Web Locker is a platform where the bank customer can keep their things secured.. This website is designing for customer’s security purpose Customer can easily pay their due on online mode.
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Web Locker For Online Banking System Chapter final project Report page
1. 1
CHAPTER - 1
INTRODUCTION
1.1 Introduction:
“Web Locker” refers to systems that enable bank customers to access accounts and general
information on bank products and services through a personal computer (PC) or other
intelligent device.Web Locker products and services can include wholesale products for
corporate customers as well as retail and fiduciary products for consumers.
Ultimately, the products and services obtained through Web Locker may mirror products and
services offered through other bank delivery channels.
Some examples of wholesale products and services include:
• Customer Cash management.
• Customer Wire transfer.
• Customer Automated clearinghouse (ACH) transactions.
• Customer Bill presentment and payment.
Examples of retail and fiduciary products and services include:
• Customer Balance inquiry.
• Customer Funds transfer.
• Customer Downloading transaction information.
• Customer Bill presentment and payment.
• Customer Loan applications.
• Customer Investment activity.
• Customer Other value-added services.
Other Web Locker services may include providing Internet access as an Internet Service
Provider (ISP). The OCC has determined that a national bank subsidiary may provide home.
banking services through an Internet connection to the bank’s home banking system and,
incidental to that service, may also provide Internet access to bank customers using that service,
drive ATM machines (transaction processing), and produce reports In the past, the computer
systems that made the information systems operate were rarely noticed by customers. Today,
Websites, electronic mail, and electronic bill presentment and payment systems are an
important way for banks to reach their customers. National banks have experimented with
various forms of online banking for many years. Some of the early experiments involved closed
systems where the customers accessed banks through a dial-in or cable TV connection. These
2. 2
systems limited a bank’s potential customer base because they required out-of area customers
to either incur long-distance charges on their phone bills or subscribe to a particular cable TV
service to access the bank. With the widespread growth of the Internet, customers can use this
technology anywhere in the world to access a bank’s network. The Internet, as an enabling
technology, has made banking products and services available to more customers and
eliminated geographic and proprietary systems barriers. With an expanded market, banks also
may have opportunities to expand or change their product and service offerings.
Growth in Internet Banking:
Numerous factors — including competitive cost, customer service, and demographic
considerations — are motivating banks to evaluate their technology and assess their electronic
commerce and Internet banking strategies. Many researchers expect rapid growth in customers
using online banking products and services. The challenge for national banks is to make sure
the savings from Web Locker technology more than offset the costs and risks associated with
conducting business in cyberspace.
Marketing strategies will vary as national banks seek to expand their markets and employ lower
cost delivery channels. Examiners will need to understand the strategies used and technologies
employed on a bank-by-bank basis to assess the risk. Evaluating a bank’s data on the use of
their Web sites, may help examiners determine the bank’s strategic objectives,
Some of the market factors that may drive a bank’s strategy include the following:
Competition
Cost Efficiencies .
Geographical Reach .
Customer Demographics .
3. 3
CHAPTER-2
BACKGROUND AND LITERATURE REVIEW
Dorra Gherib (2014)
In their research paper titled “Adoption and diffusion of internet banking: case of Tunisian
banking sector “tried to observe the embracing of Internet banking in the Tunisian banking
industry. The aim is to make out factors that accelerate or slow down the implementation
process. The literature review enables identifying a set of variables: organizational, individual
and structural. The research methodology used within this study is the case study. Five case
studies in banking sector were executed. The sample is shaped by banks that adopted the
Internet Baking as a modernization. The analysis allowed the willpower of the related
dimensions of the aforesaid variables (competition, perceived benefits, and organizational
compatibility). Indeed, this research has exposed some variables that hamper the
implementation of technological innovations.
Ms. Fozia (2013)
The purpose of this paper is to determine the customer’s perception toward the e-banking
services. A total of number of customer taken for the study is 196. Analysis of variance
technique is employed to study the significant relationship between the occupation and
customer perception of e-banking services and significant relationship between the age and
customer perception of e-banking services. The result of the study clearly shows that different
age group of customer and different occupation group of customers have different perception
toward the e-banking services. The results also propose that demographic factors impact
significantly internet banking behavior, specifically, occupation and age. Finally, this paper
suggests that understanding about the customer’s perception regarding the e-banking services
of public and private banks it will help to the banker to understand the customers need in better
way.
