Talib Report12
Talib Report12
ON
Bank Management System
Presented and Submitted By
MD TALIB MD MUSA
PRN No. 04421003676
0
A PROJECT REPORT
ON
Bank Management System
MD TALIB MD MUSA
PRN No. 04421003676
1
Bank Management System
MD TALIB MD MUSA
Head of Department
Project Guide Examiner Vikas College- Vikhroli
2
Ms. Priti Pal
CERTIFICATE
THIS IS TO CERTIFY THAT THE PROJECT
“BANK MANAGEMENT SYSTEM”
HAS BEEN SATISFACTORILY COMPLETED BY
……………………………………………………………………………………………………………………
PROJECT GUIDE EXAMINER HEAD OF DEPARTMENT
MS. PRITI PAL
3
PREFACE
With the rapid globalization of the Indian economy, enterprises are facing
with ever changing competitive environment. Enterprises are adopting
strategies aImedat developing competitive advantage based on enhanced
customer value in terms of product differentiation, quality, speed, service
and costs. In the post liberalizationera, with the deregulation of Indian
economy, the financial service sector witnessing a complete metamorphosis
and technology is playing a very signify.
control in this record. Over the last decade India has been one of the fastest
adopters of information technology, particularly because of its capability to
provide software solution to organizations around the world. This capability
has provided a tremendous impetuous to the domestic banking industry in
India to deploy the latest in technology, particularly in the Internet banking
and e-commerce arenas. Banks are growing in size by mergers and
acquisitions, which have been driven by communication and technology.
Technology is playing a major role in increasing the efficiency, courtesy and
speed of customer service. It is said to be the age of E- banking. Bank user
is expected to perform at least one of the following transactions:
● Sign in
● Sign up
● Forgot Password
● Change Password
● Cash Withdraw
● Cash Deposit
● Balance Enquiry
● Logout
4
From a banks perspective, using the Internet is more efficient than using
other distribution mediums because banks are looking for an increased
customer base. Using multiple distribution channels increases effective
market coverage by enabling different products to be targeted at different
demographic segments. Also Banks cannot risk losing customers to
competitors within the aggressive competition in the banking industry
around the world. Moreover, bank delivery offers customized service to suit
the needs and the likes of each user. Mass customization happens
effectively through Banking Management System. It reduces cost and
replaces time spent on routine errands with spending time on business
errands. Bank Management System means less staff members, smaller
infrastructure demands, compared with other banking channels. From the
customer’s perspective.
Bank Management System provides a convenient and effective way to
manage finances that is easily accessible 24 hours a day, seven days a
week. In addition, information is up to date. Nevertheless, Bank
Management System has disadvantages for banks like how to work the
technology, set-up cost, legal issues, and lack of personal contact with
customers. And for customers there are security and privacy issues.
5
ACKNOWLEDGEMENT
6
ABSTRACT
7
CHAPTER 1
OVERVIEW OF THE PROJECT
8
INTRODUCTION
9
1.1 PURPOSE OF THE SYSTEM
1. SECURITY:
There is a lot of security of data on this content management system.
One cannot open our system without knowing the password. Immediately
after opening login screen will appear on screen. Only after entering the
correct username and password user can operate our system.
2. REFERENTIAL INTEGRITY:
User cannot change the date in the transaction files. Addition of data can
be done only on the master files date in transaction files cannot be
entered until addition is done on the master files.
Though there are many online systems available on internet but this can
compete with them with some advancement in its functionality and can be
used by any bank organization to maintain their customers account and
online transaction process.
The basic functionalities of the system are:
10
Modules for Customer: -
1. Sign up Module: -
Description- New customer can sign up in to the system. New
customer should enter personal details and password in the
registration form and then click on
“submit” button. A new account will make in the system.
2. Sign in Module: -
Description- Existing customer must have user-id and password to
login into the system. Customer should enter user-id and password
and click on sign in button for login into the system.
8. Logout Module:-
Description- Existing customers can logout from the system by simply
clicking on logout button which was already login into the system.
