Atm Technology
Atm Technology
Atm Technology
1
SYNOPSIS
AIM
In the existing system the transactions are done only
manually but in proposed system we have to computerize all the banking
transaction using the software ATM TECHNOLOGY.
They are:
User Module
ADMINISTRATIVE MODULE
This module is the main module which performs all the main
operations in the system. The major operations in the system are:
Cash Withdrawal(Saving/Current withdrawal)
Inquery
Statement report
Cash transformation
Pin change
2
SYSTEM STUDY AND ANALISYS
SYSTEM ANALYSIS
3
Preliminary study is the process of gathering and interpreting facts,
using the information for further studies on the system. Preliminary study is
problem solving activity that requires intensive communication between the
system users and system developers. It does various feasibility studies. In
these studies a rough figure of the system activities can be obtained, from
which the decision about the strategies to be followed for effective system
study and analysis can be taken.
EXISTING SYSTEM
In the existing system the transactions are done only manually but
in proposed system we have to computerize all the banking transaction using
the software ATM TECHNOLOGY.
4
PROPOSED SYSTEM
Greater efficiency.
Better service.
5
User friendliness and interactive.
6
Does the existing technology sufficient for the suggested one?
Can the system expand if developed?
7
2.3.3. BEHAVIORAL FEASIBILITY
SYSTEM DESIGN
3.1 INTRODUCTION
Design is the first step into the development phase for any
engineered product or system. Design is a creative process. A good design is
the key to effective system. The term “design” is defined as “the process of
applying various techniques and principles for the purpose of defining a
process or a system in sufficient detail to permit its physical realization”. It
may be defined as a process of applying various techniques and principles for
the purpose of defining a device, a process or a system in sufficient detail to
permit its physical realization. Software design sits at the technical kernel of
the software engineering process and is applied regardless of the development
paradigm that is used. The system design develops the architectural detail
required to build a
8
LOGICAL DESIGN:
Reviews the current physical system – its data flows, file content,
volumes , frequencies etc.
9
PHYSICAL DESIGN:
Design/Specification activities:
10
Concept formulation.
Problem understanding.
High level requirements proposals.
Feasibility study.
Requirements engineering.
Architectural design.
MODULE DESIGN
Admin
The Administrator logs in using the admin login. In this module two
operations are done. During login the Login and Password is verified with
that in the database
INPUT DESIGN
OBJECTIVES
11
important to avoid errors in the data input process and show the correct
direction to the management for getting correct information from the
computerized system.
When the data is entered it will check for its validity. Data can
be entered with the help of screens. Appropriate messages are provided as
when needed so that the user will not be in a maize of instant. Thus the
objective of input design is to create an input layout that is easy to follow:
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end
user and presents the information clearly. In output design it is determined
how the information is to be displaced for immediate need and also the hard
copy output. It is the most important and direct source information to the
user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.
12
Create document, report, or other formats that contain information
produced by the system.
The database design is a two level process. In the first step, user
requirements are gathered together and a database is designed which will
meet these requirements as clearly as possible. This step is called Information
Level Design and it is taken independent of any individual DBMS.
Data Integrity
Data independence
13
To simplify the maintenance of the data through updates, insertions,
deletions.
To reduce the need to restructure or reorganize data which new
application requirements arise.
RELATIONSHIPS:
14
Table relationships are established using Key. The two main keys
of prime importance are Primary Key & Foreign Key. Entity Integrity and
Referential Integrity Relationships can be established with these keys.Entity
Integrity enforces that no Primary Key can have null values.Referential
Integrity enforces that no Primary Key can have null values.
The First Normal Form states that the domain of an attribute must
include only atomic values and that the value of any attribute in a tuple must
be a single value from the domain of that attribute. In other words 1NF
disallows “relations within relations” or “relations as attribute values within
15
tuples”. The only attribute values permitted by 1NF are single atomic or
indivisible values.
The first step is to put the data into First Normal Form. This can be
donor by moving data into separate tables where the data is of similar type in
each table. Each table is given a Primary Key or Foreign Key as per
requirement of the project. In this we form new relations for each nonatomic
attribute or nested relation. This eliminated repeating groups of data.
In this we decompose and setup a new relation for each partial key
with its dependent attributes. Make sure to keep a relation with the original
primary key and any attributes that are fully functionally dependent on it.
This step helps in taking out data that is only dependant on apart of the key.
16
set of nonkey attributes. That is, there should be no transitive dependency on
the primary key.