2.1 Existing System:-
It automates information related to particular bank.
Complexity in management transactions.
Loans details, card details, account main not maintain properly.
Customer details may not maintain properly.
Customer may not maintain all type of transaction details.
4. 4
2.2 Problems Definition:-
It automates information related to particular bank.
Complexity in management transactions.
Loans details, card details, account main not maintain properly.
It is manual system.
It is time consuming process.
No Security .
Unauthorized person may access the data.
2.3 Proposed System:
The development of this new system contains the following activities,which try to
automate the entire process keeping in the view of database integration approach.
Automates information related bank.
It is easy process.
Rich user interface.
Customer can maintain all his personal details.
Customer can maintain loan details, all transaction details.
5. 5
CHAPTER- 3
REQUIREMENTS AND SPECIFICATION
3.1 Hardware Requirements:
Processor : Pentium IV(minimum)
Hard Disk : 40GB
RAM : 256MB (minimum)
3.2 Software Requirements:
Operating System : Windows or Linux
Technology : Java/j2ee (JDBC, Servlets, JSP)
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Database : Oracle
Software’s : J2SDK1.5, Tomcat 5.5, Oracle 9i
6. 6
CHAPTER- 4
PROJECT ANALYSIS
4.1 DATAFLOW DIAGRAM (DFDS):
A graphical tool used to describe and analyze the moment of data through a system manual or
automated including the process, stores of data, and delays in the system. Data Flow Diagrams
are the central tool and the basis from which other components are developed. The
transformation of data from input to output, through processes, may be described logically and
independently of the physical components associated with the system. The DFD is also know
as a data flow graph or a bubble chart.
DFDs are the model of the proposed system. They clearly should show the requirements on
which the new system should be built. Later during design activity this is taken as the basis for
drawing the system’s structure charts. The Basic Notation used to create a DFD’s are as
follows:
1. Dataflow: Data move in a specific direction from an origin to a destination.
2. Process: People, procedures, or devices that use or produce (Transform) Data.The
physical component is not identified.
3. Source: External sources or destination of data, which may be People, Programs
, organizations or other entities.
4. Data Store: Here data are stored or referenced by a process in the System.
7. 7
4.2 CONTEXT LEVEL DIAGRAM :
A context diagram is a top level (also known as "Level 0") data flow diagram. It only contains
one process node ("Process 0") that generalizes the function of the entire system in relationship
to external entities. DFD Layers. Draw data flow diagrams can be made in several nested layers.
Administrator
customer
Registration
Accounts
DataStores
GUI Screens
Data Input Stage
Data Input Stage
Data OutPut Stage
WEBLOCKER
System Process
CONTEXT LEVEL DATA FLOW DIAGRAME
Loans
Transaction
profile
Cards details
Data OutPut Stage
Figure-4.2: Context level Diagram
8. 8
1. Administrator:
LEVEL-2:
GUI Interface Loans Data BaseData Input Stage DataOutput Stage
Data Base Loans GUI InterfaceData Input Stage DataOutput Stage
Figure 4.2.1: Level -2.0 Data Flow Diagram
GUI Interface Cards Data BaseData Input Stage Data Output Stage
Data Base Cards GUI InterfaceData Input Stage Data Output Stage
Figure 4.2.2: Level -2.1 Data Flow Diagram
GUI Interface Security Data BaseData Input Stage Data Output Stage
Data Base Security GUI InterfaceData Input Stage Data Output Stage
Figure 4.2.3: Level -2.2 Data Flow Diagram
9. 9
4.3 UNIFIED MODELLING LANGUAGE:
UML, short for Unified Modeling Language, is a modeling language that allows for the visual
representation of different aspects of software system. Although UML is supposed to be a
generic modeling language that can be used in different industries, it’s most widely used in
designing object oriented software/systems.
Structure Diagram
Class Diagram
Behaviour Diagram
Activity Diagram
Use Case Diagram
4.3.1 CLASS DIAGRAM:
Class diagrams describe the structure of the system in terms of classes and objects. The
servlet API class diagram will be as follows.