12
click on “ All Accounts Report” button and then, report will appear on
screen.
13
1.3 OVERVIEW OF PROPOSED SYSTEM
1. MENU DRIVEN:
The project uses menu throughout which we can choose required options.
Menus are self-explanatory, as they are very easy to use and user can go to
any other web page using the menu.
2. USER CONFIRMATION:
Whenever the user tries to delete or edit the data, the system asks for the
confirmation. This is used to avoid the accidental changes to the database. A
confirmation is also provided for the exit of the application.
14
1.4 BUSINESS CONTEXT
These are:
1. PAPER WORK:
All the activities that are performed by Management involve a lot of paper work
involving register consultations and entries. A separate file has to be
maintained for each kind of activity and for different periods of time.
2. TIME CONSUMPTION:
A lot of time is consumed in referencing the registers involved for particular
activities and a lot of computation as well as report verification activity is also
paper based and time consuming.
3. COMPLEXITY:
Complexity of information handling and the gathering and determination of
information is usually the most difficult problem faced.
4. REDUNDANCY:
Maintaining separate files for each department can lead to duplication of data
present in files. This can lead to a) Inconsistencies b) Update anomaly esc)
Decentralization problems.
5. HUMAN ERRORS:
Human kind of errors may be generated in typing errors and slow arithmetic
calculations, fatigue and boredom.
6. ILLEGAL ACCESS:
The security of a lot of documents, which are paper, base difficult may be in
terms of illegal access or manipulation by malicious personals either
intentionally or by accident.
15
Objective
To allow only authorized user (Bank Employee) to access various functions
available in the system.
Open any account wanted by the user.
Reduce clerical work as most of the work done by computer.
This will reduce the manual workload and give information instantly. The
software will maintain the list of A/C and customer record and Transaction
record.
The software will be user friendly so that even a beginner can operate the
package and thus maintain the status of A/C, do the transaction and
maintain balance status easily.
The Project Banking system has been made to automate the Banking
system being followed by a banking company that deals in current account
with or without check facility.
Functionalities provided by Bank
16
Management System are as follow:
Bank Management System also manage the balance detail for transaction
Details, banking detail, accounts.
It tracks all the information of bank, balance, transaction etc. Manager the
information of bank.
17
CHAPTER- 2
System Analysis
18
SYSTEM ANALYSIS:
System analysis is a process of gathering and interpreting facts, diagnosing
problems and the information about the Bank Management System to
recommend improvements on the system. It is problem solving activity that
requires intensive communication between the system users and system
developers. System analysis or study is an important phase of any system
developments process. The system is studied to the minutest detail and
analyse. The system analyst plays the role of the interrogator and dwells
deep into the working of the present system. The system is viewed as a
whole and the input to the system are identified. The outputs from the
organizations are traced to the various processes, system analysis is b
concerned with becoming aware of the problems, identifying the relevant
and decisional variables, analysing, and synthesizing the various factors
and determining an optimal or at least a satisfactory solution or program of
action. A detailed study of the process must be made by various techniques
like interview, question queries etc. the data collected by these sources
must be scrutinized to arrive to a conclusion. The conclusion is an
understanding of how the system functions. This system is called the
existing system. Now the existing system is subjected to close study and
problems areas are identified. The designers now function as a problem
solver and try to sort out the difficulties that the enterprise faces. The
solutions are given as proposals. The proposal is than weighed with the
existing system analytically and the best one is selected. The proposal is
presented to the user for an endorsement by the user. The proposal is
reviewed on user request and suitable changes are made. This is loop that
ends as soon as the user is satisfied with proposal. Preliminary study is the
process of gathering and interpreting facts, using the information for further
studies on the system. Preliminary study is problem-solving activity that
requires intensive communication between the system users and system
developers. It does various feasibility studies. In these studies, a rough
figure of the system activities can be obtained, from which the decision
about the strategies to be followed for effective system study and analysis
can be taken.
