Chris Kaburu
Chris Kaburu
Chris Kaburu
SUPERVISOR: DR.MWENDIA
Signature…………………………………….. Date…………17/4/2018…………….
CHRIS KAIMENYI KABURU
Signature………………………………………. Date………………………………….
Dr. S. Mwendia
Lecturer Faculty of Computing and Informatics
KCA University
TABLE OF CONTENT
Contents
ABSTRACT ................................................................................................................................................... 7
1.0 INTRODUCTION ..................................................................................................................................... 8
1.1 Background ....................................................................................................................................... 8
1.2. Problem Statement .......................................................................................................................... 8
1.3: Proposed Solution ............................................................................................................................ 9
1.4: Objective .......................................................................................................................................... 9
1.4.1 System Objective........................................................................................................................ 9
1.4.2 Research Objective..................................................................................................................... 9
1.5: Significance of the project ............................................................................................................... 9
2.0. LITERATURE REVIEW .......................................................................................................................... 10
Introduction .......................................................................................................................................... 10
2.1.1 Personal Computer (PC) Banking ................................................................................................. 10
2.1.2 Internet Banking .......................................................................................................................... 10
2.1.3 Consumer Behavior towards Internet Banking ........................................................................ 11
2.1.4 Attention .................................................................................................................................. 11
2.1.5 Convenience............................................................................................................................. 11
2.1.6 Accessibility .............................................................................................................................. 11
2.1.7 Usability ................................................................................................................................... 12
2.1.8 Risk ........................................................................................................................................... 12
2.1.9 Security .................................................................................................................................... 12
2.1.10 Cost ........................................................................................................................................ 13
2.2 RESEARCH METHODOLOGY............................................................................................................. 13
2.2.1 Feasibility Study ....................................................................................................................... 13
2.2.2. Data collections methods, ....................................................................................................... 14
3
2.2.3 Target population .................................................................................................................... 14
2.2.4 Sampling ................................................................................................................................. 14
2.2.4 Development Methodology (Model) ....................................................................................... 14
2.2.5 Budget and resources .............................................................................................................. 15
2.2.6 PROJECT SCHEDULE.................................................................................................................. 16
3.0. System Requirement Specification .................................................................................................... 17
3.1 Need and Purpose ........................................................................................................................... 17
3.2 Intended Audience .......................................................................................................................... 17
3.3 Overview of Document ................................................................................................................... 17
3.4 Description ...................................................................................................................................... 18
3.4.1 Features and Functions ............................................................................................................ 18
3.4.2 Users classes and Characteristics ............................................................................................. 18
3.5 Operating Environment................................................................................................................... 18
3.5.1 Hardware ................................................................................................................................. 18
3.5.2 Software ................................................................................................................................... 18
3.6 System Feature ............................................................................................................................... 19
3.6.1 System Feature & Functional Requirement ............................................................................. 19
.................................................................................................................................................................. 21
3.7 Design Constraints .......................................................................................................................... 23
3.7.1 Overview of Data Requirements .............................................................................................. 23
3.7.2 Additional Comments .............................................................................................................. 23
3.8 External Interface Requirement ...................................................................................................... 23
3.8.1 User Interfaces ......................................................................................................................... 23
3.8.2 Hardware Interfaces................................................................................................................. 23
3.8.3 Software Interfaces .................................................................................................................. 24
3.8.4 Communication Interfaces ....................................................................................................... 24
3.9 Other Nonfunctional Requirement ................................................................................................. 24
3.9.1 Reliability ................................................................................................................................. 24
3.9.2 Security Requirement .............................................................................................................. 24
3.9.3 Availability................................................................................................................................ 24
3.10 Other Requirement ....................................................................................................................... 25
4.0 DESIGN ................................................................................................................................................ 26
4
4.1 Purpose and Scope .......................................................................................................................... 26
4.2 System Overview ............................................................................................................................ 26
4.2.1 Level 0 Data flow diagram (DFD) .............................................................................................. 26