Figure 4.3.1: Class Diagram
10. 10
4.3.1.1 CLASS COLLABORATIVE DIAGRAME:
dobject
Figure 4.3.1.1: Class Collaborative Diagram
4.3.2 ACTIVITY DIAGRAM:
Activity diagram is another important diagram in UML to describe the dynamic aspects of the
system. Activity diagram is basically a flowchart to represent the flow from one activity to
another activity. The activity can be described as an operation of the system. The control flow
is drawn from one operation to another.
InitServlet
(Form unit)
Attributes
Operations
Abstract Data Access Object(From Dao)
Attributes
Operations
Public Properties getProperties( )
Public void setProperties(properites props)
Public Connection getConnection( )
<<datatype>>
HttpServlet
{From http}
11. 11
4.3.2.a ADMINISTRATION:
Figure 4.3.2.a: Administration Activity Diagram
4.3.3 USE CASE DIAGRAMS :
A use case diagram at its simplest is a representation of a user's interaction with the system
that shows the relationship between the user and the different use cases in which the user is
involved.
4.3.3.a. SYSTEM DIAGRAM:
Figure 4.3.3.a: System Use Case Diagram
Administrator
Authentication
Home AccountDetails Customerdetails ReportDetailsBillpayments Logout
Enter username,password
Validation
If Successful
If Fail
System
Administrator
User
Web-Locker
12. 12
4.3.3.b ADMINISTRATOR:
Figure 4.3.3.b: Administrator Use Case Diagram
4.4. Data Dictionary Table:
4.4.1 Account Details:
4.4.2 Account Type Master:
Administrator
AccountModule
UserModule
BillPayServices
ReportDetails
User
16. 16
4.4.12 Queries And Solve:
l
4.4.13 Question Master:
4.4.14 Transfer Amount:
4.4.15 User Authentication Details:
17. 17
CHAPTER- 5
SYSTEM DESIGN
5.1 NORMALIZATION DEFINED:
• In relational database design, the process of organizing data to minimize duplication.
• Normalization usually involves dividing a database into two or more tables and
defining relationships between the tables.
The objective is to isolate data so that additions, deletions, and modifications of a field can be
made in just one table and then propagated through the rest of the database via the defined
relationships.”
OR
"Normalization" refers to the process of creating an efficient, reliable, flexible, and
appropriate "relational" structure for storing information. Normalized data must be in a
"relational" data structure.
The Normal Forms:
A series of logical steps to take to normalize data tables
1. First Normal Form:
• The table cells must be of single value.
• Eliminate repeating groups in individual tables.
• Create a separate table for each set of related data.
• Identify each set of related data with a primary key.
2. Second Normal Form:
If it's in 1st NF and if the Primary Key is composite (multiple columns) then any fact
in that table must be a fact about the entire composite Primary Key not just part of the
Primary Key.
3. Third Normal Form:
If it's in the 2nd NF and there are no non-key fields that depend on attributes in the table
other than the Primary Key.
18. 18
4. Boyce Codd Normal Form
• A table is in BCNF if it's in 3rd NF and every determinant can be used as a primery
key.
• There’s more, but beyond scope of this.
5.2 ARCHITECTURAL DIGRAM:
Accounts
Complaints
Authentication
Registration
profile
Bills
Bank
Administration
Cards
Transfermon
ey
Figure 5.2: Architectural Diagram
19. 19
CHAPTER- 6
TECHNOLOGY
6.1 About Html:
Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows
users to produces Web pages that include text, graphics and pointer to other Web pages
(Hyperlinks).
HTML is not a programming language but it is an application of ISO Standard 8879, SGML
(Standard Generalized Markup Language), but specialized to hypertext and adapted to the
Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we can
easily jump from one point to another point. We can navigate through the information based
on our interest and preference. A markup language is simply a series of elements, each
delimited with special characters that define how text or other items enclosed within the
elements should be displayed. Hyperlinks are underlined or emphasized works that load to
other documents or some portions of the same document.
HTML can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any platform
or desktop.
HTML provides tags (special codes) to make the document look attractive. HTML tags are not
case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation
of the document. Anything that is not a tag is part of the document itself.
