This document provides an overview of an ATM database system project. It introduces the objectives of creating a centralized system to allow customers to fulfill queries efficiently and reduce employee workload. It describes functions like account opening, modification, deposit, withdrawal, and status checking. Hardware requirements include a Pentium processor, 1GB RAM, and 80GB storage. The system was designed using Java for the front-end and Microsoft SQL Server for the back-end database. Architectural design defined the basic functions, inputs, outputs, and dependencies, while detailed design subdivided functions into modules with specified behaviors.
The ‘Multi Banking System’ Interface is targeted to the future banking solution for the users who have multiple bank accounts in different banks. This interface integrates all existing banks and provides business solutions for both retail and corporate. System Involves
• This interface integrates all existing banks and provides business solutions for both retailers and corporate.
• This system acts as a standard interface between the clients and the banks
• Users who have accounts in various banks can log in here and can make any kind of transactions.
• In the backend, the system will take care of the entire obligation required in order to carry on transaction smoothly.
The Multi Banking System Interface is targeted to the future banking solution for the users who are having multiple bank accounts in multiple banks. This interface integrates all existing banks and provides business solutions for both retail and corporate. This system acts as a standard interface between the clients and all the banks, By using this portal any client who maintains accounts in various banks can directly log on to Multi Banking System Interface and make any kind of transactions. In the backend, the system will take care of the entire obligation required in order to carry on transaction smoothly.
Explain Hardware and Software technologies used in your project work.
Define the objective and motivation of your mini-project Work in reference to your Project Title.
Present and Explain DFDs of Project (DFD-0, DFD-1, DFD-2 …).
Present and Explain ER Diagram of Project.
Explain Front-End or User Interfaces (One by One) with Purpose and working.
Explain Back-End or Database Tables used in your project.
Explain Usability or Ultimate output of your project work.
Explain the Drawback or limitations of your project work.
Explain how this work can be carried out in future for improvement.
The ‘Multi Banking System’ Interface is targeted to the future banking solution for the users who have multiple bank accounts in different banks. This interface integrates all existing banks and provides business solutions for both retail and corporate. System Involves
• This interface integrates all existing banks and provides business solutions for both retailers and corporate.
• This system acts as a standard interface between the clients and the banks
• Users who have accounts in various banks can log in here and can make any kind of transactions.
• In the backend, the system will take care of the entire obligation required in order to carry on transaction smoothly.
The Multi Banking System Interface is targeted to the future banking solution for the users who are having multiple bank accounts in multiple banks. This interface integrates all existing banks and provides business solutions for both retail and corporate. This system acts as a standard interface between the clients and all the banks, By using this portal any client who maintains accounts in various banks can directly log on to Multi Banking System Interface and make any kind of transactions. In the backend, the system will take care of the entire obligation required in order to carry on transaction smoothly.
Explain Hardware and Software technologies used in your project work.
Define the objective and motivation of your mini-project Work in reference to your Project Title.
Present and Explain DFDs of Project (DFD-0, DFD-1, DFD-2 …).
Present and Explain ER Diagram of Project.
Explain Front-End or User Interfaces (One by One) with Purpose and working.
Explain Back-End or Database Tables used in your project.
Explain Usability or Ultimate output of your project work.
Explain the Drawback or limitations of your project work.
Explain how this work can be carried out in future for improvement.
A computer based management system is designed to handle all the primary information required to calculate monthly statements of customer account which include monthly statement of any month. Separate database is maintained to handle all the details required for the correct statement calculation and generation.
This project intends to introduce more user friendliness in the various activities such as record updation, maintenance, and searching. The searching of record has been made quite simple as all the details of the customer can be obtained by simply keying in the identification or account number of that customer. Similarly, record maintenance and updation can also be accomplished by using the account number with all the details being automatically generated. These details are also being promptly automatically updated in the master file thus keeping the record absolutely up-to-date.
