SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
1
CHAPTER - 1
INTRODUCTION
1.1 Introduction:
“Web Locker” refers to systems that enable bank customers to access accounts and general
information on bank products and services through a personal computer (PC) or other
intelligent device.Web Locker products and services can include wholesale products for
corporate customers as well as retail and fiduciary products for consumers.
Ultimately, the products and services obtained through Web Locker may mirror products and
services offered through other bank delivery channels.
Some examples of wholesale products and services include:
• Customer Cash management.
• Customer Wire transfer.
• Customer Automated clearinghouse (ACH) transactions.
• Customer Bill presentment and payment.
Examples of retail and fiduciary products and services include:
• Customer Balance inquiry.
• Customer Funds transfer.
• Customer Downloading transaction information.
• Customer Bill presentment and payment.
• Customer Loan applications.
• Customer Investment activity.
• Customer Other value-added services.
Other Web Locker services may include providing Internet access as an Internet Service
Provider (ISP). The OCC has determined that a national bank subsidiary may provide home.
banking services through an Internet connection to the bank’s home banking system and,
incidental to that service, may also provide Internet access to bank customers using that service,
drive ATM machines (transaction processing), and produce reports In the past, the computer
systems that made the information systems operate were rarely noticed by customers. Today,
Websites, electronic mail, and electronic bill presentment and payment systems are an
important way for banks to reach their customers. National banks have experimented with
various forms of online banking for many years. Some of the early experiments involved closed
systems where the customers accessed banks through a dial-in or cable TV connection. These
2
systems limited a bank’s potential customer base because they required out-of area customers
to either incur long-distance charges on their phone bills or subscribe to a particular cable TV
service to access the bank. With the widespread growth of the Internet, customers can use this
technology anywhere in the world to access a bank’s network. The Internet, as an enabling
technology, has made banking products and services available to more customers and
eliminated geographic and proprietary systems barriers. With an expanded market, banks also
may have opportunities to expand or change their product and service offerings.
Growth in Internet Banking:
Numerous factors — including competitive cost, customer service, and demographic
considerations — are motivating banks to evaluate their technology and assess their electronic
commerce and Internet banking strategies. Many researchers expect rapid growth in customers
using online banking products and services. The challenge for national banks is to make sure
the savings from Web Locker technology more than offset the costs and risks associated with
conducting business in cyberspace.
Marketing strategies will vary as national banks seek to expand their markets and employ lower
cost delivery channels. Examiners will need to understand the strategies used and technologies
employed on a bank-by-bank basis to assess the risk. Evaluating a bank’s data on the use of
their Web sites, may help examiners determine the bank’s strategic objectives,
Some of the market factors that may drive a bank’s strategy include the following:
 Competition
 Cost Efficiencies .
 Geographical Reach .
 Customer Demographics .
3
CHAPTER-2
BACKGROUND AND LITERATURE REVIEW
Dorra Gherib (2014)
In their research paper titled “Adoption and diffusion of internet banking: case of Tunisian
banking sector “tried to observe the embracing of Internet banking in the Tunisian banking
industry. The aim is to make out factors that accelerate or slow down the implementation
process. The literature review enables identifying a set of variables: organizational, individual
and structural. The research methodology used within this study is the case study. Five case
studies in banking sector were executed. The sample is shaped by banks that adopted the
Internet Baking as a modernization. The analysis allowed the willpower of the related
dimensions of the aforesaid variables (competition, perceived benefits, and organizational
compatibility). Indeed, this research has exposed some variables that hamper the
implementation of technological innovations.
Ms. Fozia (2013)
The purpose of this paper is to determine the customer’s perception toward the e-banking
services. A total of number of customer taken for the study is 196. Analysis of variance
technique is employed to study the significant relationship between the occupation and
customer perception of e-banking services and significant relationship between the age and
customer perception of e-banking services. The result of the study clearly shows that different
age group of customer and different occupation group of customers have different perception
toward the e-banking services. The results also propose that demographic factors impact
significantly internet banking behavior, specifically, occupation and age. Finally, this paper
suggests that understanding about the customer’s perception regarding the e-banking services
of public and private banks it will help to the banker to understand the customers need in better
way.
2.1 Existing System:-
 It automates information related to particular bank.
 Complexity in management transactions.
 Loans details, card details, account main not maintain properly.
 Customer details may not maintain properly.
 Customer may not maintain all type of transaction details.
4
2.2 Problems Definition:-
 It automates information related to particular bank.
 Complexity in management transactions.
 Loans details, card details, account main not maintain properly.
 It is manual system.
 It is time consuming process.
 No Security .
 Unauthorized person may access the data.
2.3 Proposed System:
The development of this new system contains the following activities,which try to
automate the entire process keeping in the view of database integration approach.
 Automates information related bank.
 It is easy process.
 Rich user interface.
 Customer can maintain all his personal details.
 Customer can maintain loan details, all transaction details.
5
CHAPTER- 3
REQUIREMENTS AND SPECIFICATION
3.1 Hardware Requirements:
Processor : Pentium IV(minimum)
Hard Disk : 40GB
RAM : 256MB (minimum)
3.2 Software Requirements:
Operating System : Windows or Linux
Technology : Java/j2ee (JDBC, Servlets, JSP)
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Database : Oracle
Software’s : J2SDK1.5, Tomcat 5.5, Oracle 9i
6
CHAPTER- 4
PROJECT ANALYSIS
4.1 DATAFLOW DIAGRAM (DFDS):
A graphical tool used to describe and analyze the moment of data through a system manual or
automated including the process, stores of data, and delays in the system. Data Flow Diagrams
are the central tool and the basis from which other components are developed. The
transformation of data from input to output, through processes, may be described logically and
independently of the physical components associated with the system. The DFD is also know
as a data flow graph or a bubble chart.
DFDs are the model of the proposed system. They clearly should show the requirements on
which the new system should be built. Later during design activity this is taken as the basis for
drawing the system’s structure charts. The Basic Notation used to create a DFD’s are as
follows:
1. Dataflow: Data move in a specific direction from an origin to a destination.
2. Process: People, procedures, or devices that use or produce (Transform) Data.The
physical component is not identified.
3. Source: External sources or destination of data, which may be People, Programs
, organizations or other entities.
4. Data Store: Here data are stored or referenced by a process in the System.
7
4.2 CONTEXT LEVEL DIAGRAM :
A context diagram is a top level (also known as "Level 0") data flow diagram. It only contains
one process node ("Process 0") that generalizes the function of the entire system in relationship
to external entities. DFD Layers. Draw data flow diagrams can be made in several nested layers.
Administrator
customer
Registration
Accounts
DataStores
GUI Screens
Data Input Stage
Data Input Stage
Data OutPut Stage
WEBLOCKER
System Process
CONTEXT LEVEL DATA FLOW DIAGRAME
Loans
Transaction
profile
Cards details
Data OutPut Stage
Figure-4.2: Context level Diagram
8
1. Administrator:
LEVEL-2:
GUI Interface Loans Data BaseData Input Stage DataOutput Stage
Data Base Loans GUI InterfaceData Input Stage DataOutput Stage
Figure 4.2.1: Level -2.0 Data Flow Diagram
GUI Interface Cards Data BaseData Input Stage Data Output Stage
Data Base Cards GUI InterfaceData Input Stage Data Output Stage
Figure 4.2.2: Level -2.1 Data Flow Diagram
GUI Interface Security Data BaseData Input Stage Data Output Stage
Data Base Security GUI InterfaceData Input Stage Data Output Stage
Figure 4.2.3: Level -2.2 Data Flow Diagram
9
4.3 UNIFIED MODELLING LANGUAGE:
UML, short for Unified Modeling Language, is a modeling language that allows for the visual
representation of different aspects of software system. Although UML is supposed to be a
generic modeling language that can be used in different industries, it’s most widely used in
designing object oriented software/systems.
 Structure Diagram
 Class Diagram
 Behaviour Diagram
 Activity Diagram
 Use Case Diagram
4.3.1 CLASS DIAGRAM:
Class diagrams describe the structure of the system in terms of classes and objects. The
servlet API class diagram will be as follows.
Figure 4.3.1: Class Diagram
10
4.3.1.1 CLASS COLLABORATIVE DIAGRAME:
dobject
Figure 4.3.1.1: Class Collaborative Diagram
4.3.2 ACTIVITY DIAGRAM:
Activity diagram is another important diagram in UML to describe the dynamic aspects of the
system. Activity diagram is basically a flowchart to represent the flow from one activity to
another activity. The activity can be described as an operation of the system. The control flow
is drawn from one operation to another.
InitServlet
(Form unit)
Attributes
Operations
Abstract Data Access Object(From Dao)
Attributes
Operations
Public Properties getProperties( )
Public void setProperties(properites props)
Public Connection getConnection( )
<<datatype>>
HttpServlet
{From http}
11
4.3.2.a ADMINISTRATION:
Figure 4.3.2.a: Administration Activity Diagram
4.3.3 USE CASE DIAGRAMS :
A use case diagram at its simplest is a representation of a user's interaction with the system
that shows the relationship between the user and the different use cases in which the user is
involved.
4.3.3.a. SYSTEM DIAGRAM:
Figure 4.3.3.a: System Use Case Diagram
Administrator
Authentication
Home AccountDetails Customerdetails ReportDetailsBillpayments Logout
Enter username,password
Validation
If Successful
If Fail
System
Administrator
User
Web-Locker
12
4.3.3.b ADMINISTRATOR:
Figure 4.3.3.b: Administrator Use Case Diagram
4.4. Data Dictionary Table:
4.4.1 Account Details:
4.4.2 Account Type Master:
Administrator
AccountModule
UserModule
BillPayServices
ReportDetails
User
13
4.4.3 Bill Details:
4.4.4 Card Applying Details:
4.4.5 Custmer Loan Details:
14
4.4.6 Customer:
4.4.7 Department Master:
4.4.8 Design Master:
15
4.4.9 Employees Master:
4.4.10 Loan Master:
4.4.11 Qual Master:
16
4.4.12 Queries And Solve:
l
4.4.13 Question Master:
4.4.14 Transfer Amount:
4.4.15 User Authentication Details:
17
CHAPTER- 5
SYSTEM DESIGN
