CHAPTER-1 7-10
INTRODUCTION 7
NEED FOR THE STUDY 8
SCOPE OF THE STUDY 8
OBJECTIVES OF THE STUDY 9
METHODOLOGY OF THE STUDY 9
LIMITATIONS OF THE STUDY 10
CHAPTER-2 11-16
BANK PROFILE 12-16
CHAPTER-3 17-29
THEORETICAL FRAME WORK 18-29
CHAPTER-4 30-60
ANALYSIS & INTERPRETATION 31-60
CHAPTER-5
SUMMARY 62
FINDINGS 63
SUGGESTIONS 64
CONCLUSION 65
BIBLOGRAPHY 65
CHAPTER-1
INTRODUCTION
NEED FOR THE STUDY
SCOPE OF THE STUDY
OBJECTVES OF THE STUDY
METHODOLOGY OF THE STUDY
LIMITATIONS OF THE STUDY
2
INTRODUCTION
Over the last few years, the mobile and wireless market has been one of the fastest
growing markets in the world and it is still growing at a rapid pace. With mobile
technology, banks can offer a wide range of services to their customers such as balance
Mobile Banking is an application that lives on a mobile phone, which lets one
access their bank accounts with just a few presses away. This application lets the banking
institutions provide value added services to their customers. Mobile Banking is the most
promising way to reach more number of customers who cannot frequently visit banks or
ATMs to get the information about their account. And due to its ability to provide
3
NEED FOR THE STUDY
institution that allows its customers to conduct financial transactions remotely using a
allows its customers to conduct financial transactions remotely using a mobile device
such as a smart phone or tablet. Unlike the related internet banking it uses software,
usually called an app, provided by the financial institution for the purpose. Mobile
restrictions on which accounts may be accessed through mobile banking as well as a limit
The scope of the study is confined to an indepth analysis of the banking habits of
Vijayawada, Guntur of Andhra Pradesh state. The present study started with an analysis
of the general banking habits of the respondents. Later, it focused its attention on the
electronic banking habits of the respondents. Even though a variety of multiple e-banking
delivery channels are operating in the state, the scope of the study is confined to four
popular e-banking delivery channels namely; ATMs, internet banking, mobile banking
4
OBJECTVES OF THE STUDY
Universal Banking.
This study is designed as a descriptive one. Data used for this study is derived
from primary and secondary sources. Secondary data is collected from various reports of
RBI, SBI, economic review of Planning Commission, research papers in various national
and international journals and e-journals, articles etc. Primary data was collected by way
state. A public opinion was gathered through a detailed survey, using structured and pre-
used for pilot study in order to check the internal consistency of these statements and
found that the collected data was highly reliable. The size of the sample is taken as 360
5
LIMITATIONS OF THE STUDY
1. The research was based on secondary as well as primary data. The primary data
required for research objective No. 3 was collected from the samples based in
Visakhapatnam city. Although Visakhapatnam is one of the most important cities of the
country and a commercial hub of South India, samples selected from the city cannot be
However, the objective of the survey was to check the mood/perception of the
bank managers as well as customers of the bank with regard to the concept of Universal
banking. Thus, this may not create hindrance in achieving the desired objective even if
Visakhapatnam city cannot replicate other major banking hubs of the country.
6
Chapter -2
BANK PROFILE
7
BANK PROFILE
State Bank of India (SBI) is an Indian multinational, public sector banking and
in Mumbai, Maharashtra. On 1st April, 2017, State Bank of India, which is India's largest
Bank merged with five of its Associate Banks (State Bank of Bikaner & Jaipur, State
Bank of Hyderabad, State Bank of Mysore, State Bank of Patiala and State Bank of
Travancore) and Bharatiya Mahila Bank with itself. This is the first ever large scale
consolidation in the Indian Banking Industry. With the merger, State Bank of India will
enter the league of top 50 global banks with a balance sheet size of ₹33 trillion, 278,000
employees, 420 million customers, and more than 24,000 branches and 59,000 ATMs.
