Icici Bank Project 11 (1)

download Icici Bank Project 11 (1)

of 48

Transcript of Icici Bank Project 11 (1)

  • 7/28/2019 Icici Bank Project 11 (1)

    1/48

    ACKNOWLEDGEMENT

    This is to acknowledge the support of all the people who helped me out

    in completion of this project. First of all I would like to convey myregards to PROF. who provided me all the necessary inputs and

    guidelines.

    Our head of department, PROF. who gave me thisopportunity to work on this project.

    My special thanks to SBI TRAINING OFFICERS, MR. SAURAV

    MISHRA, MR.UMESH THAKUR, MR.AMLESH KUMAR, MR.SANJEEV KUMAR SINHA, MR. M.ANAND, MR. PRASHANTKUMAR, who imparted me the knowledge about the functioningstructure of state bank of India, which helped me out to give final

    presentation of my project.

    I would like to thanks to the branch manager of ICICI BANK , namely

    MR. RAJEEV RANJAN, A.G. OFFICE DORANDA BRANCH, whogave me all the required information and inputs required for the project.

    I would also like to thank my parents who helped me morally andfinancially to carry out this project and also my friends who kept meencouraging throughout the completion of this project.

  • 7/28/2019 Icici Bank Project 11 (1)

    2/48

    CERTIFICATE

    This is to certify that SUSHMA KUMARI of B.com (Accounts Group)

    Sem. VI Roll No 88 session 2010-13 has successfully complete a

    project on the given topic the ON Line Banking In Commercial Bank

    (ICICI BANK)

    I appreciate his skill, diligence and sense of commitment in

    preparation of the project. The Project Work has been submitted as

    partial fulfillment of the degree of B.Com (Accounts Group) ofMarwari College Ranchi. This project has been prepared exclusively for

    academic purpose hence it shall not be used for any kind of non-

    academic purpose whatsoever.

  • 7/28/2019 Icici Bank Project 11 (1)

    3/48

    Objectives

    The main objectives of the study are:

    To understand the concept of Internet banking and

    importance, to bank as well as customers.

    To get aware of various aspects of net banking

    To build up SWOC analysis of Internet banking of ICICI BANK

    To build up various solutions for drawbacks in net banking

  • 7/28/2019 Icici Bank Project 11 (1)

    4/48

    PROJECT ON

    ORGANISATION: - ICICI BANK

    SUBMITTED BY:-

    NAME: SANA PERWEEN

    CLASS: - B.Com PART III (Acc.)

    CLASS ROLL NO. :-650

    EXAM ROLL NO:-

    10CACT015539

    SESSION :- 2010-13

  • 7/28/2019 Icici Bank Project 11 (1)

    5/48

    1

    INTRODUCTION

    ONLINE BANKING

    The project entitled "OnlineBanking " is a computerized telecommunications device that provides the customers of afinancial institution with access to financial transactions in a p ublic space without the need fora human clerk or bank teller. On most modern ATMs, the customer is identified by inserting aplastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a uniquecard number and some security information, such as an expiration date or CVC (CVV). Securityis provided by the customer entering a personal identification number (PIN).

    Using an ATM, customers can access their bank accounts in order to make cash withdrawals (orcredit card cash advances) and check their account balances as well as purchasing mobile cellphone prepaid credit. ATMs are known by various other names including automated banking

    machine, money machine, bank machine, cash machine, hole-in-the-wall, cashpoint, Bancomat(in various countries in Europe and Russia), Multibanco (after a registered trade mark, inPortugal), and Any Time Money (in India)..

    SYNOPSIS

    "Online Banking " is a computerized telecommunications device that provides the customers of afinancial institution with access to financial transactions in a public space without the need for a

    human clerk or bank teller. On most modern ATMs, the customer is identified by inserting aplastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a uniquecard number and some security information, such as an expiration date or CVC (CVV). Securityis provided by the customer entering a personal identification number (PIN).

    ICICI BANK

    ICICI Bank is the most valuable bank in India in terms of market capitalization and is ranked secondamongst all the companies listed on the Indi an stock exchanges.In terms of free float market capitalization*.The Bank has a network of about 1308Branches and 3,950 ATMs in India and presence in 18 countries. ICICI Bank offers a wide rangeof banking products and f inan cial servi ces t o co rpor ate and retai l cu stomer th rough avari ety of delivery channels and through its specialized subsidiaries and affiliates in the a re asof investmen t banking, life a nd non -life insurance, venture capit al and assetmanagement. The Bank currently has subsidiaries in the United Kingdom, Russia and Canada,branches in Singapore, Bahrain, Hong Kong, Sri Lanka and Dubai In ternational Fi nance Center andrepresentative offices in theUnitedStates, United Arab Emirates, China, South Africa, Bangladesh, Thailand,Malaysia and Indonesia. UK subsidiary has established a branch in Belgium. ICICI Bank's

  • 7/28/2019 Icici Bank Project 11 (1)

    6/48

    equity shares are l isted in India on Bombay Stock Exchange( BS E) an d th eN a t i o n a l S t o c k E x c h a n g e ( N S E ) o f I n d i a L i m i t e d a n d i t s AmericanDepositary Receipts (ADRs) are listed on the New York Stock Exchange (NYSE).

    OBJECTIVE

    In the existing system the transactions are done only manually but in proposed system we have tocomputerize all the banking transaction using the software Online Banking. They are: UserModule

    ADMINISTRATIVE MODULE

    This module is the main module which performs all the main operations in the system. Themajor operations in the system are: Cash Withdrawal(Saving/Current withdrawal) Inquery Statement report Cash transformation Pin change

    SIGNIFICANCE OF THE SYUDY

    Though there are many online systems available on internet but this can compete with them with

    some advancement in its functionality and can be used by any bank organization to maintain

    their customers account and online transaction process.

    The basic functionalities of the system are:

    Create Account

    Login

    Update Profile

    Password Recovery

    View Profile

    ATM and Bank finder

    Contact Form

    Amount Transaction

  • 7/28/2019 Icici Bank Project 11 (1)

    7/48

    EMI and Loan Calculator

    Delete account

    Logout

    4.2 Database design:

    Database design is required to manage the large bodies of information. The management of data

    involves both the definition of structure of the storage of information and provisions of

    mechanism for the manipulation of information. in addition to the database system must provide

    for the safety of information handled, despite the system crashes due to attempts art unauthorized

    access. for developing an efficient data base , we will have to full fill certain condition such as:

    Control Redundancy

    Ease of use

    Accuracy and integrity

    Avoiding inordinate delays

    Recovery from failure

    Privacy and security

    Performance

    There are 6 major steps in design process. The first 5 steps are usually done on paper and finally

    the design is implemented.

    Identify the tables and relationship

    Identify the data that is needed for each table and relationship

    Resolve the relationship

    Verify the design

    Implement the design

  • 7/28/2019 Icici Bank Project 11 (1)

    8/48

    NORMALIZATION

    Normalization is a technique that is more applicable to record based data models. Each of the

    process can be carried out independently to arrive at normalized tables. Normalization refines the

    data structure and data are group in simple way as possible. So later changes can be bring about

    the least impact on database structure and eliminates data redundancy.

    DATA INTEGRITY

    Data integrity refers to the procedure that ensures correctness of the data entered in the database.

    Functions have been provided in the software, which check data while being entered. Integrity

    problems are occurred due to hardware or software malfunctions such as power failure and disk

    crashes. Side effect from the program development may also be the reason.

    DATA CONSISTENCY

    Problem with data consistency occur when adding records without first checking for records with

    same key or deleting records without deleting other related records. Likewise the software is

    coded such that primary keys cant be duplicated. For developing an efficient database, we have

    to fulfill certain conditions such as :

    Control redundancy

    Ease of use

    Data independence

    Privacy and security

    Performance

    For achieving the above criterias we have to make use of various features that are available with

    DBMS such as:

    Enforcing integrity constraints to ensure data integrity and to reduce data inconsistency.

    Recovery from failures using backup facility.

