Bank Account Management System Project Report
Bank Account Management System Project Report
Bank Account Management System Project Report
1. Synopsis
2. System Analysis
CFD
DFD
3. Fundamental requirement
I/O Requirement
Process Requirement
Storage Requirement
Control Requirement
4. System Design
I/O Design
Process Design
Database Design
5. Coding and Testing
10. Implementation Issue
11. User manual
12. Future Enhancement
13. Conclusion
14. Bibliography
OBJECTIVES OF THE PROJECT
The various reasons which led to the conversion of the manual system of the bank to the
computerized system are as follows:-
Entry of information in various registers was a very hectic job for the customer.
The entry of information causing error in entering details of customer.
Even the redundancy of the record was also found through they had taken certain
precautions like entering the information with the pencil, leaving the space for
making the entry in future, if not possibly confirmed about the details.
The error prone details causing the making in the other related registers, which
might some problem while producing reports.
Even a lot of times begin spent on the entering of details after crosschecking
details from various registers.
Then the security of these registers being a major problem. Even a single page
should not be teased. The n it should not get into the hand of some unauthorized
person.
And last but not least, because it is vary calculation oriented and computerized
system can be used for given current result always.
The proposed Bank Account system will make current manual system easy to monitor,
efficient and almost error free.
HARDWARE & SOFTWARE REQUIREMENT
Windows 98 or Above
C editor
Microsoft word
INTRODUCTION
Bank account system involves maintaining of account related information. This requires
grater accuracy, speed that is why the proposed system is the computerization of the
existing system. The computerization system does the job monitoring the record in easy
and effective manner as stated below:
Account system involved maintaining data related different customer and his transaction.
This required greater accuracy, speed that is why the proposed system is the
computerization of the existing system. The computerized system does the job of the
monitoring the information easy and effective manner.
.
DISCRIPTION OF EXISTING SYSTEM
In the ongoing process, the records are maintained manually and the paper work is more.
Entering Record-
Entry of each record is done manually each time the record is done
Manually .each time the record is maintained on paper and it maximizes the maintenance
of additional files.
Modification of Records-
If any modification is required it is done directly on the documents being preserved in
correspondence to account information.
Sorting of Records-
All the record of Account is maintained on papers. And if in any case we want to see any
particular record we have to search a lot of pages.
PROBLEMS
To avoid the limitation of current system it’s necessary to design and develop a new
system which have the following benefit and the existing system.
(d)Highly accurate.
(e)User satisfaction.
FEASIBILITY STUDY
Feasibility study is a report directed management. It evaluates the impact of the proposed
changes in the area(s) in question. The report is a formal document for management, brief
enough and sufficiently, non technical to be understandable, yet detailed enough to
provide the basis for system design.
Technical feasibility
Technical feasibility centers around the existing system (hardware, software, etc) into
what it can sort the proposed addition.
Present system Vs. Candidate System
Economical Feasibility
Economical analysis in the most frequently used method for evaluation the
effectiveness of a candidate system. This procedure is to determine the benefits and
saving that are expected from a candidate system and compare it with cost.
Present system Vs. Candidate System
Operational Feasibility
Employees of any organization are inherently resistant to changes because they believe
that it will be very difficult to adapt in the new system. Computers have been to facilitate
changes. it is well known that computerization has something to do with transfers,
retraining and changes in employee job status.
Present system Vs. Candidate System
Economic Feasibility
The Bank Account System will considerably reduce the manpower and to time
necessary to manage the process and generate the report for the following imperative
action to be taken place on the basis of the reports. The proposed system will require only
the Person to manage the Contacts. The new system will generate the reports
automatically optimizing the efforts and time required.
Thus proposed system is economically feasible because it is being developed
with out having to incur the heavy development costs and it will considerably reduce time
and effort required managing the present system.
Technical Feasibility
Since the new system is going to solve the difficulties that come in the manual
system of the procurement, reports in handwritten. So proposed system is completely
feasible is terms of the behavior.
