Anda di halaman 1dari 61

A STUDY ON

ANALYSIS ON MOBILE BANKING


CHAPTERS PAGE NO

CHAPTER-1 7-10

INTRODUCTION 7


NEED FOR THE STUDY 8

SCOPE OF THE STUDY 8

OBJECTIVES OF THE STUDY 9

METHODOLOGY OF THE STUDY 9

LIMITATIONS OF THE STUDY 10
CHAPTER-2 11-16


BANK PROFILE 12-16
CHAPTER-3 17-29


THEORETICAL FRAME WORK 18-29
CHAPTER-4 30-60


ANALYSIS & INTERPRETATION 31-60
CHAPTER-5


SUMMARY 62

FINDINGS 63

SUGGESTIONS 64

CONCLUSION 65
BIBLOGRAPHY 65
CHAPTER-1

INTRODUCTION

NEED FOR THE STUDY

SCOPE OF THE STUDY

OBJECTVES OF THE STUDY

METHODOLOGY OF THE STUDY

LIMITATIONS OF THE STUDY

2
INTRODUCTION

Over the last few years, the mobile and wireless market has been one of the fastest

growing markets in the world and it is still growing at a rapid pace. With mobile

technology, banks can offer a wide range of services to their customers such as balance

enquiry, mini statement, cheque status etc.

Mobile Banking is an application that lives on a mobile phone, which lets one

access their bank accounts with just a few presses away. This application lets the banking

institutions provide value added services to their customers. Mobile Banking is the most

promising way to reach more number of customers who cannot frequently visit banks or

ATMs to get the information about their account. And due to its ability to provide

services anywhere anytime the customers of Mobile Banking rapidly increases.

Mobile Banking is being used to attract low-income populations in rural locations.

3
NEED FOR THE STUDY

Mobile banking. Mobile banking is a service provided by a bank or other financial

institution that allows its customers to conduct financial transactions remotely using a

mobile device such as a smart phone or tablet.

Mobile banking is a service provided by a bank or other financial institution that

allows its customers to conduct financial transactions remotely using a mobile device

such as a smart phone or tablet. Unlike the related internet banking it uses software,

usually called an app, provided by the financial institution for the purpose. Mobile

banking is usually available on a 24-hour basis. Some financial institutions have

restrictions on which accounts may be accessed through mobile banking as well as a limit

on the amount that can be transacted.

SCOPE OF THE STUDY

The scope of the study is confined to an indepth analysis of the banking habits of

the selected household bank customers belonging to three districts; Visakhapatnam,

Vijayawada, Guntur of Andhra Pradesh state. The present study started with an analysis

of the general banking habits of the respondents. Later, it focused its attention on the

electronic banking habits of the respondents. Even though a variety of multiple e-banking

delivery channels are operating in the state, the scope of the study is confined to four

popular e-banking delivery channels namely; ATMs, internet banking, mobile banking

and credit card.

4
OBJECTVES OF THE STUDY

1. To position a bank in terms of the progress made by it in the direction of

Universal Banking.

2. To examine the risk exposure of banks.

3. To critically examine the existing debate on Universal banking in the context of


the samples studied.

METHODOLOGY OF THE STUDY

This study is designed as a descriptive one. Data used for this study is derived

from primary and secondary sources. Secondary data is collected from various reports of

RBI, SBI, economic review of Planning Commission, research papers in various national

and international journals and e-journals, articles etc. Primary data was collected by way

of conducting sample survey among the customers of selected banks operating in AP

state. A public opinion was gathered through a detailed survey, using structured and pre-

tested questionnaire. A reliability analysis was conducted on the 84 scaled statements

used for pilot study in order to check the internal consistency of these statements and

found that the collected data was highly reliable. The size of the sample is taken as 360

which was determined by way of applying a scientific formula.

5
LIMITATIONS OF THE STUDY

1. The research was based on secondary as well as primary data. The primary data

required for research objective No. 3 was collected from the samples based in

Visakhapatnam city. Although Visakhapatnam is one of the most important cities of the

country and a commercial hub of South India, samples selected from the city cannot be

considered as a proper representation of the population of the country.

However, the objective of the survey was to check the mood/perception of the

bank managers as well as customers of the bank with regard to the concept of Universal

banking. Thus, this may not create hindrance in achieving the desired objective even if

Visakhapatnam city cannot replicate other major banking hubs of the country.

2. For primary data, non response error cannot be ruled out.

6
Chapter -2
 BANK PROFILE

7
BANK PROFILE

State Bank of India (SBI) is an Indian multinational, public sector banking and

financial services company. It is a government-owned corporation with its headquarters

in Mumbai, Maharashtra. On 1st April, 2017, State Bank of India, which is India's largest

Bank merged with five of its Associate Banks (State Bank of Bikaner & Jaipur, State

Bank of Hyderabad, State Bank of Mysore, State Bank of Patiala and State Bank of

Travancore) and Bharatiya Mahila Bank with itself. This is the first ever large scale

consolidation in the Indian Banking Industry. With the merger, State Bank of India will

enter the league of top 50 global banks with a balance sheet size of ₹33 trillion, 278,000

employees, 420 million customers, and more than 24,000 branches and 59,000 ATMs.

SBI's market share will increase to 22 percent from 17 per cent. It has 198 offices in 37

countries; 301 correspondents in 72 countries. The company is ranked 232nd on the

Fortune Global 500 list of the world's biggest corporations as of 2016.

The bank traces its ancestry to British India, through the Imperial Bank of India,

to the founding, in 1806, of the Bank of Calcutta, making it the oldest commercial bank

in the Indian subcontinent. Bank of Madras merged into the other two "presidency banks"

in British India, Bank of Calcutta and Bank of Bombay, to form the Imperial Bank of

India, which in turn became the State Bank of India in 1955. Government of India owned

the Imperial Bank of India in 1955, with Reserve Bank of India (India's Central Bank)

taking a 60% stake, and renamed it the State Bank of India. In 2008, the government took

over the stake held by the Reserve Bank of India.

State Bank of India has 20% market share in deposits and loans among Indian

commercial banks.

