SlideShare a Scribd company logo
1 of 9
Name: M.Pragash
E-mail: pragashvenkat@gmail.com
Twitter Id: pragashvenkat@gmail.com
University: Pondicherry University
Year/Semester: IInd / IVsem
Branch: Information Technology
E-DD
Introduction
 In this modern running world, we don’t have time to stand in the
same place for a long time.
 For the present world everything has become fast. Yes, it has
become automated. Each and everyday we depend on a automated
machine to make our work easier.
 Here is an idea of an automated system which is not present and
also helpful to the people running fast.
 This app is based on AUTOMATION
 Reduces the human power.
 Saves time.
 Faster and easier.
Terms and techniques
Machine - Machines have become our day to day uses. From the
morning till evening we spend our time mostly with
machines. In this aspect this is an useful automated
machine used to generate the DD(Demand Draft) for the
end-user automatically.
Bank Account - Bank account of the person is used to transfer money
for the amount of DD to be generated.
ATM card– ATM card is used to access the account of the user for
money transfer and also for security purpose so as to be
safe and secure.
DESCRIPTION
 When a person is about to generate a DD in a bank he
has to stand in a queue for token for the first time and then
to the counter queue to get the Demand Draft.
 He can use this automated machine to generate the DD
automatically with Direct interaction.
 He should use his ATM card to access to his account
for money transfer. The end-user gives the amount and the
name to whom the DD has to be generated after logging in
using his ATM card.
 A flow chart of the application is shown on the next
slide.
Machine in
which the
user access
through
ATM card
The DD
generated is
given to the
end-user.
The amount
and the name
to whom DD is
generated is
entered
This DD Generator helps the end-users to complete their work quick
and run fast along with the fast running world. The image of the DD
generator is shown in the next slide.
THEFLOWCHARTOF THE DDGenerator
Components and contents USED
Touch – The most commonly used in the developing automated
machines and systems. Here touch is used as a keyboard.
LAN - Local area network is used to transfer the data to the third
party about the usage of the ATM card for transferring money
to generate DD.
DD form – Demand Drafts are loaded into the machine manually for
generation at each transaction by the end user.
Printer - Printer for generating Demand Draft(DD) and also
e-statement due to the use of ATM card.
Interest Areas
My most priorities of interest goes on two major domains
namely
 Banking
 Big Data
It would be a immense pleasure of joining my dream
company Mphasis located at Pune, Bangalore, Chennai etc.,
I would like to join this intern to learn many things from the
desire place and would like to give my full effort in my career
contribution the Company.
Automating Demand Draft Machine

More Related Content

Viewers also liked

OSGi Mobile eclipsecon 09
OSGi Mobile eclipsecon 09OSGi Mobile eclipsecon 09
OSGi Mobile eclipsecon 09yonnyb
 
5 Red Flags You've Outgrown you Learning Solution
5 Red Flags You've Outgrown you Learning Solution5 Red Flags You've Outgrown you Learning Solution
5 Red Flags You've Outgrown you Learning SolutionRyan Shirah
 
Equipo 2 nicte ha eduardo valdemar, nestor, arturo 137 a
Equipo 2  nicte ha eduardo valdemar, nestor, arturo 137 aEquipo 2  nicte ha eduardo valdemar, nestor, arturo 137 a
Equipo 2 nicte ha eduardo valdemar, nestor, arturo 137 aVladimix Leon
 
Global & local oxygen control in in vitro systems
Global & local oxygen control in in vitro systemsGlobal & local oxygen control in in vitro systems
Global & local oxygen control in in vitro systemsMAASTRO clinic
 
Estatutos del Partido Acción Ciudadana
Estatutos del Partido Acción CiudadanaEstatutos del Partido Acción Ciudadana
Estatutos del Partido Acción CiudadanaRebeca Bolaños C.
 
¡¡Ya vienen los Reyes Magos Calpe 2015!!
¡¡Ya vienen los Reyes Magos Calpe 2015!!¡¡Ya vienen los Reyes Magos Calpe 2015!!
¡¡Ya vienen los Reyes Magos Calpe 2015!!TurismoCalp
 
Cerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain Phenotype
Cerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain PhenotypeCerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain Phenotype
Cerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain PhenotypeMiguel E. Rentería, PhD
 
El solstice coupé. antonio horacio stiuso
El solstice coupé. antonio horacio stiusoEl solstice coupé. antonio horacio stiuso
El solstice coupé. antonio horacio stiusoAntonioCabrala
 