  • 7/28/2019 Icici Bank Project 11 (1)

    9/48

    2

    ORGANISATIONL PROFILE

    HISTORY

    ICICI Bank was originally promoted in1 9 9 4 b y I C I C I L i m i t e d , a n I n d i a n financial institution, and was its wholly ownedsubsidiary. ICICI's shareholdingin ICICI Bank was reduced to 46% through a public offering ofshares in Indiain fiscal 1998, an equity offering in the form of ADRs listed on theNYSE infiscal 2000, ICICI Bank's acquisition of Bank of Madura Limited in an all-stock a m a l g a m a t i o n i n f i s c a l 2 0 0 1 , a n d s e c o n d a r y m a r k e t sa l e s b y I C I C I t o institutional investors in fiscal 2001 and fiscal 2002. ICICIwas formed in 1955at the initiative of the World Bank, the Government of India andrepresentativeso f I n d i a n i n d u s t r y . T h e p r i n c i p a l o b j e c t i v e w a s t o c r e at e a d e v e l o p m e n t financial institution for providing medium-term and long-term projectf inancingto Indian bus inesses . In the 1990s , ICICI t r ans formed i t s bus iness f r o m a development financial institution offering only project finance to adiversifiedfinancial services group offering a wide variety of products and services, bothdirectlyand through a number of subsidiaries and affiliates like ICICI Bank. In1999, ICICI becomethe first Indian company and the first bank or financialinstitution from non-Japan Asia to belisted on the NYSE.After consideration of various corporate structuring alternatives in the contextofthe emerging competitive scenario in the Indian banking industry, and themovetowards universal banking, the managements of ICICI and ICICI Bank formed theview that the merger of ICICI with ICICI Bank would be the

    optimals t r a t e g i c a l t e r n a t i ve f o r bo t h en t i t i e s , an d wo u l d c r e a t e t he op t i mal l e g a l structure for the ICICI group's universal banking strategy. The merger wouldenhancevalue for ICICI shareholders through the merged entity's access to low-cost deposits, greater opportunitiesfor earning fee-based income and the abilityto participate in the payments system and providetransaction-banking services.The merger would enhance value for ICICI Bank shareholdersthrough a largecapital base and scale of operations, seamless access to ICICI's strong corporaterelationshipsbuilt up over five decades, entry into new busi nesss e g m e n t s , h i g h e r m a r k e t s h a r e i n v a r i o u s b u s i n e s s s e g m e n t s , p a r t i c u l a r l yfee-basedservices, and access to the vast talent pool of ICICI and i ts

    subsidiaries. In10

    October 2001, the Boards of Directors of ICICI and ICICI Bank approved themerger of ICICIand two of its wholly-owned retail finance subsidiaries, ICICIPersonal Financial ServicesLimited and ICICI Capital Services Limited, withICICI Bank. The merger was approvedby shareholders of ICIC I and IC IC IB ank in January 2002, by the Hi gh Citst ofGujarat at Ahmedabad in March2002, and by the High Citst of Judicature at Mumbai andthe Reserve Bank of India in April 2002. Consequent to the merger, the ICICI group's financingand banking operations, both wholesale and retail, have been integrated in a singleentity. ICICIBank has formulated a Code of Business Conduct and Ethics for its directors and employees

  • 7/28/2019 Icici Bank Project 11 (1)

    10/48

    ORGANISATIONAL STRUCTURE

    ICICI Bank was established by the Industrial Credit and Investment Corporation of India, an

    Indian financial institution, as a wholly owned subsidiary in 1994. The parent company was

    formed in 1955 as a joint-venture of the World Bank, India's public-sector banks and public-sector insurance companies to provide project financing to Indian industry.[8][9]The bank was

    initially known as theIndustrial Credit and Investment Corporation of India Bank, before it

    changed its name to the abbreviatedICICI Bank. The parent company was later merged with the

    bank.

    ICICI Bank launched internet banking operations in 1998.[10]

    ICICI's shareholding in ICICI Bank was reduced to 46 percent, through a public offering of

    shares in India in 1998, followed by an equity offering in the form ofAmerican Depositary

    Receipts on the NYSE in 2000. ICICI Bank acquired theBank of Madura Limitedin an all-stock

    deal in 2001 and sold additional stakes to institutional investors during 2001-02.

    In the 1990s, ICICI transformed its business from a development financial institution offering

    only project finance to a diversified financial services group, offering a wide variety of products

    and services, both directly and through a number of subsidiaries and affiliates like ICICI Bank.

    In 1999, ICICI become the first Indian company and the first bank or financial institution from

    non-Japan Asia to be listed on the NYSE.[11]

    In 2000, ICICI Bank became the first Indian bank to list on the New York Stock Exchange with

    its five million American depository shares issue generating a demand book 13 times the offer

    size.

    In October 2001, the Boards of Directors of ICICI and ICICI Bank approved the merger of ICICI

    and two of its wholly owned retail finance subsidiaries, ICICI Personal Financial Services

    Limited and ICICI Capital Services Limited, with ICICI Bank. The merger was approved by

    shareholders of ICICI and ICICI Bank in January 2002, by the High Court of Gujarat at

    Ahmedabad in March 2002 and by the High Court of Judicature at Mumbai and the Reserve

    Bank of India in April 2002.[12]

    In 2008, following the 2008 financial crisis, customers rushed to ICICI ATMs and branches in

    some locations due to rumors of adverse financial position of ICICI Bank. The Reserve Bank ofIndia issued a clarification on the financial strength of ICICI Bank to dispel the rumors.[13]NEW

    UPDATES FROM THE SITE ICICI Bank is India's second-largest bank with total assets of Rs.

    4,736.47 billion (US$ 93 billion) at March 31, 2012 and profit after tax Rs. 64.65 billion (US$

    1,271 million) for the year ended March 31, 2012. The Bank has a network of 3,100 branches

    and 10,486 ATMs in India, and has a presence in 19 countries, including India.

    http://en.wikipedia.org/wiki/World_Bankhttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/NYSEhttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/Gujarat_High_Courthttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/2008_financial_crisishttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/2008_financial_crisishttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/Gujarat_High_Courthttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/NYSEhttp://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/World_Bank
  • 7/28/2019 Icici Bank Project 11 (1)

    11/48

    ICICI Bank offers a wide range of banking products and financial services to corporate and retail

    customers through a variety of delivery channels and through its specialised subsidiaries in the

    areas of investment banking, life and non-life insurance, venture capital and asset management.

    The Bank currently has subsidiaries in the United Kingdom, Russia and Canada, branches in

    United States, Singapore, Bahrain, Hong Kong, Sri Lanka, Qatar and Dubai International

    Finance Centre and representative offices in United Arab Emirates, China, South Africa,Bangladesh, Thailand, Malaysia and Indonesia. Our UK subsidiary has established branches in

    Belgium and Germany.

    ICICI Bank's equity shares are listed in India on Bombay Stock Exchange and the National Stock

    Exchange of India Limited and its American Depositary Receipts (ADRs) are listed on the New

    York Stock Exchange (NYSE)

    3.1.2 BOARD OF DIRECTORS

    MR. N.Vaghul (CHAIRMAN)

    MR. Sridar Iyengar

    MR. Lakshmi N. Mittal

    MR. Narendra Murkumbi

    MR. Anupam Puri

    Mr. Arun Ramanathan

    MR. M. K. Sharma

    MR. P.M. Sinha

    Prof. Marti G. Subrahmanyam

    MR. T. S. Vijayan

    MR. V. Prem Wasta

    MR. K. V. Kamath (MANAGING DIRECTOR & CEO)

    MR. Chanda Kochhar (JOINT MANAGING DIRECTOR)

    MR. V. Vaidyanathan, (EXECUTIVE DIRECTOR)

    Ms. Madhabi Puri-Buch, Executive Director

    MR. Sonjoy Chatterjee (EXECUTIVE DIRECTOR)

  • 7/28/2019 Icici Bank Project 11 (1)

    12/48

    Mr. Sridar Iyengar Mr. Narendra MurkumbiMr. M. K. Sharma Mr. N. VaghulMr. AnupamPuriMr. M. K. SharmaMr. P. M. SinhaProf. Marti G. SubrahmanyamCustomer Service CommitteeCredit Committee.

    Area of OperationThe Bank has a network of 2,883 branches and 10021 ATM's in India, and has apresence in 19 countries, including India.

    The bank has subsidiaries in the United Kingdom, Russia, and Canada; branches inUnited States, Singapore, Bahrain, Hong Kong, Sri Lanka, Qatar and DubaiInternational Finance Centre; and representative offices in United Arab Emirates, China,South Africa, Bangladesh, Thailand, Malaysia and Indonesia. The company's UKsubsidiary has established branches in Belgium and Germany.