Basic HTML Tags:
<! -- --> specifies comments
<A>……….</A> Creates hypertext links
<B>……….</B> Formats text as bold
<BIG>……….</BIG> Formats text in large font.
<BODY>…</BODY> Contains all tags and text in the HTML document
<CENTER>...</CENTER> Creates text
<DD>…</DD> Definition of a term
<DL>...</DL> Creates definition list
<FONT>…</FONT> Formats text with a particular font
<FORM>...</FORM> Encloses a fill-out form
<FRAME>...</FRAME> Defines a particular frame in a set of frames
20. 20
<H#>…</H#> Creates headings of different levels( 1 – 6 )
<HEAD>...</HEAD> Contains tags that specify information about a document
<HR>...</HR> Creates a horizontal rule
<HTML>…</HTML> Contains all other HTML tags
<META>...</META> Provides meta-information about a document
<SCRIPT>…</SCRIPT> Contains client-side or server-side script
<TABLE>…</TABLE> Creates a table
<TD>…</TD> Indicates table data in a table
<TR>…</TR> Designates a table row
<TH>…</TH> Creates a heading in a table
6.2 About Java Script:
JavaScript is a script-based programming language that was developed by Netscape
Communication Corporation. JavaScript was originally called Live Script and renamed as
JavaScript to indicate its relationship with Java. JavaScript supports the development of both
client and server components of Web-based applications. On the client side, it can be used to
write programs that are executed by a Web browser within the context of a Web page. On the
server side, it can be used to write Web server programs that can process information submitted
by a Web browser and then update the browser’s display accordingly
Even though JavaScript supports both client and server Web programming, we prefer
JavaScript at Client side programming since most of the browsers supports it. JavaScript is
almost as easy to learn as HTML, and JavaScript statements can be included in HTML
documents by enclosing the statements between a pair of scripting tags
<SCRIPTS>... </SCRIPT>.
<SCRIPT LANGUAGE = “JavaScript”>
JavaScript statements
</SCRIPT>
Here are a few things we can do with JavaScript:
Validate the contents of a form and make calculations.
Add scrolling or changing messages to the Browser’s status line.
Animate images or rotate images that change when we move the mouse over them.
Detect the browser in use and display different content for different browsers.
Detect installed plug-ins and notify the user if a plug-in is required.
21. 21
We can do much more with JavaScript, including creating entire application.
6.3 About Java Technology:
Initially the language was called as “oak” but it was renamed as “Java” in 1995. The primary
motivation of this language was the need for a platform-independent (i.e., architecture neutral)
language that could be used to create software to be embedded in various consumer electronic
devices.
Java is a programmer’s language.
Java is cohesive and consistent.
Except for those constraints imposed by the Internet environment, Java gives the
programmer, full control.
Finally, Java is to Internet programming where C was to system programming.
6.3.1 Importance of Java to the Internet:
Java has had a profound effect on the Internet. This is because; Java expands the Universe of
objects that can move about freely in Cyberspace. In a network, two categories of objects are
transmitted between the Server and the Personal computer. They are: Passive information and
Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in
the areas of Security and probability. But, Java addresses those concerns and by doing so, has
opened the door to an exciting new form of program called the Applet.
• But the difference is, it is an intelligent program, not just a media file. It can react to
the user input and dynamically change.
6.3.2 Features of Java Security:
Simple: Java was designed to be easy for the Professional programmer to learn and to use
effectively. If you are an experienced C++ programmer, learning Java will be even easier.
Because Java inherits the C/C++ syntax and many of the object oriented features of C++. Most
of the confusing concepts from C++ are either left out of Java or implemented in a cleaner,
more approachable manner. In Java there are a small number of clearly defined ways to
accomplish a given task.
Object-oriented: Java is an OOPL that supports the construction of programs that consist of
collections of collaborating objects. These objects have a unique identity, encapsulate attributes
and operations, and are instances of classes related by inheritance and polymorphism.
22. 22
Interpreted: Java is compiled to byte codes, which are interpreted by a Java run-time
environment.
Robust: Java is designed to eliminate certain types of programming errors. Java is strongly
typed, which allows extensive compile-time error checking. It does not support memory
pointers, which eliminates the possibility of overwriting memory and corrupting data. In
addition, its automatic memory management (garbage collection) eliminates memory leaks and
other problems associated with dynamic memory allocation/de-allocation.