5.1 NORMALIZATION DEFINED:
• In relational database design, the process of organizing data to minimize duplication.
• Normalization usually involves dividing a database into two or more tables and
defining relationships between the tables.
The objective is to isolate data so that additions, deletions, and modifications of a field can be
made in just one table and then propagated through the rest of the database via the defined
relationships.”
OR
"Normalization" refers to the process of creating an efficient, reliable, flexible, and
appropriate "relational" structure for storing information. Normalized data must be in a
"relational" data structure.
The Normal Forms:
A series of logical steps to take to normalize data tables
1. First Normal Form:
• The table cells must be of single value.
• Eliminate repeating groups in individual tables.
• Create a separate table for each set of related data.
• Identify each set of related data with a primary key.
2. Second Normal Form:
If it's in 1st NF and if the Primary Key is composite (multiple columns) then any fact
in that table must be a fact about the entire composite Primary Key not just part of the
Primary Key.
3. Third Normal Form:
If it's in the 2nd NF and there are no non-key fields that depend on attributes in the table
other than the Primary Key.
18
4. Boyce Codd Normal Form
• A table is in BCNF if it's in 3rd NF and every determinant can be used as a primery
key.
• There’s more, but beyond scope of this.
5.2 ARCHITECTURAL DIGRAM:
Accounts
Complaints
Authentication
Registration
profile
Bills
Bank
Administration
Cards
Transfermon
ey
Figure 5.2: Architectural Diagram
19
CHAPTER- 6
TECHNOLOGY
6.1 About Html:
Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows
users to produces Web pages that include text, graphics and pointer to other Web pages
(Hyperlinks).
HTML is not a programming language but it is an application of ISO Standard 8879, SGML
(Standard Generalized Markup Language), but specialized to hypertext and adapted to the
Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we can
easily jump from one point to another point. We can navigate through the information based
on our interest and preference. A markup language is simply a series of elements, each
delimited with special characters that define how text or other items enclosed within the
elements should be displayed. Hyperlinks are underlined or emphasized works that load to
other documents or some portions of the same document.
HTML can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any platform
or desktop.
HTML provides tags (special codes) to make the document look attractive. HTML tags are not
case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation
of the document. Anything that is not a tag is part of the document itself.
Basic HTML Tags:
<! -- --> specifies comments
<A>……….</A> Creates hypertext links
<B>……….</B> Formats text as bold
<BIG>……….</BIG> Formats text in large font.
<BODY>…</BODY> Contains all tags and text in the HTML document
<CENTER>...</CENTER> Creates text
<DD>…</DD> Definition of a term
<DL>...</DL> Creates definition list
<FONT>…</FONT> Formats text with a particular font
<FORM>...</FORM> Encloses a fill-out form
<FRAME>...</FRAME> Defines a particular frame in a set of frames
20
<H#>…</H#> Creates headings of different levels( 1 – 6 )
<HEAD>...</HEAD> Contains tags that specify information about a document
<HR>...</HR> Creates a horizontal rule
<HTML>…</HTML> Contains all other HTML tags
<META>...</META> Provides meta-information about a document
<SCRIPT>…</SCRIPT> Contains client-side or server-side script
<TABLE>…</TABLE> Creates a table
<TD>…</TD> Indicates table data in a table
<TR>…</TR> Designates a table row
<TH>…</TH> Creates a heading in a table
6.2 About Java Script:
JavaScript is a script-based programming language that was developed by Netscape
Communication Corporation. JavaScript was originally called Live Script and renamed as
JavaScript to indicate its relationship with Java. JavaScript supports the development of both
client and server components of Web-based applications. On the client side, it can be used to
write programs that are executed by a Web browser within the context of a Web page. On the
server side, it can be used to write Web server programs that can process information submitted
by a Web browser and then update the browser’s display accordingly
Even though JavaScript supports both client and server Web programming, we prefer
JavaScript at Client side programming since most of the browsers supports it. JavaScript is
almost as easy to learn as HTML, and JavaScript statements can be included in HTML
documents by enclosing the statements between a pair of scripting tags
<SCRIPTS>... </SCRIPT>.
<SCRIPT LANGUAGE = “JavaScript”>
JavaScript statements
</SCRIPT>
Here are a few things we can do with JavaScript:
 Validate the contents of a form and make calculations.
 Add scrolling or changing messages to the Browser’s status line.
 Animate images or rotate images that change when we move the mouse over them.
 Detect the browser in use and display different content for different browsers.
 Detect installed plug-ins and notify the user if a plug-in is required.
21
We can do much more with JavaScript, including creating entire application.
6.3 About Java Technology:
Initially the language was called as “oak” but it was renamed as “Java” in 1995. The primary
motivation of this language was the need for a platform-independent (i.e., architecture neutral)
language that could be used to create software to be embedded in various consumer electronic
devices.
 Java is a programmer’s language.
 Java is cohesive and consistent.
 Except for those constraints imposed by the Internet environment, Java gives the
programmer, full control.
 Finally, Java is to Internet programming where C was to system programming.
6.3.1 Importance of Java to the Internet:
Java has had a profound effect on the Internet. This is because; Java expands the Universe of
objects that can move about freely in Cyberspace. In a network, two categories of objects are
transmitted between the Server and the Personal computer. They are: Passive information and
Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in
the areas of Security and probability. But, Java addresses those concerns and by doing so, has
opened the door to an exciting new form of program called the Applet.
• But the difference is, it is an intelligent program, not just a media file. It can react to
the user input and dynamically change.
6.3.2 Features of Java Security:
Simple: Java was designed to be easy for the Professional programmer to learn and to use
effectively. If you are an experienced C++ programmer, learning Java will be even easier.
Because Java inherits the C/C++ syntax and many of the object oriented features of C++. Most
of the confusing concepts from C++ are either left out of Java or implemented in a cleaner,
more approachable manner. In Java there are a small number of clearly defined ways to
accomplish a given task.
Object-oriented: Java is an OOPL that supports the construction of programs that consist of
collections of collaborating objects. These objects have a unique identity, encapsulate attributes
and operations, and are instances of classes related by inheritance and polymorphism.
22
Interpreted: Java is compiled to byte codes, which are interpreted by a Java run-time
environment.
Robust: Java is designed to eliminate certain types of programming errors. Java is strongly
typed, which allows extensive compile-time error checking. It does not support memory
pointers, which eliminates the possibility of overwriting memory and corrupting data. In
addition, its automatic memory management (garbage collection) eliminates memory leaks and
other problems associated with dynamic memory allocation/de-allocation.
Secure: Java is designed to be secure in a networked environment. The Java run-time
environment uses a byte code verification process to ensure that code loaded over the network
does not violate Java security constraints.
Portable: In addition to supporting architecture neutrality, Java ensures that other
implementation-dependent aspects of language specification are eliminated. For example, Java
specifies the sizes of primitive data types and their arithmetic behavior.
Multithreaded: Java supports multiple threads of execution (a.k.a., lightweight processes),
including a set of synchronization primitives. This makes programming with threads much
easier
6.4 Java Virtual Machine (JVM):
Overall Description
Figure 6.1: Development process of JAVA Program
Java programming uses to produce byte codes and executes them. The first box indicates that
the Java source code is located in a. Java file that is processed with a Java compiler called
javac. The Java compiler produces a file called a. class file, which contains the byte code. The
.Class file is then loaded across the network or loaded locally on your machine into the
execution environment is the Java virtual machine, which interprets and executes the byte code.
Java Source Java byte code JVM
Java .Class
23
6.5 About Java Database Connectivity:
JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a
trademarked name and is not an acronym; nevertheless, JDBC is often thought of as standing
for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java
programming language. JDBC provides a standard API for tool/database developers and makes
it possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational database. One can
write a single program using the JDBC API, and the program will be able to send SQL
statements to the appropriate database. The combinations of Java and JDBC lets a programmer
write it once and run it anywhere.
What Does JDBC Do?
Simply put, JDBC makes it possible to do three things:
• Establish a connection with a database
• Send SQL statements
• Process the results.
The JDBC API supports both two-tier and three-tier models for database access.
Figure 6.2: Two-tier model
JAVA
Application
JDBC
DBMS
Client machine
DBMS-proprietary protocol
Database server
24
Figure 6.3:Three-tier model
6.6 About SQL:
Structured Query Language (SQL) is the language used to manipulate relational databases.
SQL is tied very closely with the relational model. In the relational model, data is stored in
structures called relations or tables.
SQL statements are issued for the purpose of:
Data definition: Defining tables and structures in the database (DDL used to create, alter and
drop schema objects such as tables and indexes).
Data manipulation: Used to manipulate the data within those schema objects (DML Inserting,
Updating, Deleting the data, and Querying the Database).
A schema is a collection of database objects that can include: tables, views, indexes and
sequences
List of SQL statements that can be issued against an Oracle database schema are:
 ALTER - Change an existing table, view or index definition (DDL)
 AUDIT - Track the changes made to a table (DDL)
 COMMENT - Add a comment to a table or column in a table (DDL)
Java Applet or
Html browser
Client Machine (GUI)
Application Server (Java)
JDBC
DBMS
HTTP, RMI, or CORBA calls
Server Machine
(business DBMS-
proprietary Protpocol)
Database Server
25
 COMMIT - Make all recent changes permanent (DML - transactional)
 CREATE - Create new database objects such as tables or views (DDL)
 DELETE - Delete rows from a database table (DML)
 DROP - Drop a database object such as a table, view or index (DDL)
 GRANT - Allow another user to access database objects such as tables or views (DDL)
 INSERT - Insert new data into a database table (DML)