    No. of companies: 7 major ones including ICICI Bank, the parent firm International.

    Employees Strength

    Considered to be the most aggressive player in the financial services industry, ICICIBank seeks passion, commitment and the ability to think on one's feet, in a fresh recruit.

    Chanda D. Kochhar, managing director and chief executive officer, ICICI Bank, is veryoptimistic about the growth opportunities that India will offer in the coming decade. In aninterview with Govindraj Ethiraj, Editor-in-Chief, Bloomberg UTV, Kochar says growthwill ensure that Indian banks join the big league of global banks.

    On Campus Hiring

    The company with its diverse interests does not restrict itself to ChartedAccountants and fresh MBAs, though they do form a sizable section of its fresherrecruitment. According to Saurabh the company operates in three salary brackets -High bracket, Second bracket and third bracket depending on the quality of the institute.Though for reasons of confidentiality, the company refused to mention where theindividual institutions stood, from our experience in B-School rankings, we could safelyassume that those institutions in the Top 20-25 rankings would form the high bracket,the next 25 in the second bracket and the rest in the third bracket.

    So depending on how your institute is ranked, by different agencies, you can make anintelligent guess (to know where your institute stands see the B-School Almanac thatCareers360 has published where we presented the past 5 years ranking of schools byfive major publications). The company recruits about 2500-3500 fresh talent every yearacross ICAI, B-Schools and select Agriculture and Law colleges, though the bulk of therecruitment would be from B-Schools. Salaries at MBA-level would range from Rs. 3lakhs to 12 lakhs depending on the institute and the candidates profile.

    The firm is quite upfront about the opportunities and presents a clear picture of what isin store. Banking is not exactly a glamorous job, says Ram Kumar, Exectuive Director. It

    http://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountanthttp://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountanthttp://www.careers360.com/news/7467-Industry-relevant-MBA-programmeshttp://www.careers360.com/news/7452-India-s-Top-B-Schools_Public-Privatehttp://www.careers360.com/news/4972-Interview-Amarjit-chopra-President-of-ICAIhttp://www.careers360.com/news/7615-after-10-2-legal-studyhttp://www.careers360.com/news/7537-how-to-select-a-bschoolhttp://www.careers360.com/news/4888-Make-a-career-in-Bankinghttp://www.careers360.com/news/4888-Make-a-career-in-Bankinghttp://www.careers360.com/news/7537-how-to-select-a-bschoolhttp://www.careers360.com/news/7615-after-10-2-legal-studyhttp://www.careers360.com/news/4972-Interview-Amarjit-chopra-President-of-ICAIhttp://www.careers360.com/news/7452-India-s-Top-B-Schools_Public-Privatehttp://www.careers360.com/news/7467-Industry-relevant-MBA-programmeshttp://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountanthttp://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountant
  • 7/28/2019 Icici Bank Project 11 (1)

    13/48

    demands meticulousness and demands in depth knowledge. So the company seeks outstudents who show the hunger for performance and are team players. The recruitmentprocess consists of an aptitude test, a group discussion, psychometric tests (which isoutsourced to SH, which is a UK-based business) and invariably several rounds ofinterviews. When we are selecting fresh talent passion shou ld be there, customer-orientation, conscience should be there. Dynamism, passion come first, compliance issecond, says Saurab Singh

    Off-campus hiring/ direct hiring

    The company also recruits people off- campus. Positions in middle management andspecialized functions like Law, Foreign Exchange and Technology Assessment arerecruited directly throughadvertisements, referrals and through Head Hunters. Massrecruitment at front office, executivesand Sales functions are done at national level.

    Capital Strenght

    ICICI Bank is India's second-largest bank with total assets of Rs. 4,736.47 billion (US$93 billion) at March 31, 2012 and profit after tax Rs. 64.65 billion (US$ 1,271 million) for

    the year ended March 31, 2012. The Bank has a network of 3,100 branches and 10,486

    ATMs in India, and has a presence in 19 countries, including India. . It is the second

    largest bank in India by assets and third largest by market capitalization.

    http://www.careers360.com/news/4885-Advisory-Student-exchange-programmeshttp://www.careers360.com/news/7774-career-advertisinghttp://www.careers360.com/news/3761-Front-Office-At-your-servicehttp://www.careers360.com/news/newsdetails.aspx?category=251&news_id=7111http://en.wikipedia.org/wiki/Market_capitalizationhttp://en.wikipedia.org/wiki/Market_capitalizationhttp://www.careers360.com/news/newsdetails.aspx?category=251&news_id=7111http://www.careers360.com/news/3761-Front-Office-At-your-servicehttp://www.careers360.com/news/7774-career-advertisinghttp://www.careers360.com/news/4885-Advisory-Student-exchange-programmes
  • 7/28/2019 Icici Bank Project 11 (1)

    14/48

    3

    CONCEPTUAL ANALYSIS

    2.3.1 CREATE ACCOUNTThis module is used by the user to create a new account to join services of online banking.

    The user is required to fill in a few details and is automatically assigned as an user at the end

    of process.

    2.3.2 LOGIN

    This module is used by all the users to log into the account. The user is required enter his/her

    user name and password. After login user will be redirected to the users home page.

    2.3.3 UPDATE PROFILE

    Update profile module will be used to update or change any detail of user such as address,

    phone number, city, state, etc.

    2.3.4 PASSWORD RECOVERY

    This module is used to recover the lost password by the user by entering his/her valid email

    address. This email address will be matched from database and automatically generated

    email will be sent to the user containing his/her user name and password.

    2.3.5 VIEW PROFILE

    This module is the automatically generated page when user clicks the view profile button.

    This contain the user account detail such as name, account balance, email id, address, city.

    2.3.6 ATM AND BANK LOCATOR

    This module is used to find the address and location of ATM and banks in the selected city.

  • 7/28/2019 Icici Bank Project 11 (1)

    15/48

    2.3.7 AMOUNT TRANSACTION

    This module is the user view page after login where he/she can transfer the amount to other

    account by providing the amount to be transferred and the account number where to be

    transferred.

    2.3.8 CONTACT FORM

    This module is used by both registered and non-registered user to contact bank or to give any

    feedback trough message. His/her message will be saved into the database and further bank

    can contact him/her.

    2.3.9 EMI AND LOAD INTEREST CALCULATOR

    This module is used to calculate the interest amount of EMI and load by proving the interest

    rate, total amount and duration.

    2.3.10 DELETE ACCOUNT

    This module is used to delete the users account by the confirmation of user.

    2.3.11 LOGOUT

    This module is used to logout from the users session and redirected to the home page of

    website.

  • 7/28/2019 Icici Bank Project 11 (1)

    16/48

    3. SYSTEM ANALYSIS

    3.1 Functional requirement

    3.1.1 System requirement:

    3.1.2 Program requirement

    The following are the most essential requirements for developing and hosting web applications:

    (ii) Server-side Runtime Support - This includes support for network services and a runtime for

    executing the applications.

    (iii) Deployment SupportDeployment is the process of installing the application on the server.

    Deployment could also include customizing the application.

    3.1.3 Stability & speed

    SPEED delivers unparalleled analysis into the latest developments in payments systems, realtime gross settlement, straight-through-processing, securities trading, risk management andbanking technology.

    It is the essential source of information policymakers and market participants like you read tostay informed about the policy issues shaping settlements, payments, e-money and e-trading.

    Few sources of information set out to analyse changes in the financial infrastructure as a whole.They stay in their silo. Yet increasingly what happens in one area has far reaching implicationsfor all others.

    SPEED aims to help you track these developments not just at a national or global level, but as anintegrated whole.

    3.2 Feasibility study

    3.2.1 Operational

    Now almost all Banks branches are connected through the online banking facilities. Thetransactions of a particular bank are transmitted through the Micro-Bank software from INFLEX

  • 7/28/2019 Icici Bank Project 11 (1)

    17/48

    Solutions to the Head Office, where every data is stored in the database.Real-time On-line any branch banking for the clients is used to facilitate the clients to deposit /draw or remit funds to and from their accounts, from one bank to another.Meanwhile, for the Smooth operation and efficient functioning of the system they havecompleted the proper training to the related personnel

    3.2.2 Technical

    .NET Programming Framework

    The .NET framework is a cluster of different technologies. It includes:

    The .NET languages, which include C# and Visual Basic .NET, the object-oriented and

    modernized successor to Visual Basic 6.0.