8
History

The roots of the State Bank of India lie in the first decade of the 19th century,

when the Bank of Calcutta later renamed the Bank of Bengal, was established on 2 June

1806. The Bank of Bengal was one of three Presidency banks, the other two being the

Bank of Bombay (incorporated on 15 April 1840) and the Bank of Madras (incorporated

on 1 July 1843). All three Presidency banks were incorporated as joint stock companies

and were the result of royal charters. These three banks received the exclusive right to

issue paper currency till 1861 when, with the Paper Currency Act, the right was taken

over by the Government of India. The Presidency banks amalgamated on 27 January

1921, and the re-organised banking entity took as its name Imperial Bank of India. The

Imperial Bank of India remained a joint stock company but without Government

participation.

Pursuant to the provisions of the State Bank of India Act of 1955, the Reserve

Bank of India, which is India's central bank, acquired a controlling interest in the

Imperial Bank of India. On 1 July 1955, the imperial Bank of India became the State

Bank of India. In 2008, the Government of India acquired the Reserve Bank of India's

stake in SBI so as to remove any conflict of interest because the RBI is the country's

banking regulatory authority.

In 1959, the government passed the State Bank of India (Subsidiary Banks) Act.

This made SBI subsidiaries of eight that had belonged to princely states prior to their

nationalization and operational takeover between September 1959 and October 1960,

which made eight state banks associates of SBI. This UNE with the first Five Year Plan,

which prioritised the development of rural India. The government integrated these banks

into the State Bank of India system to expand its rural outreach. In 1963 SBI merged

State Bank of Jaipur (est. 1943) and State Bank of Bikaner (est.1944).SBI has acquired

9
local banks in rescues. The first was the Bank of Bihar (est. 1911), which SBI acquired in

1969, together with its 28 branches. The next year SBI acquired National Bank of Lahore

(est. 1942), which had 24 branches. Five years later, in 1975, SBI acquired Krishnaram

Baldeo Bank, which had been established in 1916 in Gwalior State, under the patronage

of Maharaja Madho Rao Scindia. The bank had been the Dukan Pichadi, a small

moneylender, owned by the Maharaja. The new bank's first manager was Jall N. Broacha,

a Parsi. In 1985, SBI acquired the Bank of Cochin in Kerala, which had 120 branches.

SBI was the acquirer as its affiliate, the State Bank of Travancore, already had an

extensive network in Kerala. There has been a proposal to merge all the associate banks

[10]
into SBI to create a "mega bank" and streamline the group's operations. The first step

towards unification occurred on 13 August 2008 when State Bank of Saurashtra merged

with SBI, reducing the number of associate state banks from seven to six. On 19 June

2009, the SBI board approved the absorption of State Bank of Indore. SBI holds 98.3% in

State Bank of Indore. (Individuals who held the shares prior to its takeover by the

government hold the balance of 1.7 %.)

The acquisition of State Bank of Indore added 470 branches to SBI's existing

network of branches. Also, following the acquisition, SBI's total assets will approach ₹10

trillion. The total assets of SBI and the State Bank of Indore were ₹9,981,190 million as

of March 2009. The process of merging of State Bank of Indore was completed by April

2010, and the SBI Indore branches started functioning as SBI branches on 26 August

2010.

On 7 October 2013, Arundhati Bhattacharya became the first woman to be

appointed Chairperson of the bank. Mrs. Bhattacharya received an extension of two years

of service to merge into SBI the five remaining associated banks.

10
As of 2014–15, the bank had 191 overseas offices spread over 36 countries having

[16]
the largest presence in foreign markets among Indian banks. It has branches in

Singapore, Moscow, Colombo, Dhaka, Frankfurt, Hong Kong, Tehran, Johannesburg,

London, Los Angeles, Male in the Maldives, Muscat, Dubai, New York, Osaka, Sydney,

and Tokyo. It has offshore banking units in the Bahamas and Bahrain, and representative

offices in Myanmar, Bhutan and Cape Town. SBI has 7 retail banking branches in

Singapore. The Canadian subsidiary SBI Canada Bank (previously State Bank of India

(Canada)) also dates to 1982. It has six branches, four in the Toronto area and two in the

Vancouver area. SBI operates several foreign subsidiaries or affiliates. In 1989, SBI

established an offshore bank: State Bank of India International (Mauritius) Ltd in

Mauritius. SBI International (Mauritius) Ltd amalgamated with The Indian Ocean

International Bank, which has been doing retail banking business in Mauritius since 1979

with the new name, SBI (Mauritius) Ltd. Today, SBI (Mauritius) Ltd is having fully

integrated 14 branches- 13 Retail Branches covering major cities and town of Mauritius,

including Rodrigues, and 1 Global Business Branch at Ebene in Mauritius. Apart from

Branch Banking, customers also have the convenience of 24x7 ATM Banking at 18 ATMs

across the country. Bank also has a 24x7 robust Internet Banking Channel enabling

customers to work from their homes and offices.

11
Non-banking subsidiaries.

Apart from its five associate banks, SBI also has the following non-banking

subsidiaries:

 SBI Capital Markets Ltd

 SBI Funds Management Pvt Ltd

 SBI Factors & Commercial Services Pvt Ltd

 SBI Cards & Payments Services Pvt. Ltd. (SBICPSL)

 SBI DFHI Ltd

 SBI Life Insurance Company Limited

 SBI General Insurance

In March 2001, SBI (with 74% of the total capital), joined with BNP Paribas

(with 26% of the remaining capital), to form a joint venture life insurance company

named SBI Life Insurance company Ltd. In 2004, SBI DFHI (Discount and Finance

House of India) was founded with its headquarters in Mumbai.

12
CHAPTER-3
 THEORTICAL FRAME WORK

13
THEORTICAL FRAME WORK

PROBLEM DEFINITION

3.1 Existing System

The first step of preliminary study in the system analysis process involves the identification of

needs for computerization. The motivation behind this project is to overcome all the defects in

the existing system.

Some defects in existing system are

Every time Customer has to visit the bank whenever he want to perform any transactions.

3.2 Proposed System

Features of proposed system



No need of visiting bank every time

All banking services like checking balance, mini-statement, applying for
cheques are provided in mobile.

