perform job of various nature computer is
able to store volume data. Manipulate it and provide accurate and efficient
information. Now a range of computer is available with different capability and
specialty, which are made to suit different users.
Design Goals:-
The system design lies at the heart of the system development
cycle. System design specific exactly how the objective set during the system
analysis phase laid the foundation of the development of the end product.
User Friendly
The software should be user friendly so that user can easily
understand the controls without any particular guidance by the developers of
the application. The FAS system was designed keeping this requirement in
mind and the final User Interface was quite user friendly and all complexity
will be hidden from the user.
Integrity
The results of the system were very crucial as they represented
the data, which would affect quite a lot no of people and financial part needs
accuracy. So special emphasis was given to the accuracy and consistency of the
system.
Modularity
As the system was quite large so the system was designed in such
a way so that the entire software was divided into several modules,
which made the system more maintainable and easy to develop.
FROM DESIGN
The data in the forms carry information that comes from the
people and the informational output of the system goes to the people ,
the physical carriers of the data of information . It can constitute
authority for action . It provides information for making decision and
improving operations .
REQUIRE OF FORM DESIGN
1. Identification and working .
2. Physical factors .
3. Order of data items .
4. Ease of data items .
5. Size of arrangement.
6. Use of instruction.
7. Efficiency consideration.
INPUT DESIGN
Inaccurate input data are the most common cause of error
in data processing . Error entered by the data entry operation can
be control by the input design .Input design is the processing of
converting user-oriented inputs to computer base format .
OUTPUT DESIGN
Computer outputs are most important and direct
sources of information to user . Efficient , intelligible output design
improves the system relation with the user help in decision-
making. A major from output is a hard copy from the printer.
Printout should be design around the output requirement of the user .
PHYSICAL SECURITY :
The breakdown in electronic computers can be in circuits or
chips ,capacitors , transistors etc . Failures in these components occur
due to power supply problems aging. Performance of a computer
system is influenced by excessive temperature , high humidity , dust
build-up , noise Interference & magnetic fields .
DATABASE SECURITY:
APPLICATION SECURITY:
The current GUI (Graphical User Interface) application developed
is Java enables the user to work as friendly as in windows
environment. Application security is taken care by installing all the
respective dynamic link libraries into windows system folder ,which is
again hidden from end user .These all are taken care internally by
visual studio tool of package and development tool.
The security measures that are being given to the Client are listed below:
System/Information Engineering:
FUNCTIONAL TESTING :
After checking the algorithm’s validity or correctness, the next stage
of testing occurs when the coding has been freed from syntax
errors . Functional testing is referred to check the functions of
procedures procedure-by-procedure .
We check each procedure/module for its functionality and reliability .
Many logical error were found in different modules, then they are
corrected for their proper function .
Some programs may require to perform calculations on the basic of
data or input given by the user . This calculation has been tested to
give accurate results to the user .
STRUCTURAL TESTING :
Structural testing means testing of programs in structure. This
testing refers to the testing of cohesion and coupling of different
program modules. It also checks whether a program modules
produces correct output when it receives data from another module.
For best result degree of cohesion must be high and degree of
coupling must below. In this S/W there are a number of programs with
voluminous modules. We check each programs with different set of test
data and corrected mistakes as desired
IMPLEMENTATION
Introduction is the process of the having systems personnel check out the
and put new equipment into use, trained users, installed the new application
and construct any files of data needed to use it. This phase is less creative than
system design. Depending on the size of the organization that will be involved in
using the application and risk involved in its use, system developers may chose
to test the operation in only one area of the firm with only one or two person.
DOCUMENTATION
Documentation is a process that will be used for developing and maintaining
documentation for installing and maintaining products developed in the system
life cycle. Documentation typically includes training material, user document,
user manual, and operations manual and relies document. The documentation
will be reviewed and approved by concerned user of the documentation.