SBI's market share will increase to 22 percent from 17 per cent. It has 198 offices in 37
The bank traces its ancestry to British India, through the Imperial Bank of India,
to the founding, in 1806, of the Bank of Calcutta, making it the oldest commercial bank
in the Indian subcontinent. Bank of Madras merged into the other two "presidency banks"
in British India, Bank of Calcutta and Bank of Bombay, to form the Imperial Bank of
India, which in turn became the State Bank of India in 1955. Government of India owned
the Imperial Bank of India in 1955, with Reserve Bank of India (India's Central Bank)
taking a 60% stake, and renamed it the State Bank of India. In 2008, the government took
State Bank of India has 20% market share in deposits and loans among Indian
commercial banks.
8
History
The roots of the State Bank of India lie in the first decade of the 19th century,
when the Bank of Calcutta later renamed the Bank of Bengal, was established on 2 June
1806. The Bank of Bengal was one of three Presidency banks, the other two being the
Bank of Bombay (incorporated on 15 April 1840) and the Bank of Madras (incorporated
on 1 July 1843). All three Presidency banks were incorporated as joint stock companies
and were the result of royal charters. These three banks received the exclusive right to
issue paper currency till 1861 when, with the Paper Currency Act, the right was taken
1921, and the re-organised banking entity took as its name Imperial Bank of India. The
Imperial Bank of India remained a joint stock company but without Government
participation.
Pursuant to the provisions of the State Bank of India Act of 1955, the Reserve
Bank of India, which is India's central bank, acquired a controlling interest in the
Imperial Bank of India. On 1 July 1955, the imperial Bank of India became the State
Bank of India. In 2008, the Government of India acquired the Reserve Bank of India's
stake in SBI so as to remove any conflict of interest because the RBI is the country's
In 1959, the government passed the State Bank of India (Subsidiary Banks) Act.
This made SBI subsidiaries of eight that had belonged to princely states prior to their
nationalization and operational takeover between September 1959 and October 1960,
which made eight state banks associates of SBI. This UNE with the first Five Year Plan,
which prioritised the development of rural India. The government integrated these banks
into the State Bank of India system to expand its rural outreach. In 1963 SBI merged
State Bank of Jaipur (est. 1943) and State Bank of Bikaner (est.1944).SBI has acquired
9
local banks in rescues. The first was the Bank of Bihar (est. 1911), which SBI acquired in
1969, together with its 28 branches. The next year SBI acquired National Bank of Lahore
(est. 1942), which had 24 branches. Five years later, in 1975, SBI acquired Krishnaram
Baldeo Bank, which had been established in 1916 in Gwalior State, under the patronage
of Maharaja Madho Rao Scindia. The bank had been the Dukan Pichadi, a small
moneylender, owned by the Maharaja. The new bank's first manager was Jall N. Broacha,
a Parsi. In 1985, SBI acquired the Bank of Cochin in Kerala, which had 120 branches.
SBI was the acquirer as its affiliate, the State Bank of Travancore, already had an
extensive network in Kerala. There has been a proposal to merge all the associate banks
[10]
into SBI to create a "mega bank" and streamline the group's operations. The first step
towards unification occurred on 13 August 2008 when State Bank of Saurashtra merged
with SBI, reducing the number of associate state banks from seven to six. On 19 June
2009, the SBI board approved the absorption of State Bank of Indore. SBI holds 98.3% in
State Bank of Indore. (Individuals who held the shares prior to its takeover by the
The acquisition of State Bank of Indore added 470 branches to SBI's existing
network of branches. Also, following the acquisition, SBI's total assets will approach ₹10
trillion. The total assets of SBI and the State Bank of Indore were ₹9,981,190 million as
of March 2009. The process of merging of State Bank of Indore was completed by April
2010, and the SBI Indore branches started functioning as SBI branches on 26 August
2010.