3.3 User Classes and Characteristics

The Customer has to be very familiar with accessing the Internet and how to use the basic

controls displayed in the mobile. The Customer can request for new password, interacting

with mobile application.

3.4 Operating Environment

Software Requirements are Windows as Operating System. J2ME Tool Kit as Front-End

designing tools. MySql is used as Database Server. Tomcat server is the Web server.

Servlets are used as server side languages, J2ME tool kit for Mobile service.

14
3.5 Design and Implementation Constraints

This project will be developed using the technologies like Java, J2ME,Java

Servlets, MySQL and Web for all which I need to fetch knowledge on all of them in order

to code for the project. Also I‘ll be learning clearly about Software Development Life

Cycle.

3.6 User Documentation

This document also includes a user manual which assists the new user to go

about the project, he can even get the online help which caters the needs of a new user

and makes this project more user friendly, a step by step approach online makes it easy to

use software for a naïve user.

3.7 Module Description

In this we have five modules



Balance Enquiry

Mini Statement

Cheque Status Enquiry

Request for New Cheque book

Change Password

View Bills

 Balance Enquiry

This module provides facility to know the balance of the customer

 Mini Statement

This module gives the whole transaction details such as deposit, withdrawal and
balance.

15
 Cheque Status Enquiry

This module gives the withdrawal information if withdrawal mode is ‗Cheque‘

 Request for New Cheque

This module provides facility to request a new cheque book by the customer.

 Change Password

This module allows customer to change his current password to new password

2.8 HARDWARE AND SOFTWARE REQUIREMENTS

 Hard Ware Requirements



Processor:: Pentium-III (or) Higher

Ram:: 254MB (or) Higher

Cache:: 512MB

Hard disk:: 40GB

 Soft Ware Requirements



Technology: Java 2 Standard Edition, JDBC, and J2ME Tool Kit

Server Side Technologies: Servlets, Tomcat 5.5

Operating System: Microsoft Windows, Linux or Mac any version

3.2.1 FEASIBILITY STUDY

16
The next step in analysis is to verify the feasibility of the proposed system. ―All

projects are feasible given unlimited resources and infinite time―. But in reality both

resources and time are scarce. Project should confirm to time bounce and should be

optimal in there consumption of resources. This place a constant is approval of any project.

Feasibility has applied to Mobile Banking pertains to the following areas:



Technical feasibility

Operational feasibility

Economical feasibility

3.2.2 TECHNICAL FEASIBILITY

To determine whether the proposed system is technically feasible, we should take

into consideration the technical issues involved behind the system.

Mobile Banking uses the web technologies, which is rampantly employed these days

worldwide. The world without the web is incomprehensible today. That goes to proposed

system is technically feasible.

3.2.3 OPERATIONAL FEASIBILITY

To determine the operational feasibility of the system we should take into

consideration the awareness level of the users. This system is operational feasible since

the users are familiar with the technologies and hence there is no need to gear up the

personnel to use system. Also the system is very friendly and to use.

3.2.3. ECONOMIC FEASIBILITY

17
To decide whether a project is economically feasible, we have to consider various

factors as

Cost benefit analysis

Long-term returns

 Maintenance costs
The proposed Mobile Banking is computer based. It requires average

computing capabilities and access to internet, which are very basic requirements hence it

doesn‘t incur additional economic overheads, which renders the system economically

feasible.

3.3.1. SYSTEM DESIGN

System design is transition from a user oriented document to

programmers or data base personnel. The design is a solution, how to approach to the

creation of a new system. This is composed of several steps. It provides the

understanding and procedural details necessary for implementing the system

recommended in the feasibility study. Designing goes through logical and physical stages

of development, logical design reviews the present physical system, prepare input and

output specification, details of implementation plan and prepare a logical design

walkthrough.

The database tables are designed by analyzing functions involved in the

system and format of the fields is also designed. The fields in the database tables should

define their role in the system. The unnecessary fields should be avoided because it

affects the storage areas of the system. Then in the input and output screen design, the

design should be made user friendly. The menu should be precise and compact.

SOFTWARE DESIGN

In designing the software following principles are followed:

18
1. Modularity and partitioning: software is designed such that, each system should

consists of hierarchy of modules and serve to partition into separate function.

2. Coupling: modules should have little dependence on other modules of a system.

3. Cohesion: modules should carry out in a single processing function.

4.Shared use: avoid duplication by allowing a single module is called by other that need

the function it provides

3.3.2 DATA FLOW DIAGRAMS

Level 0 DFD for Customer

Customer Secure Communication Bank Application

Level-1 Subsystem Level

A level – 1 DFD describes the next level of details within the system, detailing the data

flows between subsystems, which makeup the whole

3.3.3 UML Diagrams

Usecase Diagram

Request to Cheque Book

19
customer ViewMiniStatements

Cheque Status

Change Password

View Bills

LogOut

Sequence Diagram for Login Process

user request mobile web server database


simulator

enter userid and password

userid,password is sent for process

process the values and check from the database

value return from the database

if valid login in to the form

if invalid same window displayed

20
Request for Change password

Request for mobile webserver Database


Password simulator

Request for password


process the request

Retype and confirm

process the user values

check from the database

forward result

return to mobile browser

Collabration diagram for login process

2: userid,password is sent for process


mobile web
simulator server
5: if valid login in to the form
6: if invalid same window displayed

1: enter userid and password 4:3: valueprocessreturnthefromvaluestheanddatabasecheck from the database

databas

user e request

21
Collabration for Change password

2: process the request

1: Request for password


3: Retype and confirm
Request for mobile
password simulator

7: return to mobile browser

4: process the user values

5: check from the database


webserv Databas
er E
6: forward result

3.3.4 DATABASE DESIGN:

TABLE- balance

Field Name Data type Constraints

Balid int Primary key

Amount Varchar(40)

Prestime timestamp

Transcid int

accnumber Varchar(6)

TABLE- Data type Constraints


22
check_requestField
Name

Reqid Int Not Null

Cheque_number int Not Null

Accnumber varchar Not Null

TABLE- deposit

Field Name Data type Constraints

Depid Int Not Null

Amount Varchar Not Null

Dptime Timestamp Not Null

Transcid Int Not Null

Accnumber varchar Not Null

TABLE- transaction
Field Name Data type Constraints
Transacid Int Not Null

Transcname Varchar Not Null

Transctime Timestamp Not Null

Accnumber Varchar Not Null

TABLE- withdrawField Data type Constraints


23
Name
Wid Int Not Null

Amount Varchar Not Null

Mode Timestamp Not Null

W_d_time Varchar Not Null

3.4.1 INPUT/OUTPUT DESIGN

3.4.2 Input design:

considering the requirements, procedures to collect the necessary input data

in most efficiently designed. The input design has been done keeping in view that, the

interaction of the user with the system being the most effective and simplified way.

