Online Banking System

Published on February 2017 | Categories: Documents | Downloads: 35 | Comments: 0 | Views: 169
of 35
Download PDF   Embed   Report

Comments

Content

INTRODUCTION
The project entitled “Online Banking " is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. On most modern AT s! the customer is identified b" inserting a plastic AT card with a magnetic stripe or a plastic smartcard with a chip! that contains a uni#ue card number and some securit" information! such as an e$piration date or %&% '%&&(. )ecurit" is provided b" the customer entering a personal identification number '*+,(. -sing an AT ! customers can access their bank accounts in order to make cash withdrawals 'or credit card cash advances( and check their account balances as well as purchasing mobile cell phone prepaid credit. AT s are known b" various other names including automated banking machine! mone" machine! bank machine! cash machine! hole.in.the.wall! cashpoint! Bancomat 'in various countries in /urope and 0ussia(! ultibanco 'after a registered trade mark! in *ortugal(! and An" Time one" 'in +ndia(..

SYNOPSIS
“Online Banking " is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. On most modern AT s! the customer is identified b" inserting a plastic AT card with a magnetic stripe or a plastic smartcard with a chip! that contains a uni#ue card number and some securit" information! such as an e$piration date or %&% '%&&(. )ecurit" is provided b" the customer entering a personal identification number '*+,(.

AIM
+n the e$isting s"stem the transactions are done onl" manuall" but in proposed s"stem we have to computerize all the banking transaction using the software Online Banking. The" are1 -ser odule

2

ADMINISTRATIVE MODULE This module is the main module which performs all the main operations in the s"stem. The major operations in the s"stem are1 • • • • • %ash 3ithdrawal')aving4%urrent withdrawal( +n#uer" )tatement report %ash transformation *in change

SYSTEM STUDY AND ANALISYS
SYSTEM ANALYSIS )"stem anal"sis is a process of gathering and interpreting facts! diagnosing problems and the information to recommend improvements on the s"stem. +t is a problem solving activit" that re#uires intensive communication between the s"stem users and s"stem developers. )"stem anal"sis or stud" is an important phase of an" s"stem development process. The s"stem is studied to the minutest detail and anal"zed. The s"stem anal"st pla"s the role of the interrogator and dwells deep into the working of the present s"stem. The s"stem is viewed as a whole and the input to the s"stem are identified. The outputs from the organizations are traced to the various processes. )"stem anal"sis is concerned with becoming aware of the problem! identif"ing the relevant and decisional variables! anal"zing and s"nthesizing the various factors and determining an optimal or at least a satisfactor" solution or program of action. A detailed stud" of the process must be made b" various techni#ues like interviews! #uestionnaires etc. The data collected b" these sources must be scrutinized to arrive to a conclusion. The conclusion is an understanding of how the s"stem functions. This s"stem is called the e$isting s"stem. ,ow the e$isting s"stem is subjected to close stud" and problem areas are identified. The designer now functions as a problem solver and tries to sort out the difficulties that the enterprise faces. The solutions are given as proposals. The proposal is then weighed with the e$isting s"stem anal"ticall" and the best one is selected. The proposal is presented to the user for an endorsement b" the user. The proposal is reviewed on user re#uest and suitable changes are made. This is loop that ends as soon as the user is satisfied with proposal.

5

*reliminar" stud" is the process of gathering and interpreting facts! using the information for further studies on the s"stem. *reliminar" stud" is problem solving activit" that re#uires intensive communication between the s"stem users and s"stem developers. +t does various feasibilit" studies. +n these studies a rough figure of the s"stem activities can be obtained! from which the decision about the strategies to be followed for effective s"stem stud" and anal"sis can be taken.

EXISTING SYSTEM
+n the e$isting s"stem the transactions are done onl" manuall" but in proposed s"stem we have to computerize all the banking transaction using the software Online Banking. 2. 1.1 PROBLEMS WITH EXISTING SYSTEM • • • • • • • 6ack of securit" of data. ore man power. Time consuming. %onsumes large volume of pare work. ,eeds manual calculations. ,o direct role for the higher officials. 7amage of machines due to lack of attention.

To avoid all these limitations and make the working more accuratel" the s"stem needs to be computerized. PROPOSED SYSTEM The aim of proposed s"stem is to develop a s"stem of improved facilities. The proposed s"stem can overcome all the limitations of the e$isting s"stem. The s"stem provides proper securit" and reduces the manual work. 2. 2. 1 ADVANTAGES OF THE PROPOSED SYSTEM The s"stem is ver" simple in design and to implement. The s"stem re#uires ver" low s"stem resources and the s"stem will work in almost all configurations. +t has got following features • • • • • • • • )ecurit" of data. /nsure data accurac"8s. *roper control of the higher officials. 0educe the damages of the machines. inimize manual data entr". inimum time needed for the various processing. 9reater efficienc". Better service.

:

• •

-ser friendliness and interactive. inimum time re#uired.

2.3. FEASIBILITY STUDY ;easibilit" stud" is made to see if the project on completion will serve the purpose of the organization for the amount of work! effort and the time that spend on it. ;easibilit" stud" lets the developer foresee the future of the project and the usefulness. A feasibilit" stud" of a s"stem proposal is according to its workabilit"! which is the impact on the organization! abilit" to meet their user needs and effective use of resources. Thus when a new application is proposed it normall" goes through a feasibilit" stud" before it is approved for development. The document provide the feasibilit" of the project that is being designed and lists various areas that were considered ver" carefull" during the feasibilit" stud" of this project such as Technical! /conomic and Operational feasibilities. The following are its features1

2.3.1. TECHNICAL FEASIBILITY The s"stem must be evaluated from the technical point of view first. The assessment of this feasibilit" must be based on an outline design of the s"stem re#uirement in the terms of input! output! programs and procedures. <aving identified an outline s"stem! the investigation must go on to suggest the t"pe of e#uipment! re#uired method developing the s"stem! of running the s"stem once it has been designed. Technical issues raised during the investigation are1 7oes the e$isting technolog" sufficient for the suggested one= %an the s"stem e$pand if developed= The project should be developed such that the necessar" functions and performance are achieved within the constraints. The project is developed within latest technolog". Through the technolog" ma" become obsolete after some period of time! due to the fact that never version of same software supports older versions! the s"stem ma" still be used. )o there are minimal constraints involved with this project. The s"stem has been developed using >ava the project is technicall" feasible for development. 2.3.2. ECONOMIC FEASIBILITY The developing s"stem must be justified b" cost and benefit. %riteria to ensure that effort is concentrated on project! which will give best! return at the earliest. One of the factors! which affect the development of a new s"stem! is the cost it would re#uire.