4.2.2 Level one Data Flow Diagram ................................................................................................... 27
4.3 System Architecture ........................................................................................................................ 28
4.4 Software Design .............................................................................................................................. 29
4.4 FLOW CHART: PROCESSING LOAN FLOW CHART ........................................................................ 30
4.4.1FLOW CHART: MANAGING CONTRIBUTION .............................................................................. 31
4.4.3 FLOW CHART: MANAGING USERS ............................................................................................ 32
4.4.5 FLOW CHART: MANAGING ACCOUNTS .................................................................................... 34
4.5. File and Database Design ............................................................................................................... 35
4.6. Human-Machine Interface ............................................................................................................. 38
(A) Processing Loans ......................................................................................................................... 38
(B)Managing Contribution ............................................................................................................... 39
(c)Managing User .............................................................................................................................. 40
4.7. System Integrity Controls ............................................................................................................... 40
4.7.1 Internal security ....................................................................................................................... 40
4.7.2 Verification processes .............................................................................................................. 40
4.7.3 Audit Process ........................................................................................................................... 41
5.0 SYSTEM TESTING ................................................................................................................................. 41
5.1 Goals and objectives ....................................................................................................................... 41
5.2 Statement of scope ......................................................................................................................... 41
Functionality ......................................................................................................................................... 41
5.3 Major constraints ............................................................................................................................ 41
5.4 Test Plan.......................................................................................................................................... 42
5.4.1 System to be tested ................................................................................................................. 42
5.4.2 Testing strategy ........................................................................................................................ 42
5.4.2.1 Unit testing ............................................................................................................................ 42
5.4.2.2 Integration testing ..................................................................................................................... 42
5.4.2.3 Validation testing ...................................................................................................................... 42
5.4.2.4 High-order testing ..................................................................................................................... 43
5.4.2.5 Testing resources and staffing .................................................................................................. 43
5
5.4.3 Test work products ...................................................................................................................... 43
5.4.4 Test record keeping .................................................................................................................. 43
5.4.5Testing tools and environment .................................................................................................. 43
5.5 Test schedule................................................................................................................................... 43
5.5.1 Test Procedure ......................................................................................................................... 44
5.4.2 Unit test cases .......................................................................................................................... 44
6.0 IMPLEMENTATION AND MAINTENANCE STRATEGY ........................................................................... 45
6.1 Conversion Plans ............................................................................................................................. 45
6.1.1 File Conversion ............................................................................................................................. 45
6.1.2Train Personnel ............................................................................................................................. 45
6.1.3 Installation ................................................................................................................................... 45
6.2 Training of users.............................................................................................................................. 46
6.3 Support ........................................................................................................................................... 46
6.4 Resistance to change ...................................................................................................................... 46
6.5 Software Maintenance .................................................................................................................... 46
6.6 User Manual .................................................................................................................................... 47
6.7 Implementation schedule table ........................................................................................................ 47
6.8 CONCLUSION................................................................................................................................... 47
6.9 Recommendation ........................................................................................................................ 47
7.0 ACRONYMS ......................................................................................................................................... 48
8.0 USER MANUAL .................................................................................................................................... 48
8.1 Managing the User .......................................................................................................................... 49
8.1.1 STEP1: Index Page .................................................................................................................... 49
8.1.2:STEP2: Registration Page: ........................................................................................................ 49
8.1.3 STEP3. Login Page .................................................................................................................... 50
8.1.4 STEP4: Dashboard .................................................................................................................... 50
8.2 STEP5: Processing Loan: .................................................................................................................. 51
8.3 STEP6: Managing Member Account ............................................................................................... 51
8.7. STEP7: Managing Contribution ...................................................................................................... 52
8.5 Admin Page ..................................................................................................................................... 52
9.0 SOURCE CODE..................................................................................................................................... 53
6
ABSTRACT
My proposed project looks not only to provide an internet banking platform to the
customers/client but also to automate the loan process from both, bankers as well as
customer’s side.