    The Common Language Runtime (CLR), the .NET runtime engine that executes all .NETprograms, and provides modern services such as automatic memory management, security,

    optimization, and garbage collection etc.

    The .NET class library which collects thousands of pieces of pre-built functionality that you

    can snap in to your applications. These are sometimes organized into technology sets, such

    as ADO.NET (the technology for creating database applications) and Windows Forms (th

  • 7/28/2019 Icici Bank Project 11 (1)

    18/48

    technology for creating desktop user interfaces)

  • 7/28/2019 Icici Bank Project 11 (1)

    19/48

    Online Banking System Requirements

    Bremer Bank recommends you download the most recent version of anyof the web browsers below, each of which supports 128-bit encryptionand HTML 4.0. If using a different browser than those listed, or a lowerversion, you may have difficulty using certain tools and functions inOnline Banking. In addition to using a supported browser, you mustenable JavaScript for optimal interaction with Online Banking. Pleasenote: Bremer Bank does not support beta versions of any browser.

    Our Internet Banking is a full Internet based service which doesnot require you to download any additional software. To meet

    our security standards your browser must support 128-bit SSLencryption. This page lists our recommended minimum

    hardware, operating system and browser requirements toaccess Internet Banking.

    Internet Banking

    Eligibility

    This Internet banking services is available to the following type of ICICI

    Bank account holders:

    Savings Account holders

    Credit Card holders

    Demat Account holders

    Loan Account holders

    Joint account holders can also apply for the ICICI bank internet banking

    services by submitting the filled-up Internet Banking Form at any ICICI

    Bank Branch.

    4

    ANALYSIS OF THE PROBLEM

    Existing banking system is a manual system, which leads to a number of problems in

    maintaining proper records. These are:

    http://www.icicibank.com/Personal-Banking/insta-banking/internet-banking/pdf/net_registration_new.pdfhttp://www.icicibank.com/Personal-Banking/insta-banking/internet-banking/pdf/net_registration_new.pdf
  • 7/28/2019 Icici Bank Project 11 (1)

    20/48

    1. PAPER WORK: All the activities that are performed by Management involve a lot of paper

    work involving register consultations and entries. A separate file has to be maintained for each

    kind of activity and for different periods of time.

    2. TIME CONSUMPTION: A lot of time is consumed in referencing the registers involved for

    particular activities and a lot of computation as well as report verification activity is also paper

    based and time consuming.

    3. COMPLEXITY: Complexity of information handling and the gathering and determination of

    information is usually the most difficult problem faced.

    4. REDUNDANCY: Maintaining separate files for each department can lead to duplication of

    data present in files. This can lead to:

    a) Inconsistencies

    b) Update anomalies

    c) Decentralization problems

    5. HUMAN ERRORS: Human kind of errors may be generated in typing errors and slow

    arithmetic calculations, fatigue and boredom.

    6. ILLEGAL ACCESS: The security of a lot of documents, which are paper, based if difficult

    may be in terms of illegal access or manipulation by malicious personals either intentionally or

    by accident.

  • 7/28/2019 Icici Bank Project 11 (1)

    21/48

    7. DYNAMIC ENVIRONMENT: As the working environment is dynamic and company policies

    change time and again, changing the way of working will be difficult.

    2. General Description

    2.1 Product function:

    Track Account Level Data: In this module, check the authentication of users.

    Service Level Agreements: It contains the agreements of providing the services related tousers.

    User Contact Information: It maintains all the details (Personal, Official and Contact) of theusers.

    Product Access Right Details: It maintains the information that does which user have therights of using which service.

    Problem statement User

    A problem statement is a concise description of the issues that need to be addressed by a problem

    solving team and should be presented to them (or created by them) before they try to solve theproblem. When bringing together a team to achieve a particular purpose provide them with aproblem statement. A good problem statement should answer these questions:

    1. What is the problem? This should explain why the team is needed.2. Who has the problem or who is the client/customer? This should explain who needs the

    solution and who will decide the problem has been solved.3. What form can the resolution be? What is the scope and limitations (in time, money,

    resources, technologies) that can be used to solve the problem? Does the client want awhite paper? A web-tool? A new feature for a product? A brainstormingon a topic?

    The primary purpose of a problem statement is to focus the attention of the problem solvingteam. However, if the focus of the problem is too narrow or the scope of the solution too limitedthe creativity and innovation of the solution can be stifling.

  • 7/28/2019 Icici Bank Project 11 (1)

    22/48

    In project management, the problem statement is part of the project charter. It lists what'sessential about the project and enables the project manager to identify the project scope as wellas the project stakeholders.

    A research-worthy problem statement is the description of an active challenge (i.e. problem)faced by researchers and/or practitioners that does not have adequate solutions availableincluding the argumentation for its viability based on solid peer-reviewed sources as well astheoretical foundation. The research-worthy problem statement should address all six questions:what, how, where, when, why, and who. On the other hand, a statement of the problem is one ortwo sentences claim that outlines the problem that the study addresses. The statement of theproblem should briefly address the question: What is the problem that the research will address?

  • 7/28/2019 Icici Bank Project 11 (1)

    23/48

    PREFACE

    With the rapid globalization of the Indian economy, enterprises are facing with ever changingcompetitive environment. Enterprises are adopting strategies aimed at developing competitive

    advantage based on enhanced customer value in terms of product differentiation, quality, speed,

    service and costs. In the post liberalization era, with the deregulation of Indian economy, the

    financial service sector witnessing a complete metamorphosis and technology is playing a very

    significant role in this record. Over the last decade India has been one of the fastest adopters of

    information technology, particularly because of its capability to provide software solution to

    organizations around the world. This capability has provided a tremendous impetuous to the

    domestic banking industry in India to deploy the latest in technology, particularly in the Internet

    banking and e-commerce arenas. Banks are growing in size by mergers and acquisitions, which

    have been driven by communication and technology. Technology is playing a major role in

    increasing the efficiency, courtesy and speed of customer service. It is said to be the age of E-

    banking. An Online Banking user is expected to perform at least one of the following

    transactions online:

    1. Checking account balance

    2. Transaction

    3. Paying bills

    4. Transferring funds between accounts

    5. Calculate EMI and Loan interests

    From a banks perspective, using the Internet is more efficient than using other distribution

    mediums because banks are looking for an increased customer base. Using multiple distribution

    channels increases effective market coverage by enabling different products to be targeted at

  • 7/28/2019 Icici Bank Project 11 (1)

    24/48

    different demographic segments. Also Banks cannot risk losing customers to competitors within

    the aggressive competition in the banking industry around the world. Moreover Internet delivery

    offers customized service to suit the needs and the likes of each user. Mass customization

    happens effectively through Online Banking. It reduces cost and replaces time spent on routine

    errands with spending time on business errands. Online Banking means less staff members,

    smaller infrastructure demands, compared with other banking channels. From the customers

    perspective, Online Banking provides a convenient and effective way to manage finances that is

    easily accessible 24 hours a day, seven days a week. In addition information is up to date.

    Nevertheless Online Banking has disadvantages for banks like how to work the technology, set-

    up cost, legal issues, and lack of personal contact with customers. And for customers there are

    security and privacy issues.

    SYSTEM STUDY AND ANALISYS

    SYSTEM ANALYSIS

    System analysis is a process of gathering and interpreting facts, diagnosing problems and the

    information to recommend improvements on the system. It is a problem solving activity that

    requires intensive communication between the system users and system developers. Systemanalysis or study is an important phase of any system development process. The system is

    studied to the minutest detail and analyzed. The system analyst plays the role of the interrogator

    and dwells deep into the working of the present system. The system is viewed as a whole and the

    input to the system are identified. The outputs from the organizations are traced to the various

    processes. System analysis is concerned with becoming aware of the problem, identifying the

    relevant and decisional variables, analyzing and synthesizing the various factors and determining

  • 7/28/2019 Icici Bank Project 11 (1)

    25/48

    an optimal or at least a satisfactory solution or program of action.