?

The following are some of the important financial #uestions asked during preliminar" investigation1 • • • The costs conduct a full s"stem investigation. The cost of the hardware and software. The benefits in the form of reduced costs or fewer costl" errors.

)ince the s"stem is developed as part of project work! there is no manual cost to spend for the proposed s"stem. Also all the resources are alread" available! it give an indication of the s"stem is economicall" possible for development. 2.3.3. BEHAVIORAL FEASIBILITY This includes the following #uestions1  +s there sufficient support for the users=  3ill the proposed s"stem cause harm= The project would be beneficial because it satisfies the objectives when developed and installed. All behavioral aspects are considered carefull" and conclude that the project is behaviorall" feasible.

SYSTEM DESIGN
3.1 INTRODUCTION 7esign is the first step into the development phase for an" engineered product or s"stem. 7esign is a creative process. A good design is the ke" to effective s"stem. The term “design@ is defined as “the process of appl"ing various techni#ues and principles for the purpose of defining a process or a s"stem in sufficient detail to permit its ph"sical realization@. +t ma" be defined as a process of appl"ing various techni#ues and principles for the purpose of defining a device! a process or a s"stem in sufficient detail to permit its ph"sical realization. )oftware design sits at the technical kernel of the software engineering process and is applied regardless of the development paradigm that is used. The s"stem design develops the architectural detail re#uired to build a s"stem or product. As in the case of an" s"stematic approach! this software too has undergone the best possible design phase fine tuning all efficienc"! performance and accurac" levels. The design phase is a transition from a user oriented document to a document to the programmers or database personnel. )"stem design goes through two phases of development1 6ogical and *h"sical 7esign. LOGICAL DESIGN: The logical flow of a s"stem and define the boundaries of a s"stem. +t includes the following steps1 • 0eviews the current ph"sical s"stem A its data flows! file content! volumes ! fre#uencies etc.

B

• • • • • •

*repares output specifications A that is! determines the format! content and fre#uenc" of reports. *repares input specifications A format! content and most of the input functions. *repares edit! securit" and control specifications. )pecifies the implementation plan. *repares a logical design walk through of the information flow! output! input! controls and implementation plan. 0eviews benefits! costs! target dates and s"stem constraints.

PHYSICAL DESIGN: *h"sical s"stem produces the working s"stems b" define the design specifications that tell the programmers e$actl" what the candidate s"stem must do. +t includes the following steps. • 7esign the ph"sical s"stem. • )pecif" input and output media. • 7esign the database and specif" backup procedures. • 7esign ph"sical information flow through the s"stem and a ph"sical design 3alk through. • *lan s"stem implementation. • *repare a conversion schedule and target date. • 7etermine training procedures! courses and timetable. • 7evise a test and implementation plan and specif" an" new hardware4software. • -pdate benefits ! costs ! conversion date and s"stem constraints Desi !"S#e$i%i$&'i(! &$'i)i'ies: • • • • • • %oncept formulation. *roblem understanding. <igh level re#uirements proposals. ;easibilit" stud". 0e#uirements engineering. Architectural design.

MODULE DESIGN A*+i! The Administrator logs in using the admin login. +n this module two operations are done. 7uring login the 6ogin and *assword is verified with that in the database INPUT DESIGN The design of input focuses on controlling the amount of input re#uired! controlling the errors! avoiding dela"! avoiding e$tra steps and keeping the process simple. The input C

is designed in such a wa" so that it provides securit" and ease of use with retaining the privac". +nput 7esign considered the following things1 o 3hat data should be given as input= o <ow the data should be arranged or coded= o The dialog to guide the operating personnel in providing input. o ethods for preparing input validations and steps to follow when error occur. OB,ECTIVES +nput 7esign is the process of converting a user.oriented description of the input into a computer.based s"stem. This design is important to avoid errors in the data input process and show the correct direction to the management for getting correct information from the computerized s"stem. +t is achieved b" creating user.friendl" screens for the data entr" to handle large volume of data. The goal of designing input is to make data entr" easier and to be free from errors. The data entr" screen is designed in such a wa" that all the data manipulates can be performed. +t also provides record viewing facilities. 3hen the data is entered it will check for its validit". 7ata can be entered with the help of screens. Appropriate messages are provided as when needed so that the user will not be in a maize of instant. Thus the objective of input design is to create an input la"out that is eas" to follow OUTPUT DESIGN A #ualit" output is one! which meets the re#uirements of the end user and presents the information clearl". +n output design it is determined how the information is to be displaced for immediate need and also the hard cop" output. +t is the most important and direct source information to the user. /fficient and intelligent output design improves the s"stem8s relationship to help user decision.making. 7esigning computer output should proceed in an organized! well thought out mannerD the right output must be developed while ensuring that each output element is designed so that people will find the s"stem can use easil" and effectivel". 3hen anal"sis design computer output! the" should 1  +dentif" the specific output that is needed to meet the re#uirements.  )elect methods for presenting information.  %reate document! report! or other formats that contain information produced b" the s"stem. 3.3 DATABASE DESIGN