19
Existing system of Bank Management System
20
Proposed system of Bank Management System
● Security of data.
● Ensure data accuracy`s.
● Proper control of the higher officials.
● Minimize manual data entry.
● Minimum time needed for the various processing.
● Greater efficiency.
● Better service.
● User friendliness and interactive.
21
Benefits of the system
● quick, authenticated access to accounts via the desktop.
● Easily scalable to grow with changing system requirement.
● Enterprise wide access to information.
● Improved information security, restricting unauthorized access.
● Minimize Storage Space
1. Data Dictionary: -
A Data Dictionary is a structure repository of data about data. It is a set of
rigorous definitions of all the data flow diagram, data elements and data
structure. There are three classes of items to be defined:
Data element: smallest unit of data.
Data structure: group of data element handled as a unit.
Data flow and data stores: temporary location of data and permanent
location of data.
2. Decision tree: -
23
FEASIBILITY ANALYSIS
24
ECONOMICAL FEASIBILITY
The economic analysis checks for the high investment incurred on the
system. It evaluates development & implementing charges for the proposed
“Banking Project”. The S/W used for the development is easily available at
minimal cost & the database applied is freely available hence it results in
low cost implementation. The only tangible benefit provided by the proposed
system is that the paper work is reduced to the minimum and hence the
reduction in cost incurred on Stationary and its storage. The system
provides many benefits that can’t be measured in terms of Money for e.g.
user’s friendliness, more user response being more efficient.
TECHNICAL FEASIBILITY:
25
Operational feasibility:
Now almost all Banks branches are connected through the Bank
Management System facilities. The transactions of a particular bank are
transmitted through the Micro-Bank software from INFLEX Solutions to the
Head Office, where every data is stored in the database. Real-time On-line
any branch banking for the clients is used to facilitate the clients to deposit
/draw or remit funds to and from their accounts, from one bank to another.
Meanwhile, for the Smooth operation and efficient functioning of the system
they have completed the proper training to the related personnel.
26
CHAPTER- 3
Software Requirement&
Specification
27
Software requirement specification:
It also needs a security to prevent data. The reason behind it is that there is
lot of information to be maintained and have to be kept in mind while
running the business. for this reason, we have provided features present
stem is partially automated(computerized), actually existing system is quite;
laborious as one has to enter same information at three different places.
Following points should be well considered:
Documents and reports that must be provided by the new system, there can
also be few report, which can help management in decision making and
cost controlling, but since these report do not get required attention, such
kind of reports and information were also identified and given required
attention. Details of the information needed for each document and report.
The required frequency and distribution for each document and report. With
the implementation of computerized system, the task of keeping records in
an organized manner will be solved. The greatest of all is the retrieval of
information which will be at the click of the mouse.
28
Software Required:
The project is implemented in Core Java as it provides the implementation
of art package that are used to connect distinct applications, hence the
software’s required in the creation and execution of the project are JAVA
JDK 1.7. As we know JAVA is a platform independent language so this
software runs with JRE environment on any desired platform i.e. Linux,
windows 9x, XP, or 2000 or any operating system.
Hardware Required:
As the project involve database, its hardware requirements are minimal. Any
System with Pentium P2 or above processor, 32MB RAM, 1GB Hard Disk, a
LAN Card, and a CDROM is sufficient. Its network based software so
computers connected with any kind of mode (wireless, LAN connected etc.)
will suit its requirements ...... It can also be run on a single machine for its
demo use. Best suited in laboratory where we can run its server on any
machine and many clients can use it simultaneously.
Non-functional Requirements
29
Chapter - 4
Introduction to Tool /
Language
30
JAVA: -
Platform independent:
The concept of Write-once-run-anywhere (known as the Platform
independent) is one of the important key feature of java language that
makes java as the most powerful language. Not even a single language is
idle to this feature but java is closer to this feature. The programs written on
one platform can run on any platform provided the platform must have the
JVM.
Simple:
There are various features that make the java as a simple language.