    A detailed study of the process must be made by various techniques like interviews,

    questionnaires etc. The data collected by these sources must be scrutinized to arrive to a

    conclusion. The conclusion is an understanding of how the system functions. This system is

    called the existing system. Now the existing system is subjected to close study and problem areas

    are identified. The designer now functions as a problem solver and tries to sort out the

    difficulties that the enterprise faces. The solutions are given as proposals. The proposal is then

    weighed with the existing system analytically and the best one is selected. The proposal is

    presented to the user for an endorsement by the user. The proposal is reviewed on user request

    and suitable changes are made. This is loop that ends as soon as the user is satisfied with

    proposal.

    Preliminary study is the process of gathering and interpreting facts, using the information for

    further studies on the system. Preliminary study is problem solving activity that requires

    intensive communication between the system users and system developers. It does various

    feasibility studies. In these studies a rough figure of the system activities can be obtained, from

    which the decision about the strategies to be followed for effective system study and analysis can

    be taken.

    EXISTING SYSTEM

    In the existing system the transactions are done only manually but in proposed system we have tocomputerize all the banking transaction using the software Online Banking.

    2. 1.1 PROBLEMS WITH EXISTING SYSTEM

    Lack of security of data.

    More man power.

    Time consuming.

    Consumes large volume of pare work.

    Needs manual calculations.

    No direct role for the higher officials.

    Damage of machines due to lack of attention.

    To avoid all these limitations and make the working more accurately the system needs to be

  • 7/28/2019 Icici Bank Project 11 (1)

    26/48

    computerized.

    PROPOSED SYSTEM

    The aim of proposed system is to develop a system of improved facilities. The proposed system

    can overcome all the limitations of the existing system. The system provides proper security and

    reduces the manual work.

    2. 2. 1 ADVANTAGES OF THE PROPOSED SYSTEM

    The system is very simple in design and to implement. The system requires very low system

    resources and the system will work in almost all configurations. It has got following features

    Security of data.

    Ensure data accuracy's.

    Proper control of the higher officials.

    Reduce the damages of the machines.

    Minimize manual data entry.

    Minimum time needed for the various processing.

    Greater efficiency.

    Better service. User friendliness and interactive.

    Minimum time required.

    2.3. FEASIBILITY STUDY

    Feasibility study is made to see if the project on completion will serve the purpose of the

    organization for the amount of work, effort and the time that spend on it. Feasibility study lets

    the developer foresee the future of the project and the usefulness. A feasibility study of a system

    proposal is according to its workability, which is the impact on the organization, ability to meet

    their user needs and effective use of resources. Thus when a new application is proposed it

    normally goes through a feasibility study before it is approved for development.

    The document provide the feasibility of the project that is being designed and lists various areas

    that were considered very carefully during the feasibility study of this project such as Technical,

    Economic and Operational feasibilities. The following are its features:

  • 7/28/2019 Icici Bank Project 11 (1)

    27/48

    TECHNICAL FEASIBILITY

    The system must be evaluated from the technical point of view first. The assessment of this

    feasibility must be based on an outline design of the system requirement in the terms of input,

    output, programs and procedures. Having identified an outline system, the investigation must go

    on to suggest the type of equipment, required method developing the system, of running the

    system once it has been designed.

    Technical issues raised during the investigation are:

    Does the existing technology sufficient for the suggested one Can the system expand if

    developed

    The project should be developed such that the necessary functions and performance are achieved

    within the constraints. The project is developed within latest technology. Through the technology

    may become obsolete after some period of time, due to the fact that never version of same

    software supports older versions, the system may still be used. So there are minimal constraints

    involved with this project. The system has been developed using Java the project is technically

    feasible for development.

    ECONOMIC FEASIBILITY

    The developing system must be justified by cost and benefit. Criteria to ensure that effort isconcentrated on project, which will give best, return at the earliest. One of the factors, which

    affect the development of a new system, is the cost it would require.

    The following are some of the important financial questions asked during preliminary

    investigation:

    The costs conduct a full system investigation.

    The cost of the hardware and software.

    The benefits in the form of reduced costs or fewer costly errors.

    Since the system is developed as part of project work, there is no manual cost to spend for the

    proposed system. Also all the resources are already available, it give an indication of the system

    is economically possible for development.

  • 7/28/2019 Icici Bank Project 11 (1)

    28/48

    2.3.3. BEHAVIORAL FEASIBILITY

    This includes the following questions:

    > Is there sufficient support for the users

    > Will the proposed system cause harm

    The project would be beneficial because it satisfies the objectives when developed and installed.

    All behavioral aspects are considered carefully and conclude that the project is behaviorally

    feasible.

    SYSTEM DESIGN 3.1 INTRODUCTION

    Design is the first step into the development phase for any engineered product or system. Design

    is a creative process. A good design is the key to effective system. The term "design" is defined

    as "the process of applying various techniques and principles for the purpose of defining a

    process or a system in sufficient detail to permit its physical realization". It may be defined as a

    process of applying various techniques and principles for the purpose of defining a device, a

    process or a system in sufficient detail to permit its physical realization. Software design sits at

    the technical kernel of the software engineering process and is applied regardless of the

    development paradigm that is used. The system design develops the architectural detail required

    to build a system or product. As in the case of any systematic approach, this software too has

    undergone the best possible design phase fine tuning all efficiency, performance and accuracy

    levels. The design phase is a transition from a user oriented document to a document to theprogrammers or database personnel. System design goes through two phases of development:

    Logical and Physical Design.

    LOGICAL DESIGN:

    The logical flow of a system and define the boundaries of a system. It includes the following

    steps:

    Reviews the current physical system - its data flows, file content, volumes , frequencies etc.

    Prepares output specifications - that is, determines the format, content and frequency of

    reports.

    Prepares input specifications - format, content and most of the input functions.

    Prepares edit, security and control specifications.

    Specifies the implementation plan.

    Prepares a logical design walk through of the information flow, output, input, controls and

  • 7/28/2019 Icici Bank Project 11 (1)

    29/48

    implementation plan.

    Reviews benefits, costs, target dates and system constraints.

    PHYSICAL DESIGN:

    Physical system produces the working systems by define the design specifications that tell the

    programmers exactly what the candidate system must do. It includes the following steps.

    Design the physical system.

    Specify input and output media.

    Design the database and specify backup procedures.

    Design physical information flow through the system and a physical design Walk through.

    Plan system implementation.

    Prepare a conversion schedule and target date.

    Determine training procedures, courses and timetable.

    Devise a test and implementation plan and specify any new hardware/software.

    Update benefits , costs , conversion date and system constraints

    Design/Specification activities:

    Concept formulation.

    Problem understanding.

    High level requirements proposals. Feasibility study.

    Requirements engineering.

    Architectural design.

    MODULE DESIGN Admin

    The Administrator logs in using the admin login. In this module two operations are done. During

    login the Login and Password is verified with that in the database

    INPUT DESIGN

    The design of input focuses on controlling the amount of input required, controlling the errors,

    avoiding delay, avoiding extra steps and keeping the process simple. The input is designed in

  • 7/28/2019 Icici Bank Project 11 (1)

    30/48

    such a way so that it provides security and ease of use with retaining the privacy. Input Design

    considered the following things:

    o What data should be given as input

    o How the data should be arranged or coded

    o The dialog to guide the operating personnel in providing input.

    o Methods for preparing input validations and steps to follow when error occur.

    OBJECTIVES

    Input Design is the process of converting a user-oriented description of the input into a

    computer-based system. This design is important to avoid errors in the data input process and

    show the correct direction to the management for getting correct information from the

    computerized system.

    It is achieved by creating user-friendly screens for the data entry to handle large volume of data.

    The goal of designing input is to make data entry easier and to be free from errors. The data entry

    screen is designed in such a way that all the data manipulates can be performed. It also provides

    record viewing facilities.

    When the data is entered it will check for its validity. Data can be entered with the help of

    screens. Appropriate messages are provided as when needed so that the user will not be in a

    maize of instant. Thus the objective of input design is to create an input layout that is easy to

    follow

    OUTPUT DESIGN

    A quality output is one, which meets the requirements of the end user and presents the

    information clearly. In output design it is determined how the information is to be displaced for

    immediate need and also the hard copy output. It is the most important and direct source

    information to the user. Efficient and intelligent output design improves the system's relationship

    to help user decision-making.

  • 7/28/2019 Icici Bank Project 11 (1)

    31/48

    Designing computer output should proceed in an organized, well thought out manner; the right

    output must be developed while ensuring that each output element is designed so that people will

    find the system can use easily and effectively. When analysis design computer output, they

    should :

    Identify the specific output that is needed to meet the requirements.