E

A database is an organized mechanism that has the capabilit" of storing information through which a user can retrieve stored information in an effective and efficient manner. The data is the purpose of an" database and must be protected. The database design is a two level process. +n the first step! user re#uirements are gathered together and a database is designed which will meet these re#uirements as clearl" as possible. This step is called +nformation 6evel 7esign and it is taken independent of an" individual 7B ). +n the second step! this +nformation level design is transferred into a design for the specific 7B ) that will be used to implement the s"stem in #uestion. This step is called *h"sical 6evel 7esign! concerned with the characteristics of the specific 7B ) that will be used. A database design runs parallel with the s"stem design. The organization of the data in the database is aimed to achieve the following two major objectives.  7ata +ntegrit"  7ata independence ,ormalization is the process of decomposing the attributes in an application! which results in a set of tables with ver" simple structure. The purpose of normalization is to make tables as simple as possible. ,ormalization is carried out in this s"stem for the following reasons. • • • • To structure the data so that there is no repetition of data ! this helps in saving. To permit simple retrieval of data in response to #uer" and report re#uest. To simplif" the maintenance of the data through updates! insertions! deletions. To reduce the need to restructure or reorganize data which new application re#uirements arise.

RELATIONAL DATABASE MANAGEMENT SYSTEM -RDBMS.: A relational model represents the database as a collection of relations. /ach relation resembles a table of values or file of records. +n formal relational model terminolog"! a row is called a tuple! a column header is called an attribute and the table is called a relation. A relational database consists of a collection of tables! each of which is assigned a uni#ue name. A row in a tale represents a set of related values. RELATIONS/ DOMAINS 0 ATTRIBUTES: A table is a relation. The rows in a table are called tuples. A tuple is an ordered set of n elements. %olumns are referred to as attributes. 0elationships have been set between ever" table in the database. This ensures both 0eferential and /ntit" 0elationship +ntegrit". A domain 7 is a set of atomic values. A common method of specif"ing a domain is to specif" a data t"pe from which the data values forming the domain are drawn. +t is also useful to specif" a name for the domain to help in interpreting its values. /ver" value in a relation is atomic! that is not decomposable. RELATIONSHIPS: F

Table relationships are established using Ge". The two main ke"s of prime importance are *rimar" Ge" H ;oreign Ge". /ntit" +ntegrit" and 0eferential +ntegrit" 0elationships can be established with these ke"s./ntit" +ntegrit" enforces that no *rimar" Ge" can have null values.0eferential +ntegrit" enforces that no *rimar" Ge" can have null values. 0eferential +ntegrit" for each distinct ;oreign Ge" value! there must e$ist a matching *rimar" Ge" value in the same domain. Other ke" are )uper Ge" and %andidate Ge"s. 0elationships have been set between ever" table in the database. This ensures both 0eferential and /ntit" 0elationship +ntegrit". NORMALI1ATION: As the name implies! it denoted putting things in the normal form. The application developer via normalization tries to achieve a sensible organization of data into proper tables and columns and where names can be easil" correlated to the data b" the user. ,ormalization eliminates repeating groups at data and thereb" avoids data redundanc" which proves to be a great burden on the computer resources. These includes1  ,ormalize the data.  %hoose proper names for the tables and columns.  %hoose the proper name for the data. Fi2s' N(2+&3 F(2+1 The ;irst ,ormal ;orm states that the domain of an attribute must include onl" atomic values and that the value of an" attribute in a tuple must be a single value from the domain of that attribute. +n other words 2,; disallows “relations within relations@ or “relations as attribute values within tuples@. The onl" attribute values permitted b" 2,; are single atomic or indivisible values. The first step is to put the data into ;irst ,ormal ;orm. This can be donor b" moving data into separate tables where the data is of similar t"pe in each table. /ach table is given a *rimar" Ge" or ;oreign Ge" as per re#uirement of the project. +n this we form new relations for each nonatomic attribute or nested relation. This eliminated repeating groups of data. A relation is said to be in first normal form if onl" if it satisfies the constraints that contain the primar" ke" onl". Se$(!* N(2+&3 F(2+1 According to )econd ,ormal ;orm! ;or relations where primar" ke" contains multiple attributes! no nonke" attribute should be functionall" dependent on a part of the primar" ke". +n this we decompose and setup a new relation for each partial ke" with its dependent attributes. ake sure to keep a relation with the original primar" ke" and an" attributes

I

that are full" functionall" dependent on it. This step helps in taking out data that is onl" dependant on apart of the ke". A relation is said to be in second normal form if and onl" if it satisfies all the first normal form conditions for the primar" ke" and ever" non.primar" ke" attributes of the relation is full" dependent on its primar" ke" alone. T4i2* N(2+&3 F(2+1 According to Third ,ormal ;orm! 0elation should not have a nonke" attribute functionall" determined b" another nonke" attribute or b" a set of nonke" attributes. That is! there should be no transitive dependenc" on the primar" ke". +n this we decompose and set up relation that includes the nonke" attributes that functionall" determines other nonke" attributes. This step is taken to get rid of an"thing that does not depend entirel" on the *rimar" Ge". A relation is said to be in third normal form if onl" if it is in second normal form and more over the non ke" attributes of the relation should not be depend on other non ke" attribute.

TABLES STRUCTURE
Table1 tblscode *rimar" Ge"1 scode Fie3* scode ncode ccode D&'& T5#e ,umber'I( ,umber'I( ,umber'I( C(!s'2&i!'s *rimar" ke" Des$2i#'i(!

Table1 7ail"Trans *rimar" Ge"1 Account no1 Fie3* Account no D&'& T5#e ,umber'I( C(!s'2&i!'s *rimar" ke" 2J Des$2i#'i(!

firstname surname date Transaction,ame Transaction amount *revious Balance %urrent Balance Owner ,ame

char':J( char':J( 7ate char':J( ,umber'I( ,umber'I( ,umber'I( char':J(

Table1 current *rimar" Ge"1 account no Fie3* Account no )urname ;irstname Account t"pe %urrent balance D&'& T5#e ,umber'I( char':J( char':J( %har':J( char':J( C(!s'2&i!'s *rimar" ke" Des$2i#'i(!

