You are on page 1of 59

A

Project Report (2021 –2022)

S U B M I TT E D F O R
PGDCA
PROJECT 2021-2022

APSU, REWA (M.P.)

GUIDED BY SUBMITED BY
Mr. DHEERAJ SHUKLA SEEMA SINGH

MAHATMA GANDHI COLLEGE SATNA (M.P)


CERTIFICATE

This is to certify that SEEMA SINGH has completed his


Project work for during the academic year 2021-2022
in the partial fulfillment of the award of PGDCA 1ST
SEMESTER.

Internal Examiner External Examiner

MAHATMA GANDHI COLLEGE, SATNA (M.P.)


CERTIFICATE

This is to certify that SEEMA SINGH has completed his Minor

Project work for during the academic year 2021-2022 in the

partial fulfillment of the award of PGDCA 1ST SEMESTER.

HOD Principal
(Mr. SATENDRA GAUTAM) (Mr. S. R. AHIRVAR)
MAHATMA GANDHI COLLEGE, SATNA (M.P.)

SELF CERTIFICATE

This is to certify that the project report entitled “ BANK

INFORMATION” is done by me is an authentic work carried out for

the partial fulfillment of the requirements for the award of the degree

of PGDCA under the guidance of Mr. DHEERAJ SHUKLA. The


matter embodied in this project work has not been submitted earlier

for award of any degree to the best of my knowledge and belief.

Signature of the student

Seema singh

Roll No………………
MAHATMA GANDHI COLLEGE, SATNA (M.P.)
INTRODUCTION

Banking information , also known as  information, is an electronic payment


system that enables customers of a bank or other financial institution to
conduct a range of financial transactions through the financial institution's
website. The online banking system will typically connect to or be part of
the core banking system operated by a bank and is in contrast to branch
banking which was the traditional way customers accessed banking
services.Some banks operate as a "direct bank" (or “virtual bank”), where they
rely completely on interBank information. InterBank information software
provides personal and corporate banking services offering features such as
viewing account balances, obtaining statements, checking recent transaction
and making payments.

It is application s/w of “SBI BANK“ this s/w is user friendly which is made in
java there are database files which is created in ms access environment .All the
Bank Management based on we are made on this project .this projects provided
the facility of the Staff ,Customer , Fees and Course record with help of this
project .any user access the accurate fees information of customer . User faced
various problems and difficulty in manually maintenance and also find many
changes of mistake in the handling of register.

This project facilitate the simply adding ,editing and deleting and displaying the
records or report in various manner for the Bank and their reports .this project
mainly based on customer fees calculation and report of the customer and
staff.There are many problems which are face by the user/teachers at the time
of fees calculations and keeping all sorts of record related to Bank record
manually .there might be many mistakes during calculating monthly feeses.
And the process is also very slow . by the help of this project only one computer
operator create the customer, staff and fees and all the related records without
any problems .The one operator worked as a 6 employee personal . The very
useful of display and print the record of customer, staff and fees successfully .
Computer become versatile enough perform job of various nature computer is
able to store volume data. Manipulate it and provide accurate and efficient
information. Now a range of computer is available with different capability and
specialty, which are made to suit different users.

Whenever a new project is taken or new application program is


developed it has certain objective may very form system. The main objective of
our software is to provide the information to customer. The main objective of
the software follows: -

1. Provide better service.


2. To make working efficient, fast and effective.
3. To easily query details.
4. To get error free work.
SYSTEM DESIGN

Design Goals:-
The system design lies at the heart of the system development
cycle. System design specific exactly how the objective set during the system
analysis phase laid the foundation of the development of the end product.