    Select methods for presenting information.

    Create document, report, or other formats that contain information produced by the system.

    3.3 DATABASE DESIGN

    A database is an organized mechanism that has the capability of storing information through

    which a user can retrieve stored information in an effective and efficient manner. The data is the

    purpose of any database and must be protected.

    The database design is a two level process. In the first step, user requirements are gathered

    together and a database is designed which will meet these requirements as clearly as possible.

    This step is called Information Level Design and it is taken independent of any individual

    DBMS.In the second step, this Information level design is transferred into a design for the specific

    DBMS that will be used to implement the system in question. This step is called Physical Level

    Design, concerned with the characteristics of the specific DBMS that will be used. A database

    design runs parallel with the system design. The organization of the data in the database is aimed

    to achieve the following two major objectives.

    Data Integrity

    Data independence

    Normalization is the process of decomposing the attributes in an application, which results in a

    set of tables with very simple structure. The purpose of normalization is to make tables as simple

    as possible. Normalization is carried out in this system for the following reasons.

    To structure the data so that there is no repetition of data , this helps in saving.

    To permit simple retrieval of data in response to query and report request.

  • 7/28/2019 Icici Bank Project 11 (1)

    32/48

    To simplify the maintenance of the data through updates, insertions, deletions.

    To reduce the need to restructure or reorganize data which new application requirements

    arise.

    RELATIONAL DATABASE MANAGEMENT SYSTEM (RDBMS):

    A relational model represents the database as a collection of relations. Each relation resembles a

    table of values or file of records. In formal relational model terminology, a row is called a tuple,

    a column header is called an attribute and the table is called a relation. A relational database

    consists of a collection of tables, each of which is assigned a unique name. A row in a tale

    represents a set of related values.

    RELATIONS, DOMAINS & ATTRIBUTES:

    A table is a relation. The rows in a table are called tuples. A tuple is an ordered set of n elements.

    Columns are referred to as attributes. Relationships have been set between every table in the

    database. This ensures both Referential and Entity Relationship Integrity. A domain D is a set of

    atomic values. A common method of specifying a domain is to specify a data type from which

    the data values forming the domain are drawn. It is also useful to specify a name for the domainto help in interpreting its values. Every value in a relation is atomic, that is not decomposable.

    RELATIONSHIPS:

    Table relationships are established using Key. The two main keys of prime importance are

    Primary Key & Foreign Key. Entity Integrity and Referential Integrity Relationships can be

    established with these keys.Entity Integrity enforces that no Primary Key can have null

    values.Referential Integrity enforces that no Primary Key can have null values. Referential

    Integrity for each distinct Foreign Key value, there must exist a matching Primary Key value in

    the same domain. Other key are Super Key and Candidate Keys. Relationships have been set

    between every table in the database. This ensures both Referential and Entity Relationship

    Integrity.

    NORMALIZATION:

  • 7/28/2019 Icici Bank Project 11 (1)

    33/48

    As the name implies, it denoted putting things in the normal form. The application developer via

    normalization tries to achieve a sensible organization of data into proper tables and columns and

    where names can be easily correlated to the data by the user. Normalization eliminates repeating

    groups at data and thereby avoids data redundancy which proves to be a great burden on the

    computer resources. These includes:

    Normalize the data.

    Choose proper names for the tables and columns.

    Choose the proper name for the data.

    First Normal Form:

    The First Normal Form states that the domain of an attribute must include only atomic values

    and that the value of any attribute in a tuple must be a single value from the domain of that

    attribute. In other words 1NF disallows "relations within relations" or "relations as attribute

    values within tuples". The only attribute values permitted by 1NF are single atomic or indivisible

    values.

    The first step is to put the data into First Normal Form. This can be donor by moving data into

    separate tables where the data is of similar type in each table. Each table is given a Primary Keyor Foreign Key as per requirement of the project. In this we form new relations for each

    nonatomic attribute or nested relation. This eliminated repeating groups of data.

    A relation is said to be in first normal form if only if it satisfies the constraints that contain the

    primary key only.

    Second Normal Form:

    According to Second Normal Form, For relations where primary key contains multiple attributes,

    no nonkey attribute should be functionally dependent on a part of the primary key.

    In this we decompose and setup a new relation for each partial key with its dependent attributes.

    Make sure to keep a relation with the original primary key and any attributes that are fully

  • 7/28/2019 Icici Bank Project 11 (1)

    34/48

    functionally dependent on it. This step helps in taking out data that is only dependant on apart of

    the key.

    A relation is said to be in second normal form if and only if it satisfies all the first normal form

    conditions for the primary key and every non-primary key attributes of the relation is fully

    dependent on its primary key alone. Third Normal Form:

    According to Third Normal Form, Relation should not have a nonkey attribute functionally

    determined by another nonkey attribute or by a set of nonkey attributes. That is, there should be

    no transitive dependency on the primary key.

    In this we decompose and set up relation that includes the nonkey attributes that functionally

    determines other nonkey attributes. This step is taken to get rid of anything that does not depend

    entirely on the Primary Key.

    A relation is said to be in third normal form if only if it is in second normal form and more over

    the non key attributes of the relation should not be depend on other non key attribute.

    5.2 SYSTEM IMPLEMENTATION AND TESTING

    Implementation is the stage of the project where the theoretical design is turned into a working

    system. It can be considered to be the most crucial stage in achieving a successful new system

    gaining the users confidence that the new system will work and will be effective and accurate. It

    is primarily concerned with user training and documentation. Conversion usually takes place

    about the same time the user is being trained or later. Implementation simply means convening a

    new system design into operation, which is the process of converting a new revised system

    design into an operational one.

    INTEGRATION TESTING

    Integration testing is systematic technique for constructing the program structure while at the

  • 7/28/2019 Icici Bank Project 11 (1)

    35/48

    same time conducting tests to uncover errors associated with interfacing. The objective is to take

    unit tested components and build a program structure that has been dictated by design. The entire

    program is tested as whole. Correction is difficult because isolation of causes is complicated by

    vast expanse of entire program. Once these errors are corrected, new ones appear and the process

    continues in a seemingly endless loop.

    After unit testing in Sell-Soft System all the modules were integrated to test for any

    inconsistencies in the interfaces. Moreover differences in program structures were removed and a

    unique program structure was evolved.

    VALIDATION TESTING OR SYSTEM TESTING

    This is the final step in testing. In this the entire system was tested as a whole with all forms,

    code, modules and class modules. This form of testing is popularly known as Black Box testing

    or System testing.

    Black Box testing method focuses on the functional requirements of the software. That is, Black

    Box testing enables the software engineer to derive sets of input conditions that will fully

    exercise all functional requirements for a program.

    Black Box testing attempts to find errors in the following categories; incorrect or missingfunctions, interface errors, errors in data structures or external data access, performance errors

    and initialization errors and termination errors.

    OUTPUT TESTING OR USER ACCEPTANCE TESTING

    The system considered is tested for user acceptance; here it should satisfy the firm's need. The

    software should keep in touch with perspective system; user at the time of developing and

    making changes whenever required. This done with respect to the following points

    Input Screen Designs,

    Output Screen Designs,

    Online message to guide the user and the like.

    The above testing is done taking various kinds of test data. Preparation of test data plays a vital

  • 7/28/2019 Icici Bank Project 11 (1)

    36/48

    role in the system testing. After preparing the test data, the system under study is tested using

    that test data. While testing the system by which test data errors are again uncovered and

    corrected by using above testing steps and corrections are also noted for future use.

    5.3. TRAINING

    Once the system is successfully developed the next important step is to ensure that the

    administrators are well trained to handle the system. This is because the success of a system

    invariably depends on how they are operated and used. The implementation depends upon the

    right people being at the right place at the right time. Education involves creating the right

    atmosphere and motivating the user. The administrators are familiarized with the run procedures

    of the system, working through the sequence of activities on an ongoing basis.

    Implementation is the state in the project where the theoretical design is turned into a working

    system. By this, the users get the confidence that the system will work effectively. The system

    can be implemented only after through testing.