Table1 aster *rimar" account no Fie3* 6&!7 i* !&+e '5#e *&'e A**2ess '('&3 A$$;!( D&'& T5#e N8+6e2-9. $4&2-3:. $4&2-3:. D&'e $4&2-3:. N8+6e2 N8+6e2 C(!s'2&i!'s P2i+&25 7e5 Des$2i#'i(!

SYSTEM DEVELOPEMENT

22

<.1

SYSTEM SPECIFICATION

HARDWARE RE=UIREMENTS *rocessor 0A <ard disk onitor Ge"board ouse SOFTWARE 1 KFC %ompatible processor with 2.E 9<z %lock speed 1 B25 1 1 1 1 B or more

5J 9B or more &9A4)&9A 2J? Ge"s 5 buttons4 : buttons RE=UIREMENTS 1 3indows 5JJJ4K* 1 &isual Basic C.J 1 ) Access

Operating )"stem ;ront end Back end

<.2 SOFTWARE ENVIRONMENT T4e C(!'2(3 P2(#e2'ies Before writing an event procedure for the control to response to a userLs input! "ou have to set certain properties for the control to determine its appearance and how it will work with the event procedure. Mou can set the properties of the controls in the properties window or at runtime. H&!*3i! s(+e (% '4e $(++(! $(!'2(3s 3.2.1 T4e Te>' B(> The te$t bo$ is the standard control for accepting input from the user as well as to displa" the output. +t can handle string 'te$t( and numeric data but not images or pictures. )tring in a te$t bo$ can be converted to a numeric data b" using the function &al'te$t(. The following e$ample illustrates a simple program that processes the input from the user. E>&+#3e 3.1 +n this program! two te$t bo$es are inserted into the form together with a few labels. The two te$t bo$es are used to accept inputs from the user and one of the labels will be used to displa" the sum of two numbers that are entered into the two te$t bo$es. Besides! a command button is also programmed to calculate the sum of the two numbers using the plus operator. The program use creates a variable sum to accept the summation of values from te$t bo$ 2 and te$t bo$ 5.The procedure to calculate and to displa" the output on the label is shown below. The output is shown in ;igure :.5

25

*rivate )ub %ommand2N%lick'( OTo add the values in te$t bo$ 2 and te$t bo$ 5 )um P &al'Te$t2.Te$t( Q &al'Te$t5.Te$t( OTo displa" the answer on label 2 6abel2.%aption P )um /nd )ub

Fi 82e 3.2

3.2.2 T4e L&6e3 The label is a ver" useful control for &isual Basic! as it is not onl" used to provide instructions and guides to the users! it can also be used to displa" outputs. One of its most important properties is C&#'i(!. -sing the s"nta$ 3&6e3.C&#'i(!! it can displa" te$t and numeric data . Mou can change its caption in the properties window and also at runtime. *lease refer to /$ample :.2 and ;igure :.2 for the usage of label. 3.2.3 T4e C(++&!* B8''(! The command button is one of the most important controls as it is used to e$ecute commands. +t displa"s an illusion that the button is pressed when the user click on it. The most common event associated with the command button is the %lick event! and the s"nta$ for the procedure is *rivate )ub %ommand2N%lick '( )tatements /nd )ub 3.2.< T4e Pi$'82e B(> The *icture Bo$ is one of the controls that is used to handle graphics. Mou can load a picture at design phase b" clicking on the picture item in the properties window and select the picture from the selected folder. Mou can also load the picture at runtime using the L(&*Pi$'82e method. ;or e$ample! the statement will load the picture grape.gif into the picture bo$. *icture2.*ictureP6oad*icture '"%1R&B programR+magesRgrape.gif"(

2:

Mou will learn more about the picture bo$ in future lessons. The image in the picture bo$ is not resizable.

3.2.? T4e I+& e B(> The +mage Bo$ is another control that handles images and pictures. +t functions almost identicall" to the picture bo$. <owever! there is one major difference! the image in an +mage Bo$ is stretchable! which means it can be resized. This feature is not available in the *icture Bo$. )imilar to the *icture Bo$! it can also use the 6oad*icture method to load the picture. ;or e$ample! the statement loads the picture grape.gif into the image bo$. +mage2.*ictureP6oad*icture '"%1R&B programR+magesRgrape.gif"( 3.2.@ T4e Lis' B(> The function of the 6ist Bo$ is to present a list of items where the user can click and select the items from the list. +n order to add items to the list! we can use the A**I'e+ +e'4(*. ;or e$ample! if "ou wish to add a number of items to list bo$ 2! "ou can ke" in the following statements E>&+#3e 3.2 *rivate )ub ;ormN6oad ' ( 6ist2.Add+tem “6esson2@ 6ist2.Add+tem “6esson5@ 6ist2.Add+tem “6esson:@ 6ist2.Add+tem “6esson?@ /nd )ub The items in the list bo$ can be identified b" the Lis'I!*e> propert"! the value of the 6ist+nde$ for the first item is J! the second item has a 6ist+nde$ 2! and the second item has a 6ist+nde$ 5 and so on 3.2.A T4e C(+6( B(> The function of the %ombo Bo$ is also to present a list of items where the user can click and select the items from the list. <owever! the user needs to click on the small arrowhead on the right of the combo bo$ to see the items which are presented in a drop. down list. +n order to add items to the list! "ou can also use the A**I'e+ +e'4(*. ;or e$ample! if "ou wish to add a number of items to %ombo bo$ 2! "ou can ke" in the following statements E>&+#3e 3.3 *rivate )ub ;ormN6oad ' ( %ombo2.Add+tem “+tem2@ %ombo2.Add+tem “+tem5@ %ombo2.Add+tem “+tem:@ %ombo2.Add+tem “+tem?@ /nd )ub

2?