Before developing the new system it is important to establish the design


goals, these are the standards that the developers follow during the entire
process of development so that the end product fulfills the requirements of the
user.
The developed software product must be able to fulfill the required
functional and performance test performed in the testing stage such as
exercise of code with minimal input values, execution time, response time etc.
in all combinations. The system must fulfill the criteria specified in the
functional requirements and performance requirements. Output of system
should meet the required standards of reliability, efficiency and correctness.
If the new system meets these specifications, then the application
are fit to be distributed for installation else it must be probed again and
redesigned in such a manner that it lends itself to any modification that might
be needed in due course of use.
The software must satisfy the de facto of good software, some of which are

User Friendly
The software should be user friendly so that user can easily
understand the controls without any particular guidance by the developers of
the application. The FAS system was designed keeping this requirement in
mind and the final User Interface was quite user friendly and all complexity
will be hidden from the user.

Integrity
The results of the system were very crucial as they represented
the data, which would affect quite a lot no of people and financial part needs
accuracy. So special emphasis was given to the accuracy and consistency of the
system.

Modularity
As the system was quite large so the system was designed in such
a way so that the entire software was divided into several modules,
which made the system more maintainable and easy to develop.

PROCESS AND STAGE OF SYSTEM DESIGN


The design phase focuses on the detail implementation of the System
recommended in the feasibility study. Emphasis is on translating from a
user-oriented document to a document oriented to the Programmers or
database personal .

LOGICAL & PHYSICAL DESIGN


System design goes through two phases of development .
Logical and physical design . A data flow diagram shows the
logical flow of the system and defines the boundaries of the system
for a candidate system , it describes input (source) .

FROM DESIGN
The data in the forms carry information that comes from the
people and the informational output of the system goes to the people ,
the physical carriers of the data of information . It can constitute
authority for action . It provides information for making decision and
improving operations .
REQUIRE OF FORM DESIGN
1. Identification and working .
2. Physical factors .
3. Order of data items .
4. Ease of data items .
5. Size of arrangement.
6. Use of instruction.
7. Efficiency consideration.

FILE ORGANISATION & DATABASE DESIGN


After designing the input and output , the designer begins to concentrate
on file design or how data should be organized around the
requirements . How data are organized depends on the data and
response requirement that determine hardware and configurations . File
organization may be sequential, indexed , inverted list of random . An
integrated approach to the file design is the database . The general theme
is to handle the information as an integrated whole with minimum
redundancy and improve performance .

INPUT/OUTPUT & FORM DESIGN

INPUT DESIGN
Inaccurate input data are the most common cause of error
in data processing . Error entered by the data entry operation can
be control by the input design .Input design is the processing of
converting user-oriented inputs to computer base format .

OUTPUT DESIGN
Computer outputs are most important and direct
sources of information to user . Efficient , intelligible output design
improves the system relation with the user help in decision-
making. A major from output is a hard copy from the printer.
Printout should be design around the output requirement of the user .

The design covers the following :-

1. Reviews the current physical system-its data flows, file content ,


volumes , frequencies .

2. Prepare out specification-That is determine the format, content and


frequency of report including terminal specification and location .

3. Prepare input specification-Format , content and most of the input


function . This includes determining the flow of document from the input
stores to the actual input locations.

4. Preparing edit and security & control specification-This specifying


the rules for edit , correction , back procedure and the controls that
ensure processing and file integrity .

5. Specifies the implementation plan .

6. Prepare a logical design , walkthrough of implementation flow , out


input controls and implementation plan .

7. Reviews benefits , cost , target dates and system constraints

SECURITY OF THE SYSTEM

PHYSICAL SECURITY :
The breakdown in electronic computers can be in circuits or
chips ,capacitors , transistors etc . Failures in these components occur
due to power supply problems aging. Performance of a computer
system is influenced by excessive temperature , high humidity , dust
build-up , noise Interference & magnetic fields .

Therefore we recommend the management to follow some tips as :


1.There should be appropriate electrical environment.

2. There should be controlled temperature.

3. Have a power line conditioner feeding the computer system


.