Here customers may fill out loans provided along with the required documents,
thereafter the customer gets a login id password.
The bank may now cross verify customer details and also request extra documents by
sending online alerts to the customer email.
The customer might also bank some money into the system whereby the system will
create a record and also rethink on the amount of money they can grant on a loan.
With this type of project, we will be able to see an increase in people taking loans
without any struggle/hurdle when they request for a loan.
7
1.0 INTRODUCTION
1.1 Background
With the globalization trends worldwide, it is difficult for a nation, whether small or big
/developed or undeveloped to remain isolated from what is happening around the world.
Today technology has enveloped every aspect of life, in the changing scenario the
banking sector is not an exception.
The current operations at KCA U SACCO is that of customers going out to fill forms,
waiting on long queues in the banks are over that’s why with the Recent innovation in
the industry has enabled new access methods like the use of ATM, Credit/debit cards.
Banks/ Sacco’s are facing a number of challenges due to stiff competition with service
provider’s case of M-Pesa where by it accessible even to the rural areas and this bring
the need of internet banking to the banking industry.
Due to this continuous advancement the banking industry is set to be revolutionized in
the manner in which they conduct their business.
Internet banking refers to provision of banking and financial services with the help of
computer devices.
The movement from traditional branch banking to now internet banking will cause banks
to come up with strategies to attract more customers and retain the existing one.
(Bradley & Stewart, 2003).
An appropriate banking environment is considered a key pillar as well as an enabler of
economic growth (Koivu, 2002).
Loan is an amount of money given to an individual or an institution on the condition that
it will be paid back over a given period of time with interest. The business in the banking
industry should use or provide efficient loan processing through internet banking in
order to give the company a competitive advantage within the industry a s much as
possible.(Bank System& Technology, 2013).
Technological change has been inevitable in the banking industry and more so in the
organization KCA U Sacco.
KCA U Sacco currently they are using excel as their database. Today you can’t bank
through the internet and also get an opportunity to get access to loans through the
Sacco.
8
Getting a loan is a very tiring and also a very complicated process in the organization. It
may take weeks even months for loans to be approved and one has to visit the loan
office again and again for document and verification.
Due to the fact above that’s why the loan automation system through the internet
banking will solve this situation.
The goal of this project is therefore to design and create loan automation and internet
banking system that will capture more customers, convert the traditional/previous
system of obtaining and granting loans, track loans given out to allow better workflow
and enhance compliance to condition.
1.4: Objective
The study has the following objective
1.4.1 System Objective
1. To enable Internet banking
2. To reduce the timescale of one accessing a loan
9
2.0. LITERATURE REVIEW
Introduction
This chapter reviews the literature on the effects of internet banking and loan
automation through internet on the performance of KCA U SACCO. Specifically, the
chapter addresses the theoretical framework guiding the study and the empirical
literature.
Within the internet banking adoption context, researchers have indicated various
determinant or drivers that have a positive effect on adoption decisions. For example
usefulness, compatibility, self-efficiency, relative advantage. On the contrary, lack of
user friendly technology, high initial setup cost, high security and privacy risk, lack of
suitable skills and slow rate of adoption have been the major factors that have limited
banks from widespread implementation of financial services over the internet.
In addition to the above, it is identified that there is limited information available either
on the actual adoption or the usage rate for Kenya’s internet banking services and this
might be due to limited number of studies carried out in this field.
Kenya Commercial bank and Stan chartered bank have adopted only the internet
banking leave ng the loan automated system.
Furthermore customers in Kenya are reluctant to adopt internet banking.
10
2.1.3 Consumer Behavior towards Internet Banking
Several domains suggest numerous potential influence on customer adoption of internet
banking including theories of consumer behavior adoption of internet banking including
theories of consumer behavior in mass media choice and use.
As a generic theoretical framework a bank must first attract banking consumer attention
to the internet banking services before the consumer will consider internet banking.
However unless the consumer has a high internet accessibility at home/work he/she is
unlikely to consider Internet banking.