Project Plan
The Objective of the software project planning is to provide a framework that
enables an owner to make reasonable estimate of the resources, cost and schedule. The
project leader is responsible for designing the system precisely according the requirement
specified by the customer. He is also responsible for maintenance of the system for
certain period of time. Since cost of maintenance is much higher than cost of developing
system. Thus to reduce developing and maintenance cost, to provide the system in
predefine time proper planning of system is necessary.
For this project, we used the Waterfall Model. The methodology has the following
phases:
Initial Investigation
The most crucial phase of managing system projects is planning to launch a
system investigation, we need a master plan detailing the steps to be taken, the people
to be questioned, and outcome expected. The initial investigation has the objective of
determining whether the user’s request has potential merits the major steps are
defining user requirements, studying the present system and defining the performance
expected by the candidate system to meet user requirements. The first step in the
system development life cycle is the identification of need. There may be a user
request to change, improve or enhance an existing system. The initial investigation is
one way of handling these needs. The objective is to determine whether the request is
valid and feasible before a recommendation is reached to do nothing, improve or
modify the existing system, are to build a new one.
Thus for an effective maintenance, paper follow-up and handling of the
data resulting from different information in records, it felt necessary to develop a
Bank account System so that monitoring and maintenance of record data could be
done.
INFORMATION GATHERING
A key parts of the system analysis is gathering information about the present system. The
developer must know that information to gather, where to find it, how to collect it, and
what to make of it.
The proper use of tools for gathering information is the key to successful analysis.
The tools are
The major objective of on-site observation is to get as close as possible to the real system.
In the interest to get more potential information we personally approached the senior
officials of the concerned department.
Required data are collected as forms.
Analysis phase
It includes the study of the problem and creation of the System Requirement
Specification (SRS) Document. The most crucial phase of the managing system projects
is analysis. It requires the people to be questioned, study of manual system if it exits, and
on the site observations. Analysis is necessary to understand the problem, the software
system is to solve
The analysis model is concise, precise abstraction of what the desired system
must do, not how it will done. Thus, main emphasis in analysis phase is on identifying
what is needed from system. The objective is to determine whether the request is valid
and feasible before a recommendation is reach to do nothing , improve or modify the
existing system, or to building a new one. Thus Bank Account System is automation of
the existing manual system.
An SRS establishes the basis for agreement between the client and the
developer on what the software will do. An SRS provides references for validation of the
final product. A high quality SRS is prerequisite to high quality software, which reduces
overall development cost of system.
Design Phase
It begins when the analysis phase and thus requirements documents, for the
software to be developed has been prepared. The objective of the design process is to be
to produce a model or representation of the system, which is used to build the system.
The design of the system is essentially a blueprint or plan for solution for system.
Design process for software system has two levels:
1. System Design
2. Object Design
The System Design is the high-level strategy for solving the problem and building a
solution. System design includes decisions about the organization of the system into
subsystem, the allocation of the subsystem to hardware and software component and
major conceptual and policy decisions that for the detailed design.
The Object Design phase determines the full definitions of the classes and the
association used in the implementations as well as interfaces and algorithms of the
methods used to implement operations.
Testing Phase includes the conformation of the acceptance criteria set down in
the system requirements specification document. The development of the software
system involved a series of activities where opportunities for injection of human
fallibilities are enormous. Error may begin occur at every stage of the system
development where the objectives may be erroneously or imperfectly specified as
well as later design and development stage. Software testing is critical element of
software quality assurance and represents the review of specification, design and
coding. Testing can’t show the absences of defects, it can only show that software
defects are present.