Also the measures are taken for the following



Controlling the amount of input

Avoid unauthorized access to the certificate authenticator

Eliminating extra steps

Keeping the process simple

At this stage the input forms and screens are designe

3.4.3 Output design:

24
All the screens of the system are designed with a view to provide the user with

easy operations in simpler and efficient way, minimum key strokes possible.

Instructions and important information is emphasized on the screen. Almost every

screen is provided with no error and important messages and option selection

facilitates. Emphasis is given

for speedy processing and speedy transaction between the screens. Each screen assigned

to make it as much user friendly as possible by using interactive procedures. So to say

user can operate the system without much help from the operating manual.

25
CHAPTER-4
 ANALYSIS AND INTERPRETATION

26
ANALAYSIS AND INTERPRETATION

4.1.0 IMPLEMENTATION

OVERVIEW OF SOFTWARE DEVELOPMENT TOOLS AND TECHNOLOGIES

4.1 .2 MySQL

The database has become an integral part of almost every human's life. Without it,

many things we do would become very tedious, perhaps impossible tasks. Banks,

universities, and libraries are three examples of organizations that depend heavily on

some sort of database system. On the Internet, search engines, online shopping, and even

the website naming convention (http://www...) would be impossible without the use of a

database. A database that is implemented and interfaced on a computer is often termed a

database server.

One of the fastest SQL (Structured Query Language) database servers currently

on the market is the MySQL server. MySQL, available for download, offers the database

programmer with an array of options and capabilities rarely seen in other database

servers. What's more, MySQL is free of charge for those wishing to use it for private and

commercial use. Those wishing to develop applications specifically using MySQL should

consult MySQL's licensing section, as there is a charge for licensing the product. These

capabilities range across a number of topics, including the following-


Ability to handle an unlimited number of simultaneous users.

Capacity to handle 50,000,000+ records.

Very fast command execution, perhaps the fastest to be found on the market.

Easy and efficient user privilege system.

27
A database is really nothing more than a hierarchy of increasingly complex data

structures. In MySQL, the acknowledged structure for holding blocks (or records) of

information is called the table.

These records, in turn, are made up of the smallest object that can be

manipulated by the user, known as the data type. Together, one or more of these data

types form a record. A table holds the collection of records that make up part of the

database. We can consider the hierarchy of a database to be that of the following:

Database < Table < Record < Datatype

Datatypes come in several forms and sizes, allowing the programmer to create

tables suited for the scope of the project. The decisions made in choosing proper

datatypes greatly influence the performance of a database, so it is wise to have a detailed

understanding of these concepts.

MySQL Data types

MySQL is capable of many of the datatypes that even the novice programmer has

probably already been exposed to. Some of the more commonly used include:

INT (M) [Unsigned]

The INT datatype stores integers ranging from -2147483648 to 2147483647. An optional

"Unsigned" can be denoted with the declaration, modifying the range to be 0 to

4294967295

Ex :

Light years INT;

Valid integer: '-24567'. Invalid integer: '3000000000'.

28
Ex :

Light years INT unsigned;

Valid integer: '3000000000'. Invalid integer: '-24567'.

FLOAT [(M.D)]

A FLOAT represents small decimal numbers, used when a somewhat more precise

representation of a number is required.

Ex :

Rainfall FLOAT (4,2);

This could be used to represent rainfall average in centimeters per year, which could be a

decimal value. More specifically, FLOAT (4,2) states the fact that rainfall can hold up to

four characters and two decimal places. Thus,

42.35 is valid, accurately represented.

324.45 is invalid, rounded to 324.5.

2.2 is valid, accurately represented.

34.542 is invalid, rounded to 34.54.

Note: Due to the fact that FLOAT is rounded, those wishing to represent money values

would find it wise to use DECIMAL, a datatype found within MySQL that does not

round values. Consult the documentation for a complete explanation.

DATE

Stores date related information. The default format is 'YYYY-MM-DD', and ranges from

'0000-00-00' to '9999-12-31'. MySQL provides a powerful set of date formatting and

manipulation commands, too numerous to be covered within this article. However, one

can find these functions covered in detail within the MySQL documentation.

29
TEXT / BLOB

The text and blob data types are used when a string of 255 - 65535 characters is required

to be stored. This is useful when one would need to store an article such as the one you

are reading. However, there is no end space truncation as with VARCHAR AND CHAR.

The only difference between BLOB and TEXT is that TEXT is compared case

insensitively, while BLOB is compared case sensitively.

Records

Together, a group of declared datatypes form what is known as a record. A record can be

as small as one data variable, or as many as deemed needed. One or more records form

the structure of a table.

The Bigger Picture; Tables

Before we can execute commands on the database, we must first create a table in which

data can be stored. This is accomplished in the following manner:

Mysql > CREATE TABLE test (

> name VARCHAR (15),

> email VARCHAR (25),

> phone number INT,

> ID INT NOT NULL AUTO_INCREMENT,

> PRIMARY KEY (ID));

Ensuing output:

30
Query OK, 0 rows affected (0.10 sec)

Mysql >

The first table in your database has now been created. Note: no two tables can have

the same name.

Note (2): Each dataspace is more often referred to as a column.

Column Characteristics;

A name may not be made up of strictly numbers.

A name may start with a number.

A name may be up to 64 characters.

Other table options;

The following options can be placed after any datatype, adding other characteristics and

capabilities to them.


Primary Key. Used to differentiate one record from another. No two records
can have the same primary key. This is obviously useful when it is imperative

that no two records are mistaken to be the other.