OPERATING SYSTEM LEVEL SECURITY:

Windows XP is the current operating system on the user


side .Oracle as a backend also ensures operating system security so
that when some more recent version of windows or on increase of
transaction if the user shifts to even Unix also the backend need not
to be changed .

DATABASE SECURITY:

Client has been given the facility of backup and restoring of


database so that at the end of each day after taking the various day to
day reports a backup is taken and during any loss of data can be
restored by the client itself .

APPLICATION SECURITY:
The current GUI (Graphical User Interface) application developed
is Java enables the user to work as friendly as in windows
environment. Application security is taken care by installing all the
respective dynamic link libraries into windows system folder ,which is
again hidden from end user .These all are taken care internally by
visual studio tool of package and development tool.

The security measures that are being given to the Client are listed below:

1. Valid User (Unauthorized access): The person who


knows in and out of the system will only be authorized to
make data entry.

2. Proper atmosphere: An environment completely


isolated from other departments is given .A separate
IT infrastructure is developed on the client side.

SOFTWARE ENGINEERING PARADIGM

For creating our project we use “Linear sequential paradigm”


also called Waterfall model or Classic life cycle model. This model
suggests a systematic sequential approach to software development
that begins at the system level and progress through analysis, design,
coding, testing and support. For developing our project we use all
these approaches sequentially.

System/Information Engineering:

System engineering and analysis contains requirement


gathering at the system level such as h/w configuration and the h/w
requirement for the s/w development. In this stage we establish
requirements for the s/w.

TESTING & DEBUGGING

“ Testing is the process of finding errors from a program,


rather than extracting them.”

Most error are the result of incorrect control functions in programs


rather then incorrect computation or data manipulation . Errors due to
incorrect data manipulation are usually easiest to delete and correct. The
formers often go undetected and remain in programs after they have been
approved to run in production environment. Control functions are those which
regulate the sequence in which tasks are performed, the number of times
a loop is executed, etc.
Program testing is a continuous procedure. Testing can be done in
following steps ;

ERROR FAULT & RELIABILITY:


Once the algorithm has been expressed in pseudo-code, it is subjected to
desk check . This is a process which should be applied to each procedure
within a program and involves selecting sample value of test data for input to
the procedure and processing them precisely as directed by the program
coding to determine whether or not they will produce a correct result .
We have checked this S/W using both “simulate” and “live” data . Each
algorithm now produces exactly the O/P , what we want ?

FUNCTIONAL TESTING :
After checking the algorithm’s validity or correctness, the next stage
of testing occurs when the coding has been freed from syntax
errors . Functional testing is referred to check the functions of
procedures procedure-by-procedure .
We check each procedure/module for its functionality and reliability .
Many logical error were found in different modules, then they are
corrected for their proper function .
Some programs may require to perform calculations on the basic of
data or input given by the user . This calculation has been tested to
give accurate results to the user .

STRUCTURAL TESTING :
Structural testing means testing of programs in structure. This
testing refers to the testing of cohesion and coupling of different
program modules. It also checks whether a program modules
produces correct output when it receives data from another module.
For best result degree of cohesion must be high and degree of
coupling must below. In this S/W there are a number of programs with
voluminous modules. We check each programs with different set of test
data and corrected mistakes as desired

IMPLEMENTATION
Introduction is the process of the having systems personnel check out the
and put new equipment into use, trained users, installed the new application
and construct any files of data needed to use it. This phase is less creative than
system design. Depending on the size of the organization that will be involved in
using the application and risk involved in its use, system developers may chose
to test the operation in only one area of the firm with only one or two person.

There are three types of implementation:

Implementation of a computer system to replace a manual system.

Implementation of a new computer system to replace an existing


one.

Implementation of a modified application to replace an existing one,


using the same computer.

In my perspective implementation is the process of converting a new system


design into an operational one. Conversion is one aspect of implementation, the
other aspects are post implementation review and software maintenance.