Programs are easy to write and debug because java does not use the
pointers explicitly. It is much harder to write the java programs that can
crash the system but we cannot say about the other programming
languages. Java provides the bug free system due to the strong memory
management. It also has the automatic memory allocation and de-allocation
system.
Object Oriented:
To be an Object Oriented language, any language must follow at least the
four characteristics.
Inheritance:
It is the process of creating the new classes and using the behaviour of the
existing classes by extending them just to reuse the existing code and
adding the additional features as needed.
Encapsulation:
It is the mechanism of combining the information and providing the
abstraction.
Polymorphism:
31
As the name suggest one name multiple form, Polymorphism is the way of
providing the different functionality byte functions having the same name
based on the signatures of the methods.
Dynamic binding:
Sometimes we don't have the knowledge of objects about their specific
types while writing our code. It is the way of providing the maximum
functionality to a program about the specific type at runtime. As the
languages like Objective C, C++ fulfils the above four characteristics yet
they are not fully object oriented languages because they are structured as
well as object oriented languages. But in case of java, it is a fully Object
Oriented language because object is at the outer most level of data
structure in java. No standalone methods, constants, and variables are
there in java. Everything in java is object even the primitive data types can
also be converted into object by using the wrapper class.
Robust:
Java has the strong memory allocation and automatic garbage collection
mechanism. It provides the powerful exception handling and type checking
mechanism as compare to other programming languages. Compiler checks
the program whether there any error and interpreter checks any run time
error and makes the system secure from crash. All of the above features
makes the java language robust.
Distributed:
The widely used protocols like HTTP and FTP are developed in java.
Internet programmers can call functions on these protocols and can get
access the files from any remote machine on the internet rather than writing
codes on their local system.
Portable:
The feature Write-once-run-anywhere makes the java language portable
provided that the system must have interpreter for the JVM. Java also have
the standard data size irrespective of operating system or the processor.
These features make the java as a portable language.
32
Dynamic:
While executing the java program the user can get the required files
dynamically from a local drive or from computer thousands of miles away
from the user just by connecting with the Internet.
Secure:
Java does not use memory pointers explicitly. All the programs in java are
run under an area known as the sand box. Security manager determines the
accessibility options of a class like reading and writing a file to the local disk.
Java uses the public key encryption system to allow the java applications to
transmit over the internet in the secure encrypted form. The byte code
Verifier checks the classes after loading.
Performance:
Java uses native code usage, and lightweight process called threads. In the
beginning interpretation of byte code resulted the performance slow but the
advance version of JVM uses the adaptive and just in time compilation
technique that improves the performance.
Multithreaded:
Java is also a multithreaded programming language. Multithreading means
a single program having different threads executing independently at the
same time. Multiple threads execute instructions according to the program
code in a process or a program. Multithreading works the similar ways
multiple processes run on one computer. Multithreading programming is a
very interesting concept in Java. In multithreaded programs not even a
single thread disturbs the execution of other thread. Threads are obtained
from the pool of available ready to run threads and they run on the system
CPUs. This is how Multithreading works in Java which you will soon comet
know in details in later chapters.
Interpreted:
We all know that Java is an interpreted language as well. With an
interpreted language such as Java, programs run directly from the source
code. The interpreter program reads the source code and translates it on
33
the fly into computations. Thus, Java as an interpreted language depends
on an interpreter program.
platform independent:
The source code to be written and distributed is platform independent.
Another advantage of Java as an interpreted language is its error debugging
quality.
Architecture Neutral:
The term architectural neutral seems to be weird, but yes Java is an
architectural neutral language as well. The growing popularity of networks
makes developers think distributed. In the world of network, it is essential
that the applications must be able to migrate easily to different computer
systems. Not only to computer systems but to a wide variety of hardware
architecture and operating system architectures as well. The Java compiler
does this by generating byte code instructions, to be easily interpreted on
any machine and to be easily translated into native machine code on the fly.