The project title is “Multi Banking System” the system interface is targeted to the future banking solution for the
users who is having multiple bank accounts in multiple banks. This interface integrates all existing banks and provides
business solutions for both retail and corporate. Multi-bank system is an innovative .Net web application. The main focus of
the application is maintaining multiple bank accounts a user has. A person can have bank account in any number of banks.
But it’s hard to remember every bank logins. So we have developed a web application where a person can handle all his bank
accounts in a secure manner.
A Software Engineering Project on Cyber cafe managementsvrohith 9
Cyber Café Management is a complete package developed for management of systems in a cyber café. This project is intended to be used in a Cyber Café. All cyber cafes have some basic needs likeable to control the systems that are being rented to the customers and are charged on timely basis.
The present project presented in:-
1. Use case diagram
2. Sequence diagram
3. Activity diagram
4. Class diagram
A Banking Management system is an application that gives functionality like sending money, bill payment, taking a loan, check balance, see all transaction history and many more.
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docxjoellemurphey
RISK REPORTING SYSTEM IN IT ORGANIZATIONS
CPT PAPER
Name: Vinod Kumar Donthagani
Institution: University Of The Cumberlands
Fall - 2015
INDEX
Title
Page No:
1. Company
3
2. Job Description
3
3. Project Description
4
4. Job tasks in Detail
6
5. Tools and Technologies
7
6. Learnings during Internship
8
7. Applying coursework to Internship
8
8. Challenges faced during Internship
8
9. Activities provided by company
9
10. Conclusion
10
11. References
111. COMPANY
Agnosco Technolgies, a diverse communications and technology company providing top-class business consulting, information technology and communication services.
We are powered by a pool of talented IT and consulting professionals across SAP enterprise solutions, supply chain management, financials and controlling, client relationship management, business analytics, enterprise reporting , HR and human capital management, enterprise security and administration and web development amongst other capabilities.
2. JOB DESCRIPTION
I am part of team that works on application named “Risk Reporting System” for a leading banking domain client. My role in the team was to analyze the new change requests and enhancements of current application requested by client and complete the tasks accordingly. I need to update the changes and report to my manager about the status and take care that changes has met the client’s requirements.
My secondary goal was to test the application. As a part of testing process, I have to do primary tests for validations of the User Interface pages, perform unit testing on individual class files using Junit test cases, perform manual testing and write individual test cases for manual testing. I need to make sure that test cases need to be passed and application is 100% as per the expectations with the clients. If any bugs reported needs to be taken to the notice of development team and correct them with in the deadlines and repeat the testing process. I need to make sure to follow this process until the application module is perfect.
My responsibilities in brief are:
1. Setup the computer with required soft wares needed for the project
2. Raise various access requests for shared drives, servers etc. and follow up with respective department employees to grant them.
3. Organize and analyze the requirements collected from clients and document them appropriately
4. Develop the requirements in Java and spring framework as per the clients expectations
5. Adding new features and correcting existing features as per the client’s requirements.
6. Writing sql queries for backend operations to retrieve data from database
7. Maintain database backup for every end of the day for safe recovery purpose
8. Have to provide all the change requests documents to the supervisor on weekly basis and get them reviewed.
9. Write test cases for the application modules after development of each module
10. Perform manual testing for validations of UI pages
11. Perform unit testing of ind ...
A computer based management system is designed to handle all the primary information required to calculate monthly statements of customer account which include monthly statement of any month. Separate database is maintained to handle all the details required for the correct statement calculation and generation.
This project intends to introduce more user friendliness in the various activities such as record updation, maintenance, and searching. The searching of record has been made quite simple as all the details of the customer can be obtained by simply keying in the identification or account number of that customer. Similarly, record maintenance and updation can also be accomplished by using the account number with all the details being automatically generated. These details are also being promptly automatically updated in the master file thus keeping the record absolutely up-to-date.