appointed Chairperson of the bank. Mrs. Bhattacharya received an extension of two years
10
As of 2014–15, the bank had 191 overseas offices spread over 36 countries having
[16]
the largest presence in foreign markets among Indian banks. It has branches in
London, Los Angeles, Male in the Maldives, Muscat, Dubai, New York, Osaka, Sydney,
and Tokyo. It has offshore banking units in the Bahamas and Bahrain, and representative
offices in Myanmar, Bhutan and Cape Town. SBI has 7 retail banking branches in
Singapore. The Canadian subsidiary SBI Canada Bank (previously State Bank of India
(Canada)) also dates to 1982. It has six branches, four in the Toronto area and two in the
Vancouver area. SBI operates several foreign subsidiaries or affiliates. In 1989, SBI
Mauritius. SBI International (Mauritius) Ltd amalgamated with The Indian Ocean
International Bank, which has been doing retail banking business in Mauritius since 1979
with the new name, SBI (Mauritius) Ltd. Today, SBI (Mauritius) Ltd is having fully
integrated 14 branches- 13 Retail Branches covering major cities and town of Mauritius,
including Rodrigues, and 1 Global Business Branch at Ebene in Mauritius. Apart from
Branch Banking, customers also have the convenience of 24x7 ATM Banking at 18 ATMs
across the country. Bank also has a 24x7 robust Internet Banking Channel enabling
11
Non-banking subsidiaries.
Apart from its five associate banks, SBI also has the following non-banking
subsidiaries:
In March 2001, SBI (with 74% of the total capital), joined with BNP Paribas
(with 26% of the remaining capital), to form a joint venture life insurance company
named SBI Life Insurance company Ltd. In 2004, SBI DFHI (Discount and Finance
12
CHAPTER-3
THEORTICAL FRAME WORK
13
THEORTICAL FRAME WORK
PROBLEM DEFINITION
The first step of preliminary study in the system analysis process involves the identification of
needs for computerization. The motivation behind this project is to overcome all the defects in
Every time Customer has to visit the bank whenever he want to perform any transactions.
The Customer has to be very familiar with accessing the Internet and how to use the basic
controls displayed in the mobile. The Customer can request for new password, interacting
Software Requirements are Windows as Operating System. J2ME Tool Kit as Front-End
designing tools. MySql is used as Database Server. Tomcat server is the Web server.
Servlets are used as server side languages, J2ME tool kit for Mobile service.
14
3.5 Design and Implementation Constraints
This project will be developed using the technologies like Java, J2ME,Java
Servlets, MySQL and Web for all which I need to fetch knowledge on all of them in order
to code for the project. Also I‘ll be learning clearly about Software Development Life
Cycle.
This document also includes a user manual which assists the new user to go
about the project, he can even get the online help which caters the needs of a new user
and makes this project more user friendly, a step by step approach online makes it easy to
Balance Enquiry
Mini Statement
This module gives the whole transaction details such as deposit, withdrawal and
balance.
15
Cheque Status Enquiry
This module provides facility to request a new cheque book by the customer.
Change Password
This module allows customer to change his current password to new password
16
The next step in analysis is to verify the feasibility of the proposed system. ―All
projects are feasible given unlimited resources and infinite time―. But in reality both
resources and time are scarce. Project should confirm to time bounce and should be
optimal in there consumption of resources. This place a constant is approval of any project.
Mobile Banking uses the web technologies, which is rampantly employed these days
worldwide. The world without the web is incomprehensible today. That goes to proposed
consideration the awareness level of the users. This system is operational feasible since
the users are familiar with the technologies and hence there is no need to gear up the
personnel to use system. Also the system is very friendly and to use.