3.2.B T4e C4e$7 B(> The %heck Bo$ control lets the user selects or unselects an option. 3hen the %heck Bo$ is checked! its value is set to 2 and when it is unchecked! the value is set to J. Mou can include the statements %heck2.&alueP2 to mark the %heck Bo$ and %heck2.&aluePJ to unmark the %heck Bo$! as well as use them to initiate certain actions. ;or e$ample! the program will change the background color of the form to red when the check bo$ is unchecked and it will change to blue when the check bo$ is checked. Mou will learn about the conditional statement +fS.ThenS./lesif in later lesson. &b0ed and vbBlue are color constants and Back%olor is the background color propert" of the form. 3.2.9 T4e O#'i(! B(> The Option Bo$ control also lets the user selects one of the choices. <owever! two or more Option Bo$es must work together because as one of the Option Bo$es is selected! the other Option Bo$es will be unselected. +n fact! onl" one Option Bo$ can be selected at one time. 3hen an option bo$ is selected! its value is set to “True@ and when it is unselectedD its value is set to “;alse@. +n the following e$ample! the shape control is placed in the form together with si$ Option Bo$es. 3hen the user clicks on different option bo$es! different shapes will appear. The values of the shape control are J! 2! and 5!:!?!B which will make it appear as a rectangle! a s#uare! an oval shape! a rounded rectangle and a rounded s#uare respectivel". E>&+#3e 3.< *rivate )ub Option2N%lick ' ( )hape2.)hape P J /nd )ub *rivate )ub Option5N%lick'( )hape2.)hape P 2 /nd )ub *rivate )ub Option:N%lick'( )hape2.)hape P 5 /nd )ub *rivate )ub Option?N%lick'( )hape2.)hape P : /nd )ub *rivate )ub OptionBN%lick'( )hape2.)hape P ? /nd )ub *rivate )ub OptionCN%lick'( )hape2.)hape P B /nd )ub

2B

3.2.1: T4e D2i)e Lis' B(> The 7rive 6istBo$ is for displa"ing a list of drives available in "our computer. 3hen "ou place this control into the form and run the program! "ou will be able to select different drives from "our computer as shown in ;igure :.: 3.2.11 T4e Di2e$'(25 Lis' B(> The 7irector" 6ist Bo$ is for displa"ing the list of directories or folders in a selected drive. 3hen "ou place this control into the form and run the program! "ou will be able to select different directories from a selected drive in "our computer as shown in ;igure :.? 3.2.12 T4e Fi3e Lis' B(> The ;ile 6ist Bo$ is for displa"ing the list of files in a selected director" or folder. 3hen "ou place this control into the form and run the program! "ou will be able to shown the list of files in a selected director" as shown in ;igure :.B Mou can coordinate the 7rive 6ist Bo$! the 7irector" 6ist Bo$ and the ;ile 6ist Bo$ to search for the files "ou want. The procedure will be discussed in later lessons.

SYSTEM IMPLEMENTATION AND TESTING
2C

?.1 CODING
M&i! F(2+ C(*i! 7im cleardispla" As Boolean 7im str essage As )tring *rivate )ub cmdAcceptN%lick'( )et rs P ,ew A7O7B.0ecordset 3ith rs .Active%onnection P con .%ursor6ocation P ad-se%lient .%ursorT"pe P adOpenGe"set .6ockT"pe P ad6ockOptimistic .Open "tbl)code" /nd 3ith 3ith rs .;ind ")code PL" H t$t7ispla" H "L" +f ./O; Then sgBo$ "*in ,umber is incorrect or does not /$ist"! vb%ritical! "AT .*in /rror" t$t7ispla" P ""1 t$t7ispla".)et;ocus /lse fraTransaction.&isible P True fra)ecret%ode.&isible P ;alse /nd +f /nd 3ith t$t7ispla" P "" /nd )ub *rivate )ub cmdBackN%lick'( fraTransaction.&isible P ;alse fra)ecret%ode.&isible P True /nd )ub *rivate )ub cmd%ancelN%lick'( fraAcctT"pe.&isible P ;alse fraTransaction.&isible P True /nd )ub *rivate )ub cmd%learN%lick'( t$t7ispla".Te$t P ""1 t$t7ispla".)et;ocus /nd )ub *rivate )ub cmd/$itN%lick'( fra)ecret%ode.&isible P ;alse

2E

sgBo$ "Thank "ou for Banking with us! 7o have an nice da"..."! vb+nformation! "A T .)/0&+%/" /nd /nd )ub *rivate )ub cmdOkN%lick'( 3ith deBank-ba .conBank-ba.Open "*0O&+7/0P icrosoft.>et.O6/7B.?.JD7ata )ourceP" Q App.*ath Q "RBank-ba.mdbD" .rscmd)tatement.Open ")elect T ;rom 7ail"Trans where UAccount,umberVPL" H t$tAcct,o H "L"! deBank-ba.conBank-ba! adOpen7"namic! ad6ockOptimistic rpt)tatement.)how vb odal .conBank-ba.%lose /nd 3ith -nload e /nd )ub *rivate )ub cmd+n#uer"N%lick'( fraAcctT"pe.&isible P True frm)tatement.%aption P "/nter "our Account ,umber" frm)tatement.cmd)earch.%aption P "H+n#uire" frm3el.fraTransaction.&isible P ;alse /nd )ub *rivate )ub cmd,ewAcctN%lick'( frm,ewAcct.)how vb odal /nd )ub *rivate )ub cmd*inN%lick'( fraTransaction.&isible P ;alse frm%hange*in.)how vb odal /nd )ub *rivate )ub cmd*roceedN%lick'( fraAcctT"pe.&isible P ;alse frm)tatement.)how vb odal /nd )ub *rivate )ub cmd)tatementN%lick'( fraTransaction.&isible P ;alse fraAcctT"pe.&isible P True /nd )ub *rivate )ub cmdTransferN%lick'( str essage P "This )ervice is -n.Avialable at the moment! *lease bear with us" sgBo$ str essage! vb+nformation! "A T )/0&+%/" fraTransaction.&isible P True /nd )ub 2F