The project title is “Multi Banking System” the system interface is targeted to the future banking solution for the
users who is having multiple bank accounts in multiple banks. This interface integrates all existing banks and provides
business solutions for both retail and corporate. Multi-bank system is an innovative .Net web application. The main focus of
the application is maintaining multiple bank accounts a user has. A person can have bank account in any number of banks.
But it’s hard to remember every bank logins. So we have developed a web application where a person can handle all his bank
accounts in a secure manner.
A Software Engineering Project on Cyber cafe managementsvrohith 9
Cyber Café Management is a complete package developed for management of systems in a cyber café. This project is intended to be used in a Cyber Café. All cyber cafes have some basic needs likeable to control the systems that are being rented to the customers and are charged on timely basis.
The present project presented in:-
1. Use case diagram
2. Sequence diagram
3. Activity diagram
4. Class diagram
A Banking Management system is an application that gives functionality like sending money, bill payment, taking a loan, check balance, see all transaction history and many more.
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docxjoellemurphey
RISK REPORTING SYSTEM IN IT ORGANIZATIONS
CPT PAPER
Name: Vinod Kumar Donthagani
Institution: University Of The Cumberlands
Fall - 2015
INDEX
Title
Page No:
1. Company
3
2. Job Description
3
3. Project Description
4
4. Job tasks in Detail
6
5. Tools and Technologies
7
6. Learnings during Internship
8
7. Applying coursework to Internship
8
8. Challenges faced during Internship
8
9. Activities provided by company
9
10. Conclusion
10
11. References
111. COMPANY
Agnosco Technolgies, a diverse communications and technology company providing top-class business consulting, information technology and communication services.
We are powered by a pool of talented IT and consulting professionals across SAP enterprise solutions, supply chain management, financials and controlling, client relationship management, business analytics, enterprise reporting , HR and human capital management, enterprise security and administration and web development amongst other capabilities.
2. JOB DESCRIPTION
I am part of team that works on application named “Risk Reporting System” for a leading banking domain client. My role in the team was to analyze the new change requests and enhancements of current application requested by client and complete the tasks accordingly. I need to update the changes and report to my manager about the status and take care that changes has met the client’s requirements.
My secondary goal was to test the application. As a part of testing process, I have to do primary tests for validations of the User Interface pages, perform unit testing on individual class files using Junit test cases, perform manual testing and write individual test cases for manual testing. I need to make sure that test cases need to be passed and application is 100% as per the expectations with the clients. If any bugs reported needs to be taken to the notice of development team and correct them with in the deadlines and repeat the testing process. I need to make sure to follow this process until the application module is perfect.
My responsibilities in brief are:
1. Setup the computer with required soft wares needed for the project
2. Raise various access requests for shared drives, servers etc. and follow up with respective department employees to grant them.
3. Organize and analyze the requirements collected from clients and document them appropriately
4. Develop the requirements in Java and spring framework as per the clients expectations
5. Adding new features and correcting existing features as per the client’s requirements.
6. Writing sql queries for backend operations to retrieve data from database
7. Maintain database backup for every end of the day for safe recovery purpose
8. Have to provide all the change requests documents to the supervisor on weekly basis and get them reviewed.
9. Write test cases for the application modules after development of each module
10. Perform manual testing for validations of UI pages
11. Perform unit testing of ind ...
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2. INTRODUCTION
Introduction to the project
Objectives of the project
Scope of the project
Hardware and Software Requirements
Technology used
DESIGN
Design
System Design
Architecture Design
Detailed Design
Diagrams
SCREENSHOTS
CONCLUSION
Conclusion
Perspective Users
Limitations
CONTENTS
3. INTRODUCTION
An automated teller machine (ATM) is a computerized telecommunications device
that provides the customers of a financial institution with access to financial
transactions in a public space without the need for a human clerk or bank teller. On
most modern ATMs, the customer is identified by inserting a plastic ATM card with
a magnetic stripe or a plastic smartcard with a chip, that contains a unique card
number and some security information, such as an expiration date or CVC(CVV).