 NO AUDIT - Turn off the auditing function (DDL)
 REVOKE - Disallow a user access to database objects such as tables and views (DDL)
 ROLLBACK - Undo any recent changes to the database (DML - Transactional)
 SELECT - Retrieve data from a database table (DML)
 TRUNCATE - Delete all rows from a database table (can not be rolled back) (DML)
 UPDATE - Change the values of some data items in a database table (DML)
6.6 About Servlets:
Introduction:
The Java web server is JavaSoft's own web Server. The Java web server is just a part of a larger
framework, intended to provide you not just with a web server, but also with tools. To build
customized network servers for any Internet or Intranet client/server system. Servlets are to a
web server, how applets are to the browser.
About Servlets:
Servlets provide a Java-based solution used to address the problems currently associated with
doing server-side programming, including inextensible scripting solutions, platform-specific
APIs, and incomplete interfaces.
Servlets are objects that conform to a specific interface that can be plugged into a Java-based
server. Servlets are to the server-side what applets are to the client-side - object byte codes that
can be dynamically loaded off the net. They differ from applets in that they are faceless objects
(without graphics or a GUI component). They serve as platform independent, dynamically
loadable, pluggable helper byte code objects on the server side that can be used to dynamically
extend server-side functionality.
For example, an HTTP Servlets can be used to generate dynamic HTML content. When you
use Servlets to do dynamic content you get the following advantages:
26
 They’re faster and cleaner than CGI scripts
 They use a standard API (the Servlets API)
 They provide all the advantages of Java (run on a variety of servers without needing to
be rewritten).
Attractiveness of Servlets:
There are many features of Servlets that make them easy and attractive to use. These include:
 Easily configured using the GUI-based Admin tool
 Can be loaded and invoked from a local disk or remotely across the network.
 Can be linked together, or chained, so that one Servlets can call another Servlets, or
several Servlets in sequence.
 Can be called dynamically from within HTML pages, using server-side include tags.
 Are secure - even when downloading across the network, the Servlets security model
and Servlets sandbox protect your system from unfriendly behavior.
 Web components:
-Servlets or JSP pages
-JavaBeans (optional)
Figure 6.4: J2EE Server
27
Features of Servlets:
 Servlets are persistent. Servlet are loaded only by the web server and can maintain
services between requests.
 Servlets are fast. Since Servlets only need to be loaded once, they offer much better
performance over their CGI counterparts.
 Servlets are platform independent.
 Servlets are extensible. Java is a robust, object-oriented programming language,
which easily can be extended to suit your needs
 Servlets are secure.
 Servlets can be used with a variety of clients.
6.8 About Java Server Pages (JSP):
Java server Pages is a simple, yet powerful technology for creating and maintaining dynamic-
content web pages. Based on the Java programming language, Java Server Pages offers proven
portability, open standards, and a mature re-usable component model.
The Java Server Pages architecture enables the separation of content generation from content
presentation. This separation not eases maintenance headaches; it also allows web team
members to focus on their areas of expertise. Now, web page designer can concentrate on
layout, and web application designers on programming, with minimal concern about impacting
each other’s work.
Features of JSP:
JSP are tag based approach to develop dynamic web application. JSP have all the features of
Servlet because it is internally Servlet. It have following feature these are:
 Extension to Servlet
 Powerful
 Portable
 Flexible
 Easy
 Less code than Servlet
28
Extension to Servlet: JSP is Extension to Servlet, it have all the features of servlet and it
have also implicit objects, predefined tags, expression language and Custom tags in JSP,
that makes JSP easy to develop any application.
Powerful: These are internally Servlet, means consists byte code, so that all java features
are applicable in case of jsp like robust, dynamic, secure, platform independent.
Portable: JSP tags will process and execute by the server side web container, So that these
are browser independent and j2ee server independent.
Flexible: Allows to defined custom tags, the developer can fill conferrable to use any kind,
framework based markup tags in JSP.
Easy: JSP is easy to learn, easy to understand and easy to develop. JSPs are more convenient
to write than Servlets because they allow you to embed Java code directly into your HTML
pages, in case of servlets you embed HTML inside of Java code.
Less code than Servlet: In JSP, we can use a lot of tags such as action tags, jstl, custom
tags etc. that reduces the code
29
CHAPTER- 7
TESTING
Software testing can be stated as the process of validating and verifying that a computer
program/application/product:
 meets the requirements that guided its design and development,
 works as expected,
 can be implemented with the same characteristics,
 and satisfies the needs of stakeholders.(client)
Testing Methods
 The box approach:
Software testing methods are traditionally divided into white- and black-box
testing. These two approaches are used to describe the point of view that a test
engineer takes when designing test cases.
7.1 White-Box testing:
White-box testing (also known as clear box testing, glass box testing, transparent box
testing and structural testing) tests internal structures or workings of a program. In white-box
testing an internal perspective(view) of the system, as well as programming skills, are used to
design test cases.
While white-box testing can be applied at the unit, integration and system levels of the software
testing process, it is usually done at the unit level.
7.2 Black-box testing:
Black-box testing treats the software as a "black box", examining functionality without any
knowledge of internal implementation. The tester is only aware of what the software is
supposed to do, not how it does it.
7.3 Grey-box testing:
Grey-box testing involves having knowledge of internal data structures and algorithms for
purposes of designing tests, while executing those tests at the user, or black-box level. The
tester is not required to have full access to the software's source code.
30
7.4 Testing Levels:
7.4.1 Unit testing:
Unit testing, also known as component testing, it verify the functionality of a specific
section of code, usually at the function level. In an object-oriented environment, this is
usually at the class level, and the minimal unit tests include the constructors and
destructors.
7.4.2 Integration testing:
Integration testing works to expose defects in the interfaces and interaction between
integrated components (modules).
7.4.3 System testing:
System testing, or end-to-end testing, tests a completely integrated system to verify that
it meets its requirements.
7.4.4 Acceptance testing:
At last the system is delivered to the user for Acceptance testing.
31
CHAPTER- 8
IMPLEMENTATION
The System is still under construction few report are yet to me made after that this system
will be implanted at client side. Users will be given a training to use the package and special
Work shop is conducted by the courier for the purpose and according to their feedback the
change implanted in the software.
Home Page:
Figure 8.1: Home Page
32
Login page:
Figure 8.2: Login Page
User home page:
Figure 8.3: User home page
33
Personal Detail :
Figure 8.4: Personal details
Customer Details:
Figure 8.5: Customer Details
34
Customer Account Details:
Figure 8.6: Customer Account Details
Customer Loan Details:
Figure 8.7: Customer Loan Details
35
Customer Loan Issue Status Details:
Figure 8.8: Customer Loan Issue Status Details
Apply Customer Card Details:
Figure 8.9: Apply Customer Card Details
36
Customer Card Issues Status Details:
Figure 8.10: Customer Card Issues Status Details
Customer Deposite Details:
Figure 8.11: Customer Deposite Details
37
Customer Withdraw Details:
Figure 8.12: Customer Withdraw Details
Balance Details:
Figure 8.13: Balance Details
38
Customer Phone Details:
Figure 8.14: Customer Phone Details
View Electricity Bill:
Figure 8.15: View Electricity Bill
39
Chapter-9
CONCLUSION
The solution will facilitate to the bank employees and the account holders with the different
modules. This solution is very much necessary for the private sector banks and the corporate
sector. The banking industry will take a new shape and explore like never before and here we
can pay the electricity, water and phone bills through online.
It is not possible to develop a system that makes all the requirements of the user. User
requirements keep changing as the system is being used. Some of the future enhancements that
can be done to this system are:
 As the technology emerges, it is possible to upgrade the system and can be adaptable
to desired environment.
 Because it is based on object-oriented design, any further changes can be easily
adaptable.
 Based on the future security issues, security can be improved using emerging
technologies.
 Loans,Cards,transfer ,checks,Drafts Amount can be Enhanced.
 Admin module can be implemented.
40
REFERENCES
[1.] Steve McNally (June 30, 2011). "The Locker Project and Your Digital Wake". Forbes.
Retrieved April 3, 2017.
[2.] Ryan Kim (February 4, 2011). "The Locker Project: Why Leave Data Tracking to Others?
Do It Yourself". GigaOM. Retrieved April 3, 2017.
[3.] Yousafzai, S. Y. (2012). A literature review of theoretical models of Internet banking
adoption at the individual level. Journal of Financial Services Marketing, 17(3), 215-226.
[4.] Dixit, J. B. and Kumar, R. (2008). Structured System Analysis and Design. Paperbacked.
New Delhi, India: Laxmi Publisher.
[5.] Dr. N.SuthanthiraVanitha1 Department of Electrical and Electronics Engineering,
Knowledge institute of technology, Tamilnadu, India “Vehicle Tracking and Locking
System Based on GSM and GPS” I.J. Intelligent Systems and Applications, 2013, 09, 86-
93 Published Online August 2013 in MECS (http://www.mecs-press.org/) DOI:
10.5815/ijisa.2013.09.10
[6.] Research paper titled as The Architecture and Implementation of Apache Lucene by
Josiane Gamgo published by Giessen Friedberg University of Applied Sciences in Nov.,
2010
[7.] Efficient Crawling Through URL Ordering Junghoo Cho, Hector Garcia- Molina,
Lawrence Page Department of Computer Science Stanford University,1998.
[8.] Yousafzai, S., Pallister, J. and Foxall, G. (2009) Multi- dimensional role of trust in internet
banking adoption, The Service Industries Journal, Vol. 29 No. 5, pp. 591- 605.
[9].Atif A.A-Jilani Muhammad-Usman, AamerNadeem, ZafarI. Malik ,Zahid
Halim,”Comparitive Study on DFD to UML diagrams Transformations”,journal of
WCSIT,vol.1, no.1,10-16,2.
[10] Sinha, I., & Mukherjee, S. (2016). Acceptance of technology, related factors in use of off
branch e-banking: an Indian case study. The Journal of High Technology Management
Research, 27(1), 88-100.
[11] Al-Ajam, A. S., & Nor, K. M. (2013). Internet banking adoption: integrating technology
acceptance model and trust. European Journal of Business and Management, 5(3), 207-
215.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Atm software
Atm softwareAtm software
Atm software
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Online banking
Online bankingOnline banking
Online banking
 