The consumer will also need to consider whether the perceived relative advantage of
internet banking compared with other banking form outweigh perceived risk and cost.
Each component of the framework is discussed below:
Chorofas, Dimitris N, Electronic Funds transfer, Butterworth London, UK, 1998.
2.1.4 Attention
It appears that marketing of internet banking has eluded the attention of many
consumers not only in Kenya but to the entire world who may be prospective adopters.
Many non-users mentioned not having known or thought about internet banking
previously, nor have seen it being advertised.
Some participants remarked they did not bank on the internet because they have not
attempted it, believing it to be too complicated suggesting the need for banks to
motivate interest.
2.1.5 Convenience
The convenience is the most important factor in making the decision to bank using the
internet. Some users observed that internet banking is convenience as an extension of
overall internet convenience - that is, they had obtained internet access in the
expectation that many services and other needs fulfilment would be more convenient
through its use.
9Ibid. 10Luarn, P. and Lim, H.H., “Towards an understanding of the behavioral
intention to use mobile banking,” Computers in Human Behaviors, 2004, pp.119.
2.1.6 Accessibility
Access to computers is not the issue, but access to the internet is.
Almost all the customers got computers at home, but not access to the internet at
home." This comment from a non-user is illustrative of non-user comments suggesting
that missing or inadequate internet accessibility is a key influence on the adoption
decision. Some participants with home internet connection utilized service provision with
limited access hours, for cost-based reasons.
11
. An emerging issue is restrictive workplace internet practices and policy, with several
non-users relaying stories of limited hours for internet use at work, and the need to
perform work within this timeframe rather than utilizing personal utility applications such
as internet banking.
2.1.7 Usability
"The banks and financial institutions want everyone to go online, but they haven't
actually set up their system so that people can actually use it." (Pew, 2003). 'Ease of
use' - or usability - was frequently cited and found closely linked to individual
perceptions of complexity, web site design and integratability /interoperability.
Interestingly, some non-users had formed views of complexity and site design usability
issues without having sighted internet banking applications.
11Pew, "Convenience is King", Pew Internet and American Life Project, 2003,
2.1.8 Risk
Customers consider internet-based risks in making banking channel choices. For most
of the bank customers, the convenience factor of banking methods was seen as more
important than risk according to a survey conducted among Australian banking
consumers.
Rogers13 finding that more innovative, risk accepting people are 'early adopters' may
explain why users in our sample were less risk averse than non-users
2.1.9 Security
The reliability of internet connections and internet banking applications was a concern.
Bank customers might face incidents such as computers not working, attempting to use
internet banking only to find pages that did not load, and logging on only to read a
message stating that there was a problem and advising the user to try again later.
Confidentiality and privacy issues were often confused, with concerns expressed that
data would be disclosed to others, but with a lack of differentiation between personal
and other confidential information.
(Williamson, Kirsty, 2006), While confidentiality was not part of the lay definition given
them for security, participants viewed the confidentiality issue as a security concern in
accordance with published definitions of information security that include protection of
information confidentiality.
Williamson, Kirsty, and Lichtenstein, Sharman, “Understanding Consumer Adoption of
Internet Banking: An Interpretive Study in the Australian Banking Context”, Journal of
Electronic Commerce Research, January 2006. 15GAO, "Information Security:
Emerging Cybersecurity Issues Threaten Federal Information Systems", Report GAO-
05-231, Report to Congressional Requesters, May 2005.
12
2.1.10 Cost
Consumers cited various types of costs which had inhibited their use of internet
banking. Burnham et al.18 identified procedural, financial and relational costs
considered by consumers when switching between various types of service offerings
and such costs were cited by participants.
In the banking industry we cannot limit ourselves to only one country but to the entire
world where by everyone today is a prospective customer.
With all these financial institution in Kenya with a population of 44 million and a total of
42 banks, the competition for customers might be very high.
According to a report released by Cytonn, the sheet aggregate for banks grew by 1.4
percent from 3.6 trillion shillings in June 2015 to 3.7 trillion shilling in September 2017.