Auto increment. A column with this function is automatically incremented one
value (previous + 1) when an insertion is made into the record. The

Data type is automatically incremented when 'NULL' is inserted into the

column.


NOT NULL. Signifies that the column can never be assigned a NULL value.

31
Ex :

soc_sec_number INT PRIMARY KEY;

No two soc_sec_number records can hold the same value.

ID_NUMBER INT AUTO_INCREMENT;

Insertion of records

Note: The originally created table, test, created in the last section will be used to illustrate

the examples in this section. Here it is again, for quick reference:

Mysql > CREATE TABLE test (

> name VARCHAR (15),

> email VARCHAR (25),

> phone_number INT,

> ID INT NOT NULL AUTO_INCREMENT,

> PRIMARY KEY (ID));

Insertion of data into the table is accomplished, logically enough, using the INSERT

command.

Mysql > INSERT INTO test VALUES

Mysq l> ('Bugs Bunny', 'carrots@devshed.com',

Mysql > 5554321, NULL);

Result, assuming the command was correctly entered:

Query OK, 1 row affected (0.02 sec)

Mysql >

32
Selection

A database would not be much use if one was not able to search and extract data from it.

In MySql terms, this is accomplished through the SELECT statement.

Mysql > SELECT * FROM test

Mysql > WHERE (name = "Bugs Bunny");

Result:

Name email phone ID

Bugs
carrots@devshed.com 5554321 1
Bunny

Let's assume we have inserted four differing records, all bearing the same name of "Bugs

Bunny", yet having different email addresses and phone numbers. The table test, would

look somewhat like the following:

Name email phone ID

Bugs Bunny carrots@devshed.com 5554321 1

Bugs Bunny peppers@devshed.com 5554331 2

Bugs Bunny lettuce@devshed.com 5554341 3

Bugs Bunny celery@devshed.com 5554351 4

33
Deletion

One can also delete records inserted into the table. This is accomplished through the

DELETE command.

mysql> DELETE FROM test

mysql> WHERE (name = "Bugs Bunny");

Result:

This would result in the deletion of all records within the table test containing name

"Bugs Bunny".

Another example:

Mysql > DELETE FROM test

Mysql > WHERE (phone_number = 5554321);

Result: (Using the previously illustrated example)

Name Email phone ID

Bugs Bunny peppers@devshed.com 5554331 2

Bugs Bunny lettuce@devshed.com 5554341 3

Bugs Bunny celery@devshed.com 5554351 4

34
Modification

MySQL also has the capability of modifying data already entered into the table. This is

accomplished through the UPDATE command.

Mysql > UPDATE test SET name = 'Daffy Duck'

Mysql > WHERE name = "Bugs Bunny";

Name Email phone ID

Daffy Duck peppers@devshed.com 5554331 2

Daffy Duck lettuce@devshed.com 5554341 3

Daffy Duck celery@devshed.com 5554351 4

This section, we covered the core MySQL database manipulation functions, basic

insertion, deletion, modification, and search. The next section will elaborate on these

capabilities, providing extended functioning and flexibility when manipulating the

database.

What we have covered so far is but a small part of what MySQL is capable of. Let's

delve a little deeper into the language, exploring some of the more advanced commands

of the language.

35
Logical Operations

MySQL includes full support of all basic logical operations.

AND (&&)

Mysql > SELECT * FROM test WHERE

Mysql > (name = "Bugs Bunny") AND

Mysql > (phone_number = 5554321);

Result:

All records containing the name "Bugs Bunny" AND the phone number '5554321' will be

displayed to the screen.

OR ( || )

Mysql > SELECT * FROM test WHERE

Mysql > (name = "Bugs Bunny") OR

Mysql > (phone_number = 5554321);

Result:

All records containing the name "Bugs Bunny" OR the phone number '5554321' will be

displayed to the screen.

NOT ( ! )

Mysql > SELECT * FROM test WHERE

Mysql > (name != "Bugs Bunny");

Result:

All records NOT containing the name "Bugs Bunny" will be displayed to the screen.

36
Order By

mysql> SELECT * FROM test WHERE

mysql> (name = "Bugs Bunny") ORDER BY

mysql> phone_number;

Result:

All records containing the name "Bugs Bunny" will be displayed to the screen, ordered in

respect to the phone_number.

Search functions

MySQL offers the user the ability to perform both general and specific searches on data.

mysql> SELECT * FROM test WHERE

mysql> (name LIKE "% gs Bunny");

Result:

All records containing the partial string "gs Bunny" will be displayed to the screen. This

would include such names as: "Bugs Bunny", "ags Bunny", "gs Bunny", and "234rtgs

Bunny".

Notice that "LIKE" has been used instead of the equals sign (=). "LIKE" signifies that

one is searching for an estimate of the data requested, and not necessarily an exact copy.

The '%' sign could be placed anywhere within the string. The method in which the server

searches for a string is dependent upon where one places the '%' sign.

mysql> SELECT * FROM test WHERE

mysql> (name LIKE "Bugs Bunny%");

37
Result:

All records containing the partial string "Bugs Bunny" will be displayed to the screen.

This would include such names as: "Bugs Bunnys", "Bugs Bunnyyyy453", "Bugs

Bunnytrtrtrtrtr", but not "gs Bunny".

Focused Search Results

One can also perform searches and display only certain columns.

mysql> SELECT name FROM test WHERE

mysql> (name = "Bugs Bunny");

Result:

name

Bugs Bunny

Alter table

Another very important function of MySQL is the ability to modify previously created

tables. This is accomplished via the ALTER statement. This function allows one to add,

modify, and delete columns, as well as rename the table, among other functions.

Example: Rename the table

mysql> ALTER table test RENAME mytest;

Example: Add a column

mysql> ALTER table mytest ADD birthday DATE;

38
Example: Modify a column

mysql> ALTER table mytest CHANGE

mysql> name newname VARCHAR (25);

Example: Delete a column

mysql> ALTER table mytest DROP newname;

Executing the above four functions would modify test, creating the following table:

mysql> TABLE mytest (

> email VARCHAR (25),

> phone_number INT,

> ID INT AUTO_INCREMENT,

> birthday DATE );

HTML

HTML, an initialism of Hypertext Markup Language, is the predominant markup

language for web pages. It provides a means to describe the structure of text-based

information in a document — by denoting certain text as headings, paragraphs, lists, and

so on — and to supplement that text with interactive forms, embedded images, and other

objects. HTML is written in the form of labels (known as tags), surrounded by angle

brackets. HTML can also describe, to some degree, the appearance and semantics of a

document, and can include embedded scripting language code which can affect the

behavior of web browsers and other HTML processors.