Bank management system
Bank management systemBank management system
Bank management system
 
54039271 atm-project-report
54039271 atm-project-report54039271 atm-project-report
54039271 atm-project-report
 
Presentation on java project (bank management system)
Presentation on java project (bank management system)Presentation on java project (bank management system)
Presentation on java project (bank management system)
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Atm project
Atm projectAtm project
Atm project
 
ATM BANKING SYSTEM
ATM BANKING SYSTEMATM BANKING SYSTEM
ATM BANKING SYSTEM
 
BANK MANAGEMENT SYSTEM report
BANK MANAGEMENT SYSTEM reportBANK MANAGEMENT SYSTEM report
BANK MANAGEMENT SYSTEM report
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
Atm
AtmAtm
Atm
 
"Bank management system"
"Bank management system""Bank management system"
"Bank management system"
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
Quiz app (android) Documentation
Quiz app (android) DocumentationQuiz app (android) Documentation
Quiz app (android) Documentation
 
locker presentation (1)
locker presentation (1)locker presentation (1)
locker presentation (1)
 
Bank System
Bank SystemBank System
Bank System
 
Bank Management System
Bank Management System Bank Management System
Bank Management System
 
BANKING SYSTEM
BANKING SYSTEMBANKING SYSTEM
BANKING SYSTEM
 

Ähnlich wie Web Locker For Online Banking System Chapter final project Report page

Final Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptxFinal Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptxswarajkakade83
 
Banking Management System SRS
Banking Management System SRSBanking Management System SRS
Banking Management System SRSMr. Moms
 