17
To decide whether a project is economically feasible, we have to consider various
factors as
Cost benefit analysis
Long-term returns
Maintenance costs
The proposed Mobile Banking is computer based. It requires average
computing capabilities and access to internet, which are very basic requirements hence it
doesn‘t incur additional economic overheads, which renders the system economically
feasible.
programmers or data base personnel. The design is a solution, how to approach to the
recommended in the feasibility study. Designing goes through logical and physical stages
of development, logical design reviews the present physical system, prepare input and
walkthrough.
system and format of the fields is also designed. The fields in the database tables should
define their role in the system. The unnecessary fields should be avoided because it
affects the storage areas of the system. Then in the input and output screen design, the
design should be made user friendly. The menu should be precise and compact.
SOFTWARE DESIGN
18
1. Modularity and partitioning: software is designed such that, each system should
4.Shared use: avoid duplication by allowing a single module is called by other that need
A level – 1 DFD describes the next level of details within the system, detailing the data
Usecase Diagram
19
customer ViewMiniStatements
Cheque Status
Change Password
View Bills
LogOut
20
Request for Change password
forward result
databas
user e request
21
Collabration for Change password
TABLE- balance
Amount Varchar(40)
Prestime timestamp
Transcid int
accnumber Varchar(6)
TABLE- deposit
TABLE- transaction
Field Name Data type Constraints
Transacid Int Not Null
in most efficiently designed. The input design has been done keeping in view that, the
interaction of the user with the system being the most effective and simplified way.
24
All the screens of the system are designed with a view to provide the user with
easy operations in simpler and efficient way, minimum key strokes possible.
screen is provided with no error and important messages and option selection
for speedy processing and speedy transaction between the screens. Each screen assigned
user can operate the system without much help from the operating manual.
25
CHAPTER-4
ANALYSIS AND INTERPRETATION
26
ANALAYSIS AND INTERPRETATION
4.1.0 IMPLEMENTATION
4.1 .2 MySQL
The database has become an integral part of almost every human's life. Without it,
many things we do would become very tedious, perhaps impossible tasks. Banks,
universities, and libraries are three examples of organizations that depend heavily on
some sort of database system. On the Internet, search engines, online shopping, and even
the website naming convention (http://www...) would be impossible without the use of a
database server.
One of the fastest SQL (Structured Query Language) database servers currently
on the market is the MySQL server. MySQL, available for download, offers the database
programmer with an array of options and capabilities rarely seen in other database
servers. What's more, MySQL is free of charge for those wishing to use it for private and
commercial use. Those wishing to develop applications specifically using MySQL should
consult MySQL's licensing section, as there is a charge for licensing the product. These
Ability to handle an unlimited number of simultaneous users.
Capacity to handle 50,000,000+ records.
Very fast command execution, perhaps the fastest to be found on the market.
Easy and efficient user privilege system.
27
A database is really nothing more than a hierarchy of increasingly complex data
structures. In MySQL, the acknowledged structure for holding blocks (or records) of
These records, in turn, are made up of the smallest object that can be
manipulated by the user, known as the data type. Together, one or more of these data
types form a record. A table holds the collection of records that make up part of the
Datatypes come in several forms and sizes, allowing the programmer to create
tables suited for the scope of the project. The decisions made in choosing proper
MySQL is capable of many of the datatypes that even the novice programmer has
probably already been exposed to. Some of the more commonly used include:
The INT datatype stores integers ranging from -2147483648 to 2147483647. An optional
4294967295
Ex :
28
Ex :
FLOAT [(M.D)]
A FLOAT represents small decimal numbers, used when a somewhat more precise
Ex :
This could be used to represent rainfall average in centimeters per year, which could be a
decimal value. More specifically, FLOAT (4,2) states the fact that rainfall can hold up to
Note: Due to the fact that FLOAT is rounded, those wishing to represent money values
would find it wise to use DECIMAL, a datatype found within MySQL that does not
DATE
Stores date related information. The default format is 'YYYY-MM-DD', and ranges from
manipulation commands, too numerous to be covered within this article. However, one
can find these functions covered in detail within the MySQL documentation.