13
• Define and identify characteristics of proposed system.
• Determine and evaluate performance and cost effective of the proposed system.
• Weigh system performance and cost data.
• Prepare and report the final project direct to management?
Advantages of interview
• Identification Phase.
• Design
• Construct or Build
• Evaluation and Risk Analysis.
14
2.2.5 Budget and resources
The key items include:
ITEMS COST
internet 1500
Total
15
2.2.6 PROJECT SCHEDULE
The propose system will be carried out in as shown in the table below. The work breakdown is
formulated below.
Maintenance 10hrs
plan
User manual 10hrs
Final report 5hrs
16
3.0. System Requirement Specification
3.1 Need and Purpose
In present times, all major economic transactions have started taking place digitally. The
major trends of modern digital transactions is substantiated by use of database
management. These databases can be accessed by anyone with specific rights, and
perform certain actions on it.
The data update is done almost automatically and is much faster.
Users can, in present days can access their accounts directly without going to a Sacco,
making transfers, transactions and accessing cash directly without standing in long
queues as was prevalent earlier using ATM machines.
On employee-side the data is much more organized, and accessing and performing
actions on user accounts is easier for them. Due to this the Sacco will have better work
efficiency and customer experience improves as well.
The Sacco have been using the excel application as their database and that’s why they
need to adapt to these new technologies that are coming up.
17
3.4 Description
3.4.1 Features and Functions
Features
KCA U internet Sacco system can be used by Sacco members and/or Customers
Depending on Sacco policy. It can be used by several employees of the Sacco at the
same time with required rights.
It can be accessed using any general web browser with graphical interface.
Our Product consists mainly of the
Employee Work-Space (EWS): It will deal with the internal Sacco functions like new
account registration, withdrawal, deposit, money transfer etc.
18
3.6 System Feature
3.6.1 System Feature & Functional Requirement
The interface will look like:
I. Login Feature
The member will be required to register in the system, enter in his password so as to get access
into the system.
Functional Requirement: Account Number
Password.
Registration Details
Account
Number
Pin
Number
Welcome
Page
Sacco
Register
Member
Employee Work
Issue
Password
Account
Number
19
II. Loaning Feature
Once the member has logged in the system Answer some few questions they can get access to the loan
with effect from their previous transaction.
Pin
Number
Request
Loan
Ask
questions
Sacco
Answer
member question
Employee Work
Issue Loan
Account
Number
20
III. Monthly Statement
The Member will be getting a displayed monthly statement from the system which will be updated
regularly.
Pin
Number
Display
Monthly
Statemnet
Sacco Updating
Monthly
member Statement
Employee Work Station
Account
Number
21
IV. Bank Transaction System
The Sacco Members will be doing services like withdrawing money, getting balances of their
account, requesting loan and also getting a copy of their monthly statements from the system.
The system on the other hand will be recording deposit, recording withdraw and also updating
the monthly statement.
Withdraw
Money
Pin
Number
Display
BALANCE
Record
deposit
Sacco
member Record
withdraw
Employee Work Station
Request
loan
Display
Monthly
Statemnet
Account
Number
22
Database can store details of up to about a Hundreds of accounts, but that can vary
according to Sacco need, and would depend on data storage capacity of server and not
on database
The response time depends on size of database due to searching process, but still the
response by server will be just the time to search, as it would be accessed from specific
devices in the Sacco and there is no system for accessing it online.
3.7 Design Constraints
Enhancements to the security features might lead to performance overhead.
Central Server should be on-line round the clock.
3.7.1 Overview of Data Requirements
The product is completely data oriented.
In EWS, the employees would input the various details of Customer for updating,
processing or retrieval of data and for new customers, required fields for registration will
be filled.
3.7.2 Additional Comments
This document describes a MySQL and PHP based application, for purpose of
implementing a KCA U Sacco on loan automation and internet Sacco System.
23
3.8.3 Software Interfaces
Software interface is supported by the main control panels and operating system in
which hosts the algorithms for calculating distributed travel and wait time information.