Security is provided by the customer entering a personal identification
number(PIN).
Using an ATM, customers can access their bank accounts in order to make cash
withdrawals (or credit card cash advances) and check their account balances as
well as purchasing mobile cell phone prepaid credit.
ATMs are known by various other names including automated banking machine,
money machine, bank machine, cash machine, hole-in-the-wall, cashpoint,
Bancomat (in various countries in Europe and Russia), Multibanco and Any Time
Money eased ATM usage is also helped by the fact that customers have now the
flexibility of using ATMs of other banks, as most of the banks are part of major
interbank networks like National Financial Switch (NFS), Milr, BANGS, Cashtree and
Cashnet. The interbank networks have brought together ATMs of several banks so
that consumers would gain access to any of the participating banks' ATMs.
4. Before making this application, we assumed that a fictitious bank which
had recently started its operations found it very difficult to handle their
customers.
It was due to their great customer service and efficient handling of daily
operations that they customer base started growing, and in a day, they
started to handle lot of customer requests.
When this happened, the bank authorities realized that the customer had
lot of different queries like Account opening, Account information,
Deposit, Withdrawal etc.
Slowly & slowly the count of such customers started to grow very rapidly
and the bank employees had to devote their maximum time in handling
such customers.
This resulted in large response times of the bank employees who found
themselves unable to give adequate time to other important customers
like NRIs.
1. Slowly, the bank started loosing its important or gold customers due to
poor response times by the bank employees and they even started
loosing those customers whose requests could not be fulfilled.
After this, the bank decided to install a centralized system that can help
its customers fulfill their queries efficiently and at the same time help the
bank undertake important tasks securely which can improve the response
times and can ease up the tasks of the employees who were already
overburdened with handling all the processes manually till date.
OBJECTIVE
5. Keeping the problem in mind, we have developed a solution which would
help the bank, achieve its overall objectives. The application can be securely
accessed by bank employees & the administrator who has got system-level
rights to access confidential information of the bank employees in the
database.
The administrator can perform the following tasks:
Account Opening: In this module, all the relevant personal information details
like Name, Address, Contact, PAN etc. of the prospective customer who wants
to open an account with the bank are entered.
Modification: In this function, an administrator can modify the details of a
customer like Name, Address etc. Before the details are modified, the
account-id of the customer is inputted which is cross-checked in the database
for correctness.
Kiosk status: In this application, we have assumed 3 kiosk / ATM machine
locations namely Vikas Puri, Dwarka & South Ex- II. Additionally, we have
assumed that all of these kiosks will have Rs. 25 lakh each in a day to serve
customer’s withdrawal requests efficiently.
Lock/Unlock Accounts: Through this functionality, administrator would be able
to lock or unlock a customer’s account. We have assumed that one condition
in which the customer’s account would be locked will be if he/she wrongly
inputs the pin no. for 3 instances while logging in. This is a special security
feature that has been implemented to encourage security.
SCOPE OF THE PROJECT
6. Close Accounts: An administrator can close a customer’s account upon bank’s
request only if the customer has not done any transaction for a long period,
say 1 year. It is assumed that when a customer does not make any transaction
for a long period, his account becomes dormant and reminder letters are
being given to that customer by the bank regarding conversion of his/her
account to dormant. If the customer still does not respond to the reminders,
his/her id finally closed.
Deposit: We have assumed that the customers can make deposit requests
through cheques wherein they can deposit their cheques through inputting all
the necessary & important details like cheque no, cheque date & cheque
amount in the application. The application will not accept post-dated cheques
and the customer will be duly notified about same.
Withdrawal: Under this function, the customer can withdraw amount from his
account. His present balance is being shown before the withdrawal. After the
withdrawal, revised balance is being shown. It is assumed that in any day, a
customer is not allowed to withdraw more that Rs. 50,000/-.