DOCUMENTATION
Documentation is a process that will be used for developing and maintaining
documentation for installing and maintaining products developed in the system
life cycle. Documentation typically includes training material, user document,
user manual, and operations manual and relies document. The documentation
will be reviewed and approved by concerned user of the documentation.

The purpose of documentation process is to develop and maintain the


documentation that will be used to install and operate the product. This process
also ensures that the documentation developed is synchronized with latest
product releases.
Our product document typically consist of the following:

Deliverables (file name, size etc): It includes the codes.


Test summary report.

MAINTENANCE

The maintenance of existing software can account over 30 percent of all


effort expended by a development organization, and the percentage continues
to rise of more software is produced.

Uninitiated readers may ask why so much maintenance is required and


why so much effort is expended. Much of the software we depend on today is on
average 10 to 15 years old. Even when these programs ware created using the
best design and coding techniques known at the time and most were not, they
were created when program size and storage space were principle concerns.
They were then migrated to new platforms, adjusted for changes in machine
and operating system technology and enhanced to meet new user needs all
without enough regard to overall architecture.

The ubiquitous nature of change underlines all software work. Change is


inevitable when computer-based system are built.

Software maintenance is, of course, for more then “fixing mistakes.” We may
defined maintenance by describing four activities that are undertaken after a
program is released for use. There are four different maintenance activities:
collective maintenance, adoptive maintenance, perfectly maintenance or
enhancement maintenance, and preventive maintenance or
reengineering. Only about 20 percent of all maintenance work is spent “fixed
mistake”. The remaining 80 percent is spent adapting existing systems to
changes in their external environment, making enhance required by users, and
reengineering an application for future use.
Chapter 1

Introduction

 Purpose of project

 Project of objective
Purpose of project:--
The usage of e banking by the enterprises came into existence in mid 90’s.e
banking came into existence in greater numbers because of low operating costs.
First it is in the form of ATM’s and phone transactions. Recently it transformed
to internet a new channel between customers and banks which benefits both.
The main aim of e- banking services is to provide the customers a much faster
services with low cost. From the last twenty years, banking sector has chosen a
new method of banking based on the progress of information technology. In
addition to these customers, transaction and communication abilities are
fastened based on information technology.

The progress of electronic banking started with use of automatic teller


machines and afterwards it developed to online banking. In the future it will be
done in mobile phones(wap-enabled).Anyway online banking continues to be
the best for financial transactions.
Objective of Project:-
 The main objectives of the study are to understand the genesis and concept of
Online-Banking.  To analyses the importance, functions, advantages and
limitations of Online-Banking.  To explain the different form of Online-Banking
and to analyses the rules & regulation regarding Online-Banking guided by RBI.
 To highlighting on the security problems of Online-Banking and how to
reduce the security issues with the help of security control tools.  To analyses
the trend of Online-Banking with the help of primary data.  To analyses the
present e-banking scenario concerned with ATM, InterBank information, Mobile
banking, credit card-debit card, fund transfer and other e-banking services.
Chapter 2
Problem Analysis:-

 Software requirement

 System planning

 Project estimation

 Project Risk Analysis


Software requirement Analysis and
specification

During our analysis of the project, we referred various books and manuals and

conduct questionnaire with various administrators. The job of system

administrator involves the maintains the new entry broker who are wanted to

do testing, getting detail knowledge ofthe testing own Bikes, searching Bike

Information who was tested, searching about testing , and also done the modify

any test and bike or staff information and so on . This task is usually entrusted

to a single person, the system administrator, also known as the super user. He

has vest powers, having access to practically everything.


System planning

Scheduling of a software project does not differ greatly from System

administrator in window xp is not quite demanding and requires form

theadministrator an in depth knowledge of the different components. The above

stated task of a system administration is considered as routine duties of an

administrator. But system problem can be quite grave and unexpected By

identify the system responsibilities of a administrator to be quite demanding

requiring a through knowledge of the system, which makes it a cumbersome

job. We identified a need of “graphical tool for the task of system administration

as its menu and screens will guide him through the whole process.”scheduling

of any multitask engineering effort. Therefore, generalized project scheduling

tool and techniques can be applied with little modification to software projects.