    The systems personnel check the feasibility of the system. The actual data were inputted to the

    system and the working of the system was closely monitored. The master option was selected

    from the main menu and the actual data were input through the corresponding input screens. Thedata movement was studied and found to be correct queries option was then selected and this

    contains various reports. Utilities provide various data needed for inventory was input and the

    module was test run. Satisfactory results were obtained. Reports related to these processes were

    also successfully generated. Various input screen formats are listed in the appendix.

    Implementation walkthroughs ensure that the completed system actually solves the original

    problem. This walkthrough occurs just before the system goes into use, and it should include

    careful review of all manuals, training materials and system documentation. Again, users, the

    analyst and the members of the computer services staff may attend this meeting.

    CONCLUSION

    Using "Online Banking " , customers can access their bank accounts in order to make cash

    withdrawals (or credit card cash advances) and check their account balances as well as

  • 7/28/2019 Icici Bank Project 11 (1)

    37/48

    purchasing mobile cell phone prepaid credit. In this the customer is identified by inserting a

    plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique

    card number and some security information, such as an expiration date or CVC (CVV). Security

    is provided by the customer entering a personal identification number (PIN).

    6

    BIBLIOGRAPHY

    BOOKS:

    1. Charles Hampfed (2000) 'Visual Basic' University of Toronto

    2. Herbert Schildt (2000) 'Visual Basic 6.0' Tata McGraw Hill3. John Zukowski (2000) 'Visual Basic 6.0' 'BPB Publications

    4. Jamie Jaworsky 'Visual Basic 6.0'Techmedia

    5. Stefen Denninger 'Visual Basic 6.0'Author's Press

    6. Ian Somerville 'Software engineering'

    7. Rajeev mall 'Software engineering'

    8. Elmasri Navathe 'Fundamentals of database systems'

    Internet banking is a product of e-commerce in the field of banking and financial services. In

    what can be described as business to customer domain for banking industry, Internet banking

    offers different online services like balance enquiry, balance transfer, opening account, calculate

    EMIs etc. Mostly, these are traditional services offered through internet as a new delivery

    channel. Banks are also offering payment services on the behalf of their customers who shop in

    different e-shops, e-malls etc. Further, different banks have different levels of such services

    offered, starting from level-1 where only information is disseminated through internet to level-3

    where online transactions are put through.

    1.1 PURPOSE OF THE SYSTEM

  • 7/28/2019 Icici Bank Project 11 (1)

    38/48

    1. SECURITY: There is a lot of security of data on this content management system. One

    cannot open our system without knowing the password. Immediately after opening login screen

    will appear on screen. Only after entering the correct username and password user can operate

    our system.

    2. REFERENTIAL INTEGRITY: User cannot change the date in the transaction files.

    Addition of data can be done only on the master files date in transaction files cannot be entered

    until addition is done on the master files.

    3. EASY RETRIEVAL OF DATA: Data is retrieved easily and quick using sql commands. On

    line commands are used to retrieve huge amount of data.

    4. GENERATION OF AUTOMATIC VALUES: In project in some screen some fields

    generated automatically like Profile detail, Account number, etc.

    OVERVIEW OF PROPOSED SYSTEM

    1. MENU DRIVEN:

    The project uses menu throughout which we can choose required options. Menus are self-

    explanatory, as they are very easy to use and user can go to any other web page using the menu.

    2. USER CONFIRMATION:

    Whenever the user tries to delete or edit the data, the system asks for the confirmation. This is

    used to avoid the accidental changes to the database. A confirmation is also provided for the exitof the application.

    3. GRAPHICAL USER INTERFACE:

  • 7/28/2019 Icici Bank Project 11 (1)

    39/48

    User is provided with a graphical interface in which user can select from various options and can

    perform desired operations with perfect understanding of the menu selected.

    4. MULTIPLE DOCUMENT INTERFACE:

    The package provides a multiple document interface to the user. The user can view more than

    one entry form or pages at the same time.

    5. SECURITY AND ACCESS: A password form has been provided at the beginning of the

    package. Entering the correct password will take user to the main user page

    3

    CONCEPTUAL ANALYSIS

    2.3.1 CREATE ACCOUNT

    This module is used by the user to create a new account to join services of online banking.

    The user is required to fill in a few details and is automatically assigned as an user at the end

    of process.

    2.3.2 LOGIN

    This module is used by all the users to log into the account. The user is required enter his/her

    user name and password. After login user will be redirected to the users home page.

    2.3.3 UPDATE PROFILE

    Update profile module will be used to update or change any detail of user such as address,phone number, city, state, etc.

    2.3.4 PASSWORD RECOVERY

  • 7/28/2019 Icici Bank Project 11 (1)

    40/48

    This module is used to recover the lost password by the user by entering his/her valid email

    address. This email address will be matched from database and automatically generated

    email will be sent to the user containing his/her user name and password.

    2.3.5 VIEW PROFILE

    This module is the automatically generated page when user clicks the view profile button.

    This contain the user account detail such as name, account balance, email id, address, city.

    2.3.6 ATM AND BANK LOCATOR

    This module is used to find the address and location of ATM and banks in the selected city.

    2.3.7 AMOUNT TRANSACTION

    This module is the user view page after login where he/she can transfer the amount to other

    account by providing the amount to be transferred and the account number where to be

    transferred.

    2.3.8 CONTACT FORM

    This module is used by both registered and non-registered user to contact bank or to give any

    feedback trough message. His/her message will be saved into the database and further bank

    can contact him/her.

    2.3.9 EMI AND LOAD INTEREST CALCULATOR

    This module is used to calculate the interest amount of EMI and load by proving the interest

    rate, total amount and duration.

  • 7/28/2019 Icici Bank Project 11 (1)

    41/48

    2.3.10 DELETE ACCOUNT

    This module is used to delete the users account by the confirmation of user.

    2.3.11 LOGOUT

    6. Performance requirement

    The completion of a system is achieved only after it has been thoroughly tested. Though

    this gives a feel the project is completed, there cannot be any project without going through this

    stage. Hence in this stage it is decided whether the project can undergo the real time environment

    execution without any break downs, therefore a package can be rejected even at this stage.

    6.1 SYSTEM TESTING

    Testing is a set of activities that can be planned in advance and conducted systematically. The

    proposed system is tested in parallel with the software that consists of its own phases of analysis,

    implementation, testing and maintenance. Following are the tests conducted on the system.

    6.2 UNIT TESTING

    During the implementation of the system each module of the system was tested separately to

    uncover errors with in its boundaries. User interface was used as a guide in the process.

    6.3 MODULE TESTING

  • 7/28/2019 Icici Bank Project 11 (1)

    42/48

    A module is composed of various programs related to that module. Module testing is done to

    check the module functionality and interaction between units within a module.

    It checks the functionality of each program with relation to other programs within the same

    module. It then tests the overall functionality of each module.

    6.4 INTEGRATION TESTING

    Integration testing is a systematic technique for constructing the program structure while

    conducting tests to uncover errors associated with interfacing. The objective is to take unit-tested

    module and build a program structure that has been dictated by design.

    6.5 ACCEPTANCE TESTING

    The software has been tested with the realistic data given by the client and produced fruitful

    results. The client satisfying all the requirements specified by them has also developed the

    software within the time limitation specified. A demonstration has been given to the client and

    the end-user giving all the operational features.

    7. Non functional attributes

    7.1 Security

  • 7/28/2019 Icici Bank Project 11 (1)

    43/48

    Event management is the application of project management to the creation and development

    of festivals, events ,extra vagenga and conferences.

    Event management involves studying the intricacies of the brand, identifying the target audience,

    devising the event concept, planning the logistics and coordinating the technical aspects before

    actually executing the modalities of the proposed event. Post-event analysis and ensuring a returnon investment have become significant drivers for the event industry.

    The recent growth of festivals and events as an industry around the world means that the

    management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a

    large impact on their communities and, in some cases, the whole country.

    The industry now includes events of all sizes from the Olympics down to a breakfast meeting for

    ten business people. Many industries, charitable organization and interest groups will hold events

    of some size in order to market themselves, build business relationships, raise money orcelebrate.

    7.2 Reliability

    Internet banking renders location and time irrelevant, and empowers customers with greatercontrol of their accounts. Banks achieve cost and efficiency gains in a large number ofoperational areas. This paper addresses the aspects of reliability and accessibility from a banking

    enterprise point of view and puts forth present day solutions to problems involving these issues.An Indian perspective of Internet banking is also looked at in order to gaining a betterperspective regarding the situation.

