Beruflich Dokumente
Kultur Dokumente
is very
user
programming helps us to
friendly to work
Microsoft Visual
with. Its
event
Basic
driven
Existing
information is stored
system
maintained
job
while
the
records
are
of
maintained
records
is
manually. The
occurs
Chapter I
INTRODUCTION
1.1. ABOUT THE ORGANIZATION
1.2
Jewel Loan module has details are customer id, customer name ,
customer address, phone number, etc., and jewel weight, customer
withdrawal amount, per month interest, per year interest , monthly
installment amount etc., through this modules the Bank can easily update
these module.
b. HOME/ PROPERTY LOAN:
Home Loan modules is used to maintain the bank and customer
respectively. Loan module has details are customer id, customer name ,
customer address, phone number, etc., and customer salary, date,
customer withdrawal amount , year loan, monthly installment etc.,
through this modules the bank can easily update the loan module.
c. PERSONAL/BUSINESS LOAN:
Personal Loan modules is used to maintain the bank and customer
respectively. Loan module has details are customer id, customer name ,
customer address, phone number, etc., and customer salary, date,
customer withdrawal amount , year loan, monthly installment etc.,
through this modules the bank can easily update the loan module.
d. EDUCATIONAL LOAN:
Educational Loan modules are used to maintain the bank and
Student customer respectively. This Loan module has details are Student
customer id, Student name , Student address, phone number, etc., and
Loan date, withdrawal amount, year loan, monthly installment etc.,
through this modules the bank can easily update the loan module.
e. VEHICLE LOAN:
Vehicle Loan modules are used to maintain the bank based on
customers Vehicle respectively. This Loan module has details are
customer id, name , address, phone number, Vehicle Reg.No, Vehicle Type,
Vehicle Company name, Model No, Year of Manufacture etc., and Loan
date, withdrawal amount, year loan, monthly installment etc.,
through
this modules the bank can easily update the loan module.
2. TRANSACTION DETAILS:
This details include deposit entries, withdraw entries, loan pay entries for the clients to
deposit / withdraw or loan pay in the bank.
Chapter II
REVIEW OF LITERATURE
2.1 EXISTING SYSTEM
The existing system is manual. All informations get from the applicant, and then those
informations are entered in the applicant form. Like applicant name, age, address, occupation
of the application is noted. It takes a long time for preparing the daily, monthly report and the
annual report. Retrieving of information is very difficult.
2.2 LIMITATIONS
Some of the limitations are:
Chapter III
SYSTEM STUDY
3.1 PROPOSED SYSTEM
The
proposed
with
Microsoft Visual Basic .Net as the front end tool and SQL Server 2005 as the back end
tool . The various inputs given to the proposed system are membership application form for
jewel loan , house loan, deposits & withdraw various types of accounts. The above information
is maintained and it can be retrieved from the proposed system.
The Advantages in the proposed system are:
Chapter IV
SYSTEM ANALYSIS
4.1 DATA FLOW DIAGRAM
Level 0
ADMIN
School
Management
Customer Detail
Level 1
Customer details
Admin
Personal
Process
Loan detail
Deposit detail
Loan Detail
Withdraw detail
Loan
Status
Loan Details
Deposit Detail
Adameci Details
cusno
name
accno
add
cusno
accno
Deposit
name
Withdraw
Cur
bal
depbal
witdrawamt
amt
accno
Loan Status
Loan
applyi
status
appno
personal
jewel
period
name
Loan detail
home
addr
HARDWARE SPECIFICATION
:
Intel pentium I3
Ram
2GB
Hard disk
500Gb
Monitor
LCD
Keyboard/Mouse
Logitech
Processor
Printer
HP Laer Jet
SOFTWARE SPECIFICATION
Operating system
Windows Xp
deployment and
versioning conflict.
To make the developer experience consist ant across widely varying types of
To build all communication on industry standards to ensure that code based on the
The common language runtime is the foundation of the .NET framework .you can think
of the runtime as an agent that manages code at execution time, providing core services such as
memory management and thread management while also enforcing strict type safety and other
forms of code accuracy that ensure security and robustness.