Program evaluation and review Technique (PERT) and critical path method

(CPM) are two project scheduling method that can be applied to software

development. Both techniques are driven by information already development

in project planning activities:

 Estimates of Effort

 A decomposition of the product function


 The selection of the appropriate process model and task set

 Decomposition of tasks

Project Estimation:-

The project size is another important factor for the project estimation that can
affect

accuracy and efficacy of estimations. As size increase, the interdependency


among

various elements of the software grown rapidly.

Risk Analysis:-

Risk analysis and management are a series of steps that help a software team to

understand and manage uncertainty. Many problems can infected a software

project. A risk is a potential problem-it might happen it might not. But

regardless of the outcome, it’s a really good idea of identify it, assess its

probability of occurrence, estimate its impact, and establish a possibility plan

should the problem actually occur.

For Risk analysis firstly recognizing what can go wrong that is called “risk

Identification “.Next, each risk is analyzed to determine the probability that it

will occur and the damage that will do if it does occur. Once this information is
established, risks are ranked, by probability and impact. Finally a plan is

developed to manage those risks with high probability and high impact.
PERT CHART
HOME
Feedback
Signup
Login
Inbank
Beneficiary Registration
Beneficiary Payment
Bill
REG
Reg
Feed

Inbank
.

Quick
.
Bentry

.
Testing

Testing Techniques:-

The time dependent asynchronous nature of many real-time application adds

anew and tential difficult element of mix time. Not only does the test case

designer have to consider white-box testing black-box testing cases but also

event handling (i.e. interrupt processing) the timing of the data, and the

parallelism of the tasks (process) that handle the data.

Comprehensive test case design methods for real-time system have yet to

evolve. However an overall four step strategy can be proposed:

 Task Testing

 Behavioral Testing

 Intertask Testing

 System Testing

Task Testing:-
The first step in the testing of real time software is to test each task

independently. That is white box testing and black box testing are designed and

executed for each task. Each task is executed independently during these tests.

Task testing uncovers error in logic and function but not timing or behavioral .
Behavioral Testing:-

Using system models created with CASE tools, it is possible to simulate

thebehavioral of a real-time system and examine its behavioral as a

consequence ofexternal events. These analysis activities can serve as the basic

for the design oftest case that is conducted when the real time software has

been built. Using atechnique that is similar to equivalent partitioning, events

(e.g. interrupts, control signals) are categorized for testing. For example, events

for the

photocopier might be user interrupts (e.g. reset counter), mechanical

interrupts(e.g., paper jammed), system interrupts (e.g., toner low), and failure

mode (e.g.,roller overhead). Each of these events tested individually and the

behavioral ofthe executable system is examined to detect errors that occur as a

consequenceof processing associated with these events. The behavior of system

model andas the executable software can be compared for performance .

Intertask Testing:

Once error an individual tasks and in the system behavior have been isolated.

Testing shifts to time-related errors. Asynchronous tasks that are known to

communicate with one another are tested with different data rates and

processing load to determine if Intertask synchronization errors will occur.


Task that communicate via a message queue or data store are tested to uncover

errors in the sizing of these data storage areas.


System Testing:-

Software and hardware are integrated and a full range of the system test are

conducted in an attempt to attempts to uncover error at the software /

hardware interface. Most real-time system process interrupts. The tester

develops a list of all possible interrupts and the processing that occurs as a

consequence of the interrupts. Tests are then designed to asses the following

system characteristics:

 Are interrupts priorities properly assigned and properly handle?

 Is processing for each interrupts handled correctly?

 Does the performance of each interrupts-handling procedure conform to

requirements?