JDK: -
javac –
The compiler, which converts source code into Java bytecode
Jar –
The archiver, which packages related class libraries into a single JAR file.
This tool also helps manage JAR files.
Javadoc –
The documentation generator, which automatically generates
documentation from source code comments
jdb –
The debugger
javap –
The class file disassembler
Applet viewer –
This tool can be used to run and debug Java applets without web browser.
javah –
The C header and stub generator, used to write native methods
Ext check –
35
This utility can detect JAR-file conflicts.
apt–
The annotation processing tool
jhat –
(Experimental) Java heap analysis tool
Jstack –
(Experimental) This utility prints Java stack traces of Java threads.
jstat –
(Experimental) Java Virtual Machine statistics monitoring tool
jstatd –
(Experimental) jstat daemon
Jinfo –
(Experimental) This utility gets configuration information from a running Java
process or crash dump.
jmap –
(Experimental) This utility outputs the memory map for Java and can print
shared object memory maps or heap memory details of a given processor
core dump.
idlj–
The IDL-to-Java compiler. This utility generates Java bindings from a given
IDL file.
policy tool –
The policy creation and management tool, which can determine policy for a
Java runtime, specifying which permissions are available for code from
various sources.
36
VisualVM –
Visual tool integrating several command line JDK tools and lightweight
performance and memory profiling capabilities.
The JDK also comes with a complete Java Runtime Environment, usually
called a private
runtime. It consists of a Java Virtual Machine and all of the class libraries
that will be present in the production environment, as well as additional
libraries only useful to developers, such as the internationalization libraries
and the ID Libraries. Also included is a wide selection of example programs
demonstrating the use of almost all portions of the Java API.
37
CHAPTER-5
System Design
38
5.1 INTRODUCTION:
39
Data base design:
Database Design is a collection of processes that facilitate the designing,
development, implementation and maintenance of enterprise data
management systems. It helps produce database systems.
1. That meet the requirements of the users.
2. Have high performance.
1. *Control Redundancy.
2. *Ease of use.
3. *Accuracy and integrity.
4. *Avoiding inordinate delays.
5. *Recovery from failure.
6. *Privacy and security.
7. *Performance.
There are 6 major steps in design process. The first 5 steps are usually
done on paper and finally the design is implemented.
40
NORMALIZATION:
DATA INTEGRITY
Data integrity refers to the procedure that ensures correctness of the data
entered in the database. Functions have been provided in the software,
which check data while being entered. Integrity problems are occurred due
to hardware or software malfunctions such as power failure and disk
crashes. Side effect from the program development may also be the reason.
DATA CONSISTENCY
Problem with data consistency occur when adding records without first
checking for records with same key or deleting records without deleting
other related records. Likewise, the software is coded such that primary
keys can’t be duplicated.
For developing an efficient database, we have to fulfil certain conditions
such as:
1. *Control redundancy.
2. *Ease of use.
3. *Data independence.
4. *Privacy and security.
Performance for achieving the above criteria’s we have to make use of various
features that are available with DBMS such as:
1. *Enforcing integrity constraints to ensure data integrity and to reduce data
inconsistency.
2. *Recovery from failures using backup facility
41
5.2 NORMALIZATION:
43
DFD SYMBOLS:
CONSTRUCTING A DFD:
Several rules of thumb are used in drawing DFD’S:
1. Process should be named and numbered for an easy reference. Each name
should be representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data
traditionally flow from source to the destination although they may flow back to
the source. One way to indicate this is to draw long flow line back to a source.
An alternative way is to repeat the source symbol as a destination. Since it
issued more than once in the DFD it is marked with a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters.
Process and dataflow names have the first letter of each work capitalized DFD
typically shows the minimum contents of data store. Each data store should
contain all the data elements that flow in and out. Questionnaires should
contain all the data elements that flow in and out. Missing interfaces
redundancies and like is then accounted for often through interviews.