*rivate )ub cmd3ith7N%lick'( fraAcctT"pe.&isible P True frm)tatement.%aption P "/nter "our Account ,umber" frm)tatement.cmd)earch.%aption P "H*rocess" frm3el.fraTransaction.&isible P ;alse /nd )ub *rivate )ub digitsN%lick'+nde$ As +nteger( +f cleardispla" Then t$t7ispla".Te$t P "" cleardispla" P ;alse /nd +f t$t7ispla".Te$t P t$t7ispla".Te$t Q digits'+nde$(.%aption /nd )ub *rivate )ub ;ormNActivate'( L)hockwave;lash2. ovie P App.*ath H "R" H "BA,G+,9.swf" )hockwave;lash2.*la" )hockwave;lash2.6oop P True /nd )ub *rivate )ub ;ormN6oad'( %all Open7B fra)ecret%ode.&isible P True /nd )ub *rivate )ub mnu7epositN%lick'( frm7eposit.)how vb odal /nd )ub C4&! e Pi! *rivate )ub cmd%hang*inN%lick'( 3ith rs%ode .;ind ")code PL" H t$tOld*in H "L" +f ./O; Then sgBo$ "*in ,umber does not /$istW "! vb+nformation t$tOld*in P "" t$t,ew*in P "" t$t%on;,ew*in P "" t$tOld*in.)et;ocus /lse+f 6en't$t,ew*in( P 6en't$t%on;,ew*in( And 6en't$t,ew*in( X : And 6en't$t%on;,ew*in( X : Then t$tOld*in.Te$t P t$t,ew*in.Te$t .;ields'J( P t$tOld*in .;ields'2( P t$tOld*in .;ields'5( P t$t%on;,ew*in 2I

.-pdate sgBo$ "*in <as been )uccessfull changedW"! vb+nformation -nload e frm3el.fraTransaction.&isible P True /lse sgBo$ "%onfirm *in does not march with ,ew *in"! vb+nformation t$tOld*in P "" t$t,ew*in P "" t$t%on;,ew*in P "" t$tOld*in.)et;ocus /nd +f /nd 3ith /nd )ub *rivate )ub cmd/$itN%lick'( -nload e frm3el.fraTransaction.&isible P True /nd )ub *rivate )ub ;ormN6oad'( %all tbl)ecret%ode %all Open7B /nd )ub T2&!s&$'i(! *rivate )ub cmd2JJJN%lick'( t$t3Amt7pt P "2JJJ" 3ith7 P t$t3Amt7pt %all 3ith7raw /nd )ub *rivate )ub cmd5JJJN%lick'( t$t3Amt7pt P "5JJJ" 3ith7 P t$t3Amt7pt %all 3ith7raw /nd )ub *rivate )ub cmd:JJJN%lick'( t$t3Amt7pt P ":JJJ" 3ith7 P t$t3Amt7pt %all 3ith7raw /nd )ub *rivate )ub cmd?JJJN%lick'( t$t3Amt7pt P "?JJJ" 3ith7 P t$t3Amt7pt %all 3ith7raw 5J

/nd )ub *rivate )ub cmdBJJJN%lick'( t$t3Amt7pt P "BJJJ" 3ith7 P t$t3Amt7pt %all 3ith7raw /nd )ub *rivate )ub cmdOthersN%lick'( sgBo$ '"ok Mou can enter "our choice"( fra3amt.&isible P ;alse fraAmt.&isible P ;alse lblAmt.&isible P True cmdOthers.&isible P ;alse t$t3Amt7pt.&isible P True fra9et%ash.&isible P True /nd )ub *rivate )ub cmd3%loseN%lick'( -nload e -nload frm)tatement frm)tatement.<ide frm3el.fraTransaction.&isible P True /nd )ub *rivate )ub 3ith7raw'( 3ith rsT .Add,ew .;ields'J( P t$t37ate .;ields'2( P Act&ariable .;ields'B( P "3ithdrawal" .;ields'C( P 3ith7 .;ields'E( P *revBal .;ields'F( P t$t3%rrntBal .-pdate /nd 3ith 3ith rs% .;ields'?( P t$t3%rrntBal .-pdate -nload e e.<ide /nd 3ith -nload frm3ith7 frm3ith7.<ide frm3ait3ith7.)how vb odal sgBo$ "The )um of1 " H 3ith7 H " <as been 7educted from "our account"! vb+nformation frm%ash.cmd%ancel.&isible P ;alse frm%ash.lbl7ispla".&isible P ;alse 6oad frm%ash 52

frm%ash.)how vb odal /nd )ub *rivate )ub cmd37rawN%lick'( 7im str essage As )tring 7im str3ithAmt As )tring 3ith rsT .Add,ew .;ields'J( P t$t37ate .;ields'2( P Act&ariable .;ields'B( P "3ithdrawal" .;ields'C( P t$t3Amt7pt .;ields'E( P *revBal .;ields'F( P t$t3%rrntBal .-pdate /nd 3ith 3ith rs% .;ields'?( P t$t3%rrntBal .-pdate -nload e e.<ide /nd 3ith frm3ait3ith7.)how vb odal -nload e sgBo$ " Mour Toatl amount <as been 7educted from "our account!plz wait..."! vb+nformation frm%ash.cmd%ancel.&isible P ;alse frm%ash.lbl7ispla".&isible P ;alse 6oad frm%ash frm%ash.)how vb odal /nd )ub *rivate )ub ;ormN6oad'( %all aster %all Trans %all %rent t$t37ate P 7ate 3ith rs% .;ind "Account,umber P" H Act&ariable H "" +f ./O; Then sgBo$ "Account does not /$istW *lease contact customer services"! vb+nformation! "A T )ervice....." /lse *revBal P rs%.;ields'?( t$t3AcctT"p P rs%.;ields'2( t$t3)name P rs%.;ields'5( t$t3;name P rs%.;ields':( t$t3*revBal P *revBal /nd +f 55