Account Status: Through this feature, the customer can have complete details
regarding his present account balance and the last deposit & withdrawal
transaction being done with all the details.
7. HARDWARE & SOFTWARE
REQUIREMENTS
Hardware:
Intel Pentium D Processor with 3.00 GHz CPU
clock speed
01 GB of RAM
80 GB of Hard Disk space
Software:
Microsoft Windows XP Professional (Service pack 2)
Java 6 Update 12 (JDK1.6)
8. • FRONT END :-
Java:
Java is a general-purpose, Object Oriented programming language. Its syntax is very much
similar to C & C++, but it omits features that make C & C++ complex, confusing and
insecure. Java was initially developed to address the problems of built in software for
small-distributed systems to embed in consumer devices.
• Back End:-
Microsoft SQL Server :-
Microsoft SQL Server is a relational database management system(RDBMS) produced
by Microsoft. Its primary query languages are MS-SQL and T-SQL. Protocol layer
implements the external interface to SQL Server. All operations that can be invoked on
SQL Server are communicated to it via a Microsoft-defined format, called Tabular DatA
Stream (TDS).
TECHNOLOGY USED
9. We performed the analysis in 02 parts i.e. Feasibility Analysis & Requirements
Analysis.
Feasibility Analysis:
We studied the whole system & its objectives. Calculated the total time & resources
incurred on every function being done manually.
Bifurcated the complete system into a list of functions & the users who operate on
them.
Further subdivided all the functions into a list or source of requirements/inputs &
clearly defined the output/expectation from each function.
The interaction, communication & dependency of all the functions between each
other were carefully analyzed in terms of sequence & information.
System Design
10. The source & flow of the information was determined & how would it be processed &
used was considered.
Finally, we visualized the complete system with automated functions & compared the
total time & resources being incurred to check the feasibility & see whether it is fulfilling
all the necessary objectives.
Requirement Analysis:
This was a subset of feasibility analysis in which we defined a set of objectives for the
complete system after thoroughly analyzing it.
All the objectives were further subdivided into a set of function(s).
The input(s) required by each function & the expected output(s)/behavior was/were
clearly defined.
The source of information/input to every function was determined & its corresponding
processing, usage & storage were also taken into account.
After this the interdependency & communication was finalized.
11. Under architectural design, after defining the whole system into a set of objectives &
further subdividing them into functions, we defined the basic dependency &
communication between them.
This means that all the prime functions, their required inputs, expected
output/behavior & interdependency between other functions were clearly defined.
The corresponding interfaces for the user for each function were designed to ensure
user-friendliness.
We actually addressed the system-level problems here and made a conscious effort
to build a robust design which can result in an effective communication within itself
and with the system in terms of raw data or processed information.
• All the primary database design for data storage was also done in this phase.
Architectural Design
13. In this phase, we further subdivided every function into a set of modules & defined
required inputs & expected behavior for each of them. All the minute correlations,
interdependencies, communication between the modules were clearly defined. The
source, usage & processing of data for every module was carefully done. The database
design was also normalized at this stage to ensure that the data is efficiently stored &
retrieved.
Detailed design helped us to exactly concretize every problem into inputs & outputs and
visualize them in terms of their communication with each other. We focused on
interdependency & interoperability between the broken modules here.
It was this design phase where the factors like user-friendliness ease of use, scalability and
self-explanation of interfaces & outputs were actually realized. For all the modules, the
placement of controls, passing of information, communication of different interfaces, user
messages, data transfer to databases was defined.
Detailed Design
14. DFD DIAGRAMS
A data-flow diagram (DFD) is a graphical representation of the "flow" of data
through a information system. DFDs can also be used for the visualization of
data processing
On a DFD, data items flow from an external data source or an internal data
store to an internal data store or an external data sink, via an internal process.
shown
16. • In this diagram, overall control is with administrator when we login as an administrator.