.Code that targets the runtime isknown as managed code, while code that dose not target the
runtime is known as unmanaged code.
The .NET framework can be hosted by unmanaged components that load the common
language runtime into their processes and initiate the execution of managed code, thereby
creating a software environment that can explicit both managed and unmanaged features.
The .NET framework not only provides several runtime hosts, but also supports the
development of third-party runtime hosts.
Internet explore is an example of an unmanaged application that runtime (in the form of
a mime type extension).Using internet explorer to host the runtime enables you to embed
managed components or windows from controls in the HTML document
The Components Of CLR Are:
implement a set of interfaces that you can use to develop you r own collection classes .your
collection classes will blend seamlessly with the classes in the .NET framework.One can use the
.NET framework to develop the following types of application and services.
Console application
VB.NET application
Forms
Toolbox
Tabs
Properties windows
Solution explorer
Output windows
Forms
A form is one of the most basic objects in which the application code and acts as a
container for the controls placed on it thus providing a visual interface. VB.NET initially
includes a default form.
Toolbox
The toolbox is an important window, which contains a set of controls. It contains the
controls to create our forms non-graphical components such as database connections and code
fragments that can be dragged directly from the toolbox into the code window.
Tabs
Different tabs are organized in the toolbox. Some of the tabs are
Clipboard ring: Contains a list of the last few items that is copied to the system
clipboard.
General: Empty by default, this is a place for us to store general controls, components,
Win forms: Containing windows form controls is automatically available when windows
Web forms: Contains server side web form controls that are used to create web pages.
HTML tab: Contains controls that correspond to the standard HTML tags.
Properties Window
The properties window appears beneath the solution explorer on the right-hand of the VS.NET
main window. It displays the properties for the currently selected object in the main window.
Pressing key F4 also displays the properties window for the selected object.
Solution Explorer
Solution explorer window is similar to the project explorer window in the Bathe solution
explorer is a bit more advanced, since it allows us to construct solutions out of several different
projects including those written in different languages.
Class View
The class view window is somewhat similar to the solution explorer, in the it provides a
view into our solution and project. A view of classes, methods and properties rather than a view
of files are provided by the class view in the world of object-oriented world of .NET.
Server Explorer
Server explorer is an exciting new feature of VS.NET as it allows us to explore and
access server components in nice graphical environments. The server explorer lists the data
connections and the servers that are available to the user. It can be used to examine and
manipulate servers and the databases they contain in the server explorer.
Output Window
The output window is similar to the immediate window available in the previous version
of visual basic. The immediate window is used to view debug output from the application, and
to interact with the environment by entering bits of code or even calling procedures within the
users code.
Task List Window
Task list window is a feature that is used to provide a quick list of all the current build and
syntax errors in our application. The main advantage of using the task list is that by doubleclicking on an error listed in the window will take us right to the troublesome point in our code.
SQL SERVER 2000
Microsoft SQL Server 2000 is a full-featured relational database management system
(RDBMS) that offers a variety of administrative tools to ease the burdens of database
development, maintenance and administration.
Enterprise Manager is the main administrative console for SQL Server installations. It
provides you with a graphical "birds-eye" view of all of the SQL Server installations on our
network.
Query Analyzer offers a quick and dirty method for performing queries against any of
our SQL Server databases. It is a great way to quickly pull information out of a database in
response to a user request, test queries before implementing them in other applications,
create/modify stored procedures and execute administrative tasks.
SQL Profiler provides a window into the inner workings of your database. SQL Profiler
allows you to capture and replay system "traces" that log various activities. It is a great tool for
optimizing databases with performance issues or troubleshooting particular problems.
Service Manager is used to control the MS SQL Server (the main SQL Server process),
MSDTC (Microsoft Distributed Transaction Coordinator) and SQL Server Agent processes. An
icon for this service normally resides in the system tray of machines running SQL Server.