Secure: Java is designed to be secure in a networked environment. The Java run-time
environment uses a byte code verification process to ensure that code loaded over the network
does not violate Java security constraints.
Portable: In addition to supporting architecture neutrality, Java ensures that other
implementation-dependent aspects of language specification are eliminated. For example, Java
specifies the sizes of primitive data types and their arithmetic behavior.
Multithreaded: Java supports multiple threads of execution (a.k.a., lightweight processes),
including a set of synchronization primitives. This makes programming with threads much
easier
6.4 Java Virtual Machine (JVM):
Overall Description
Figure 6.1: Development process of JAVA Program
Java programming uses to produce byte codes and executes them. The first box indicates that
the Java source code is located in a. Java file that is processed with a Java compiler called
javac. The Java compiler produces a file called a. class file, which contains the byte code. The
.Class file is then loaded across the network or loaded locally on your machine into the
execution environment is the Java virtual machine, which interprets and executes the byte code.
Java Source Java byte code JVM
Java .Class
23. 23
6.5 About Java Database Connectivity:
JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a
trademarked name and is not an acronym; nevertheless, JDBC is often thought of as standing
for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java
programming language. JDBC provides a standard API for tool/database developers and makes
it possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational database. One can
write a single program using the JDBC API, and the program will be able to send SQL
statements to the appropriate database. The combinations of Java and JDBC lets a programmer
write it once and run it anywhere.
What Does JDBC Do?
Simply put, JDBC makes it possible to do three things:
• Establish a connection with a database
• Send SQL statements
• Process the results.
The JDBC API supports both two-tier and three-tier models for database access.
Figure 6.2: Two-tier model
JAVA
Application
JDBC
DBMS
Client machine
DBMS-proprietary protocol
Database server
24. 24
Figure 6.3:Three-tier model
6.6 About SQL:
Structured Query Language (SQL) is the language used to manipulate relational databases.
SQL is tied very closely with the relational model. In the relational model, data is stored in
structures called relations or tables.
SQL statements are issued for the purpose of:
Data definition: Defining tables and structures in the database (DDL used to create, alter and
drop schema objects such as tables and indexes).
Data manipulation: Used to manipulate the data within those schema objects (DML Inserting,
Updating, Deleting the data, and Querying the Database).
A schema is a collection of database objects that can include: tables, views, indexes and
sequences
List of SQL statements that can be issued against an Oracle database schema are:
ALTER - Change an existing table, view or index definition (DDL)
AUDIT - Track the changes made to a table (DDL)
COMMENT - Add a comment to a table or column in a table (DDL)
Java Applet or
Html browser
Client Machine (GUI)
Application Server (Java)
JDBC
DBMS
HTTP, RMI, or CORBA calls
Server Machine
(business DBMS-
proprietary Protpocol)
Database Server
25. 25
COMMIT - Make all recent changes permanent (DML - transactional)
CREATE - Create new database objects such as tables or views (DDL)
DELETE - Delete rows from a database table (DML)
DROP - Drop a database object such as a table, view or index (DDL)
GRANT - Allow another user to access database objects such as tables or views (DDL)
INSERT - Insert new data into a database table (DML)
NO AUDIT - Turn off the auditing function (DDL)
REVOKE - Disallow a user access to database objects such as tables and views (DDL)
ROLLBACK - Undo any recent changes to the database (DML - Transactional)
SELECT - Retrieve data from a database table (DML)
TRUNCATE - Delete all rows from a database table (can not be rolled back) (DML)
UPDATE - Change the values of some data items in a database table (DML)
6.6 About Servlets:
Introduction:
The Java web server is JavaSoft's own web Server. The Java web server is just a part of a larger
framework, intended to provide you not just with a web server, but also with tools. To build
customized network servers for any Internet or Intranet client/server system. Servlets are to a
web server, how applets are to the browser.
About Servlets:
Servlets provide a Java-based solution used to address the problems currently associated with
doing server-side programming, including inextensible scripting solutions, platform-specific
APIs, and incomplete interfaces.