39
HTML provides tags (special codes) to make the document look attractive. HTML tags

are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the

presentation of the document. Anything that is not a tag is part of the document itself.

Basic HTML Tags:

<! -- --> Specifies comments

<A>……….</A> Creates hypertext links

<B>……….</B> Formats text as bold

<BIG>……….</BIG> Formats text in large font.

<BODY>…</BODY> Contains all tags and text in the HTML document

<CENTER>...</CENTER> Creates text

<DD>…</DD> Definition of a term

<DL>...</DL> Creates definition list

<FONT>…</FONT> Formats text with a particular font

<FORM>...</FORM> Encloses a fill-out form

<FRAME>...</FRAME> Defines a particular frame in a set of frames

<H#>…</H#> Creates headings of different levels( 1 – 6 )

<HEAD>...</HEAD> Contains tags that specify information about a document

<HR>...</HR> Creates a horizontal rule

<HTML>…</HTML> Contains all other HTML tags

<META>...</META> Provides meta-information about a document

<SCRIPT>…</SCRIPT> Contains client-side or server-side script

<TABLE>…</TABLE> Creates a table

<TD>…</TD> Indicates table data in a table

<TR>…</TR> Designates a table row

<TH>…</TH> Creates a heading in a table

40
Advantages


A HTML document is small and hence easy to send over the net. It is small
because it does not include formatted information.

HTML is platform independent.

HTML tags are not case-sensitive.

JavaScript

JavaScript is a script-based programming language that was developed by Netscape

Communication Corporation. JavaScript was originally called Live Script and renamed as

JavaScript to indicate its relationship with Java. JavaScript supports the development of

both client and server components of Web-based applications. On the client side, it can be

used to write programs that are executed by a Web browser within the context of a Web

page. On the server side, it can be used to write Web server programs that can process

information submitted by a Web browser and then update the browser‘s display

accordingly

Even though JavaScript supports both client and server Web programming, we prefer

JavaScript at Client side programming since most of the browsers supports it. JavaScript

is almost as easy to learn as HTML, and JavaScript statements can be included in HTML

documents by enclosing the statements between a pair of scripting tags

<SCRIPTS>.. </SCRIPT>.

<SCRIPT LANGUAGE = ―JavaScript‖>

JavaScript statements

</SCRIPT>
Here are a few things we can do with JavaScript:

Validate the contents of a form and make calculations.

Add scrolling or changing messages to the Browser‘s status line.

Animate images or rotate images that change when we move the mouse over

them.

Detect the browser in use and display different content for different browsers.

Detect installed plug-ins and notify the user if a plug-in is required.

We can do much more with JavaScript, including creating entire application.

JavaScript Vs Java

JavaScript and Java are entirely different languages. A few of the most glaring differences

are;

 Java applets are generally displayed in a box within the web document; JavaScript

can affect any part of the Web document itself.

 While JavaScript is best suited to simple applications and adding interactive

features to Web pages; Java can be used for incredibly complex applications.

There are many other differences but the important thing to remember is that JavaScript

and Java are separate languages. They are both useful for different things; in fact they can

be used together to combine their advantages.

Advantages


JavaScript can be used for Sever-side and Client-side scripting.

It is more flexible than VBScript.


JavaScript is the default scripting languages at Client-side since all the browsers
supports it.
Java Technology

Java technology is both a programming language and a platform.

The Java Programming Language

The Java programming language is a high-level language that can be characterized by all

of the following buzzwords:



Simple

Architecture neutral

Object oriented

Portable

Distributed

High performance
With most programming languages, you either compile or interpret a program so that you can run

it on your computer. The Java programming language is unusual in that a program is both

compiled and interpreted. With the compiler, first you translate a program into an intermediate

language called Java byte codes —the platform-independent codes interpreted by the interpreter

on the Java platform. The interpreter parses and runs each Java byte code instruction on the

computer. Compilation happens just once; interpretation occurs each time the program is

executed. The following figure illustrates how this works.

FIGURE 2- WORKING OF JAVA

You can think of Java bytecodes as the machine code instructions for the Java Virtual

Machine (Java VM). Every Java interpreter, whether it‘s a development tool or a Web

browser that can run applets, is an implementation of the Java VM. Java bytecodes help

make ―write once, run anywhere‖ possible. You can compile your program into

bytecodes on any platform that has a Java compiler. The bytecodes can then be run on

any implementation of the Java VM. That means that as long as a computer has a Java

VM, the same program written in the Java programming language can run on Windows

2000, a Solaris workstation, or on an iMac.


The Java Platform

A platform is the hardware or software environment in which a program runs.

We‘ve already mentioned some of the most popular platforms like Windows 2000, Linux,

Solaris, and MacOS. Most platforms can be described as a combination of the operating

system and hardware. The Java platform differs from most other platforms in that it‘s a

software-only platform that runs on top of other hardware-based platforms.

The Java platform has two components:



The Java Virtual Machine (Java VM)

The Java Application Programming Interface (Java API)

You‘ve already been introduced to the Java VM. It‘s the base for the Java

platform and is ported onto various hardware-based platforms.

The Java API is a large collection of ready-made software components that provide many

useful capabilities, such as graphical user interface (GUI) widgets. The Java API is

grouped into libraries of related classes and interfaces; these libraries are known as

packages. The next section, What Can Java Technology Do?, highlights what

functionality some of the packages in the Java API provide.

The following figure depicts a program that‘s running on the Java platform. As the figure

shows, the Java API and the virtual machine insulate the program from the hardware.

FIGURE 3- THE JAVA PLATFORM


Native code is code that after you compile it, the compiled code runs on a specific

hardware platform. As a platform-independent environment, the Java platform can be a

bit slower than native code. However, smart compilers, well-tuned interpreters, and just-
in-time bytecode compilers can bring performance close to that of native code without

threatening portability.