29
TEXT / BLOB
The text and blob data types are used when a string of 255 - 65535 characters is required
to be stored. This is useful when one would need to store an article such as the one you
are reading. However, there is no end space truncation as with VARCHAR AND CHAR.
The only difference between BLOB and TEXT is that TEXT is compared case
Records
Together, a group of declared datatypes form what is known as a record. A record can be
as small as one data variable, or as many as deemed needed. One or more records form
Before we can execute commands on the database, we must first create a table in which
Ensuing output:
30
Query OK, 0 rows affected (0.10 sec)
Mysql >
The first table in your database has now been created. Note: no two tables can have
Column Characteristics;
A name may not be made up of strictly numbers.
A name may start with a number.
A name may be up to 64 characters.
The following options can be placed after any datatype, adding other characteristics and
capabilities to them.
Primary Key. Used to differentiate one record from another. No two records
can have the same primary key. This is obviously useful when it is imperative
Auto increment. A column with this function is automatically incremented one
value (previous + 1) when an insertion is made into the record. The
column.
NOT NULL. Signifies that the column can never be assigned a NULL value.
31
Ex :
Insertion of records
Note: The originally created table, test, created in the last section will be used to illustrate
Insertion of data into the table is accomplished, logically enough, using the INSERT
command.
Mysql >
32
Selection
A database would not be much use if one was not able to search and extract data from it.
Result:
Bugs
carrots@devshed.com 5554321 1
Bunny
Let's assume we have inserted four differing records, all bearing the same name of "Bugs
Bunny", yet having different email addresses and phone numbers. The table test, would
33
Deletion
One can also delete records inserted into the table. This is accomplished through the
DELETE command.
Result:
This would result in the deletion of all records within the table test containing name
"Bugs Bunny".
Another example:
34
Modification
MySQL also has the capability of modifying data already entered into the table. This is
This section, we covered the core MySQL database manipulation functions, basic
insertion, deletion, modification, and search. The next section will elaborate on these
database.
What we have covered so far is but a small part of what MySQL is capable of. Let's
delve a little deeper into the language, exploring some of the more advanced commands
of the language.
35
Logical Operations
AND (&&)
Result:
All records containing the name "Bugs Bunny" AND the phone number '5554321' will be
OR ( || )
Result:
All records containing the name "Bugs Bunny" OR the phone number '5554321' will be
NOT ( ! )
Result:
All records NOT containing the name "Bugs Bunny" will be displayed to the screen.
36
Order By
mysql> phone_number;
Result:
All records containing the name "Bugs Bunny" will be displayed to the screen, ordered in
Search functions
MySQL offers the user the ability to perform both general and specific searches on data.
Result:
All records containing the partial string "gs Bunny" will be displayed to the screen. This
would include such names as: "Bugs Bunny", "ags Bunny", "gs Bunny", and "234rtgs
Bunny".
Notice that "LIKE" has been used instead of the equals sign (=). "LIKE" signifies that
one is searching for an estimate of the data requested, and not necessarily an exact copy.
The '%' sign could be placed anywhere within the string. The method in which the server
searches for a string is dependent upon where one places the '%' sign.
37
Result:
All records containing the partial string "Bugs Bunny" will be displayed to the screen.
This would include such names as: "Bugs Bunnys", "Bugs Bunnyyyy453", "Bugs
One can also perform searches and display only certain columns.
Result:
name
Bugs Bunny
Alter table
Another very important function of MySQL is the ability to modify previously created
tables. This is accomplished via the ALTER statement. This function allows one to add,
modify, and delete columns, as well as rename the table, among other functions.
38
Example: Modify a column
Executing the above four functions would modify test, creating the following table:
HTML
language for web pages. It provides a means to describe the structure of text-based
so on — and to supplement that text with interactive forms, embedded images, and other
objects. HTML is written in the form of labels (known as tags), surrounded by angle
brackets. HTML can also describe, to some degree, the appearance and semantics of a
document, and can include embedded scripting language code which can affect the
39
HTML provides tags (special codes) to make the document look attractive. HTML tags
are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the
presentation of the document. Anything that is not a tag is part of the document itself.