FEATURES OF SQL SERVER 2000
Internet Integration
The SQL Server 2000 database engine includes integrated XML support. It also has the
scalability, availability, and security features required to operate as the data storage component
of the largest Web sites. The SQL Server 2000 programming model is integrated with the
Windows DNA architecture for developing Web applications.
support demanding data processing environments. The database engine protects data integrity
while minimizing the overhead of managing thousands of users concurrently modifying the
database. SQL Server 2000 includes a set of administrative and development tools that improve
upon the process of installing, deploying, managing, and using SQL Server across several sites.
Data warehousing
SQL Server 2000 includes tools for extracting and analyzing summary data for online
analytical processing. SQL Server also includes tools for visually designing databases and to
analyze the data.
CHAPTER V
SYSTEM DESIGN
5.1 DATABASE ANALYSIS
Database design is an important place in designing a system.
During this phase care should be taken to avoid redundancy of
information storing into a database, since it leads to wastage of memory
space.
Normalization Techniques:
Normalization is a process of simplifying the relationship between data
elements in a record. Through normalization a collection of data in a
records structure is replaced by successive record structures that are
simpler and more predictable and therefore more manageable.
A relation is said to be in first normal form if the values in the relation are
atomic for every attribute in the relation .By this we mean simply that no
attribute value can be a set of values or as it sometimes expressed, a
repeating group.
Transitive Dependency
If two non-key attributes depends on each other as well as on the
primary key then they are said to be transitively dependent. the above
normalization principles where applied to decompose the data in multiple
tables there by making the data to be maintained in a consistent state.
5.2 DATABASE DESIGN
Table Name
: Login
:User
Description
Password.
Field Name
AdminUser
Password
Data Type
Text
Text
Table Name
: Deposit
Primary key
: Account No
Purpose
Width
20
20
Description
Admin User
Password
Table
Field name
Data Type
Size
Description
Acc No
Double
Account Number
Cus_No
Double
Customer Number
Cus_Name
Text
10
Customer Name
Cus_Add
Text
Cus_Bal
Double
Customer Balance
Dep_Bal
Double
Deposit Balance
Int_Rate
Double
Interest Rate
Int_Amt
Double
InterestAmount
Tot_Amt
Table Name
Double
: Withdraw
Total Amount
20
Customer Address
Field name
Data
Size
Type
Description
Acc No
Double
Account Number
Cus_No
Double
Customer Number
Cus_Name
Text
10
Customer Name
Cus_Add
Text
20
Customer Address
Cur_Bal
Double
Current Balance
Withdraw_Amt
Double
Withdraw Amount
Data Type
Size
Description
Loan No
Cus_No
Acc No
Double
Double
Double
5
5
5
Loan Number
Customer Number
Account No
Cus_Name
Text
10
Customer Name
Jewel_Quan
Int
Jewel Quantity
Date of Loan
Loan Amt
Rate of Interest
Loan_Exp Date
Date/Time
Double
Double
Date/Time
8
8
5
8
Date Of Loan
Loan Amount
Rate Of Interest
Loan Expiry Date
Data Type
Size
Description
Loan No
Cus_No
A/c No
Double
Double
Double
5
5
5
Loan Number
Customer Number
Account No
Cus_Name
Text
10
Customer Name
Date of Loan
Loan Amt
Rate of Interest
Loan_Exp Date
Date/Time
Double
Double
Date/Time
8
8
5
8
Date Of Loan
Loan Amount
Rate Of Interest
Loan Expiry Date
Data Type
Size
5
5
Description
Loan No
Cus_No
Double
Double
A/c No
Double
Cus_Name
Text
10
Customer Name
Date of Loan
Date/Time
Date Of Loan
Loan Number
Customer Number
Account No
Loan Amt
Rate of Interest
Loan_Exp Date
Double
Double
Date/Time
8
5
8
Loan Amount
Rate Of Interest
Loan Expiry Date
Table Name
:
Loan Status
Primary keyfield
:
AppNo
Description
:
This table stores the details regarding
whether the loan is sanctioned (or) rejected
Field Name Data Type
Width
Description
AppNo
Number
Long integer
Application Number
AppName
Text
20
Applicant Name
Purpose
Text
20
Purpose
LoanApplied
Text
20
Loan Applied
Period
Text
20
Period
Gname
Text
20
Guarantor Name
Report
Text
20
Inspection Report
DoneBy
Text
20
Inspection done by
Status
Text
20
Whether sanctioned or
rejected
Chapter VI
SYSTEM TESTING
System testing is critical aspect of software quality assurance and represents the
ultimate Review of specification, design and coding. Testing is a process of executing a program
with the intent of finding an error. A good testing case is that has the probability of finding as
yet undiscovered error. The purpose of the system testing is to identify and correct bugs in the
developed system. Nothing is complete without testing. Testing is vital to the success of the
system.