/nd 3ith /nd )ub *rivate )ub t$t3Amt7ptN%hange'( t$t3%rrntBal P &al't$t3*revBal( . &al't$t3Amt7pt( /nd )ub *rivate )ub %lear3Bo$es'( t$t37ate P "" t$t3AcctT"p P "" t$t3Acct,um P "" t$t3)name P "" t$t3;name P "" t$t37,ame P "" t$t3Amt7pt P "" t$t3*revBal P "" t$t3%rrntBal P "" /nd )ub S'&'e+e!'s VieC *rivate )ub cmd)earchN%lick'( +f cmd)earch.%aption P "H&iew )tatement" Then Act&ariable P t$t)tAcct,um.Te$t -nload e 6oad frm3ait frm3ait.)how frm3el.fraTransaction.&isible P ;alse /$it )ub /lse+f cmd)earch.%aption P "H*rocess" Then Act&ariable P t$t)tAcct,um %all %rent 3ith rs% .;ind "Account,umber P" H Act&ariable H "" +f ./O; Then sgBo$ "Account does not /$istW *lease contact customer services"! vb+nformation! "A T )ervice....." t$t)tAcct,um P "" t$t)tAcct,um.)et;ocus cmd)earch.%aption P "H*rocess" /lse -nload e e.<ide 6oad frm3ith7 frm3ith7.)how vb odal /nd +f /nd 3ith /lse Act&ariable P t$t)tAcct,um 5:

%all %rent 3ith rs% .;ind "Account,umber P" H Act&ariable H "" +f ./O; Then sgBo$ "Account does not /$istW *lease contact customer services"! vb+nformation! "A T )ervice....." t$t)tAcct,um P "" t$t)tAcct,um.)et;ocus cmd)earch.%aption P "H+n#uire" /lse -nload e e.<ide frm%ash.+mage2.&isible P ;alse frm%ash.cmdOk.&isible P ;alse 6oad frm%ash frm%ash.)how vb odal /nd +f /nd 3ith /nd +f -nload e frm3el.fraTransaction.&isible P True frm3el.fraAcctT"pe.&isible P ;alse frm3el.fra)ecret%ode.&isible P ;alse /nd )ub

?.2 SYSTEM IMPLEMENTATION AND TESTING
+mplementation is the stage of the project where the theoretical design is turned into a working s"stem. +t can be considered to be the most crucial stage in achieving a successful new s"stem gaining the users confidence that the new s"stem will work and will be effective and accurate. +t is primaril" concerned with user training and documentation. %onversion usuall" takes place about the same time the user is being trained or later. +mplementation simpl" means convening a new s"stem design into operation! which is the process of converting a new revised s"stem design into an operational one. ?.2.1. SYSTEM TESTING )oftware Testing is the process of e$ecuting software in a controlled manner! in order to answer the #uestion . 7oes the software behave as specified=. )oftware testing is often used in association with the terms verification and validation. &alidation is the checking or testing of items! includes software! for conformance and consistenc" with an associated specification. )oftware testing is just one kind of verification! which also uses techni#ues such as reviews! anal"sis! inspections! and walkthroughs. &alidation is the process of checking that what has been specified is what the user actuall" wanted. &alidation &erification : Are we doing the right job= : Are we doing the job right=

5?

)oftware testing should not be confused with debugging. 7ebugging is the process of anal"zing and localizing bugs when software does not behave as e$pected. Although the identification of some bugs will be obvious from pla"ing with the software! a methodical approach to software testing is a much more thorough means for identif"ing bugs. 7ebugging is therefore an activit" which supports testing! but cannot replace testing. Other activities which are often associated with software testing are static anal"sis and d"namic anal"sis. )tatic anal"sis investigates the source code of software! looking for problems and gathering metrics without actuall" e$ecuting the code. 7"namic anal"sis looks at the behavior of software while it is e$ecuting! to provide information such as e$ecution traces! timing profiles! and test coverage information. Testing is a set of activit" that can be planned in advanced and conducted s"stematicall". Testing begins at the module level and work towards the integration of entire computers based s"stem. ,othing is complete without testing! as it vital success of the s"stem testing objectives! there are several rules that can serve as testing objectives. The" are Testing is a process of e$ecuting a program with the intend of finding an error.A good test case is one that has high possibilit" of finding an undiscovered error.A successful test is one that uncovers an undiscovered error. +f a testing is conducted successfull" according to the objectives as stated above! it would uncovered errors in the software also testing demonstrate that the software function appear to be working according to the specification! that performance re#uirement appear to have been met. There are three wa"s to test program. • ;or correctness • ;or implementation efficienc" • ;or computational comple$it" Test for correctness are supposed to verif" that a program does e$actl" what it was designed to do. This is much more difficult than it ma" at first appear! especiall" for large programs.

TEST PLAN
A test plan implies a series of desired course of action to be followed in accomplishing various testing methods. The Test *lan acts as a blue print for the action that is to be followed. The software engineers create a computer program! its documentation and related data structures. The software developers is alwa"s responsible for testing the individual units of the programs! ensuring that each performs the function for which it was designed. There is an independent test group '+T9( which is to remove the inherent problems associated with letting the builder to test the thing that has been built. The specific objectives of testing should be stated in measurable terms. )o that the mean time 5B

to failure! the cost to find and fi$ the defects! remaining defect densit" or fre#uenc" of occurrence and test work.hours per regression test all should be stated within the test plan. The levels of testing include1 • • • • -nit testing +ntegration Testing 7ata validation Testing Output Testing