40
Advantages
A HTML document is small and hence easy to send over the net. It is small
because it does not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
JavaScript
Communication Corporation. JavaScript was originally called Live Script and renamed as
JavaScript to indicate its relationship with Java. JavaScript supports the development of
both client and server components of Web-based applications. On the client side, it can be
used to write programs that are executed by a Web browser within the context of a Web
page. On the server side, it can be used to write Web server programs that can process
information submitted by a Web browser and then update the browser‘s display
accordingly
Even though JavaScript supports both client and server Web programming, we prefer
JavaScript at Client side programming since most of the browsers supports it. JavaScript
is almost as easy to learn as HTML, and JavaScript statements can be included in HTML
<SCRIPTS>.. </SCRIPT>.
JavaScript statements
</SCRIPT>
Here are a few things we can do with JavaScript:
Validate the contents of a form and make calculations.
Add scrolling or changing messages to the Browser‘s status line.
Animate images or rotate images that change when we move the mouse over
them.
Detect the browser in use and display different content for different browsers.
Detect installed plug-ins and notify the user if a plug-in is required.
JavaScript Vs Java
JavaScript and Java are entirely different languages. A few of the most glaring differences
are;
Java applets are generally displayed in a box within the web document; JavaScript
features to Web pages; Java can be used for incredibly complex applications.
There are many other differences but the important thing to remember is that JavaScript
and Java are separate languages. They are both useful for different things; in fact they can
Advantages
JavaScript can be used for Sever-side and Client-side scripting.
It is more flexible than VBScript.
JavaScript is the default scripting languages at Client-side since all the browsers
supports it.
Java Technology
The Java programming language is a high-level language that can be characterized by all
it on your computer. The Java programming language is unusual in that a program is both
compiled and interpreted. With the compiler, first you translate a program into an intermediate
language called Java byte codes —the platform-independent codes interpreted by the interpreter
on the Java platform. The interpreter parses and runs each Java byte code instruction on the
computer. Compilation happens just once; interpretation occurs each time the program is
You can think of Java bytecodes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it‘s a development tool or a Web
browser that can run applets, is an implementation of the Java VM. Java bytecodes help
make ―write once, run anywhere‖ possible. You can compile your program into
bytecodes on any platform that has a Java compiler. The bytecodes can then be run on
any implementation of the Java VM. That means that as long as a computer has a Java
VM, the same program written in the Java programming language can run on Windows
We‘ve already mentioned some of the most popular platforms like Windows 2000, Linux,
Solaris, and MacOS. Most platforms can be described as a combination of the operating
system and hardware. The Java platform differs from most other platforms in that it‘s a
You‘ve already been introduced to the Java VM. It‘s the base for the Java
The Java API is a large collection of ready-made software components that provide many
useful capabilities, such as graphical user interface (GUI) widgets. The Java API is
grouped into libraries of related classes and interfaces; these libraries are known as
packages. The next section, What Can Java Technology Do?, highlights what
The following figure depicts a program that‘s running on the Java platform. As the figure
shows, the Java API and the virtual machine insulate the program from the hardware.
bit slower than native code. However, smart compilers, well-tuned interpreters, and just-
in-time bytecode compilers can bring performance close to that of native code without
threatening portability.
The most common types of programs written in the Java programming language are
applets and applications. If you‘ve surfed the Web, you‘re probably already familiar with
applets. An applet is a program that adheres to certain conventions that allow it to run
special kind of application known as a server serves and supports clients on a network.
Examples of servers are Web servers, proxy servers, mail servers, and print servers.
that runs on the server side. Java Servlets are a popular choice for building interactive
web applications, replacing the use of CGI scripts. Servlets are similar to applets in that
servlets run within Java Web servers, configuring or tailoring the server.