Onlinebanking system.ppt
Onlinebanking system.pptOnlinebanking system.ppt
Onlinebanking system.pptMohitDhande3
 
Software Engineering Testing & Research
Software Engineering Testing & Research Software Engineering Testing & Research
Software Engineering Testing & Research Vrushali Lanjewar
 
Banking Management System SDS
Banking Management System SDSBanking Management System SDS
Banking Management System SDSMr. Moms
 
Payment Routing Module using Kafka Streams
Payment Routing Module using Kafka StreamsPayment Routing Module using Kafka Streams
Payment Routing Module using Kafka StreamsIRJET Journal
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdfNEERAJRAJPUT81
 
java Project report online banking system
java Project report online banking systemjava Project report online banking system
java Project report online banking systemVishNu KuNtal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Mobile store management
Mobile store management Mobile store management
Mobile store management Rupendra Verma
 
Design and implement a new secure prototype structure of e-commerce system
Design and implement a new secure prototype structure of  e-commerce system Design and implement a new secure prototype structure of  e-commerce system
Design and implement a new secure prototype structure of e-commerce system IJECEIAES
 
ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...
ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...
ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...Nathan Mathis
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC SystemIRJET Journal
 
Documentation
DocumentationDocumentation
DocumentationKalyan A
 

Ähnlich wie Web Locker For Online Banking System Chapter final project Report page (20)

Final Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptxFinal Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptx
 
Banking Management System SRS
Banking Management System SRSBanking Management System SRS
Banking Management System SRS
 
banking project
banking projectbanking project
banking project
 
Onlinebanking system.ppt
Onlinebanking system.pptOnlinebanking system.ppt
Onlinebanking system.ppt
 
Banking java project
Banking java projectBanking java project
Banking java project
 
Software Engineering Testing & Research
Software Engineering Testing & Research Software Engineering Testing & Research
Software Engineering Testing & Research
 
Banking Management System SDS
Banking Management System SDSBanking Management System SDS
Banking Management System SDS
 
Payment Routing Module using Kafka Streams
Payment Routing Module using Kafka StreamsPayment Routing Module using Kafka Streams
Payment Routing Module using Kafka Streams
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
 
java Project report online banking system
java Project report online banking systemjava Project report online banking system
java Project report online banking system
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Mobile store management
Mobile store management Mobile store management
Mobile store management
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
ASSIGNMENT
ASSIGNMENT ASSIGNMENT
ASSIGNMENT
 
Design and implement a new secure prototype structure of e-commerce system
Design and implement a new secure prototype structure of  e-commerce system Design and implement a new secure prototype structure of  e-commerce system
Design and implement a new secure prototype structure of e-commerce system
 
ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...
ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...
ARCHITECTURE FOR INTEGRATION OF POINT OF SALE TERMINALS WITH FINANCIAL INSTIT...
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC System
 
Documentation
DocumentationDocumentation
Documentation
 

Kürzlich hochgeladen

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Web Locker For Online Banking System Chapter final project Report page