BANK
CUSTOMER ACCOUNT CUSTOMER
SYSTEM
CUSTOMER
CUSTOMER INFORMATION
FILE
Order
Response Account
Process
Transaction information
Password Address Operation Name
code
csafacodeccode
code
CUSTOMER BANK
Use
Ha
V-p-A/c v-p- ve
no. password
Mgr-
MANAGER
password
A
BANK MONEY
TRANSACTION SYSTEM
B.M.T SYSTEM
____________
________________________________________________________________________
__
________________________________________________________________________
__
OPERATION CASH/CHEQUE CHEQUE NO. DATE TIME AMOUNT
________________________________________________________________________
__
________________________________________________________________________
__
typedef struct
{
long unsigned int v_ac_num,ac_num;
int close;
float amount;
char name[20],address[50],pas[12],ch;
}database;
typedef struct
{
long unsigned int ac_num;
float amount1;
char operation[9],ope[6],ch_no[10],name1[20],d[10],t[10];
}database1;
typedef struct
{
char initials[15];
}database2;
database2 a1;
database b1,b2;
database1 c1;
void pas_overflow()
{
int i,j;
clrscr();
textmode(C40);
textcolor(LIGHTRED);
gotoxy(4,5);
cprintf("YOUR PASSWORD IS OVERFLOW");
gotoxy(2,10);
cprintf("PLEASE ENTER SMALLER PASSWORD");
textcolor(YELLOW);
gotoxy(3,24);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
textmode(C80);
}
textcolor(RED);
gotoxy(12,20);
cprintf("CURRENT TIME IS");
textcolor(GREEN);
gotoxy(15,23);
cprintf("%d",t.ti_hour);
textcolor(GREEN+BLINK);
cprintf(":");
textcolor(GREEN);
cprintf("%d",t.ti_min);
textcolor(GREEN+BLINK);
cprintf(":");
textcolor(GREEN);
cprintf("%d",t.ti_sec);
}
if(i<0)
i=0;
}
}
else if(ch!=13)
{
gotoxy(p,11);
cprintf("*");
name[i++]=ch;
}
if(i>15)
{
fclose(fp);fclose(fp1);
pas_overflow();
deleterecord() ;
}
}while(ch!=13);
name[i]=NULL;
rewind(fp);
rewind(fp1);
fflush(stdin);
g=check(&no,name);
if(g=='y')
{
fflush(stdin);
c=search1(&no);
if(c=='n')
{
clrscr();
textmode(C40);
gotoxy(5,8);
textcolor(YELLOW);
cprintf("YOUR A/C HSA BEEN LOCKED");
gotoxy(3,12);
cprintf("PLEASE CONTACT TO THE BANK MANAGER");
gotoxy(2,24);
textcolor(13);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
textmode(C80);
fclose(fp);
fclose(fp1);
menu1();
}
rewind(fp);
while(fread(&b2,sizeof(b2),1,fp)==1)
{
if((strcmp(name,b2.pas)==0)&&(no==b2.ac_num))
{
b2.close=1;
strcpy(name1,b2.name);
isfound='y';
fwrite(&b2,sizeof(b2),1,fp1);
}
else
{
fwrite(&b2,sizeof(b2),1,fp1);
}
}
}
rewind(fp);
rewind(fp1);
fclose(fp);
fclose(fp1);
if(isfound=='n')
{
clrscr();
textmode(C40);
border();
gotoxy(7,8);
textcolor(LIGHTRED);
cprintf("RECORD NOT FOUND");
getch();
textmode(C80);
fclose(fp);
fclose(fp1);
menu1();
}
else
{
clrscr();
gotoxy(5,10);
cprintf("%s",name1);
gotoxy(6,12);
cprintf("YOUR RECORD HAS BEEN CLOSED");
gotoxy(7,22);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
}
remove("data123.txt");
rename("data123.txt","data123.txt");
textmode(C80);
}
/*this function gets the A/c no & password while user login*/
