17-04-2014, 03:48 PM
Online Banking
Online Banking[.pdf (Size: 87.87 KB / Downloads: 104)
INTRODUCTION
The project entitled “Online Banking " is a computerized telecommunications device
that provides the customers of a financial institution with access to financial transactions
in a public space without the need for a human clerk or bank teller. On most modern
ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe
or a plastic smartcard with a chip, that contains a unique card number and some security
information, such as an expiration date or CVC (CVV). Security is provided by the
customer entering a personal identification number (PIN).
Using an ATM, customers can access their bank accounts in order to make cash
withdrawals (or credit card cash advances) and check their account balances as well as
purchasing mobile cell phone prepaid credit. ATMs are known by various other names
including automated banking machine, money machine, bank machine, cash machine,
hole-in-the-wall, cashpoint, Bancomat (in various countries in Europe and Russia),
Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India)..
SYNOPSIS
“Online Banking " is a computerized telecommunications device that provides the
customers of a financial institution with access to financial transactions in a public space
without the need for a human clerk or bank teller. On most modern ATMs, the customer
is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard
with a chip, that contains a unique card number and some security information, such as
an expiration date or CVC (CVV). Security is provided by the customer entering a
personal identification number (PIN).
SYSTEM ANALYSIS
System analysis is a process of gathering and interpreting facts, diagnosing problems
and the information to recommend improvements on the system. It is a problem solving
activity that requires intensive communication between the system users and system
developers. System analysis or study is an important phase of any system development
process. The system is studied to the minutest detail and analyzed. The system analyst
plays the role of the interrogator and dwells deep into the working of the present system.
The system is viewed as a whole and the input to the system are identified. The outputs
from the organizations are traced to the various processes. System analysis is concerned
with becoming aware of the problem, identifying the relevant and decisional variables,
analyzing and synthesizing the various factors and determining an optimal or at least a
satisfactory solution or program of action.
TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first. The assessment
of this feasibility must be based on an outline design of the system requirement in the
terms of input, output, programs and procedures. Having identified an outline system, the
investigation must go on to suggest the type of equipment, required method developing
the system, of running the system once it has been designed.
OBJECTIVES:
Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process
and show the correct direction to the management for getting correct information from
the computerized system.
It is achieved by creating user-friendly screens for the data entry to handle large volume
of data. The goal of designing input is to make data entry easier and to be free from
errors. The data entry screen is designed in such a way that all the data manipulates can
be performed. It also provides record viewing facilities.
When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in
a maize of instant. Thus the objective of input design is to create an input layout that is
easy to follow
RELATIONSHIPS:
Table relationships are established using Key. The two main keys of prime importance
are Primary Key & Foreign Key. Entity Integrity and Referential Integrity Relationships
can be established with these keys.Entity Integrity enforces that no Primary Key can have
null values.Referential Integrity enforces that no Primary Key can have null values.
Referential Integrity for each distinct Foreign Key value, there must exist a matching
Primary Key value in the same domain. Other key are Super Key and Candidate Keys.
Relationships have been set between every table in the database. This ensures both
Referential and Entity Relationship Integrity.
CONCLUSION
Using “Online Banking " , customers can access their bank accounts in order to make
cash withdrawals (or credit card cash advances) and check their account balances as well
as purchasing mobile cell phone prepaid credit. In this the customer is identified by
inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip,
that contains a unique card number and some security information, such as an expiration
date or CVC (CVV). Security is provided by the customer entering a personal
identification number (PIN).
Online Banking[.pdf (Size: 87.87 KB / Downloads: 104)
INTRODUCTION
The project entitled “Online Banking " is a computerized telecommunications device
that provides the customers of a financial institution with access to financial transactions
in a public space without the need for a human clerk or bank teller. On most modern
ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe
or a plastic smartcard with a chip, that contains a unique card number and some security
information, such as an expiration date or CVC (CVV). Security is provided by the
customer entering a personal identification number (PIN).
Using an ATM, customers can access their bank accounts in order to make cash
withdrawals (or credit card cash advances) and check their account balances as well as
purchasing mobile cell phone prepaid credit. ATMs are known by various other names
including automated banking machine, money machine, bank machine, cash machine,
hole-in-the-wall, cashpoint, Bancomat (in various countries in Europe and Russia),
Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India)..
SYNOPSIS
“Online Banking " is a computerized telecommunications device that provides the
customers of a financial institution with access to financial transactions in a public space
without the need for a human clerk or bank teller. On most modern ATMs, the customer
is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard
with a chip, that contains a unique card number and some security information, such as
an expiration date or CVC (CVV). Security is provided by the customer entering a
personal identification number (PIN).
SYSTEM ANALYSIS
System analysis is a process of gathering and interpreting facts, diagnosing problems
and the information to recommend improvements on the system. It is a problem solving
activity that requires intensive communication between the system users and system
developers. System analysis or study is an important phase of any system development
process. The system is studied to the minutest detail and analyzed. The system analyst
plays the role of the interrogator and dwells deep into the working of the present system.
The system is viewed as a whole and the input to the system are identified. The outputs
from the organizations are traced to the various processes. System analysis is concerned
with becoming aware of the problem, identifying the relevant and decisional variables,
analyzing and synthesizing the various factors and determining an optimal or at least a
satisfactory solution or program of action.
TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first. The assessment
of this feasibility must be based on an outline design of the system requirement in the
terms of input, output, programs and procedures. Having identified an outline system, the
investigation must go on to suggest the type of equipment, required method developing
the system, of running the system once it has been designed.
OBJECTIVES:
Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process
and show the correct direction to the management for getting correct information from
the computerized system.
It is achieved by creating user-friendly screens for the data entry to handle large volume
of data. The goal of designing input is to make data entry easier and to be free from
errors. The data entry screen is designed in such a way that all the data manipulates can
be performed. It also provides record viewing facilities.
When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in
a maize of instant. Thus the objective of input design is to create an input layout that is
easy to follow
RELATIONSHIPS:
Table relationships are established using Key. The two main keys of prime importance
are Primary Key & Foreign Key. Entity Integrity and Referential Integrity Relationships
can be established with these keys.Entity Integrity enforces that no Primary Key can have
null values.Referential Integrity enforces that no Primary Key can have null values.
Referential Integrity for each distinct Foreign Key value, there must exist a matching
Primary Key value in the same domain. Other key are Super Key and Candidate Keys.
Relationships have been set between every table in the database. This ensures both
Referential and Entity Relationship Integrity.
CONCLUSION
Using “Online Banking " , customers can access their bank accounts in order to make
cash withdrawals (or credit card cash advances) and check their account balances as well
as purchasing mobile cell phone prepaid credit. In this the customer is identified by
inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip,
that contains a unique card number and some security information, such as an expiration
date or CVC (CVV). Security is provided by the customer entering a personal
identification number (PIN).