Servlets are objects that conform to a specific interface that can be plugged into a Java-based
server. Servlets are to the server-side what applets are to the client-side - object byte codes that
can be dynamically loaded off the net. They differ from applets in that they are faceless objects
(without graphics or a GUI component). They serve as platform independent, dynamically
loadable, pluggable helper byte code objects on the server side that can be used to dynamically
extend server-side functionality.
For example, an HTTP Servlets can be used to generate dynamic HTML content. When you
use Servlets to do dynamic content you get the following advantages:
26. 26
They’re faster and cleaner than CGI scripts
They use a standard API (the Servlets API)
They provide all the advantages of Java (run on a variety of servers without needing to
be rewritten).
Attractiveness of Servlets:
There are many features of Servlets that make them easy and attractive to use. These include:
Easily configured using the GUI-based Admin tool
Can be loaded and invoked from a local disk or remotely across the network.
Can be linked together, or chained, so that one Servlets can call another Servlets, or
several Servlets in sequence.
Can be called dynamically from within HTML pages, using server-side include tags.
Are secure - even when downloading across the network, the Servlets security model
and Servlets sandbox protect your system from unfriendly behavior.
Web components:
-Servlets or JSP pages
-JavaBeans (optional)
Figure 6.4: J2EE Server
27. 27
Features of Servlets:
Servlets are persistent. Servlet are loaded only by the web server and can maintain
services between requests.
Servlets are fast. Since Servlets only need to be loaded once, they offer much better
performance over their CGI counterparts.
Servlets are platform independent.
Servlets are extensible. Java is a robust, object-oriented programming language,
which easily can be extended to suit your needs
Servlets are secure.
Servlets can be used with a variety of clients.
6.8 About Java Server Pages (JSP):
Java server Pages is a simple, yet powerful technology for creating and maintaining dynamic-
content web pages. Based on the Java programming language, Java Server Pages offers proven
portability, open standards, and a mature re-usable component model.
The Java Server Pages architecture enables the separation of content generation from content
presentation. This separation not eases maintenance headaches; it also allows web team
members to focus on their areas of expertise. Now, web page designer can concentrate on
layout, and web application designers on programming, with minimal concern about impacting
each other’s work.
Features of JSP:
JSP are tag based approach to develop dynamic web application. JSP have all the features of
Servlet because it is internally Servlet. It have following feature these are:
Extension to Servlet
Powerful
Portable
Flexible
Easy
Less code than Servlet
28. 28
Extension to Servlet: JSP is Extension to Servlet, it have all the features of servlet and it
have also implicit objects, predefined tags, expression language and Custom tags in JSP,
that makes JSP easy to develop any application.
Powerful: These are internally Servlet, means consists byte code, so that all java features
are applicable in case of jsp like robust, dynamic, secure, platform independent.
Portable: JSP tags will process and execute by the server side web container, So that these
are browser independent and j2ee server independent.
Flexible: Allows to defined custom tags, the developer can fill conferrable to use any kind,
framework based markup tags in JSP.
Easy: JSP is easy to learn, easy to understand and easy to develop. JSPs are more convenient
to write than Servlets because they allow you to embed Java code directly into your HTML
pages, in case of servlets you embed HTML inside of Java code.
Less code than Servlet: In JSP, we can use a lot of tags such as action tags, jstl, custom
tags etc. that reduces the code
29. 29
CHAPTER- 7
TESTING
Software testing can be stated as the process of validating and verifying that a computer
program/application/product:
meets the requirements that guided its design and development,
works as expected,
can be implemented with the same characteristics,
and satisfies the needs of stakeholders.(client)
Testing Methods
The box approach:
Software testing methods are traditionally divided into white- and black-box
testing. These two approaches are used to describe the point of view that a test
engineer takes when designing test cases.
7.1 White-Box testing:
White-box testing (also known as clear box testing, glass box testing, transparent box
testing and structural testing) tests internal structures or workings of a program. In white-box
testing an internal perspective(view) of the system, as well as programming skills, are used to
design test cases.
While white-box testing can be applied at the unit, integration and system levels of the software
testing process, it is usually done at the unit level.
7.2 Black-box testing:
Black-box testing treats the software as a "black box", examining functionality without any
knowledge of internal implementation. The tester is only aware of what the software is
supposed to do, not how it does it.