void menu()
{
long unsigned int num;
int p,t,i ;
char ch,name[12],isfound;
clrscr();
textmode(C40);
bank();
textcolor(3);
gotoxy(10,3);
border1();
//date1();
time();
gotoxy(3,10);
textcolor(GREEN);
cprintf("ENTER YOUR ACCOUNT NUMBER :");
fflush(stdin);
scanf("%lu",&num);
gotoxy(3,11);
textcolor(GREEN);
gotoxy(3,12);
cprintf("ENTER THE PASSWORD :");
p=t=24;
i=0;
do
{
p++;
fflush(stdin);
ch=getch();
if(ch==8)
{
if(p>t)
{
p--;
gotoxy(p,12);
cprintf(" ");
p--;
i--;
if(i<0)
i=0;
}
}
else if(ch!=13)
{
gotoxy(p,12);
cprintf("*");
name[i++]=ch;
}
if(i>15)
{
pas_overflow();
menu() ;
}
}while(ch!=13);
name[i]=NULL;
clrscr();
gotoxy(2,17);
textcolor(YELLOW);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
isfound=check(&num,name);
if(isfound=='y')
{
menu1();
}
else
{
clrscr();
gotoxy(3,10);
cprintf("WRONG LOGIN NAME OR PASSWORD :");
gotoxy(7,14);
cprintf("ENTER (Y/N)...");
fflush(stdin);
scanf("%c",&ch);
if(ch=='y'||ch=='Y')
{
menu3();
}
else
{
menu();
}
}
}
rewind(fp);
while(fread(&b1,sizeof(b1),1,fp)==1)
{
clrscr();
border();
gotoxy(25,23);
textcolor(WHITE+BLINK);
cprintf("[ 0 EXIT MENU ]");
/*this function sets the A/c no. while opening a new A/c*/
long unsigned int cnt()
{
/*this function get the all detial of new user to open the new a/c*/
void menu2()
{
long unsigned int pos,ac_no,tmp;
double k=-1;
int p=0,t=0,i;
char pas1[12],ch,flag,num[10],isfound;
FILE *fp;
textmode(C80);
fp=fopen("data123.txt","rb+");
rewind(fp);
while(fread(&b2,sizeof(b2),1,fp)==1)
{
if(b2.close==0)
{
k=0;
break;
}
}
fclose(fp);
fp=fopen("data123.txt","ab+");
clrscr();
textmode(C80);
b1.ac_num=cnt();
textcolor(GREEN);
textmode(C40);
textcolor(LIGHTRED);
border();
//date();
gotoxy(9,1);
textcolor(YELLOW);
cprintf("PLEASE ENTER SOME INFORMATION");
//gotoxy(25,4);
//cprintf("*****************************");
gotoxy(4,5);
b1.ac_num++;
cprintf("YOUR ACCOUNT NUMBER IS :%lu",b1.ac_num);
gotoxy(4,7);
cprintf("ENTER YOUR NAME :");
fflush(stdin);
gets(b1.name);
isfound=check1(b1.name);
b1.close=0;
if(isfound=='n')
{
clrscr();
textmode(C40);
gotoxy(10,9);
textcolor(GREEN);
cprintf("NAME IS NOT ALPHABETIC");
gotoxy(16,15);
textcolor(YELLOW);
cprintf("PLEASE TRY AGAIN");
gotoxy(5,20);
textcolor(20);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
textmode(C80);
fclose(fp);
menu2();
}
gotoxy(4,9);
cprintf("ENTER THE ADDRESS :");
fflush(stdin);
gets(b1.address);
t=strlen(b1.address);
if(t==0)
{
clrscr();
textmode(C40);
gotoxy(10,9);
textcolor(GREEN);
cprintf("YOU MUST BE ENTER ADDRESS");
gotoxy(16,15);
textcolor(YELLOW);
cprintf("PLEASE TRY AGAIN");
gotoxy(5,20);
textcolor(20);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
textmode(C80);
fclose(fp);
menu2();
}
gotoxy(4,11);
b1.amount=0;
cprintf("ENTER THE INITIAL AMOUNT :");
gotoxy(4,12);
cprintf("(MORE THAN Rs.500):");
fflush(stdin);
scanf("%f",&b1.amount);
if(b1.amount<500)
{
clrscr();
gotoxy(10,9);
cprintf("YOUR AMOUNT IS NOT SUFFICIENT");