MAINTENANCE
Software maintenance is, of course, for more then “fixing mistakes.” We may
defined maintenance by describing four activities that are undertaken after a
program is released for use. There are four different maintenance activities:
collective maintenance, adoptive maintenance, perfectly maintenance or
enhancement maintenance, and preventive maintenance or
reengineering. Only about 20 percent of all maintenance work is spent “fixed
mistake”. The remaining 80 percent is spent adapting existing systems to
changes in their external environment, making enhance required by users, and
reengineering an application for future use.
Chapter 1
Introduction
Purpose of project
Project of objective
Purpose of project:--
The usage of e banking by the enterprises came into existence in mid 90’s.e
banking came into existence in greater numbers because of low operating costs.
First it is in the form of ATM’s and phone transactions. Recently it transformed
to internet a new channel between customers and banks which benefits both.
The main aim of e- banking services is to provide the customers a much faster
services with low cost. From the last twenty years, banking sector has chosen a
new method of banking based on the progress of information technology. In
addition to these customers, transaction and communication abilities are
fastened based on information technology.
Software requirement
System planning
Project estimation
During our analysis of the project, we referred various books and manuals and
administrator involves the maintains the new entry broker who are wanted to
do testing, getting detail knowledge ofthe testing own Bikes, searching Bike
Information who was tested, searching about testing , and also done the modify
any test and bike or staff information and so on . This task is usually entrusted
to a single person, the system administrator, also known as the super user. He
job. We identified a need of “graphical tool for the task of system administration
as its menu and screens will guide him through the whole process.”scheduling
tool and techniques can be applied with little modification to software projects.
Program evaluation and review Technique (PERT) and critical path method
(CPM) are two project scheduling method that can be applied to software
Estimates of Effort
Decomposition of tasks
Project Estimation:-
The project size is another important factor for the project estimation that can
affect
Risk Analysis:-
Risk analysis and management are a series of steps that help a software team to
regardless of the outcome, it’s a really good idea of identify it, assess its
For Risk analysis firstly recognizing what can go wrong that is called “risk
will occur and the damage that will do if it does occur. Once this information is
established, risks are ranked, by probability and impact. Finally a plan is
developed to manage those risks with high probability and high impact.
PERT CHART
HOME
Feedback
Signup
Login
Inbank
Beneficiary Registration
Beneficiary Payment
Bill
REG
Reg
Feed
Inbank
.
Quick
.
Bentry
.
Testing
Testing Techniques:-
anew and tential difficult element of mix time. Not only does the test case
designer have to consider white-box testing black-box testing cases but also
event handling (i.e. interrupt processing) the timing of the data, and the
Comprehensive test case design methods for real-time system have yet to
Task Testing
Behavioral Testing
Intertask Testing
System Testing
Task Testing:-
The first step in the testing of real time software is to test each task
independently. That is white box testing and black box testing are designed and
executed for each task. Each task is executed independently during these tests.
Task testing uncovers error in logic and function but not timing or behavioral .
Behavioral Testing:-
consequence ofexternal events. These analysis activities can serve as the basic
for the design oftest case that is conducted when the real time software has
(e.g. interrupts, control signals) are categorized for testing. For example, events
for the
interrupts(e.g., paper jammed), system interrupts (e.g., toner low), and failure
mode (e.g.,roller overhead). Each of these events tested individually and the
Intertask Testing:
Once error an individual tasks and in the system behavior have been isolated.
communicate with one another are tested with different data rates and
Software and hardware are integrated and a full range of the system test are
develops a list of all possible interrupts and the processing that occurs as a
consequence of the interrupts. Tests are then designed to asses the following
system characteristics:
requirements?
in
Function of performance?
White-Box Testing:-
It is also called glass box testing. It is a test case design method that uses the
control structure of the procedural design to derive test cases. In this all
statement in the program has been executed at least once during testing that all
logical conditions have been exercised. Using white box testing methods ,
bounds.