IPMARK sobre las I Jornadas de Publicitarios del S. XXI
IPMARK sobre las I Jornadas de Publicitarios del S. XXIIPMARK sobre las I Jornadas de Publicitarios del S. XXI
IPMARK sobre las I Jornadas de Publicitarios del S. XXIAlvaro Quesada
 
Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexualesdaniguzman
 
Apresentando o OpenStreetMap no FISL
Apresentando o OpenStreetMap no FISLApresentando o OpenStreetMap no FISL
Apresentando o OpenStreetMap no FISLArlindo Pereira
 
Guión literario de proyectos creativos con tics
Guión literario de proyectos creativos con ticsGuión literario de proyectos creativos con tics
Guión literario de proyectos creativos con ticsSilvina Lemos
 
SPARQL in the Semantic Web
SPARQL in the Semantic WebSPARQL in the Semantic Web
SPARQL in the Semantic WebJan Beeck
 
Leukemic stem cells
Leukemic stem cellsLeukemic stem cells
Leukemic stem cellsmds-web
 

Viewers also liked (20)

Better Builder Issue 3
Better Builder Issue 3Better Builder Issue 3
Better Builder Issue 3
 
OSGi Mobile eclipsecon 09
OSGi Mobile eclipsecon 09OSGi Mobile eclipsecon 09
OSGi Mobile eclipsecon 09
 
5 Red Flags You've Outgrown you Learning Solution
5 Red Flags You've Outgrown you Learning Solution5 Red Flags You've Outgrown you Learning Solution
5 Red Flags You've Outgrown you Learning Solution
 
Equipo 2 nicte ha eduardo valdemar, nestor, arturo 137 a
Equipo 2  nicte ha eduardo valdemar, nestor, arturo 137 aEquipo 2  nicte ha eduardo valdemar, nestor, arturo 137 a
Equipo 2 nicte ha eduardo valdemar, nestor, arturo 137 a
 
Historia universal
Historia universalHistoria universal
Historia universal
 
Global & local oxygen control in in vitro systems
Global & local oxygen control in in vitro systemsGlobal & local oxygen control in in vitro systems
Global & local oxygen control in in vitro systems
 
The Progress Index
The Progress IndexThe Progress Index
The Progress Index
 
Nov03 agenda
Nov03 agendaNov03 agenda
Nov03 agenda
 
Revista virtual
Revista virtualRevista virtual
Revista virtual
 
Estatutos del Partido Acción Ciudadana
Estatutos del Partido Acción CiudadanaEstatutos del Partido Acción Ciudadana
Estatutos del Partido Acción Ciudadana
 
¡¡Ya vienen los Reyes Magos Calpe 2015!!
¡¡Ya vienen los Reyes Magos Calpe 2015!!¡¡Ya vienen los Reyes Magos Calpe 2015!!
¡¡Ya vienen los Reyes Magos Calpe 2015!!
 
Cerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain Phenotype
Cerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain PhenotypeCerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain Phenotype
Cerebral Asymmetry: A Quantitative, Multifactorial and Plastic Brain Phenotype
 
El solstice coupé. antonio horacio stiuso
El solstice coupé. antonio horacio stiusoEl solstice coupé. antonio horacio stiuso
El solstice coupé. antonio horacio stiuso
 
IPMARK sobre las I Jornadas de Publicitarios del S. XXI
IPMARK sobre las I Jornadas de Publicitarios del S. XXIIPMARK sobre las I Jornadas de Publicitarios del S. XXI
IPMARK sobre las I Jornadas de Publicitarios del S. XXI
 
Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexuales
 
Apresentando o OpenStreetMap no FISL
Apresentando o OpenStreetMap no FISLApresentando o OpenStreetMap no FISL
Apresentando o OpenStreetMap no FISL
 
Guión literario de proyectos creativos con tics
Guión literario de proyectos creativos con ticsGuión literario de proyectos creativos con tics
Guión literario de proyectos creativos con tics
 
SPARQL in the Semantic Web
SPARQL in the Semantic WebSPARQL in the Semantic Web
SPARQL in the Semantic Web
 
IO SATURNALIA
 IO SATURNALIA IO SATURNALIA
IO SATURNALIA
 
Leukemic stem cells
Leukemic stem cellsLeukemic stem cells
Leukemic stem cells
 

Similar to Automating Demand Draft Machine

Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdfNEERAJRAJPUT81
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdfSruthiMugle
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital BankingAbinayaS31
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Banking application & software solutions at competitive rate
Banking application & software solutions at competitive rateBanking application & software solutions at competitive rate
Banking application & software solutions at competitive rateAaron Jacobson
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET Journal
 