gotoxy(5,11);
cprintf("PLEASE SUBMIT MORE THEN Rs.500/- TO BE REGISTERED OIN OUR
BANK");
getch();
fclose(fp);
clrscr();
menu2();
}
gotoxy(4,14);
if(i<0)
i=0;
}
}
else if(ch!=13)
{
gotoxy(p,13);
cprintf("*");
b1.pas[i++]=ch;
}
if(i>15)
{
fclose(fp);
pas_overflow();
menu2() ;
}
}while(ch!=13);
b1.pas[i++]='\0';
if(i<0)
i=0;
}
}
else if(ch!=13)
{
gotoxy(p,17);
cprintf("*");
pas1[i++]=ch;
}
if(i>15)
{
fclose(fp);
pas_overflow();
menu2() ;
}
}while(ch!=13);
pas1[i++]='\0' ;
}
b1.ch='y';
gotoxy(4,20);
cprintf("SHOULD IT SVAE IN DATABASE(Y/N)...");
fflush(stdin);
scanf("%c",&ch);
if(ch=='y'||ch=='Y')
{
fflush(stdin);
tmp=b1.v_ac_num;
flag=check(&tmp,pas1);
if(flag=='y'||k==-1)
{
fseek(fp,0,2);
fwrite(&b1,sizeof(b1),1,fp);
strcpy(num,"--");
restore(b1.ac_num, b1.name,2,1,num,&b1.amount);
clrscr();
textcolor(13);
border();
gotoxy(6,7);
fseek(fp,-sizeof(b1),SEEK_CUR);
cprintf("HELLO %s !",b1.name);
gotoxy(4,8);
cprintf("YOU HAVE REGISTERED IN OUR BANK.");
FILE *fp;
clrscr();
fp=fopen("data123.txt","rb+");
textmode(C40);
textcolor(WHITE);
gotoxy(12,2);
cprintf("CHANGE OF PASSOWRD");
gotoxy(12,3);
cprintf("__________________");
textcolor(YELLOW);
gotoxy(4,7);
cprintf("ENTER YOUR ACCOUNT NUMBER :");
fflush(stdin);
scanf("%lu",&no);
gotoxy(4,10);
cprintf("ENTER THE PASSWORD...");
p=t=26;
i=0;
do
{
p++;
fflush(stdin);
ch=getch();
if(ch==8)
{
if(p>t)
{
p--;
gotoxy(p,10);
cprintf(" ");
p--;
i--;
if(i<0)
i=0;
}
}
else if(ch!=13)
{
gotoxy(p,10);
cprintf("*");
pas1[i++]=ch;
}
if(i>15)
{
pas_overflow();
fclose(fp);
change_pas();
}
}while(ch!=13);
pas1[i]='\0' ;
sz=sizeof(b1);
fflush(stdin);
g=check(&no,pas1);
if(g=='y')
{
fflush(stdin);
c=search1(&no);
if(c=='n')
{
clrscr();
textmode(C40);
gotoxy(5,8);
textcolor(YELLOW);
cprintf("YOUR ACCOUNT HAS BEEN LOCKED");
gotoxy(3,12);
cprintf("PLEASE CONTACT TO BANK MANAGER");
gotoxy(2,24);
textcolor(13);
cprintf("PRESS ANY KEY TO CONTINUE..." );
getch();
textmode(C80);
fclose(fp);
menu1();
}
rewind(fp);
border();
while(fread(&b1,sizeof(b1),1,fp)==1)
{
if((strcmp(pas1,b1.pas)==0)&&(no==b1.ac_num))
{
gotoxy(4,13);
cprintf("ENTER THE NEW PASSOWRD...");
p=t=30;
i=0;
do
{
p++;
fflush(stdin);
ch=getch();
if(ch==8)
{
if(p>t)
{
p--;
gotoxy(p,13);
cprintf(" ");
p--;
i--;
if(i<0)
i=0;
}
}
else if(ch!=13)
{
gotoxy(p,13);
cprintf("*");
pas2[i++]=ch;
}
if(i>15)
{
pas_overflow();
fclose(fp);
change_pas();
}
}while(ch!=13);
pas2[i]='\0' ;
strcpy(b1.pas,pas2);
fseek(fp,-sz,SEEK_CUR);
fwrite(&b1,sizeof(b1),1,fp);
isfound='y';
break;
}
}
}
if(isfound=='n')
{
clrscr();
textcolor(13);
border();
gotoxy(6,13);
cprintf("WRONG A/C NO. OR PASSWORD");
gotoxy(4,15);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
}
else
{
clrscr();
textcolor(YELLOW+BLINK) ;
gotoxy(8,9);
cprintf("NEW PASSWORD ACCEPTED");
textcolor(13);
gotoxy(4,15);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
}
fclose(fp) ;
textmode(C80);
}
if(i<0)
i=0;
}
}
else if(ch!=13)