TABLES STRUCTURE
Table: tblscode
Primary Key: scode
Table: DailyTrans
Primary Key: Account no:
17
surname char(30)
date date
TransactionNa char(30)
me
Transaction Number(9)
amount
Previous Number(9)
Balance
Current Number(9)
Balance
Owner Name char(30)
Table: current
Primary Key: account no
Table: Master
Primary account no
18
Field Data Type Constraints Description
bank id Number(9) Primary key
name char(30)
type char(30)
date date
Address char(30)
total number
Acc_no number
SYSTEM DEVELOPEMENT
HARDWARE REQUIREMENTS
Monitor : VGA/SVGA
19
Mouse : 2 buttons/ 3 buttons
SOFTWARE REQUIREMENTS
20
The text box is the standard control for accepting input from the
user as well as to display the output. It can handle string (text) and numeric
data but not images or pictures. String in a text box can be converted to a
numeric data by using the function Val(text). The following example
illustrates a simple program that processes the input from the user.
Example 3.1
In this program, two text boxes are inserted into the form together
with a few labels. The two text boxes are used to accept inputs from the user
and one of the labels will be used to display the sum of two numbers that are
entered into the two text boxes. Besides, a command button is also
programmed to calculate the sum of the two numbers using the plus operator.
The program use creates a variable sum to accept the summation of values
from text box 1 and text box 2.The procedure to calculate and to display the
output on the label is shown below. The output is shown in Figure 3.2
21
3.2.2 The Label
The label is a very useful control for Visual Basic, as it is not only
used to provide instructions and guides to the users, it can also be used to
display outputs. One of its most important properties is Caption. Using the
syntax label.Caption, it can display text and numeric data . You can change
its caption in the properties window and also at runtime. Please refer to
Example 3.1 and Figure 3.1 for the usage of label.
22
The command button is one of the most important controls as it is
used to execute commands. It displays an illusion that the button is pressed
when the user click on it. The most common event associated with the
command button is the Click event, and the syntax for the procedure is-
You will learn more about the picture box in future lessons. The
image in the picture box is not resizable.
23
3.2.5 The Image Box
The Image Box is another control that handles images and pictures.
It functions almost identically to the picture box. However, there is one major
difference, the image in an Image Box is stretchable, which means it can be
resized. This feature is not available in the Picture Box. Similar to the Picture
Box, it can also use the LoadPicture method to load the picture. For example,
the statement loads the picture grape.gif into the image box.
The function of the List Box is to present a list of items where the
user can click and select the items from the list. In order to add items to the
list, we can use the AddItem method. For example, if you wish to add a
number of items to list box 1, you can key in the following statements
Example 3.2
24
List1.AddItem “Lesson1”
List1.AddItem “Lesson2”
List1.AddItem “Lesson3”
List1.AddItem “Lesson4”
End Sub
The items in the list box can be identified by the ListIndex property, the
value of the ListIndex for the first item is 0, the second item has a ListIndex
1, and the second item has a ListIndex 2 and so on
Example 3.3
Combo1.AddItem “Item1”
Combo1.AddItem “Item2”
Combo1.AddItem “Item3”
Combo1.AddItem “Item4”
25
End Sub
The Check Box control lets the user selects or unselects an option. When the
Check Box is checked, its value is set to 1 and when it is unchecked, the
value is set to 0. You can include the statements Check1.Value=1 to mark
the Check Box and Check1.Value=0 to unmark the Check Box, as well as
use them to initiate certain actions. For example, the program will change the
background color of the form to red when the check box is unchecked and it
will change to blue when the check box is checked. You will learn about the
conditional statement If….Then….Elesif in later lesson. VbRed and vbBlue
are color constants and BackColor is the background color property of the
form.
The Option Box control also lets the user selects one of the
choices. However, two or more Option Boxes must work together because as
one of the Option Boxes is selected, the other Option Boxes will be
unselected. In fact, only one Option Box can be selected at one time. When
an option box is selected, its value is set to “True” and when it is unselected;
26
its value is set to “False”. In the following example, the shape control is
placed in the form together with six Option Boxes. When the user clicks on
different option boxes, different shapes will appear. The values of the shape
control are 0, 1, and 2,3,4,5 which will make it appear as a rectangle, a
square, an oval shape, a rounded rectangle and a rounded square respectively.
Example 3.4
27
The Drive ListBox is for displaying a list of drives available in your
computer. When you place this control into the form and run the program,
you will be able to select different drives from your computer as shown in
Figure 3.3
The File List Box is for displaying the list of files in a selected
directory or folder. When you place this control into the form and run the
program, you will be able to shown the list of files in a selected directory as
shown in Figure 3.5
You can coordinate the Drive List Box, the Directory List Box and the File
List Box to search for the files you want. The procedure will be discussed in
later lessons.