7.3 Grey-box testing:
Grey-box testing involves having knowledge of internal data structures and algorithms for
purposes of designing tests, while executing those tests at the user, or black-box level. The
tester is not required to have full access to the software's source code.
30. 30
7.4 Testing Levels:
7.4.1 Unit testing:
Unit testing, also known as component testing, it verify the functionality of a specific
section of code, usually at the function level. In an object-oriented environment, this is
usually at the class level, and the minimal unit tests include the constructors and
destructors.
7.4.2 Integration testing:
Integration testing works to expose defects in the interfaces and interaction between
integrated components (modules).
7.4.3 System testing:
System testing, or end-to-end testing, tests a completely integrated system to verify that
it meets its requirements.
7.4.4 Acceptance testing:
At last the system is delivered to the user for Acceptance testing.
31. 31
CHAPTER- 8
IMPLEMENTATION
The System is still under construction few report are yet to me made after that this system
will be implanted at client side. Users will be given a training to use the package and special
Work shop is conducted by the courier for the purpose and according to their feedback the
change implanted in the software.
Home Page:
Figure 8.1: Home Page
39. 39
Chapter-9
CONCLUSION
The solution will facilitate to the bank employees and the account holders with the different
modules. This solution is very much necessary for the private sector banks and the corporate
sector. The banking industry will take a new shape and explore like never before and here we
can pay the electricity, water and phone bills through online.
It is not possible to develop a system that makes all the requirements of the user. User
requirements keep changing as the system is being used. Some of the future enhancements that
can be done to this system are:
As the technology emerges, it is possible to upgrade the system and can be adaptable
to desired environment.
Because it is based on object-oriented design, any further changes can be easily
adaptable.
Based on the future security issues, security can be improved using emerging
technologies.
Loans,Cards,transfer ,checks,Drafts Amount can be Enhanced.
Admin module can be implemented.
40. 40
REFERENCES
[1.] Steve McNally (June 30, 2011). "The Locker Project and Your Digital Wake". Forbes.
Retrieved April 3, 2017.
[2.] Ryan Kim (February 4, 2011). "The Locker Project: Why Leave Data Tracking to Others?
Do It Yourself". GigaOM. Retrieved April 3, 2017.
[3.] Yousafzai, S. Y. (2012). A literature review of theoretical models of Internet banking
adoption at the individual level. Journal of Financial Services Marketing, 17(3), 215-226.
[4.] Dixit, J. B. and Kumar, R. (2008). Structured System Analysis and Design. Paperbacked.
New Delhi, India: Laxmi Publisher.
[5.] Dr. N.SuthanthiraVanitha1 Department of Electrical and Electronics Engineering,
Knowledge institute of technology, Tamilnadu, India “Vehicle Tracking and Locking
System Based on GSM and GPS” I.J. Intelligent Systems and Applications, 2013, 09, 86-
93 Published Online August 2013 in MECS (http://www.mecs-press.org/) DOI:
10.5815/ijisa.2013.09.10
[6.] Research paper titled as The Architecture and Implementation of Apache Lucene by
Josiane Gamgo published by Giessen Friedberg University of Applied Sciences in Nov.,
2010
[7.] Efficient Crawling Through URL Ordering Junghoo Cho, Hector Garcia- Molina,
Lawrence Page Department of Computer Science Stanford University,1998.
[8.] Yousafzai, S., Pallister, J. and Foxall, G. (2009) Multi- dimensional role of trust in internet
banking adoption, The Service Industries Journal, Vol. 29 No. 5, pp. 591- 605.
[9].Atif A.A-Jilani Muhammad-Usman, AamerNadeem, ZafarI. Malik ,Zahid
Halim,”Comparitive Study on DFD to UML diagrams Transformations”,journal of
WCSIT,vol.1, no.1,10-16,2.
[10] Sinha, I., & Mukherjee, S. (2016). Acceptance of technology, related factors in use of off
branch e-banking: an Indian case study. The Journal of High Technology Management
Research, 27(1), 88-100.
[11] Al-Ajam, A. S., & Nor, K. M. (2013). Internet banking adoption: integrating technology
acceptance model and trust. European Journal of Business and Management, 5(3), 207-
215.