How does the API support all these kinds of programs? It does so with packages
The essentials: Objects, strings, threads, numbers, input and output, data
Security: Both low level and high level, including electronic signatures, public
component architectures.
The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure depicts what
is included in the Java 2 SDK.
connectionless protocol.
IP datagram’s
The IP layer provides a connectionless and unreliable delivery system. It considers each
supplied by the higher layers. The IP layer supplies a checksum that includes its own
header. The header includes the source and destination addresses. The IP layer handles
routing through an Internet. It is also responsible for breaking up large datagram into
smaller ones for transmission and reassembling them at the other end.
TCP
TCP supplies logic to give a reliable connection-oriented protocol above IP. It provides a
Internet addresses
In order to use a service, you must be able to find it. The Internet uses an address scheme
for machines so that they can be located. The address is a 32 bit integer which gives the
IP address. This encodes a network ID and more addressing. The network ID falls into
Network address
Class A uses 8 bits for the network address with 24 bits left over for other addressing.
Class B uses 16 bit network addressing. Class C uses 24 bit network addressing and class
Subnet address
Internally, the UNIX network is divided into sub networks. Building 11 is currently on
one sub network and uses 10-bit addressing, allowing 1024 different hosts.
Host address
8 bits are finally used for host addresses within our subnet. This places a limit of 256
FIGURE 6 - IP ADDRESSING
Port addresses
A service exists on a host, and is identified by its port. This is a 16 bit number. To send a
message to a server, you send it to the port for that service of the host that it is running
on. This is not location transparency! Certain of these ports are "well known".
#include <sys/types.h>
#include <sys/socket.h>
Here "family" will be AF_INET for IP communications, protocol will be zero, and
type will depend on whether TCP or UDP is used. Two processes wishing to
communicate over a network create a socket each. These are similar to two ends of a pipe
SOFTWARE TESTING
Testing
Software Testing is the process used to help identify the correctness, completeness,
related information about the product with respect to the context in which it is intended to
operate. This includes, but is not limited to, the process of executing a program or
application with the intent of finding errors. Quality is not an absolute; it is value to some
person. With that in mind, testing can never completely establish the correctness of
the state and behaviour of the product against a specification. An important point is that
software testing should be distinguished from the separate discipline of Software Quality
Assurance (SQA), which encompasses all business process areas, not just testing.
Introduction
In general, software engineers distinguish software faults from software failures. In case
of a failure, the software does not do what the user expects. A fault is a programming
error that may or may not actually manifest as a failure. A fault can also be described as
an error in the correctness of the semantic of a computer program. A fault will become a
failure if the exact computation conditions are met, one of them being that the faulty
portion of computer software executes on the CPU. A fault can also turn into a failure
Myers in his 1978 book the "Art of Software Testing". Although his attention was on
verification. Drs. Dave Gelperin and William C. Hetzel classified in 1988 the phases and
goals in software testing as follows: until 1956 it was the debugging oriented period,
where testing was often associated to debugging: there was no clear difference between
testing and debugging. From 1957-1978 there was the demonstration oriented period
where debugging and testing was distinguished now - in this period it was shown, that
software satisfies the requirements. The time between 1979-1982 is announced as the
destruction oriented period, where the goal was to find errors. 1983-1987 is classified as
the evaluation oriented period: intention here is that during the software lifecycle a
product evaluation is provided and measuring quality. From 1988 on it was seen as
prevention oriented period where tests were to demonstrate that software satisfies its
specification, to detect faults and to prevent faults. Dr. Gelperin chaired the IEEE 829-
1988 (Test Documentation Standard) with Dr. Hetzel writing the book "The Complete
Guide of Software Testing". Both works were pivotal in to today's testing culture and
remain a consistent source of reference. Dr. Gelperin and Jerry E. Durant also went on to
develop High Impact Inspection Technology that builds upon traditional Inspections but
To make sure that during the operation, incorrect input, processing and output will
be detected
To see that when correct inputs are fed to the system the outputs are correct
To verify that the controls incorporated in the same system as intended
Testing is a process of executing a program with the intent of finding an error
A good test case is one that has a high probability of finding an as yet
undiscovered error
The software developed has been tested successfully using the following testing
strategies and any errors that are encountered are corrected and again the part of the
program or the procedure or function is put to testing until all the errors are removed. A
Note that the result of the system testing will prove that the system is working correctly.