 Does a high volume of interrupts arriving at critical times create problem

in

 Function of performance?
White-Box Testing:-

It is also called glass box testing. It is a test case design method that uses the

control structure of the procedural design to derive test cases. In this all

statement in the program has been executed at least once during testing that all

logical conditions have been exercised. Using white box testing methods ,

software engineer can derive test cases that

 Guarantee that all independent paths within a module have been

exercised at least once.

 Exercise all loops at their boundaries and within their operational

bounds.

 Exercise all logical decision on their true and false sides.

 Exercise internal data structure to assure their validity.

Basic path testing, a white box technique, makes use of program graphs to drive

the set of linearly independent tests that will insure coverage. Conditional and

data flow testing further exercise program logic, and loop testing complements

other white box technique by providing a procedure for exercising loops of

varying degrees of complexity.


Black Box Testing:-

It focuses on the functional requirements of the software i.e. black box testing

enables the software engineer to derive sets of input condition that will fully

exercise all functional requirements for a program. Black box Testing is not

alternative to white box testing. Rather, it is a complementary approach that is

likely to uncover different class errors than white box testing. . Black box

Testing attempts to find errors in the following categories:-

I. Incorrect or missing function.

II. Interface error.

III. Errors in the data structure or external database.

IV. Performance error.

V. Initialization and termination errors.

The testing process which we have followed for our software is black box

testing. In this type of testing we test the software looking it as a black box

testing without considering the internal details. A required set of inputs are to

be supplied depending upon the software and we get our desired outputs.In the

testing phase of our software we have followed the approach where testing is

done in step First we have tested all the function individually by executing then

with the required inputs. If these functions are called by some other functions
then it is checked that the functions returning the correct value, then it is

checked that these objects are created in the desired format. We had to test the

functions by making changes in the code itself so that their returning value can

be printed, giving us the idea about their being correct.

Installation:-
To install the network management software on your computer network. Some
follows the instructions of step to step:-

 Insert the setup CD in CD-Drive of a computer and double click the setup.

 Install the software by setup.

 Follow the step to install the software.


Feasibility:-

Feasibility of project can project can be explained in two terms below:

Technical Feasibility:-
Our project is technically feasible, as we have taken visual basic as our front
end.

Advantages of language are achieved as:-

 Good interface for user.


 Allow changes as when required.
 It is rapid action development tool, which makes processing fast.
 Coding make technical processing easy.
 VB is event driven which means use is in control of application.
 VB is infinitely extensible through the use of Active-X control.Dynamically
linked libraries and add-ins.

Economical Feasibility:-
1. Before creation of this project all the database and function were

managed

2. manually by persons but after creation there is a need of just a single

operator for complete management, which makes it economically feasible.

3. Our project is quite affordable in term of using of any level and provides

complete functionality as desired.

4. Project can be also being called feasible economically in terms of

convenience. As booking can be phone dialing.


Methodology Adopted

To solve the actual problem in an agency setting, software engineer or a team of

engineers must incorporate a development strategy encompasses the process

method and tool and generic phase. This strategy is often referred to as a

process model or a software engineering paradigm. A process model for

software engineering is chosen base on the nature of the project and

application, the methods and tools to used, and the controls and deliverables

that are required.All software development can be categorized as a problem

solving loop in which four distinct stages are encounters. Status quo “represents

the current states of affairs”; problem definition identifies the specific problem

to be solve; technical development solve the problem through the application of

some technology, and the solution integration delivers the result those who

requested the solution in the place.

Problem definition

Status Technical
Quo Developments

Solution
Integration
There is a verity of different process model for software engineering. Each

represents attempts to bring order to an inherently chaotic activity it is

important to remember that each of model of the models has been categories.
Linear sequential model:-

Some linear sequential some time called classic life cycle waterfall model.