  • 1. 1 CHAPTER - 1 INTRODUCTION 1.1 Introduction: “Web Locker” refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer (PC) or other intelligent device.Web Locker products and services can include wholesale products for corporate customers as well as retail and fiduciary products for consumers. Ultimately, the products and services obtained through Web Locker may mirror products and services offered through other bank delivery channels. Some examples of wholesale products and services include: • Customer Cash management. • Customer Wire transfer. • Customer Automated clearinghouse (ACH) transactions. • Customer Bill presentment and payment. Examples of retail and fiduciary products and services include: • Customer Balance inquiry. • Customer Funds transfer. • Customer Downloading transaction information. • Customer Bill presentment and payment. • Customer Loan applications. • Customer Investment activity. • Customer Other value-added services. Other Web Locker services may include providing Internet access as an Internet Service Provider (ISP). The OCC has determined that a national bank subsidiary may provide home. banking services through an Internet connection to the bank’s home banking system and, incidental to that service, may also provide Internet access to bank customers using that service, drive ATM machines (transaction processing), and produce reports In the past, the computer systems that made the information systems operate were rarely noticed by customers. Today, Websites, electronic mail, and electronic bill presentment and payment systems are an important way for banks to reach their customers. National banks have experimented with various forms of online banking for many years. Some of the early experiments involved closed systems where the customers accessed banks through a dial-in or cable TV connection. These
  • 2. 2 systems limited a bank’s potential customer base because they required out-of area customers to either incur long-distance charges on their phone bills or subscribe to a particular cable TV service to access the bank. With the widespread growth of the Internet, customers can use this technology anywhere in the world to access a bank’s network. The Internet, as an enabling technology, has made banking products and services available to more customers and eliminated geographic and proprietary systems barriers. With an expanded market, banks also may have opportunities to expand or change their product and service offerings. Growth in Internet Banking: Numerous factors — including competitive cost, customer service, and demographic considerations — are motivating banks to evaluate their technology and assess their electronic commerce and Internet banking strategies. Many researchers expect rapid growth in customers using online banking products and services. The challenge for national banks is to make sure the savings from Web Locker technology more than offset the costs and risks associated with conducting business in cyberspace. Marketing strategies will vary as national banks seek to expand their markets and employ lower cost delivery channels. Examiners will need to understand the strategies used and technologies employed on a bank-by-bank basis to assess the risk. Evaluating a bank’s data on the use of their Web sites, may help examiners determine the bank’s strategic objectives, Some of the market factors that may drive a bank’s strategy include the following:  Competition  Cost Efficiencies .  Geographical Reach .  Customer Demographics .
  • 3. 3 CHAPTER-2 BACKGROUND AND LITERATURE REVIEW Dorra Gherib (2014) In their research paper titled “Adoption and diffusion of internet banking: case of Tunisian banking sector “tried to observe the embracing of Internet banking in the Tunisian banking industry. The aim is to make out factors that accelerate or slow down the implementation process. The literature review enables identifying a set of variables: organizational, individual and structural. The research methodology used within this study is the case study. Five case studies in banking sector were executed. The sample is shaped by banks that adopted the Internet Baking as a modernization. The analysis allowed the willpower of the related dimensions of the aforesaid variables (competition, perceived benefits, and organizational compatibility). Indeed, this research has exposed some variables that hamper the implementation of technological innovations. Ms. Fozia (2013) The purpose of this paper is to determine the customer’s perception toward the e-banking services. A total of number of customer taken for the study is 196. Analysis of variance technique is employed to study the significant relationship between the occupation and customer perception of e-banking services and significant relationship between the age and customer perception of e-banking services. The result of the study clearly shows that different age group of customer and different occupation group of customers have different perception toward the e-banking services. The results also propose that demographic factors impact significantly internet banking behavior, specifically, occupation and age. Finally, this paper suggests that understanding about the customer’s perception regarding the e-banking services of public and private banks it will help to the banker to understand the customers need in better way. 2.1 Existing System:-  It automates information related to particular bank.  Complexity in management transactions.  Loans details, card details, account main not maintain properly.  Customer details may not maintain properly.  Customer may not maintain all type of transaction details.
  • 4. 4 2.2 Problems Definition:-  It automates information related to particular bank.  Complexity in management transactions.  Loans details, card details, account main not maintain properly.  It is manual system.  It is time consuming process.  No Security .  Unauthorized person may access the data. 2.3 Proposed System: The development of this new system contains the following activities,which try to automate the entire process keeping in the view of database integration approach.  Automates information related bank.  It is easy process.  Rich user interface.  Customer can maintain all his personal details.  Customer can maintain loan details, all transaction details.
  • 5. 5 CHAPTER- 3 REQUIREMENTS AND SPECIFICATION 3.1 Hardware Requirements: Processor : Pentium IV(minimum) Hard Disk : 40GB RAM : 256MB (minimum) 3.2 Software Requirements: Operating System : Windows or Linux Technology : Java/j2ee (JDBC, Servlets, JSP) Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Database : Oracle Software’s : J2SDK1.5, Tomcat 5.5, Oracle 9i
  • 6. 6 CHAPTER- 4 PROJECT ANALYSIS 4.1 DATAFLOW DIAGRAM (DFDS): A graphical tool used to describe and analyze the moment of data through a system manual or automated including the process, stores of data, and delays in the system. Data Flow Diagrams are the central tool and the basis from which other components are developed. The transformation of data from input to output, through processes, may be described logically and independently of the physical components associated with the system. The DFD is also know as a data flow graph or a bubble chart. DFDs are the model of the proposed system. They clearly should show the requirements on which the new system should be built. Later during design activity this is taken as the basis for drawing the system’s structure charts. The Basic Notation used to create a DFD’s are as follows: 1. Dataflow: Data move in a specific direction from an origin to a destination. 2. Process: People, procedures, or devices that use or produce (Transform) Data.The physical component is not identified. 3. Source: External sources or destination of data, which may be People, Programs , organizations or other entities. 4. Data Store: Here data are stored or referenced by a process in the System.
  • 7. 7 4.2 CONTEXT LEVEL DIAGRAM : A context diagram is a top level (also known as "Level 0") data flow diagram. It only contains one process node ("Process 0") that generalizes the function of the entire system in relationship to external entities. DFD Layers. Draw data flow diagrams can be made in several nested layers. Administrator customer Registration Accounts DataStores GUI Screens Data Input Stage Data Input Stage Data OutPut Stage WEBLOCKER System Process CONTEXT LEVEL DATA FLOW DIAGRAME Loans Transaction profile Cards details Data OutPut Stage Figure-4.2: Context level Diagram
  • 8. 8 1. Administrator: LEVEL-2: GUI Interface Loans Data BaseData Input Stage DataOutput Stage Data Base Loans GUI InterfaceData Input Stage DataOutput Stage Figure 4.2.1: Level -2.0 Data Flow Diagram GUI Interface Cards Data BaseData Input Stage Data Output Stage Data Base Cards GUI InterfaceData Input Stage Data Output Stage Figure 4.2.2: Level -2.1 Data Flow Diagram GUI Interface Security Data BaseData Input Stage Data Output Stage Data Base Security GUI InterfaceData Input Stage Data Output Stage Figure 4.2.3: Level -2.2 Data Flow Diagram
  • 9. 9 4.3 UNIFIED MODELLING LANGUAGE: UML, short for Unified Modeling Language, is a modeling language that allows for the visual representation of different aspects of software system. Although UML is supposed to be a generic modeling language that can be used in different industries, it’s most widely used in designing object oriented software/systems.  Structure Diagram  Class Diagram  Behaviour Diagram  Activity Diagram  Use Case Diagram 4.3.1 CLASS DIAGRAM: Class diagrams describe the structure of the system in terms of classes and objects. The servlet API class diagram will be as follows. Figure 4.3.1: Class Diagram
  • 10. 10 4.3.1.1 CLASS COLLABORATIVE DIAGRAME: dobject Figure 4.3.1.1: Class Collaborative Diagram 4.3.2 ACTIVITY DIAGRAM: Activity diagram is another important diagram in UML to describe the dynamic aspects of the system. Activity diagram is basically a flowchart to represent the flow from one activity to another activity. The activity can be described as an operation of the system. The control flow is drawn from one operation to another. InitServlet (Form unit) Attributes Operations Abstract Data Access Object(From Dao) Attributes Operations Public Properties getProperties( ) Public void setProperties(properites props) Public Connection getConnection( ) <<datatype>> HttpServlet {From http}
  • 11. 11 4.3.2.a ADMINISTRATION: Figure 4.3.2.a: Administration Activity Diagram 4.3.3 USE CASE DIAGRAMS : A use case diagram at its simplest is a representation of a user's interaction with the system that shows the relationship between the user and the different use cases in which the user is involved. 4.3.3.a. SYSTEM DIAGRAM: Figure 4.3.3.a: System Use Case Diagram Administrator Authentication Home AccountDetails Customerdetails ReportDetailsBillpayments Logout Enter username,password Validation If Successful If Fail System Administrator User Web-Locker
  • 12. 12 4.3.3.b ADMINISTRATOR: Figure 4.3.3.b: Administrator Use Case Diagram 4.4. Data Dictionary Table: 4.4.1 Account Details: 4.4.2 Account Type Master: Administrator AccountModule UserModule BillPayServices ReportDetails User
  • 13. 13 4.4.3 Bill Details: 4.4.4 Card Applying Details: 4.4.5 Custmer Loan Details:
  • 14. 14 4.4.6 Customer: 4.4.7 Department Master: 4.4.8 Design Master:
  • 15. 15 4.4.9 Employees Master: 4.4.10 Loan Master: 4.4.11 Qual Master:
  • 16. 16 4.4.12 Queries And Solve: l 4.4.13 Question Master: 4.4.14 Transfer Amount: 4.4.15 User Authentication Details:
  • 17. 17 CHAPTER- 5 SYSTEM DESIGN 5.1 NORMALIZATION DEFINED: • In relational database design, the process of organizing data to minimize duplication. • Normalization usually involves dividing a database into two or more tables and defining relationships between the tables. The objective is to isolate data so that additions, deletions, and modifications of a field can be made in just one table and then propagated through the rest of the database via the defined relationships.” OR "Normalization" refers to the process of creating an efficient, reliable, flexible, and appropriate "relational" structure for storing information. Normalized data must be in a "relational" data structure. The Normal Forms: A series of logical steps to take to normalize data tables 1. First Normal Form: • The table cells must be of single value. • Eliminate repeating groups in individual tables. • Create a separate table for each set of related data. • Identify each set of related data with a primary key. 2. Second Normal Form: If it's in 1st NF and if the Primary Key is composite (multiple columns) then any fact in that table must be a fact about the entire composite Primary Key not just part of the Primary Key. 3. Third Normal Form: If it's in the 2nd NF and there are no non-key fields that depend on attributes in the table other than the Primary Key.
  • 18. 18 4. Boyce Codd Normal Form • A table is in BCNF if it's in 3rd NF and every determinant can be used as a primery key. • There’s more, but beyond scope of this. 5.2 ARCHITECTURAL DIGRAM: Accounts Complaints Authentication Registration profile Bills Bank Administration Cards Transfermon ey Figure 5.2: Architectural Diagram
  • 19. 19 CHAPTER- 6 TECHNOLOGY 6.1 About Html: Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows users to produces Web pages that include text, graphics and pointer to other Web pages (Hyperlinks). HTML is not a programming language but it is an application of ISO Standard 8879, SGML (Standard Generalized Markup Language), but specialized to hypertext and adapted to the Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we can easily jump from one point to another point. We can navigate through the information based on our interest and preference. A markup language is simply a series of elements, each delimited with special characters that define how text or other items enclosed within the elements should be displayed. Hyperlinks are underlined or emphasized works that load to other documents or some portions of the same document. HTML can be used to display any type of document on the host computer, which can be geographically at a different location. It is a versatile language and can be used on any platform or desktop. HTML provides tags (special codes) to make the document look attractive. HTML tags are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation of the document. Anything that is not a tag is part of the document itself. Basic HTML Tags: <! -- --> specifies comments <A>……….</A> Creates hypertext links <B>……….</B> Formats text as bold <BIG>……….</BIG> Formats text in large font. <BODY>…</BODY> Contains all tags and text in the HTML document <CENTER>...</CENTER> Creates text <DD>…</DD> Definition of a term <DL>...</DL> Creates definition list <FONT>…</FONT> Formats text with a particular font <FORM>...</FORM> Encloses a fill-out form <FRAME>...</FRAME> Defines a particular frame in a set of frames
  • 20. 20 <H#>…</H#> Creates headings of different levels( 1 – 6 ) <HEAD>...</HEAD> Contains tags that specify information about a document <HR>...</HR> Creates a horizontal rule <HTML>…</HTML> Contains all other HTML tags <META>...</META> Provides meta-information about a document <SCRIPT>…</SCRIPT> Contains client-side or server-side script <TABLE>…</TABLE> Creates a table <TD>…</TD> Indicates table data in a table <TR>…</TR> Designates a table row <TH>…</TH> Creates a heading in a table 6.2 About Java Script: JavaScript is a script-based programming language that was developed by Netscape Communication Corporation. JavaScript was originally called Live Script and renamed as JavaScript to indicate its relationship with Java. JavaScript supports the development of both client and server components of Web-based applications. On the client side, it can be used to write programs that are executed by a Web browser within the context of a Web page. On the server side, it can be used to write Web server programs that can process information submitted by a Web browser and then update the browser’s display accordingly Even though JavaScript supports both client and server Web programming, we prefer JavaScript at Client side programming since most of the browsers supports it. JavaScript is almost as easy to learn as HTML, and JavaScript statements can be included in HTML documents by enclosing the statements between a pair of scripting tags <SCRIPTS>... </SCRIPT>. <SCRIPT LANGUAGE = “JavaScript”> JavaScript statements </SCRIPT> Here are a few things we can do with JavaScript:  Validate the contents of a form and make calculations.  Add scrolling or changing messages to the Browser’s status line.  Animate images or rotate images that change when we move the mouse over them.  Detect the browser in use and display different content for different browsers.  Detect installed plug-ins and notify the user if a plug-in is required.
  • 21. 21 We can do much more with JavaScript, including creating entire application. 6.3 About Java Technology: Initially the language was called as “oak” but it was renamed as “Java” in 1995. The primary motivation of this language was the need for a platform-independent (i.e., architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices.  Java is a programmer’s language.  Java is cohesive and consistent.  Except for those constraints imposed by the Internet environment, Java gives the programmer, full control.  Finally, Java is to Internet programming where C was to system programming. 6.3.1 Importance of Java to the Internet: Java has had a profound effect on the Internet. This is because; Java expands the Universe of objects that can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the Server and the Personal computer. They are: Passive information and Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in the areas of Security and probability. But, Java addresses those concerns and by doing so, has opened the door to an exciting new form of program called the Applet. • But the difference is, it is an intelligent program, not just a media file. It can react to the user input and dynamically change. 6.3.2 Features of Java Security: Simple: Java was designed to be easy for the Professional programmer to learn and to use effectively. If you are an experienced C++ programmer, learning Java will be even easier. Because Java inherits the C/C++ syntax and many of the object oriented features of C++. Most of the confusing concepts from C++ are either left out of Java or implemented in a cleaner, more approachable manner. In Java there are a small number of clearly defined ways to accomplish a given task. Object-oriented: Java is an OOPL that supports the construction of programs that consist of collections of collaborating objects. These objects have a unique identity, encapsulate attributes and operations, and are instances of classes related by inheritance and polymorphism.
  • 22. 22 Interpreted: Java is compiled to byte codes, which are interpreted by a Java run-time environment. Robust: Java is designed to eliminate certain types of programming errors. Java is strongly typed, which allows extensive compile-time error checking. It does not support memory pointers, which eliminates the possibility of overwriting memory and corrupting data. In addition, its automatic memory management (garbage collection) eliminates memory leaks and other problems associated with dynamic memory allocation/de-allocation. Secure: Java is designed to be secure in a networked environment. The Java run-time environment uses a byte code verification process to ensure that code loaded over the network does not violate Java security constraints. Portable: In addition to supporting architecture neutrality, Java ensures that other implementation-dependent aspects of language specification are eliminated. For example, Java specifies the sizes of primitive data types and their arithmetic behavior. Multithreaded: Java supports multiple threads of execution (a.k.a., lightweight processes), including a set of synchronization primitives. This makes programming with threads much easier 6.4 Java Virtual Machine (JVM): Overall Description Figure 6.1: Development process of JAVA Program Java programming uses to produce byte codes and executes them. The first box indicates that the Java source code is located in a. Java file that is processed with a Java compiler called javac. The Java compiler produces a file called a. class file, which contains the byte code. The .Class file is then loaded across the network or loaded locally on your machine into the execution environment is the Java virtual machine, which interprets and executes the byte code. Java Source Java byte code JVM Java .Class
  • 23. 23 6.5 About Java Database Connectivity: JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is often thought of as standing for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java programming language. JDBC provides a standard API for tool/database developers and makes it possible to write database applications using a pure Java API. Using JDBC, it is easy to send SQL statements to virtually any relational database. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. The combinations of Java and JDBC lets a programmer write it once and run it anywhere. What Does JDBC Do? Simply put, JDBC makes it possible to do three things: • Establish a connection with a database • Send SQL statements • Process the results. The JDBC API supports both two-tier and three-tier models for database access. Figure 6.2: Two-tier model JAVA Application JDBC DBMS Client machine DBMS-proprietary protocol Database server
  • 24. 24 Figure 6.3:Three-tier model 6.6 About SQL: Structured Query Language (SQL) is the language used to manipulate relational databases. SQL is tied very closely with the relational model. In the relational model, data is stored in structures called relations or tables. SQL statements are issued for the purpose of: Data definition: Defining tables and structures in the database (DDL used to create, alter and drop schema objects such as tables and indexes). Data manipulation: Used to manipulate the data within those schema objects (DML Inserting, Updating, Deleting the data, and Querying the Database). A schema is a collection of database objects that can include: tables, views, indexes and sequences List of SQL statements that can be issued against an Oracle database schema are:  ALTER - Change an existing table, view or index definition (DDL)  AUDIT - Track the changes made to a table (DDL)  COMMENT - Add a comment to a table or column in a table (DDL) Java Applet or Html browser Client Machine (GUI) Application Server (Java) JDBC DBMS HTTP, RMI, or CORBA calls Server Machine (business DBMS- proprietary Protpocol) Database Server