Basic path testing, a white box technique, makes use of program graphs to drive
the set of linearly independent tests that will insure coverage. Conditional and
data flow testing further exercise program logic, and loop testing complements
It focuses on the functional requirements of the software i.e. black box testing
enables the software engineer to derive sets of input condition that will fully
exercise all functional requirements for a program. Black box Testing is not
likely to uncover different class errors than white box testing. . Black box
The testing process which we have followed for our software is black box
testing. In this type of testing we test the software looking it as a black box
testing without considering the internal details. A required set of inputs are to
be supplied depending upon the software and we get our desired outputs.In the
testing phase of our software we have followed the approach where testing is
done in step First we have tested all the function individually by executing then
with the required inputs. If these functions are called by some other functions
then it is checked that the functions returning the correct value, then it is
checked that these objects are created in the desired format. We had to test the
functions by making changes in the code itself so that their returning value can
Installation:-
To install the network management software on your computer network. Some
follows the instructions of step to step:-
Insert the setup CD in CD-Drive of a computer and double click the setup.
Technical Feasibility:-
Our project is technically feasible, as we have taken visual basic as our front
end.
Economical Feasibility:-
1. Before creation of this project all the database and function were
managed
3. Our project is quite affordable in term of using of any level and provides
method and tool and generic phase. This strategy is often referred to as a
application, the methods and tools to used, and the controls and deliverables
solving loop in which four distinct stages are encounters. Status quo “represents
the current states of affairs”; problem definition identifies the specific problem
some technology, and the solution integration delivers the result those who
Problem definition
Status Technical
Quo Developments
Solution
Integration
There is a verity of different process model for software engineering. Each
important to remember that each of model of the models has been categories.
Linear sequential model:-
Some linear sequential some time called classic life cycle waterfall model.
development that begins system at the level and progresses through analysis,
design, coding, testing and support. Below figure illustrate the linear sequential
model for the software engineering the linear sequential model encompasses
following activities:-
modeling
established requirement for all system element the allocating some subset of
these requirements to software. This system view essential when software must
interact with other element such as hardware, people and database. System
engineer must understand the information domain for the software as well as
Design
Software design is actually multi step process that focuses on four distinct
Coding:
The design must be translate in to a machine-readable form. The code
Testing:-
Once code has been generated program testing being. The testing process
focuses on the logical internals of the software, ensuring that all statements
have been tested and on functional externals; that is conducting tests to uncover
error and ensure that the defined input will produce the actual results that
Supports :-
Software will under go change after it is delivered to the customer, change will
occur because error have been encountered, because the software must to
at an unimaginable speed. The end user is concerned about security along with
manager must consider measures for marinating data and controlling secret at
depends on the sensitivity of the data, the reliability of the user, & the
complexity of the system. A well designed system includes control procedure to
(database security).
Application security:
In our project, going password an application security. In our project, if the user
type wrong password and user name then he/she cannot enter inside the
project, if the users want to users want to use or run the project then he/she
must enter the correct user name and password. If the user type three times
wrong password and click three times enter then our project will close and
Transaction Security:-
In this project, several kinds of transaction securities have been provided such
as: -
2. We can change the login and password code if we know user name and
password.
Database security:-
data. A control must be kept over the issue of data file, so that possibilities of
destruction are minimized. Any person not open database. If he/she know
then being added later on. Security is like sheet belt it does not guarantee there
will be not accident. However, when accident does occur it may be found too
much cheaper, it may records. The system security problem can be divided into
System security:-
Hardware security
Hardware security includes arrangement for detection of fire fighting
Software security:-
processing center, the data file storage and the programs file. A copy of all
program May be file stored away from the computer installation as a security
measure.
Limitation:-
We invested lots of time & effort to develop present system but still few short
coming are their. Reason might be lack of time or lack of expertise a VB.net. Bike
Agency very vast & to development it completely within a six months course is
almost impossible.
Any from which will directly close may loss database information.