Thelinear sequential model suggests a systemic sequential approach to software

development that begins system at the level and progresses through analysis,

design, coding, testing and support. Below figure illustrate the linear sequential

model for the software engineering the linear sequential model encompasses

following activities:-

 System / Information engineering and

modeling

Because a software is a part time of a large system, were beginning by

established requirement for all system element the allocating some subset of

these requirements to software. This system view essential when software must

interact with other element such as hardware, people and database. System

engineering and analysis encompasses requirements gathering at the system

level with a small amount of top level design analysis.

 Software requirement analysis :-


The requirements gathering process is intensified and focused specifically on

software. To understand the nature of program to be built, The software

engineer must understand the information domain for the software as well as

require function, behavior, performance, and interface .

 Design

Software design is actually multi step process that focuses on four distinct

attribute of program; datastructre, software architecture, interface

representation and procedural detail. The design process translates

requirements into a representation of the software that can be accessed for

quality before coding beginning

Coding:
The design must be translate in to a machine-readable form. The code

generation step performs this task. If design is perform in a detailed manner,

code generation can accomplished mechanistically.

 Testing:-
Once code has been generated program testing being. The testing process

focuses on the logical internals of the software, ensuring that all statements

have been tested and on functional externals; that is conducting tests to uncover

error and ensure that the defined input will produce the actual results that

agree with required results.

 Supports :-
Software will under go change after it is delivered to the customer, change will

occur because error have been encountered, because the software must to

adopted to accommodate changes in its external environments. Because the

customer requirements functional and performance enhancements

SECURITY OF THE SYSTEM:-

Computer is a versatile instruction with almost enormous capacity computation

at an unimaginable speed. The end user is concerned about security along with

increased dependence on the computer. In system development, the project

manager must consider measures for marinating data and controlling secret at

all time. This involves built in hardware feature, programs procedures to

protect candidate system from unauthorized access. The level of protection

depends on the sensitivity of the data, the reliability of the user, & the
complexity of the system. A well designed system includes control procedure to

provide physical protection (hardware security) and restrict system access

(database security).

Application security:

In our project, going password an application security. In our project, if the user

type wrong password and user name then he/she cannot enter inside the

project, if the users want to users want to use or run the project then he/she

must enter the correct user name and password. If the user type three times

wrong password and click three times enter then our project will close and

he/she not enter any type.

Transaction Security:-

In this project, several kinds of transaction securities have been provided such

as: -

1. We cannot enter the wrong value/data

2. We can change the login and password code if we know user name and

password.

3. We can take modified/deleted records

Database security:-

The database security is most essential to avoid theft or leakage of confidential

data. A control must be kept over the issue of data file, so that possibilities of
destruction are minimized. Any person not open database. If he/she know

password then he/she open database.The security arrangement should be

provided by computer installation initially at time it is being established rather

then being added later on. Security is like sheet belt it does not guarantee there

will be not accident. However, when accident does occur it may be found too

much cheaper, it may records. The system security problem can be divided into

following related issues.

System security:-
Hardware security
Hardware security includes arrangement for detection of fire fighting

equipment, alternative arrangement to meet emergency requirement

alternatively and uninterrupted power arrangement and hardware insurance in

case of own hardware equipment.

Software security:-

Software security may need striker control on person an access to the

processing center, the data file storage and the programs file. A copy of all

program May be file stored away from the computer installation as a security

measure.
Limitation:-
We invested lots of time & effort to develop present system but still few short

coming are their. Reason might be lack of time or lack of expertise a VB.net. Bike

Agency very vast & to development it completely within a six months course is

almost impossible.

Our system is also having few limitations:-

 There is no automatically facility of saving to main database.

 Any from which will directly close may loss database information.

 There is no facility of trial balance and profit loss.

 There is no automatically edit the records.


CONCLUSION

Banks are quite important to the economy and are involved in


such economic activities as issuing money, settling payments,
credit intermediation, maturity transformation and money
creation in the form of fractional reserve banking. To make
money, banks use deposits and whole sale deposits, share
equity and fees and interest from debt, loans and consumer
lending, such as credit cards and bank fees.

You might also like