Additionally, the algorithms define and export system commands for main control
panels, and communication mediums. For testing purposes the software shall be
capable of interfacing with software simulators on a PC computer using GUI
applications of webpages.
This communication allows for failure messages, and requests to be sent and received
by the main system
3.9 Other Nonfunctional Requirement
3.9.1 Reliability
The system is safety critical. If it moves out of normal operation mode, the requirement
to drop to the next lower floor and open its doors is given priority. This emergency
behavior shall not occur without reason.
The system has to be very reliable due to the importance of data and the damages
incorrect or incomplete data can do.
3.9.3 Availability
When in normal operating conditions, request by a user for a servicer shall be handled
within 1second. Immediate feedback of the systems activities shall be communicated to
the user by link page clicked. At peek system load, individual users at either the server
in the security office, at the links or inside the Sacco system shall not experience any
delay in the service response to their commands longer than 1 second.
:
The system is available 100% for the user and is used 24 hrs. A day and 365 days a
year. The system shall be operational 24 hours a day and 7 days a week.
24
3.10 Other Requirement
A degraded mode of operation should be possible in which each user can operate
independently of central scheduling.
The software shall have power failure and error recognition codes acting as a safety
net, thus keeping the software from performing any major catastrophic functions.
The main considerations when deciding about the output media are:
• The suitability for the device to the particular application
• The need for a hard copy.
• The response time required.
• The location of the users
The software and hardware available. Keeping in view the above description the project
is to have outputs mainly coming under the category of internal outputs. The main
outputs desired according to the requirement specification are: The outputs were
needed to be generated as a hot copy and as well as queries to be viewed on the
screen. Keeping in view these outputs, the format for the output is taken from the
outputs, which are currently being obtained after manual processing. The standard
printer is to be used as output media for hardcopies
25
4.0 DESIGN
This document gives the description of software design of the KCA U loan automation as well as internet
banking system.
Validation Info
ACCOINT INFO
KCA SACCO USER
MEMBER
SYSTEM
Fig1
The system will be interacting with the customer where they will be validating and reporting back to the
system. Then it will also be interacting with the user the Sacco employees using the system.
26
4.2.2 Level one Data Flow Diagram
User 1 Users
Managing Users
Members
2 Managing Details
3
Processing Loan
Managing
Member Accounts
D2 Member Details
D3 Loans
4
Managing
Contribution
D4 Contribution
The Figure above shows how the system, user and customer interact together. The system can be able
to process loan, manage contribution and also manage users. It is important to note that the system
can close the account.
27
4.3 System Architecture
The KCA U SACCO System is a client-server based system, which contains the following layers: user
interface, internet/LAN communication, functional service, and data storage layers.
DATABASE
WEB SERVER
INTERNET
Pc Pc Pc
28
Data transfers occur in both directions in the system. The user’s input or data request is sent using
either an internet browser. This data then connects to the system either through the internet or, in the
case of an onsite connection, through the LAN connection. In the case of an internet connection, the
data is required to pass through the system’s firewall for security purposes, prior to connecting to the
web server. Local personnel, once validated within the system, will be connected directly to the
application server. In the functional services layer, the data input or request is routed to the
appropriate functional module in accordance with the user’s login and account type. Through these
modules, the users will interact with the database via the SQL server.
MEMBER MANAGE
PROCESS LOANS MANAGE USERS
ACCOUNT CONTRIBUTION
DELETE TOP UP
CHECK ADD USER WITHDRAW
APPLY LOAN USER CONTRIBUTI
VALIDATION CONTRIBUTION
ON
The chart depicts how the system will be interacting with the three processes that is for processing loan,
managing contribution and managing users.
Pseudocode
START
INFOORMATI NO
ON PROVIDED APLICATION FORM REJECTED
VALID?
YES
ELIGIBILITY CHECK
NO
ELIGIBLE FOR
LOAN? LOAN REJECTED
YES
LOAN GRANTED
30
It will allow users to get loans if the system approves that they have met standards . If they
haven’t they are denied access to loans.