{
gotoxy(p,11);
cprintf("*");
pas1[i++]=ch;
}
if(i>15)
{
pas_overflow();
fclose(fp);
withdraw();
}
}while(ch!=13);
pas1[i]='\0' ;
sz=sizeof(b1);
fflush(stdin);
g=check(&no,pas1);
if(g=='y')
{
fflush(stdin);
c=search1(&no);
if(c=='n')
{
clrscr();
textmode(C40);
gotoxy(5,8);
textcolor(YELLOW);
cprintf("YOUR A/C HAS BEEN LOCKED") ;
gotoxy(3,12);
cprintf("PLEASE CONTACT TO THE BANK MANAGER");
gotoxy(2,24);
textcolor(13);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
textmode(C80);
fclose(fp);
menu1();
}
rewind(fp);
while(fread(&b1,sizeof(b1),1,fp)==1)
{
if((strcmp(pas1,b1.pas)==0)&&(no==b1.ac_num))
{
k='y';
strcpy(name1,b1.name);
clrscr();
gotoxy(10,11);
textcolor(13+BLINK);
delay(150);
cprintf("[ PASSWORD ACCEPTED ]");
gotoxy(7,15);
textcolor(YELLOW);
cprintf("PRESS ANY KEY TO CONTINUE...");
getch();
clrscr();
gotoxy(1,9);
textcolor(13);
cprintf("ENTER THE AMOUNT TO WITHDRAW:");
fflush(stdin) ;
scanf("%f",&amount);
gotoxy(4,13);
textcolor(YELLOW);
cprintf("BY CASH OR BY CHEQUE");
gotoxy(6,14) ;
textcolor(GREEN) ;
cprintf("ENTER 1 FOR CASH");
gotoxy(6,15);
cprintf("ENTER 2 FOR CHEQUE");
fflush(stdin);
scanf("%c",&a);
if(a=='2')
{
clrscr();
gotoxy(6,9);
cprintf("ENTER THE CHEQUE NUMBER...") ;
fflush(stdin);
gets(num);
i=0;
i=strlen(num);
p=b1.amount-500;
if(amount<p)
{
fseek(fp,-sz,SEEK_CUR);
b1.amount=b1.amount-amount;
if(a==2)
{
restore(no,name1,1,2,num,&amount);
}
else
{
strcpy(num,"--");
restore(no,name1,1,1,num,&amount);
}
fwrite(&b1,sizeof(b1),1,fp);
clrscr();
textcolor(YELLOW);
gotoxy(6,9);
cprintf("WITHDRAW SUCCESSFUL") ;
getch();
}
else
{
clrscr();
textcolor(YELLOW);
gotoxy(3,9);
cprintf("YOU HAVE ONLY Rs. %f/-",b1.amount);
gotoxy(3,13);
cprintf("SO YOU CAN'T WITHDRAW Rs.%f/-",amount);
textcolor(13);
gotoxy(20,23);
cprintf("TRY AGAIN !...");
getch();
fclose(fp);
withdraw();
}
break;
}
}
}
if(k=='n')
{
clrscr();
gotoxy(6,9);
textcolor(LIGHTRED);
cprintf("WRONG A/C NUMBER OR PASSWORD");
gotoxy(7,12);
cprintf("TRY AGAIN !...");
getch();
}
textmode(C80);
ch='n';
rewind(fp);
fclose(fp);
menu1();
} */
p=b1.amount+500;
if(amount<p)
{
fseek(fp,-sz,SEEK_CUR);
b1.amount=b1.amount+amount;
if(ch=='y')
{
restore(no,name1,2,2,num,&amount);
}
else
{
strcpy(num,"--");
restore(no,name1,2,1,num,&amount);
}
fwrite(&b1,sizeof(b1),1,fp);
clrscr();
textcolor(YELLOW);
gotoxy(6,9);
cprintf("DEPOSIT SUCCESSFUL") ;
getch();
}
break;
}
}
}
if(k=='n')
{
clrscr();
gotoxy(6,9);
textcolor(LIGHTRED);
cprintf("WRONG A/C NUMBER OR PASSWORD");
gotoxy(7,12);
cprintf("TRY AGAIN !...");
getch();
}
textmode(C80);
ch='n';
rewind(fp);
fclose(fp);
menu1();
}
void main()
{
clrscr();
home_page();
set_mgr_pas();
menu5();
}
TESTING TECHNIQUES
Our objective is to design test systematically uncover different classes of errors and do so
with minimum amount of time and effort. Data collected as testing is conducted provide a
good indication of software reliability and some indication of software quality as a whole.