44
SAILENT FEATURES OF DFD’S
1. The DFD shows flow of data, not of control loops and decision are
controlled considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process
whether the dataflow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
CURRENT PHYSICAL:
In Current Physical DFD 45recess label include the name of people or
their positions or the names of computer systems that might provide
some of the overall system-processing label includes an identification
of the technology used to process the data. Similarly, data flows and
data stores are often labels with the names of the actual physical
media on which data are stored such as file folders, computer files,
business forms or computer tapes.
CURRENT LOGICAL:
The physical aspects at the system are removed as much as possible so
that the current system is reduced to its essence to the data and the
processors that transform them regardless of actual physical form. This is
exactly like a current logical model if the user were completely happy with
the user were completely happy with the functionality of the current system
but had problems with how it was implemented typically through the new
logical model will differ from current logical model while having additional
functions, absolute function removal and inefficient flows recognized.
45
NEW PHYSICAL:
The new physical represents only the physical implementation of the new
system.
E–R DIAGRAMS:
The entity Relationship Diagram (ERD) depicts the relationship between the
data objects. The ERD is the notation that is used to conduct the date
modelling activity the attributes of each data object noted is the ERD can be
described resign a data object description.
The set of primary components that are identified by the ERD are
Data object
Relationships
Attributes
Various types of indicators. The primary purpose of the ERD is to represent
data objects and their relationships
46
User case diagram:
Draw your system's boundaries using a rectangle that contains use cases.
Place actors outside the system's boundaries.
Use case
Draw use cases using ovals. Label the ovals with verbs that represent
the system’s functions.
Actors
Actors are the users of a system. When one system is the actor of
another system, label the actor system with the actor stereotype.
Relationships
Illustrate relationships between an actor and a use case with a simple
line. For relationships among use cases, use arrows labelled either
"uses" or "extends.
47
Use Case Diagram
48
6.4 WATERFALL MODEL
49
WATERFALL MODEL
50
CHAPTER- 6
Coding
51
public class Login1 extends Frame Implements Action Listener {
Button login, signup, reset;
JTextField AccountTextField;
JPasswordField pinTextField;
Login1() {
setTitle("AUTOMATED TELLER MACHINE");
setLayout(null);
ImageIcon i1 = new
ImageIcon(ClassLoader.getSystemResource("icons/loggn.jpg"));
Image i2 = i1.getImage().getScaledInstance(700, 700,
Image.SCALE_DEFAULT);
ImageIcon i3 = new ImageIcon(i2);
JLabel label11 = new JLabel(i3);
label11.setBounds(750, 50, 700, 700);
add(label11);
ImageIcon l1 = new
ImageIcon(ClassLoader.getSystemResource("icons/bankinglogo1.jpg"));
Image l2 = l1.getImage().getScaledInstance(100, 100,
Image.SCALE_DEFAULT);
ImageIcon l3 = new ImageIcon(l2);
JLabel label = new JLabel(l3);
label.setBounds(70, 10, 100, 100);
add(label);
ImageIcon j1 = new
ImageIcon(ClassLoader.getSystemResource("icons/loginpage1.jpg"));
Image j2 = j1.getImage().getScaledInstance(700, 200,
Image.SCALE_DEFAULT);
ImageIcon j3 = new ImageIcon(j2);
JLabel label6 = new JLabel(j3);
label6.setBounds(20, 580, 700, 200);
add(label6);
52
ImageIcon h1 = new
ImageIcon(ClassLoader.getSystemResource("icons/log_login.png"));
Image h2 = h1.getImage().getScaledInstance(70, 70,
Image.SCALE_DEFAULT);
ImageIcon h3 = new ImageIcon(h2);
JLabel label5 = new JLabel(h3);
label5.setBounds(300, 190, 70, 70);
add(label5);
JLabel text1 = new JLabel("LOGIN");
text1.setFont(new Font("Osward", Font.BOLD, 20));
text1.setForeground(Color.black);
text1.setBounds(300, 260, 450, 40);
add(text1);
53
pin.setBounds(110, 390, 200, 40);
add(pin);
setSize(1600, 1200);
setVisible(true);
}
54
@Override
public void actionPerformed(ActionEvent ae) {
/// perform sign-in , signUp, reset
if (ae.getSource() == reset) {
AccountTextField.setText(" ");
pinTextField.setText("");
} else if (ae.getSource() == login) {
ConnectionSql c = new ConnectionSql();
String Accountno = AccountTextField.getText();
String pin = pinTextField.getText();
String query = "select *from login where Account_No = '" +
Accountno + "' and Login_Password = '" + pin + "'";
try {
ResultSet rs = c.s.executeQuery(query);
if (rs.next()) {
setVisible(false);
new Transactions(pin,Accountno).setVisible(true);
}
}
}
}
55
CHAPTER- 8
Testing
56
Testing:
Software testing is a critical element of software quality assurance and
represents the ultimate review of specification, design and coding. In fact,
testing is the one-step in the software engineering process that could be
viewed as destructive rather than constructive.