START
INFOORMATI NO
ON PROVIDED APLICATION FORM REJECTED
VALID?
YES
ELIGIBILITY CHECK
NO
ELIGIBLE FOR
CONTRIBUTI CONTRIBUTION REJECTED
ON?
YES
31
Fig no 8. Managing Contribution Flowchart
It will allow users to get loans if the system approves that they have met standards . If they
haven’t they are denied access to loans.
Pseudocode
Pseudocode
Enter username/password
If login valid
The figure below shows that when users are entering the system they will enter using their login
details, if not valid they will be denied access to the system.
32
START
ENTER
USERNAME AND
PASSWORD
LOGIN
USER DETAILS
NO
VALID
DENY ACESS
YES
NO CLOSE?
YES
EXIT
33
4.4.5 FLOW CHART: MANAGING ACCOUNTS
ENTER
USERNAME AND
PASSWORD
LOGIN
USER DETAILS
NO
VALID
DENY ACESS
YES
NO CLOSE?
YES
EXIT
34
Pseudocode
Enter username/password
If sign in valid
Loan
35
Users
Contribution
36
Account
37
4.6. Human-Machine Interface
(A) Processing Loans
GET LOAN
50,000 30,000
100,000
SUBMIT
The data submitted will be verified via the access control function. Upon submitting the document the
loan will be subjected to a checkup so that it can approved and sent to the member.
38
(B)Managing Contribution
KCA SACCO SYSTEM
BANK WITH US
CONTRIBUTION
10,000 3,000
5,000
SUBMIT
Upon clicking the Submitting button the moneys remitted will be shown in the system
39
(c)Managing User
KCA SACCO SYSTEM
USERS SIGN IN
REPLY TO MEMBERS
REQUEST
ADVICE MEMBERS
MANAGE MEMBERS
Users will be subjected to sign in process before they can continue to so that the links can be active if a
failed log in the user can’t be able to access the system.
Audit procedures to meet control, reporting, and retention period requirements for operational and
management reports
40
4.7.3 Audit Process
Ability to identify all audit information by user identification, network terminal identification, date, time,
and data accessed or changed.
1. Ensure that the system being tested meets the design and specification requirements and
standards.
2. Allow for the development of a system that is acceptable to the end users, since they are
the major users of the system.
3. Establish resources required to perform the testing process.
4. To identify errors, faults and failures that may be present in the system and fix them in
the process.
5. To come up with a reference tool for validating the system.
6. To make ensure that the system produces the desired output.
Functionality
1. Test availability of the system to the members.
2. Test whether the admin can login to the portal securely.
3. Test when payment occurs if the details are added to database.
4. Test concurrency if the system can operate many functions all together.
1. Time constraints. The time needed to complete the system is limited therefore not all the
required tests will be done in the correct time and this may result to some errors.
41
2. Some errors were may be untraceable. Not all the required tests may be accomplished
therefore the system will contain few problems with it operations.
This section describes the overall testing strategy and the project management issues that are
required to properly execute effective tests.
This test is done to ensure correctness of the system, its input, content and the output being
outputted whether they are all correct and meet the conditions given. It ensures that all integrated
unit programs conform to each other without conflicting and form one close to perfect system.
Security will also be an issue when it comes to validation. To enforce system security a user
name and strong password is required for to be able to gain access to the system.
42
5.4.2.4 High-order testing
A number of tests will be carried out in the new system to verify its functionality and to see how
it will function under high stress levels. This is achieved by a number of tests such as unit
testing, integration testing, functional testing and acceptance testing. Overall testing of the
system will be done after the end of the development process of the entire project.
Inputting pay and pay amounts by the developers and the analyzing first report.
Crystal reports will be used to evaluate immediate test results. After the results have been
evaluated, they will be submitted to XAMPP database for storage. The test result will be
recorded as a word document in a hard disk or compact disk storage device for future reference.