But there is one thing that testing can not do.
Testing can not show the absence of defects, it can only show that software defects are
present.
Information flow for testing follows the pattern described in the figure:
Two classes of input are provided:
1. A software configuration that includes a software requirement specification, a
design specification, and Source code
2. A test configuration that include a Test Plane and Procedure, any testing tools that
are to be used, and test cases and there expected results.
Software
Configuration
There is no use of mouse to handle the software .The keyboard is meant for providing
any sort of inputs. There is only vertical menu with key access.
The application certainly has same striking advantage over manual system. There will be
no paper work as possible and the information will be updated as it changes.
It is automation of Telephone directory system.
With this system one can generate the report of the address.
It secures the database of Telephone directory system from the unauthorized
person.
The operator does not require any previous training because of its user
friendliness the operator is free from any technicality of the backend processing,
that is how database is maintained.
If the process of the working changes in future then the alteration in the system
will be done easily and will not cause in the mismanaging of data.
Furthermore with its implementation very large amount of data will be secure and
editing and addition or deletion of data is done very easily.
In future according to the user’s requirement it can be updated so that to reach the
user specification.
CONCLUSION
The application certainly has some striking feature over manual system. User queries
have become quite accurate and efficient. Lot of paper work has been eliminated. Future
modification and enhancements have become quite easier now in comparison to the
previous manual system.
Last but one of the most important advantages of the banking system is that, through this
system the whole procedure will take too less time in comparison of the manual system.
No doubt BAS will be helpful for institutes in all procedure, which will be monitoring
through Account. At the first step BAS will only be installed in the bank .The main
advantage of BAS is that, it will become a powerful tool in establishment of better system
in comparison of the existing system. It helps to protect the system from the corruption.
After installation of BAS in the bank, there is a greater possibility of stabilization a clear
and fair system, which will be accurate, update and fast.
There is no doubt that there always remains some scope of improvement. The important
thing is that the system developed should be flexible to accommodate any future
enhancements. This system can be used to provide some enhancement without rewriting
of existing code.
BIBLIOGRAPHY