What Can Java Technology Do?

The most common types of programs written in the Java programming language are

applets and applications. If you‘ve surfed the Web, you‘re probably already familiar with

applets. An applet is a program that adheres to certain conventions that allow it to run

within a Java-enabled browser.

An application is a standalone program that runs directly on the Java platform. A

special kind of application known as a server serves and supports clients on a network.

Examples of servers are Web servers, proxy servers, mail servers, and print servers.

Another specialized program is a servlet. A servlet can almost be thought of as an applet

that runs on the server side. Java Servlets are a popular choice for building interactive

web applications, replacing the use of CGI scripts. Servlets are similar to applets in that

they are runtime extensions of applications. Instead of working in browsers, though,

servlets run within Java Web servers, configuring or tailoring the server.

How does the API support all these kinds of programs? It does so with packages

of software components that provide a wide range of functionality. Every full

implementation of the Java platform gives you the following features:

 The essentials: Objects, strings, threads, numbers, input and output, data

structures, system properties, date and time, and so on.

 Applets: The set of conventions used by applets.


 Networking: URLs, TCP (Transmission Control Protocol), UDP (User Data gram

Protocol) sockets, and IP (Internet Protocol) addresses.

 Security: Both low level and high level, including electronic signatures, public

and private key management, access control, and certificates.


TM
 Software components: Known as JavaBeans , can plug into existing

component architectures.

 Object serialization: Allows lightweight persistence and communication via

Remote Method Invocation (RMI).


TM
 Java Database Connectivity (JDBC ): Provides uniform access to a wide

range of relational databases.

The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure depicts what
is included in the Java 2 SDK.

FIGURE 4 – JAVA 2 SDK


Networking-TCP/IP stack

The TCP/IP stack is shorter than the OSI one:

FIGURE 5 – TCP/IP STACK

TCP is a connection-oriented protocol; UDP (User Datagram Protocol) is a

connectionless protocol.

IP datagram’s

The IP layer provides a connectionless and unreliable delivery system. It considers each

datagram independently of the others. Any association between datagram must be

supplied by the higher layers. The IP layer supplies a checksum that includes its own

header. The header includes the source and destination addresses. The IP layer handles

routing through an Internet. It is also responsible for breaking up large datagram into

smaller ones for transmission and reassembling them at the other end.
TCP

TCP supplies logic to give a reliable connection-oriented protocol above IP. It provides a

virtual circuit that two processes can use to communicate.

Internet addresses

In order to use a service, you must be able to find it. The Internet uses an address scheme

for machines so that they can be located. The address is a 32 bit integer which gives the

IP address. This encodes a network ID and more addressing. The network ID falls into

various classes according to the size of the network address.

Network address

Class A uses 8 bits for the network address with 24 bits left over for other addressing.

Class B uses 16 bit network addressing. Class C uses 24 bit network addressing and class

D uses all 32.

Subnet address

Internally, the UNIX network is divided into sub networks. Building 11 is currently on

one sub network and uses 10-bit addressing, allowing 1024 different hosts.

Host address

8 bits are finally used for host addresses within our subnet. This places a limit of 256

machines that can be on the subnet.


Total address

FIGURE 6 - IP ADDRESSING

The 32 bit address is usually written as 4 integers separated by dots.

Port addresses

A service exists on a host, and is identified by its port. This is a 16 bit number. To send a

message to a server, you send it to the port for that service of the host that it is running

on. This is not location transparency! Certain of these ports are "well known".

#include <sys/types.h>

#include <sys/socket.h>

int socket(int family, int type, int protocol);

Here "family" will be AF_INET for IP communications, protocol will be zero, and

type will depend on whether TCP or UDP is used. Two processes wishing to

communicate over a network create a socket each. These are similar to two ends of a pipe

- but the actual pipe does not yet exist.


4.2.1-TESTING

SOFTWARE TESTING

Testing

Software testing is a critical element of software quality assurance and

represents the ultimate review of specification, design and code generation.

Software Testing is the process used to help identify the correctness, completeness,

security, and quality of developed computer software. Testing is a process of technical

investigation, performed on behalf of stakeholders, that is intended to reveal quality-

related information about the product with respect to the context in which it is intended to

operate. This includes, but is not limited to, the process of executing a program or

application with the intent of finding errors. Quality is not an absolute; it is value to some

person. With that in mind, testing can never completely establish the correctness of

arbitrary computer software; testing furnishes a criticism or comparison that compares

the state and behaviour of the product against a specification. An important point is that

software testing should be distinguished from the separate discipline of Software Quality

Assurance (SQA), which encompasses all business process areas, not just testing.

Introduction

In general, software engineers distinguish software faults from software failures. In case

of a failure, the software does not do what the user expects. A fault is a programming

error that may or may not actually manifest as a failure. A fault can also be described as

an error in the correctness of the semantic of a computer program. A fault will become a

failure if the exact computation conditions are met, one of them being that the faulty

portion of computer software executes on the CPU. A fault can also turn into a failure

when the software is ported to a different hardware platform or a different compiler,


History

The separation of debugging from testing was initially introduced by Glenford J.

Myers in his 1978 book the "Art of Software Testing". Although his attention was on

breakage testing it illustrated the desire of the software engineering community to

separate fundamental development activities, such as debugging, from that of

verification. Drs. Dave Gelperin and William C. Hetzel classified in 1988 the phases and

goals in software testing as follows: until 1956 it was the debugging oriented period,

where testing was often associated to debugging: there was no clear difference between

testing and debugging. From 1957-1978 there was the demonstration oriented period

where debugging and testing was distinguished now - in this period it was shown, that

software satisfies the requirements. The time between 1979-1982 is announced as the

destruction oriented period, where the goal was to find errors. 1983-1987 is classified as

the evaluation oriented period: intention here is that during the software lifecycle a

product evaluation is provided and measuring quality. From 1988 on it was seen as

prevention oriented period where tests were to demonstrate that software satisfies its

specification, to detect faults and to prevent faults. Dr. Gelperin chaired the IEEE 829-

1988 (Test Documentation Standard) with Dr. Hetzel writing the book "The Complete

Guide of Software Testing". Both works were pivotal in to today's testing culture and

remain a consistent source of reference. Dr. Gelperin and Jerry E. Durant also went on to

develop High Impact Inspection Technology that builds upon traditional Inspections but

utilizes a test driven additive.