SYSTEM IMPLEMENTATION AND TESTING
5.1 CODING
28
Main Form Coding
With rs
.Find "Scode ='" & txtDisplay & "'"
If .EOF Then
MsgBox "Pin Number is incorrect or does not Exist", vbCritical,
"ATM-Pin Error"
txtDisplay = "": txtDisplay.SetFocus
Else
fraTransaction.Visible = True
fraSecretCode.Visible = False
End If
End With
txtDisplay = ""
End Sub
29
fraTransaction.Visible = True
End Sub
30
frmWel.fraTransaction.Visible = False
End Sub
31
frmWel.fraTransaction.Visible = False
End Sub
Change Pin
Private Sub cmdChangPin_Click()
With rsCode
32
.Find "Scode ='" & txtOldPin & "'"
If .EOF Then
MsgBox "Pin Number does not Exist! ", vbInformation
txtOldPin = ""
txtNewPin = ""
txtConFNewPin = ""
txtOldPin.SetFocus
ElseIf Len(txtNewPin) = Len(txtConFNewPin) And Len(txtNewPin) > 3
And Len(txtConFNewPin) > 3 Then
txtOldPin.Text = txtNewPin.Text
.Fields(0) = txtOldPin
.Fields(1) = txtOldPin
.Fields(2) = txtConFNewPin
.Update
MsgBox "Pin Has been Successfull changed!", vbInformation
Unload Me
frmWel.fraTransaction.Visible = True
Else
MsgBox "Confirm Pin does not march with New Pin", vbInformation
txtOldPin = ""
txtNewPin = ""
txtConFNewPin = ""
txtOldPin.SetFocus
End If
End With
End Sub
33
Transaction
34
End Sub
35
frmWithD.Hide
frmWaitWithD.Show vbModal
MsgBox "The Sum of: " & WithD & " Has been Deducted from your
account", vbInformation
frmCash.cmdCancel.Visible = False
frmCash.lblDisplay.Visible = False
Load frmCash
frmCash.Show vbModal
End Sub
36
frmCash.Show vbModal
End Sub
37
End Sub
Statements View
38
If .EOF Then
MsgBox "Account does not Exist! Please contact customer services",
vbInformation, "A T M Service....."
txtStAcctNum = ""
txtStAcctNum.SetFocus
cmdSearch.Caption = "&Inquire"
Else
Unload Me
Me.Hide
frmCash.Image1.Visible = False
frmCash.cmdOk.Visible = False
Load frmCash
frmCash.Show vbModal
End If
End With
End If
Unload Me
frmWel.fraTransaction.Visible = True
frmWel.fraAcctType.Visible = False
frmWel.fraSecretCode.Visible = False
End Sub
39
confidence that the new system will work and will be effective and accurate.
It is primarily concerned with user training and documentation. Conversion
usually takes place about the same time the user is being trained or later.
Implementation simply means convening a new system design into operation,
which is the process of converting a new revised system design into an
operational one.
40
software, looking for problems and gathering metrics without actually
executing the code. Dynamic analysis looks at the behavior of software while
it is executing, to provide information such as execution traces, timing
profiles, and test coverage information.
TEST PLAN
41
A test plan implies a series of desired course of action to be
followed in accomplishing various testing methods. The Test Plan acts as a
blue print for the action that is to be followed. The software engineers create
a computer program, its documentation and related data structures. The
software developers is always responsible for testing the individual units of
the programs, ensuring that each performs the function for which it was
designed. There is an independent test group (ITG) which is to remove the
inherent problems associated with letting the builder to test the thing that has
been built. The specific objectives of testing should be stated in measurable
terms. So that the mean time to failure, the cost to find and fix the defects,
remaining defect density or frequency of occurrence and test work-hours per
regression test all should be stated within the test plan.
Unit testing
Integration Testing
Data validation Testing
Output Testing
UNIT TESTING
42
Tests of data flow across a module interface are required before
any other test is initiated. If data do not enter and exit properly, all other tests
are moot. Selective testing of execution paths is an essential task during the
unit test. Good design dictates that error conditions be anticipated and error
handling paths set up to reroute or cleanly terminate processing when an error
does occur. Boundary testing is the last task of unit testing step. Software
often fails at its boundaries.
INTEGRATION TESTING
43
VALIDATION TESTING OR SYSTEM TESTING
This is the final step in testing. In this the entire system was
tested as a whole with all forms, code, modules and class modules. This form
of testing is popularly known as Black Box testing or System testing.
44
5.3. TRAINING
45
APPENDIX
SCREEN SHOTS
46
Login
ATM home
47
Withdrawal
48
49
.
Transaction
50
Amount Type
51
Success Transaction
52
Balance
53
Transaction Progress
54
Transaction Report
55
Cash Transfer
56
57
DEVELOPER
58
Exit From ATM
59
CONCLUSION
Using “ATM TECHNOLOGY " , customers can access their
bank accounts in order to make cash withdrawals (or credit card cash
60
advances) and check their account balances as well as purchasing mobile cell
phone prepaid credit. In this the customer is identified by inserting a plastic
ATM card with a magnetic stripe or a plastic smartcard with a chip, that
contains a unique card number and some security information, such as an
expiration date or CVC (CVV). Security is provided by the customer entering
a personal identification number (PIN).
BIBLIOGRAPHY
BOOKS:
ONLINE REFERENCE:
www.w3schools.com
www.theserverside.com
www.visual.com
61
62