Microsoft Visual basic and Microsoft Access will be used as the testing tools as well as testing
environment.
43
View report detail The user should just view
detail report stored in the
database
Validation System interfaces Should be easy to understand
by the user
Modules Should be easy to use by the
user
Implementation Should be easy to implement
by the user
5.5.1 Test Procedure
This section describes as detailed test procedure including test tactics and test cases for the
software.
Test Scenario Test steps Test Data Expected Actual results Pass/fai
Results l
Check system 1. Go to the computer User ID=1 User As expected Pass
login with valid and open the system. should
Data Password= login in to
2.enter user ID Allow1 the system.
3.Enter Password
4.Click Submit
Check login with 1. Go to the computer User ID=1 Invalid As Expected pass
invalid data and open the system. username/p
assword.
2.Enter User ID
3.Enter Password
4.Click Login
Adding records Open the system on Enter details The admin As Expected Pass
to database webpage of the Sacco into the should fill
columns. the details
with
correct info
44
6.0 IMPLEMENTATION AND MAINTENANCE STRATEGY
The system will be implemented so as to replace a manual system. The objective therefore is to
put the system into operation
6.1.2Train Personnel
The members will be trained through user manual
Screen menu
6.1.3 Installation
The approach to be used is the parallel installation whereby the will be using the old and the
new system for a period of time
45
The main activities will be:-
• Programming
• Testing data preparation
• Data collection
• Training of users
6.3 Support
The system will automate support but what is to be noted is that the system will provide a
recovery and backup in case of a disaster.
The above activities are corrective maintenance whereby one will be repairing performance
failures.
The changes will be made because of previous uncorrected problem.
46
6.6 User Manual
The system has a user manual written clearly how the system works and in case of a disaster it
shows way to go about.
6.8 CONCLUSION.
This is to ensure that the system meets the right required specification needed to keep it running
and working.
Testing the system will help the developer and the team know how exactly the system works and
if it has any problems.
6.9 Recommendation
This system is workable and I recommend it to the SACCO since I believe it is beneficial to the
organization.
47
7.0 ACRONYMS
GUI- Graphical User Interface
VER- Version
4. Printer
5. Internet
48
8.1 Managing the User
8.1.1 STEP1: Index Page
This is the index page where by one will login as a member or the staff
49
8.1.3 STEP3. Login Page
Thereafter he/she can continue to login to the system
50
8.2 STEP5: Processing Loan:
51
8.7. STEP7: Managing Contribution
52
9.0 SOURCE CODE
<?php include('server.php') ?>
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<div class="header">
<h2>Login</h2>
</div>
<div class="input-group">
<label>Email</label>
</div>
<div class="input-group">
<label>Password</label>
</div>
<div class="input-group">
</div>
53
<p>
</p>
</form>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<div class="header">
</div>
<div class="input-group">
<label>First Name</label>
</div>
<div class="input-group">
<label>Last Name</label>
</div>
54
<div class="input-group">
<label>Email</label>
</div>
<div class="input-group">
<label>Password</label>
</div>
<div class="input-group">
<label>Confirm password</label>
</div>
<div class="input-group">
</div>
<p>
</p>
</form>
</body>
</html>
<?php session_start();
?>
<!DOCTYPE html>
<html>
<head>
55
<title>Get Loan</title>
</head>
<body>
<div class="header">
<h2>Get Loan</h2>
</div>
<a
href="contributions.php"style="text-decoration:none;" id="navbar-item">Contribution</a>
<a
href="process_statement.php"style="text-decoration:none;" id="navbar-item">statement</a>
<a
href="index.php?logout='1'"style="text-decoration:none;" id="navbar-item">logout</a></font>
</div>
<table>
<tr>
<td>First Name:</td>
</tr>
<tr>
<td>Last Name:</td>
</tr>
56
<tr>
<td>Email:</td>
</tr>
<tr>
<td>Amount:</td>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
57
</tr>
</table>
</div>
</div>
</form>
</center><br><br>
</div></center>
</body>
</html>
58