Software for atm manufacturer
Software for atm manufacturerSoftware for atm manufacturer
Software for atm manufacturerhandryjames
 
Secure Real Time Embedded System For ATM Using Web Server
Secure Real Time Embedded System For ATM Using Web ServerSecure Real Time Embedded System For ATM Using Web Server
Secure Real Time Embedded System For ATM Using Web Serverijcite
 
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...IRJET Journal
 
IRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport BusIRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport BusIRJET Journal
 
IRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing SystemIRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing SystemIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 

Similar to Automating Demand Draft Machine (20)

Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdf
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
E banking
E   bankingE   banking
E banking
 
Atm
AtmAtm
Atm
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital Banking
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Atm project
Atm projectAtm project
Atm project
 
Black book converted
Black book convertedBlack book converted
Black book converted
 
Black book converted
Black book convertedBlack book converted
Black book converted
 
Banking application & software solutions at competitive rate
Banking application & software solutions at competitive rateBanking application & software solutions at competitive rate
Banking application & software solutions at competitive rate
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
 
Software for atm manufacturer
Software for atm manufacturerSoftware for atm manufacturer
Software for atm manufacturer
 
Secure Real Time Embedded System For ATM Using Web Server
Secure Real Time Embedded System For ATM Using Web ServerSecure Real Time Embedded System For ATM Using Web Server
Secure Real Time Embedded System For ATM Using Web Server
 
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
 
IRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport BusIRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
 
IRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing SystemIRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing System
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 

More from Mphasis

Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation SystemMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagraMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 

More from Mphasis (20)

SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automation
AutomationAutomation
Automation
 
IoT
IoTIoT
IoT
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
IoT
IoTIoT
IoT
 
SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
Io t 22
Io t 22Io t 22
Io t 22
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
IoT
IoTIoT
IoT
 
Automation
AutomationAutomation
Automation
 

Recently uploaded

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 

Recently uploaded (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 

Automating Demand Draft Machine

  • 1. Name: M.Pragash E-mail: pragashvenkat@gmail.com Twitter Id: pragashvenkat@gmail.com University: Pondicherry University Year/Semester: IInd / IVsem Branch: Information Technology E-DD
  • 2. Introduction  In this modern running world, we don’t have time to stand in the same place for a long time.  For the present world everything has become fast. Yes, it has become automated. Each and everyday we depend on a automated machine to make our work easier.  Here is an idea of an automated system which is not present and also helpful to the people running fast.  This app is based on AUTOMATION  Reduces the human power.  Saves time.  Faster and easier.
  • 3. Terms and techniques Machine - Machines have become our day to day uses. From the morning till evening we spend our time mostly with machines. In this aspect this is an useful automated machine used to generate the DD(Demand Draft) for the end-user automatically. Bank Account - Bank account of the person is used to transfer money for the amount of DD to be generated. ATM card– ATM card is used to access the account of the user for money transfer and also for security purpose so as to be safe and secure.
  • 4. DESCRIPTION  When a person is about to generate a DD in a bank he has to stand in a queue for token for the first time and then to the counter queue to get the Demand Draft.  He can use this automated machine to generate the DD automatically with Direct interaction.  He should use his ATM card to access to his account for money transfer. The end-user gives the amount and the name to whom the DD has to be generated after logging in using his ATM card.  A flow chart of the application is shown on the next slide.
  • 5. Machine in which the user access through ATM card The DD generated is given to the end-user. The amount and the name to whom DD is generated is entered This DD Generator helps the end-users to complete their work quick and run fast along with the fast running world. The image of the DD generator is shown in the next slide. THEFLOWCHARTOF THE DDGenerator
  • 6.
  • 7. Components and contents USED Touch – The most commonly used in the developing automated machines and systems. Here touch is used as a keyboard. LAN - Local area network is used to transfer the data to the third party about the usage of the ATM card for transferring money to generate DD. DD form – Demand Drafts are loaded into the machine manually for generation at each transaction by the end user. Printer - Printer for generating Demand Draft(DD) and also e-statement due to the use of ATM card.
  • 8. Interest Areas My most priorities of interest goes on two major domains namely  Banking  Big Data It would be a immense pleasure of joining my dream company Mphasis located at Pune, Bangalore, Chennai etc., I would like to join this intern to learn many things from the desire place and would like to give my full effort in my career contribution the Company.