  • 25. 25  COMMIT - Make all recent changes permanent (DML - transactional)  CREATE - Create new database objects such as tables or views (DDL)  DELETE - Delete rows from a database table (DML)  DROP - Drop a database object such as a table, view or index (DDL)  GRANT - Allow another user to access database objects such as tables or views (DDL)  INSERT - Insert new data into a database table (DML)  NO AUDIT - Turn off the auditing function (DDL)  REVOKE - Disallow a user access to database objects such as tables and views (DDL)  ROLLBACK - Undo any recent changes to the database (DML - Transactional)  SELECT - Retrieve data from a database table (DML)  TRUNCATE - Delete all rows from a database table (can not be rolled back) (DML)  UPDATE - Change the values of some data items in a database table (DML) 6.6 About Servlets: Introduction: The Java web server is JavaSoft's own web Server. The Java web server is just a part of a larger framework, intended to provide you not just with a web server, but also with tools. To build customized network servers for any Internet or Intranet client/server system. Servlets are to a web server, how applets are to the browser. About Servlets: Servlets provide a Java-based solution used to address the problems currently associated with doing server-side programming, including inextensible scripting solutions, platform-specific APIs, and incomplete interfaces. Servlets are objects that conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the client-side - object byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform independent, dynamically loadable, pluggable helper byte code objects on the server side that can be used to dynamically extend server-side functionality. For example, an HTTP Servlets can be used to generate dynamic HTML content. When you use Servlets to do dynamic content you get the following advantages:
  • 26. 26  They’re faster and cleaner than CGI scripts  They use a standard API (the Servlets API)  They provide all the advantages of Java (run on a variety of servers without needing to be rewritten). Attractiveness of Servlets: There are many features of Servlets that make them easy and attractive to use. These include:  Easily configured using the GUI-based Admin tool  Can be loaded and invoked from a local disk or remotely across the network.  Can be linked together, or chained, so that one Servlets can call another Servlets, or several Servlets in sequence.  Can be called dynamically from within HTML pages, using server-side include tags.  Are secure - even when downloading across the network, the Servlets security model and Servlets sandbox protect your system from unfriendly behavior.  Web components: -Servlets or JSP pages -JavaBeans (optional) Figure 6.4: J2EE Server
  • 27. 27 Features of Servlets:  Servlets are persistent. Servlet are loaded only by the web server and can maintain services between requests.  Servlets are fast. Since Servlets only need to be loaded once, they offer much better performance over their CGI counterparts.  Servlets are platform independent.  Servlets are extensible. Java is a robust, object-oriented programming language, which easily can be extended to suit your needs  Servlets are secure.  Servlets can be used with a variety of clients. 6.8 About Java Server Pages (JSP): Java server Pages is a simple, yet powerful technology for creating and maintaining dynamic- content web pages. Based on the Java programming language, Java Server Pages offers proven portability, open standards, and a mature re-usable component model. The Java Server Pages architecture enables the separation of content generation from content presentation. This separation not eases maintenance headaches; it also allows web team members to focus on their areas of expertise. Now, web page designer can concentrate on layout, and web application designers on programming, with minimal concern about impacting each other’s work. Features of JSP: JSP are tag based approach to develop dynamic web application. JSP have all the features of Servlet because it is internally Servlet. It have following feature these are:  Extension to Servlet  Powerful  Portable  Flexible  Easy  Less code than Servlet
  • 28. 28 Extension to Servlet: JSP is Extension to Servlet, it have all the features of servlet and it have also implicit objects, predefined tags, expression language and Custom tags in JSP, that makes JSP easy to develop any application. Powerful: These are internally Servlet, means consists byte code, so that all java features are applicable in case of jsp like robust, dynamic, secure, platform independent. Portable: JSP tags will process and execute by the server side web container, So that these are browser independent and j2ee server independent. Flexible: Allows to defined custom tags, the developer can fill conferrable to use any kind, framework based markup tags in JSP. Easy: JSP is easy to learn, easy to understand and easy to develop. JSPs are more convenient to write than Servlets because they allow you to embed Java code directly into your HTML pages, in case of servlets you embed HTML inside of Java code. Less code than Servlet: In JSP, we can use a lot of tags such as action tags, jstl, custom tags etc. that reduces the code
  • 29. 29 CHAPTER- 7 TESTING Software testing can be stated as the process of validating and verifying that a computer program/application/product:  meets the requirements that guided its design and development,  works as expected,  can be implemented with the same characteristics,  and satisfies the needs of stakeholders.(client) Testing Methods  The box approach: Software testing methods are traditionally divided into white- and black-box testing. These two approaches are used to describe the point of view that a test engineer takes when designing test cases. 7.1 White-Box testing: White-box testing (also known as clear box testing, glass box testing, transparent box testing and structural testing) tests internal structures or workings of a program. In white-box testing an internal perspective(view) of the system, as well as programming skills, are used to design test cases. While white-box testing can be applied at the unit, integration and system levels of the software testing process, it is usually done at the unit level. 7.2 Black-box testing: Black-box testing treats the software as a "black box", examining functionality without any knowledge of internal implementation. The tester is only aware of what the software is supposed to do, not how it does it. 7.3 Grey-box testing: Grey-box testing involves having knowledge of internal data structures and algorithms for purposes of designing tests, while executing those tests at the user, or black-box level. The tester is not required to have full access to the software's source code.
  • 30. 30 7.4 Testing Levels: 7.4.1 Unit testing: Unit testing, also known as component testing, it verify the functionality of a specific section of code, usually at the function level. In an object-oriented environment, this is usually at the class level, and the minimal unit tests include the constructors and destructors. 7.4.2 Integration testing: Integration testing works to expose defects in the interfaces and interaction between integrated components (modules). 7.4.3 System testing: System testing, or end-to-end testing, tests a completely integrated system to verify that it meets its requirements. 7.4.4 Acceptance testing: At last the system is delivered to the user for Acceptance testing.
  • 31. 31 CHAPTER- 8 IMPLEMENTATION The System is still under construction few report are yet to me made after that this system will be implanted at client side. Users will be given a training to use the package and special Work shop is conducted by the courier for the purpose and according to their feedback the change implanted in the software. Home Page: Figure 8.1: Home Page
  • 32. 32 Login page: Figure 8.2: Login Page User home page: Figure 8.3: User home page
  • 33. 33 Personal Detail : Figure 8.4: Personal details Customer Details: Figure 8.5: Customer Details
  • 34. 34 Customer Account Details: Figure 8.6: Customer Account Details Customer Loan Details: Figure 8.7: Customer Loan Details
  • 35. 35 Customer Loan Issue Status Details: Figure 8.8: Customer Loan Issue Status Details Apply Customer Card Details: Figure 8.9: Apply Customer Card Details
  • 36. 36 Customer Card Issues Status Details: Figure 8.10: Customer Card Issues Status Details Customer Deposite Details: Figure 8.11: Customer Deposite Details
  • 37. 37 Customer Withdraw Details: Figure 8.12: Customer Withdraw Details Balance Details: Figure 8.13: Balance Details
  • 38. 38 Customer Phone Details: Figure 8.14: Customer Phone Details View Electricity Bill: Figure 8.15: View Electricity Bill
  • 39. 39 Chapter-9 CONCLUSION The solution will facilitate to the bank employees and the account holders with the different modules. This solution is very much necessary for the private sector banks and the corporate sector. The banking industry will take a new shape and explore like never before and here we can pay the electricity, water and phone bills through online. It is not possible to develop a system that makes all the requirements of the user. User requirements keep changing as the system is being used. Some of the future enhancements that can be done to this system are:  As the technology emerges, it is possible to upgrade the system and can be adaptable to desired environment.  Because it is based on object-oriented design, any further changes can be easily adaptable.  Based on the future security issues, security can be improved using emerging technologies.  Loans,Cards,transfer ,checks,Drafts Amount can be Enhanced.  Admin module can be implemented.
  • 40. 40 REFERENCES [1.] Steve McNally (June 30, 2011). "The Locker Project and Your Digital Wake". Forbes. Retrieved April 3, 2017. [2.] Ryan Kim (February 4, 2011). "The Locker Project: Why Leave Data Tracking to Others? Do It Yourself". GigaOM. Retrieved April 3, 2017. [3.] Yousafzai, S. Y. (2012). A literature review of theoretical models of Internet banking adoption at the individual level. Journal of Financial Services Marketing, 17(3), 215-226. [4.] Dixit, J. B. and Kumar, R. (2008). Structured System Analysis and Design. Paperbacked. New Delhi, India: Laxmi Publisher. [5.] Dr. N.SuthanthiraVanitha1 Department of Electrical and Electronics Engineering, Knowledge institute of technology, Tamilnadu, India “Vehicle Tracking and Locking System Based on GSM and GPS” I.J. Intelligent Systems and Applications, 2013, 09, 86- 93 Published Online August 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2013.09.10 [6.] Research paper titled as The Architecture and Implementation of Apache Lucene by Josiane Gamgo published by Giessen Friedberg University of Applied Sciences in Nov., 2010 [7.] Efficient Crawling Through URL Ordering Junghoo Cho, Hector Garcia- Molina, Lawrence Page Department of Computer Science Stanford University,1998. [8.] Yousafzai, S., Pallister, J. and Foxall, G. (2009) Multi- dimensional role of trust in internet banking adoption, The Service Industries Journal, Vol. 29 No. 5, pp. 591- 605. [9].Atif A.A-Jilani Muhammad-Usman, AamerNadeem, ZafarI. Malik ,Zahid Halim,”Comparitive Study on DFD to UML diagrams Transformations”,journal of WCSIT,vol.1, no.1,10-16,2. [10] Sinha, I., & Mukherjee, S. (2016). Acceptance of technology, related factors in use of off branch e-banking: an Indian case study. The Journal of High Technology Management Research, 27(1), 88-100. [11] Al-Ajam, A. S., & Nor, K. M. (2013). Internet banking adoption: integrating technology acceptance model and trust. European Journal of Business and Management, 5(3), 207- 215.