It will give confidence to system designer, users of the system, prevent frustration during
White box testing is a testing case design method that uses the control structure of the
procedure design to derive test cases. All independents path in a module are exercised at
least once, all logical decisions are exercised at once, execute all loops at boundaries and
within their operational bounds exercise internal data structure to ensure their validity.
Here the customer is given three chances to enter a valid choice out of the given menu.
incorrect or missing functions, interface error, errors in data structures, performance error
and initialization and termination error. Here all the input data must match the data type
Unit Testing
Unit testing is essentially for the verification of the code produced during
the coding phase and the goal is test the internal logic of the module/program. In the
Generic code project, the unit testing is done during coding phase of data entry
forms whether the functions are working properly or not. In this phase all the
4.3.1-OUTPUT SCREENS
Step4-Change Password
There has been a sea change across the banking and financial sector in India in the
last ten years, the major credit for which is attributable to the Information Processing and
Communication Technology, commonly known as IT. It has changed the way in which
banking business is being done today. Bankers are now convinced that to 'create and
retain a customer is the key to succeed in this competitive market. Therefore banks
refocus on their core asset the customer. IT has changed the entire scenario of customer
Technology has already helped in providing various delivery channels to customers. Now
the customers no longer have to go inside the bank for their regular banking needs. The
options are many to go to the nearest ATM or to the nearest internet enabled computer for
access to their account or they can use their own mobile handsets for doing banking
Major findings with regard to the banking habits of the respondents are listed
Below;
The study reveals that majority of the customers are taking the service of their
respective banks for nearly seven years. They visit their bank branch atleast once
in a month. Bank wise classification gives the idea that even though new
generation ban customers have six years of experience with their banks, they are
customers. The result of age wise study shows that the older groups have been
using the services of the their respective banks for the last ten years followed by
elder group with seven years and youngsters with four years. However, it is
revealed that even though younger groups have less experience with their banks
as compared to older groups, they are more active users of banking than their
counterparts. Education wise study reveals that professionals and graduates have
six years of experience with their banks, for post graduates it is nearly eight years,
for SSLC group it is seven years and for Pre degree it is only five years.
Income wise analysis also reveal that in the case of availability of ATMs, and
ATM transactions, all groups irrespective of their income status are well aware,
but in the case of mechanism of using ATMs, awareness level of very low income
experience and satisfaction, the following suggestions are made to make further
1. The use of e-banking delivery channels is still not up to the mark as expected by
the banks. This requires awareness building among the customers about the
2. The banks have to initiate steps to educate the customers about new banking
services / new products, ATMs, online banking, mobile banking etc. The banker
may have to conduct different programs like customers day, customer meet and
customer campaign in which they can directly interact with their customers and
3. Banks should take prompt and timely action to ensure the smooth functioning of
ATMs. Customers should be relieved from their apprehensions and make them
4.For ensuring security, banks must appoint watch and ward staff who would also
be able to guide the customers for availing services at ATMs. Steps should also be
5. For adoption of internet banking, it is necessary that the banks offering this
service make the consumers aware about the availability of such a service
The Mobile Banking project has been successfully completed. The goal
of the system is achieved and the problems are solved. This project is developed in this
manner that is user friendly and required help is provided at different levels.
Customers. Different types of services are provided to both the admin and customer.
http://www.studymode.com/subjects/objectives-of-mobile-banking-study-
page1.html