A strategy for software testing integrates software test case design
methods into well-planned series of steps that result in the successful
construction of software. Testing is the set of activities that can be
planned in advance and conducted systematically. The underlying
motivation of program testing is to affirm software quality with methods
that can economically and effectively apply to both strategic to both large
and small-scale systems.
• See if the VA libations of input data are all taken care off. Test cases were
designed to check the results retrieved from the database and the validation of
all user inputs. All the modules were tested thoroughly. The module interface
was also tested to ensure that information flows into and out of the program
units.
57
8.3. INTEGRATION TESTING
This testing is performed after all individual modules are developed and
ready for the integration. The objective of this testing is to build a
program structure as dictated in the design by taking unit tested modules.
REQUIREMENT TO BE TESTED
The following requirements will be tested1. Verify if valid users are
identified.2. Verify if invalid users are blocked from logging into the
application.
58
Chapter-9
Screen Layouts
59
Welcome Page:
Balance Page:
60
Welcome Bank:
Customer Welcome:
61
Withdraw Page
Change PIN:
62
Additional Details:
Account Details:
63
Chapter-9
Maintenance
64
Maintenance
Types of Maintenance
65
3. Perfective Maintenance - This includes modifications and updates done
in order to keep the software usable over long period of time. It includes
new features, new user requirements for refining the software and
improve its reliability and performance.
Maintenance Activities
66
4. Implementation - The new modules are coded with the help of structured
design created in the design step. Every programmer is expected to do
unit testing in parallel.
7. Delivery - After acceptance test, the system is deployed all over the
organization either by small update package or fresh installation of the
system. The final testing takes place at client end after the software is
delivered. Training facility is provided if required, in addition to the hard
copy of user manual.
67
CHAPTER-10
68
Limitation of Project on Bank Management System:
Although I have put my best efforts to make the software flexible easy to
operate but limitation cannot be ruled out even by me .Though the
software present a broad range of operations to its users intricate option
could not covered into it; party because of logistic and party due to lack
of sophistication .Paucity of time was also major constraint, thus it was
not possible to make the software fool proof and dynamic lack of time
also compelled me to ignore some part such as storing old result of the
candidate etc. Considerable efforts have made the software easy to
operate even for the people not related to the field of component but it is
acknowledgement that a layman may find it a bit problematic at the first
instance.
10.1 Conclusion
This project was successfully completed within the time span allotted.
The project Bank Management System has been developed in core java.
All the modules are tested separately and put together to form the main
system. Finally, the system is tested with real data and everything
worked successfully. Thus the system has fulfilled the entire objective
identified. The system had been developed in an attractive dialogs
fashion. So user with minimum knowledge about computers can also
operate the system easily. It will make easy interactions between users
and store. The speed and accuracy are maintained in proper way.
This project was developed to fulfil user requirement. However, there are
lots of scope to improve the performance of the Banking System in the
area of user interface, database performance and query processing time.
So there are many things for future enhancement of this project. The
future enhancements that are possible in the project are as follows.
69