An administrator can create a new account by providing a user ID and password, where a
new customer and his all the details are acting as an input to the machine. Kiosk status
fills the ATM machine which the desired amount that should present in the machine.
Administrator can close a user account if he/she wants to do that.
• Now user can make transaction from the ATM machine in the form of withdraw and
deposit and check his account.
18. Logging in as administrator, an administrator can add a new customer in which he
enters his personal details he can create current or saving account. User can
modify his details. He can temporary lock his account.
Administrator can check the kiosk status of the accounts of the customer and if
the balance in the machine is not enough than the administrator can fill up the
machine with the desired amount now if and user wants to closes account than he
can requested that administrator to do that and his account permanently.
20. • In this DFD, user can make transaction in the form of withdrawal and deposit.
This two boxes acts as an input that the user enters. A user can add money to
his previous account and can withdraw money from his existing account. He
can then check his account status which acts as output to the user.
27. CONCLUSION
• The project development has been an enriching experience. Its technological
components challenged us to use most current tools and techniques of Java.
Developing a live system is a work of high responsibility and is not as simple
as it finally appears to client who is going to use it. It not only requires in
depth study of the system already used but also understanding of the
problem analysis and design issues.
28. Perspective Users
It is used by customers in payment of the bills, tax debates, money transfer,
sales of products and recharge of mobile bills.
Bank employees use ATM to transfer their transaction made at their branch
to the main branch of the Bank.
It is used in the financial sector regarding the credit card information.
It is used in the different parts of the world to carry out the work related to
money.
• Providing customers with all the money transactions & debits in a convenient
way.
29. Researchers who work for an Israeli computer security company say they have
discovered a fundamental weakness in the system that banks use to keep debit card PIN
codes secret while they are transported across bank networks - a flaw that they say
could undermine the entire debit card system Accordingly its limitations include three
types of feasibility:-
• Economic Feasibility: Economic analysis includes the use or rather n some sense misuse
of the ATM machines in foreign countries. it can be misuse in any part of the world. the
money can be used by some unauthorized agency for their brutal purpose. again here
the verification of the PIN no. plays a very important role. ln the financial sector this is
regarded as the PIN cracking.
• Technical Feasibility: Technical feasibility includes the proper functioning of atm database
system when it comes to the remembering of the PIN no. Many cardholders walk up to
an ATM and pull out a piece of paper containing four numbers. If you are not sure, make
it a point that you don't keep the PIN and ATM card together in your wallet - If someone
comes up and hits you over the head, they're going to have all your information right
there. But ideally, one should never write down the PIN number - it should be
memorized.
• Social Feasibility: Illiterate People cant handle the functioning of ATM. So to teach them
the use instructions are also provided regarding its transactions & debits, transfer of
money to people at any part of the world
Limitation And Constraints of project
We have developed a solution which will help the bank achieve its objectives. The bank employees and the administrator who has the system level rights can access the information regarding bank employees in the database.
All relevant information like name, address, contract, pan of the prospective customers who want to open an account with the bank are entered.
In this we can modify all the details of the customer and before making changes we check the correctness of customer id.
We want to install Atm machines at 3 new locations i.e. Vikas Puri, Dwarka & south ex-2. we have assumed that all of these machines will have Rs. 25 lakh each in a day to serve customer’s withdrawal requests efficiently.
In this case the administrator can even lock/unlock the account if the pin has been wrongly entered for 3 times.
5) If no transaction has been done for 1 yr then the account becomes inoperative, in such a case the bank will post letter to that customer informing that customer that his/her account has become inoperative and after that if the customer still does not reply then the account is closed.
6) We have assumed that the amount can be deposited through cheques by entering all important details like cheque no, date and amount in the application.
7) The customer can even withdraw amount from his account this application can even show present balance before withdrawal and revised balance after withdrawal the maximum limit for withdrawal can be Rs 50,000 per day.
8) In this feature, the customer can get to know the details regarding his present account balance and last deposit & withdrawal transaction done with all details.