UNIT TESTING -nit testing focuses verification effort on the smallest unit of software design A the software component or module. -sing the component level design description as a guide! important control paths are tested to uncover errors within the boundar" of the module. The relative comple$it" of tests and uncovered scope established for unit testing. The unit testing is white.bo$ oriented! and step can be conducted in parallel for multiple components. The modular interface is tested to ensure that information properl" flows into and out of the program unit under test. The local data structure is e$amined to ensure that data stored temporaril" maintains its integrit" during all steps in an algorithm8s e$ecution. Boundar" conditions are tested to ensure that all statements in a module have been e$ecuted at least once. ;inall"! all error handling paths are tested. Tests of data flow across a module interface are re#uired before an" other test is initiated. +f data do not enter and e$it properl"! all other tests are moot. )elective testing of e$ecution paths is an essential task during the unit test. 9ood design dictates that error conditions be anticipated and error handling paths set up to reroute or cleanl" terminate processing when an error does occur. Boundar" testing is the last task of unit testing step. )oftware often fails at its boundaries. -nit testing was done in )ell.)oft )"stem b" treating each module as separate entit" and testing each one of them with a wide spectrum of test inputs. )ome flaws in the internal logic of the modules were found and were rectified. INTEGRATION TESTING +ntegration testing is s"stematic techni#ue for constructing the program structure while at the same time conducting tests to uncover errors associated with interfacing. The objective is to take unit tested components and build a program structure that has been dictated b" design. The entire program is tested as whole. %orrection is difficult because isolation of causes is complicated b" vast e$panse of entire program. Once these errors are corrected! new ones appear and the process continues in a seemingl" endless loop. After unit testing in )ell.)oft )"stem all the modules were integrated to test for an" inconsistencies in the interfaces. oreover differences in program structures were removed and a uni#ue program structure was evolved.

5C

VALIDATION TESTING OR SYSTEM TESTING This is the final step in testing. +n this the entire s"stem was tested as a whole with all forms! code! modules and class modules. This form of testing is popularl" known as Black Bo$ testing or )"stem testing. Black Bo$ testing method focuses on the functional re#uirements of the software. That is! Black Bo$ testing enables the software engineer to derive sets of input conditions that will full" e$ercise all functional re#uirements for a program. Black Bo$ testing attempts to find errors in the following categoriesD incorrect or missing functions! interface errors! errors in data structures or e$ternal data access! performance errors and initialization errors and termination errors. OUTPUT TESTING OR USER ACCEPTANCE TESTING The s"stem considered is tested for user acceptanceD here it should satisf" the firm8s need. The software should keep in touch with perspective s"stemD user at the time of developing and making changes whenever re#uired. This done with respect to the following points  +nput )creen 7esigns!  Output )creen 7esigns!  Online message to guide the user and the like. The above testing is done taking various kinds of test data. *reparation of test data pla"s a vital role in the s"stem testing. After preparing the test data! the s"stem under stud" is tested using that test data. 3hile testing the s"stem b" which test data errors are again uncovered and corrected b" using above testing steps and corrections are also noted for future use. ?.3. TRAINING Once the s"stem is successfull" developed the ne$t important step is to ensure that the administrators are well trained to handle the s"stem. This is because the success of a s"stem invariabl" depends on how the" are operated and used. The implementation depends upon the right people being at the right place at the right time. /ducation involves creating the right atmosphere and motivating the user. The administrators are familiarized with the run procedures of the s"stem! working through the se#uence of activities on an ongoing basis. +mplementation is the state in the project where the theoretical design is turned into a working s"stem. B" this! the users get the confidence that the s"stem will work effectivel". The s"stem can be implemented onl" after through testing. The s"stems personnel check the feasibilit" of the s"stem. The actual data were inputted to the s"stem and the working of the s"stem was closel" monitored. The master option was selected from the main menu and the actual data were input through the

5E

corresponding input screens. The data movement was studied and found to be correct #ueries option was then selected and this contains various reports. -tilities provide various data needed for inventor" was input and the module was test run. )atisfactor" results were obtained. 0eports related to these processes were also successfull" generated. &arious input screen formats are listed in the appendi$. +mplementation walkthroughs ensure that the completed s"stem actuall" solves the original problem. This walkthrough occurs just before the s"stem goes into use! and it should include careful review of all manuals! training materials and s"stem documentation. Again! users! the anal"st and the members of the computer services staff ma" attend this meeting.

APPENDIX
SCREEN SHOTS L( i!

ATM 4(+e

5F

Wi'4*2&C&3

5I

T2&!s&$'i(!

A+(8!' T5#e

S8$$ess T2&!s&$'i(!

:J

B&3&!$e

T2&!s&$'i(! P2( 2ess

:2

T2&!s&$'i(! Re#(2'

C&s4 T2&!s%e2

:5

C4&! e Pi!

::

E>i' F2(+ ATM

:?

CONCLUSION
-sing “Online Banking " ! customers can access their bank accounts in order to make cash withdrawals 'or credit card cash advances( and check their account balances as well as purchasing mobile cell phone prepaid credit. +n this the customer is identified b" inserting a plastic AT card with a magnetic stripe or a plastic smartcard with a chip! that contains a uni#ue card number and some securit" information! such as an e$piration date or %&% '%&&(. )ecurit" is provided b" the customer entering a personal identification number '*+,(.

BIBLIOGRAPHY
BOOG)1 2. %harles <ampfed '5JJJ( O&isual Basic8 -niversit" of Toronto 5. <erbert )childt '5JJJ( O&isual Basic C.J8 Tata c9raw <ill :. >ohn Yukowski '5JJJ( O&isual Basic C.J8 OB*B *ublications ?. >amie >aworsk" O&isual Basic C.J8Techmedia B. )tefen 7enninger O&isual Basic C.J8Author8s *ress C. +an )omerville O)oftware engineering8 E. 0ajeev mall O)oftware engineering8 F. /lmasri ,avathe O;undamentals of database s"stems8 ONLINE REFERENCE: www.w:schools.com www.theserverside.com www.visual.com

:B

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close