4.2.2 TESTING OBJECTIVES

To ensure that during operation the system will perform as per specification.

TO make sure that system meets the user requirements during operation


To make sure that during the operation, incorrect input, processing and output will
be detected

To see that when correct inputs are fed to the system the outputs are correct

To verify that the controls incorporated in the same system as intended

Testing is a process of executing a program with the intent of finding an error


A good test case is one that has a high probability of finding an as yet
undiscovered error

The software developed has been tested successfully using the following testing

strategies and any errors that are encountered are corrected and again the part of the

program or the procedure or function is put to testing until all the errors are removed. A

successful test is one that uncovers an as yet undiscovered error.

Note that the result of the system testing will prove that the system is working correctly.

It will give confidence to system designer, users of the system, prevent frustration during

implementation process etc.,

4.2.3 TEST CASE DESIGN

White box testing

White box testing is a testing case design method that uses the control structure of the

procedure design to derive test cases. All independents path in a module are exercised at

least once, all logical decisions are exercised at once, execute all loops at boundaries and

within their operational bounds exercise internal data structure to ensure their validity.
Here the customer is given three chances to enter a valid choice out of the given menu.

After which the control exits the current menu.

Black Box Testing

Black Box Testing attempts to find errors in following areas or categories,

incorrect or missing functions, interface error, errors in data structures, performance error

and initialization and termination error. Here all the input data must match the data type

to become a valid entry.

The following are the different tests at various levels:

Unit Testing

Unit testing is essentially for the verification of the code produced during

the coding phase and the goal is test the internal logic of the module/program. In the

Generic code project, the unit testing is done during coding phase of data entry

forms whether the functions are working properly or not. In this phase all the

drivers are tested they are rightly connected or not.

4.3.1-OUTPUT SCREENS

Step1 -Login Screen Step2-Home Page


Step3-Connect

Step4-Change Password

Step5- cheque Appilication Form Ste6- cheque Withdrawal Form


Step7- Mini Statement Step8- View Bills
CHAPTER-5

SUMMARY

FINDINGS

SUGGESTIONS

CONCLUSION

BIBLOGRAPHY
SUMMARY

There has been a sea change across the banking and financial sector in India in the

last ten years, the major credit for which is attributable to the Information Processing and

Communication Technology, commonly known as IT. It has changed the way in which

banking business is being done today. Bankers are now convinced that to 'create and

retain a customer is the key to succeed in this competitive market. Therefore banks

refocus on their core asset the customer. IT has changed the entire scenario of customer

bank relationship, adding growth to bank business and convenience to customers.

Technology has already helped in providing various delivery channels to customers. Now

the customers no longer have to go inside the bank for their regular banking needs. The

options are many to go to the nearest ATM or to the nearest internet enabled computer for

access to their account or they can use their own mobile handsets for doing banking

transactions. Computerization has reduced processing time in banking transactions. A

cheque now deposited gets cleared quickly.


FINDINGS

Major findings with regard to the banking habits of the respondents are listed

Below;

 The study reveals that majority of the customers are taking the service of their

respective banks for nearly seven years. They visit their bank branch atleast once

in a month. Bank wise classification gives the idea that even though new

generation ban customers have six years of experience with their banks, they are

more active in branch banking as compared to nationalized and AP based bank

customers. The result of age wise study shows that the older groups have been
using the services of the their respective banks for the last ten years followed by

elder group with seven years and youngsters with four years. However, it is

revealed that even though younger groups have less experience with their banks

as compared to older groups, they are more active users of banking than their

counterparts. Education wise study reveals that professionals and graduates have

six years of experience with their banks, for post graduates it is nearly eight years,

for SSLC group it is seven years and for Pre degree it is only five years.

 Income wise analysis also reveal that in the case of availability of ATMs, and

ATM transactions, all groups irrespective of their income status are well aware,

but in the case of mechanism of using ATMs, awareness level of very low income

group is slightly less as compared to other income categories.


SUGGESTIONS
Based on the above findings and conclusion on e-banking awareness, adoption,

experience and satisfaction, the following suggestions are made to make further

improvements in these aspects of e-banking.

1. The use of e-banking delivery channels is still not up to the mark as expected by

the banks. This requires awareness building among the customers about the

benefits of these services. Customers should be properly educated about the

mechanism of using these services.

2. The banks have to initiate steps to educate the customers about new banking

services / new products, ATMs, online banking, mobile banking etc. The banker

may have to conduct different programs like customers day, customer meet and

customer campaign in which they can directly interact with their customers and

educate them about their new products /services.

3. Banks should take prompt and timely action to ensure the smooth functioning of

ATMs. Customers should be relieved from their apprehensions and make them

feel comfortable while using ATMs.

4.For ensuring security, banks must appoint watch and ward staff who would also

be able to guide the customers for availing services at ATMs. Steps should also be

initiated to avoid the problem of technical breakdown which is common in some

of the ATM centers through regular inspection and preventive measures.

5. For adoption of internet banking, it is necessary that the banks offering this

service make the consumers aware about the availability of such a service

and explain how it adds value to their banking needs.


CONCLUSION

The Mobile Banking project has been successfully completed. The goal

of the system is achieved and the problems are solved. This project is developed in this

manner that is user friendly and required help is provided at different levels.

The primary objective is to provide the interactive service to all the

Customers. Different types of services are provided to both the admin and customer.

Customer can avail this service any time.



BIBLOGRAPHY
 www.arraydev.com/commerce/JIBC/000 1.07.htm

 www.arraydev.com/commerce/JIBC/03l 1-0l .htm.


 http://athena.sca.isr.umich.edu/scriptsl info/info.asp
 www.federalreserve.gov/pubs/fedsl199711997351199735pap.p

 http://www.studymode.com/subjects/objectives-of-mobile-banking-study-
page1.html

Anda mungkin juga menyukai