    7.3 Maintainability

    The aptitude of a system to undergo repair and evolution.

    (1) The ease with which a software system or component can be modified to correctfaults, improve performance or other attributes, or adapt to a changed environment.

    (2) The ease with which a hardware system or component can be retained in, or restoredto, a state in which it can perform its required functions. [IEEE Std. 610.12]

    7.4 Portability

    Portability in high-level computer programming is the usability of the same software in differentenvironments. The prerequirement for portability is the generalized abstractionbetween the

    http://en.wikipedia.org/wiki/High-level_programming_languagehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Abstraction_(computer_science)http://en.wikipedia.org/wiki/Abstraction_(computer_science)http://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/High-level_programming_language
  • 7/28/2019 Icici Bank Project 11 (1)

    44/48

    application logic and system interfaces. When software with the same functionality is producedfor several computing platforms, portability is the key issue for development cost reduction.

    7.5 Reusability

    In computer science and software engineering, reusability is the likelihood a segment of sourcecode that can be used again to add new functionalities with slight or no modification. Reusablemodules and classes reduce implementation time, increase the likelihood that prior testing anduse has eliminated bugs and localizes code modifications when a change in implementation isrequired.

    Subroutines orfunctions are the simplest form of reuse. A chunk of code is regularly organizedusing modules ornamespaces into layers. Proponents claim that objects and offer a moreadvanced form of reusability, although it has been tough to objectively measure and define levelsor scores of reusability.

    The ability to reuse relies in an essential way on the ability to build larger things from smaller

    parts, and being able to identify commonalities among those parts. Reusability is often a requiredcharacteristic ofplatform software. Reusability brings several aspects to softwaredevelopment that do not need to be considered when reusability is not required.

    Reusability implies some explicit managementofbuild, packaging, distribution, installation, configuration, deployment, maintenance and upgrade issues. If these issues are not considered, software may appear to be reusablefrom designpoint of view, but will not be reused in practice.

    Software reusability more specifically refers to design features of a software element (orcollection of software elements) that enhance its suitability for reuse.

    7.6 Resource utilization

    A supply chain network uses resources of various kinds: manufacturing resources (machines,

    material handlers, tools, etc.); storage resources (warehouses, automated storage and retrieval

    systems); logistics resources (trucks, rail transport, air-cargo carriers, etc.); human resources

    (labor, scientific and technical personnel); and financial (working capital, stocks, etc.). The

    objective is to utilize these assets or resources efficiently so as to maximize customer service

    levels, minimize lead times, and optimize inventory levels.

    7.7 Stable and speed efficiency

    The implementation is the final and important phase. It involves User training, system testing

    and successful running of the developed system. The users test the developed system when

    http://en.wikipedia.org/wiki/Interface_(computer_science)http://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Computer_sciencehttp://en.wikipedia.org/wiki/Software_engineeringhttp://en.wikipedia.org/wiki/Subroutinehttp://en.wikipedia.org/wiki/Function_(programming)http://en.wikipedia.org/wiki/Module_(programming)http://en.wikipedia.org/wiki/Namespace_(computer_science)http://en.wikipedia.org/wiki/Layer_(HTML_tag)http://en.wikipedia.org/wiki/Object_(computer_science)http://en.wikipedia.org/wiki/Commonalityhttp://en.wikipedia.org/wiki/Platform_(computing)http://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Software_buildhttp://en.wikipedia.org/wiki/Packaginghttp://en.wikipedia.org/wiki/Distribution_(business)http://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Computer_configurationhttp://en.wikipedia.org/wiki/Software_deploymenthttp://en.wikipedia.org/wiki/Software_maintenancehttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Software_designhttp://en.wikipedia.org/wiki/Software_designhttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Software_maintenancehttp://en.wikipedia.org/wiki/Software_deploymenthttp://en.wikipedia.org/wiki/Computer_configurationhttp://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Distribution_(business)http://en.wikipedia.org/wiki/Packaginghttp://en.wikipedia.org/wiki/Software_buildhttp://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Platform_(computing)http://en.wikipedia.org/wiki/Commonalityhttp://en.wikipedia.org/wiki/Object_(computer_science)http://en.wikipedia.org/wiki/Layer_(HTML_tag)http://en.wikipedia.org/wiki/Namespace_(computer_science)http://en.wikipedia.org/wiki/Module_(programming)http://en.wikipedia.org/wiki/Function_(programming)http://en.wikipedia.org/wiki/Subroutinehttp://en.wikipedia.org/wiki/Software_engineeringhttp://en.wikipedia.org/wiki/Computer_sciencehttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Interface_(computer_science)
  • 7/28/2019 Icici Bank Project 11 (1)

    45/48

    changes are made according to the needs. The testing phase involves the testing of the developed

    system using various kinds of data. An elaborate testing of data is prepared and system is tested

    using the tests data.

    Implementation is the stage where theoretical design turned into a working system.

    Implementation is planned carefully to propose system to avoid unanticipated problems. Manypreparations involved before and during the implementation of proposed system. The system

    needed to be plugged in to the organizations network then it could be accessed from anywhere,

    after a user logins into the portal. The tasks that had to be done to implement the system were to

    create the database tables in the organization database domain. Then the administrator was

    granted his role so that the system could be accessed.

    The next phase in the implementation was to educate the system. A demonstration of all the

    functions that can be carried out by the system was given to examination department person, who

    will make extensive use of the system.

    8.Security

    8.1 Description

    Event management is the application of project management to the creation and development

    of festivals, events ,extra vagenga and conferences.

    Event management involves studying the intricacies of the brand, identifying the target audience,

    devising the event concept, planning the logistics and coordinating the technical aspects before

    actually executing the modalities of the proposed event. Post-event analysis and ensuring a returnon investment have become significant drivers for the event industry.

    The recent growth of festivals and events as an industry around the world means that the

    management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a

    large impact on their communities and, in some cases, the whole country.

  • 7/28/2019 Icici Bank Project 11 (1)

    46/48

    The industry now includes events of all sizes from the Olympics down to a breakfast meeting for

    ten business people. Many industries, charitable organization and interest groups will hold events

    of some size in order to market themselves, build business relationships, raise money or

    celebrate.

    8.2 Technical issues

    Software companies service event planners with a complete Tool, Hotel Booking Tool,

    Travel Booking Tool, Budgeting Tool etc.

    As far as the technical issues related to this project from security point of view, there is

    no chance of steal the data until either we want or if there is any problem in the coding

    section.

    8.3 Cost and schedule

    Merely we think of the cost estimation on the basis of the following points:

    Static IP for WEB ---- null

    Paper work & reports ---- Rs.400

    Labour costs ---- null

    Other expenses ---- Rs. 50

    Now looking at the time limit of 15 days and working for 2 hours and work to do we can

    divide our work in following parts and complete it.

    8.4 Risk

    Risk is the term applied to a logical and semantic method of establishing the context,

    identifying, analyzing, evaluating, treating, monitoring and communicating risks associated with

    any activity, function or process in a way that will enable organizations to maximize

    losses and minimize opportunities.

  • 7/28/2019 Icici Bank Project 11 (1)

    47/48

    The complete RISK ANALYSIS is given below in the table :-

    S.NO. RISK ITEMS. RISK MANAGEMENT TECHNIQUES.

    1. Personnel

    Shortfalls

    Team comprises of the persons who are ignorant or novice in the

    security issues and also in the technology that we are going to use

    for the implementation of the same.

    2. Unrealistic

    Schedule and

    Budget

    The term/ time span allotted is very short, quite insufficient and the

    things are really next to impossible to be in such a short span of

    time, with the same working hours per day.

    3. Developing the

    wrong s/w

    functions

    Mission Analysis is strong but what if a person or more gets

    diverted from.

    4. User interface For the user interface developed , even after getting it sanctioned

    from the opposite side if it denies to accept the existing user

    interface.

    5. Continuation

    stream of

    requirementchanges.

    What if the user side even after signing the contract are

    continuously asking for the changes and modification an undue

    problem would be there in the development of the software andundue time would be utilized for the same which can ultimately

    result in a delay in the project.

    Risk may occur with the WEB is

    Internet speed Proper security and communication for password and premium

    submission.

    We have to take certain important measures to not face these risks to occur.

  • 7/28/2019 Icici Bank Project 11 (1)

    48/48