6.1 SYSTEM TESTING
After each program passes its own test, it is linkage to the other programs is scrutinized
with a program integration test. This ensures that the program work together as intended.
Before the implementation phase the designed system should be tested with raw data to ensure
that all modules of the system work correctly and satisfactorily. If some bug is found they can
be removed before the implementation phase. The testing has the four kind of testing that is as
follows.
WHITE BOX TESTING
White box testing, sometimes called glass-box testing is a test case design method that
uses the control structure of the procedural design to derive test cases. Using white box testing
methods, the software engineer can derive test cases.
1. Guarantee that all independent paths within a module have exercised at least once.
2. Exercise all logical decisions on their true and false sides.
3. Execute all loops at their boundaries and within their operational bounds.
4. Exercise internal data structures to ensure their validity.
BLACK BOX TESTING
Black box testing, also called behavioral testing, focuses on the functional requirements
of the software. That is, black box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program. Black box testing is
not an alternative to white box techniques. Rather it is a complementary approach that is likely
to uncover a different class of errors than white box methods. Black box testing attempts to find
errors in the following categories.
UNIT TESTING
Unit testing is the basic level of testing where individual components are tested to
ensure that they operate correctly. In a properly designed system, each component should have
a precise specification, and test cases must be defined to check that the component meets
its specification. Unit testing considers each component to be a stand-alone entity, which does
not require other system components to be present during the testing process. The modules
purchase, sales are individually unit tested using the above approach.
ACCEPTANCE TESTING
Acceptance testing involves planning an execution of a functional test, performance test
and stress test to verify that the implemented system satisfies the requirement. The acceptance
testing is the final stage of the user the various possibilities of the data are entered and the
results are tested.
VALIDATION TESTING
Software validation is achieved through a series of test that demonstrates the conformity
and requirements. Thus the proposed system under consideration has to be tested by validation
and found to be working satisfactorily. For example in customer enters phone number field
should contain number otherwise it produces an error message Similarly in all the forms the
fields are validated
6.2 IMPLEMENTATION PLAN
System implementation is loss creative than design but it is a crucial phase in the system life
cycle. It is primarily concerned with ordering of the items. Implementation is the process of
concerning a new system design into an operational one. Implementation is the stage in the
project where the theoretical design is turned into a working system. The most crucial stage is
achieving a new successful system and in giving confidence is in getting the approval for the
system manager.
The data entry, the various menus and most important reports that the system is capable
of producing are shown to the staff. This is done in view of any last minute changes that will be
necessary in the formats.When everyone is satisfied, the new system is finally handled over to
the data entry operators. The more complex the system is being implemented, the more
involved will be the systems analysis and design effect required for the implementation.
Chapter VII
CONCLUSION
The project is a complete
system
ensures
easy,
secured
and
time
saving
undergone
all the
system
.The
and it
also provides
future.
The Bank Loan Management System is a tool that used to
integrate various peers that are connected the customer to depositer and
bank. Thus the system can be further extended to adopt into various fields
that involve in bank process such as new account opening, deposit the
amount, and loan payment etc., The system is having function which will
be most useful in sensitive and serious applications such as computerized
bank system and online deposit the amount. Thus the system will
enhance the functionality of those systems in a very broad way and can
even be the cause of the system newer applications to beign.
BIBLIOGRAPHY
REFERENCES
Eilas M.Awad,
Publications (P)