You are on page 1of 87

1|Page

2|Page

Conte

nts
Serial
No.
1.

Name of Topic
Certificate

Page
No.
3.

2.

Preface

4.

3.

Acknowledgement

5.

4.

Introduction to Project

6.

5.

Objective

7.

6.

Abstract

8.

7.

Hardware & Software Configuration

9.

8.

Introduction of Visual Basic

10.

9.

History Of Visual Basic

11.

10.

Features Of Visual Basic

12.

11.

Introduction To Access

13-14.

12.

System Study and Analysis

15-31

13.

Flow-Chart

32-33.

14.

DFD Diagram

34-36.

15.

Snapshot and Coding

37-77.

16.

Future Enhancement

78.
2

Signature

3|Page

17.

Conclusion

79.

18.

Bibliography

80.

Certificate

This is to certify that the project report entitled Banking


Management System is a bonafide work carried out by Manoj Kumar
(7061020029) 2th semester of PGDCA at Bareilly College Bareilly.
During the academic year 2015-16. Under the guidance and supervision
of Mr. Nitesh Saxena.

Supervision & Guidance

Nitesh Saxena

4|Page

SELF CERTIFICATE

This is to certify that project entitled Banking

Management System
is done by me is an authentic work carried out for the partial
fulfillment of the requirements for the award of the degree of
PGDCA under the guidance of Mr. Nitesh Saxena. The
matter embodied in this project work has not Been submitted
earlier for award of any degree or diploma to the Bes
ofknowledge and belief.

5|Page

Roll No-7061020029

Signature of
the Student

Preface
The field of computer education has witnessed a sea
change since the discovery of simple calculating machine by
CHARLES BABAGE. The era is confronting with the speed and
mind of computer, i.e. the speed and intelligence have become
vital. At one end they are competing with each other. Not only
have these computers immensely benefited the mankind in the
field of planning. The wheel of progress is rolling with much
faster speed then it used to be a decade ago; thank to the
revolution ushered in by computer. But all this havent come as
5

6|Page

easy as it appears to be rather it requires planning strategy and


a lot of brain storming before a package is developed or a
language is born.
Since the prime task of the computer is to process a raw
data into useful information, we can ignore the basic step of
information collection ret rival and processing at our risk only.
The importance of finding the right information in the possible
least time as well knows to us.

Acknowledgement
We take this precious opportunity to express our gratitude toward
BANKING MANAGEMENT SYSTEM to grant is permission for
undergoing the training project. Without its willingness to permit this
project would not have been succeed.
First of all, we would like to thanks all those people who helped us
directly or indirectly to complete my project whenever we found our self
in problems. Our all faculties encourages me and due to their kindness
and helpful nature and help we got very much confidence to complete
this project.
6

7|Page

We are deeply inherited who devoted his precious time in giving me


the information about the various aspects and gave support and
guidance at every point of time. We are really thankful to their kind and
supportive nature. His inspiring nature has always made my work easy.

Introduction to Project
Bank is the place where customers feel the sense of safety for
their property. In the bank, customers deposit and withdraw their money.
Transaction of money also is a part where customer takes shelter of the
bank. Now to keep the belief and trust of customers, there is the positive
need for management of the bank, which can handle all this with
comfort and ease. Smooth and efficient management affects the
satisfaction of the customers and staff members, indirectly. And of
course, it encourages management committee in taking some needed
decision for future enhancement of the bank.
Now a day, managing a bank is tedious job up to certain limit. So
software that reduces the work is essential. Also todays world is a
7

8|Page

genuine computer world and is getting faster and faster day-by-day.


Thus, considering above necessities, the software for bank management
has became necessary which would be useful in managing the bank
more efficiently.

Our software will perform and fulfill all the tasks that any
customer would desire.
Our motto is to develop a software program for managing
the entire bank process related to customer accounts,
employee accounts and to keep each every track about
their property and their various transaction processes
efficiently.
Hereby, our main objective is the customers satisfaction
considering todays faster world.
8

9|Page

To allow only authorized user to access various functions


and processes available in the system.
Reduced clerical work as most of the work done by
computer.
Provide greater speed & reduced time consumption.
To increase the number of A/C and customer.

In the recent years, computers are included in almost all kind of


works and jobs everyone come across in the routine. The availability of
the softwares for almost every process or every system has taken the
world in its top-gear and fastens the day-to-day life.

So, we have tried our best to develop the software program for the
Bank Management System where all the tasks to manage the bank
system are performed easily and efficiently. It manages all the
9

10 | P a g e

transactions like new account entry, deposit as well as withdraw entry,


transaction of money for various processes, loan entry, managing bills
cash or cheque, etc.

Thus, above features of this software will save transaction time


and therefore increase the efficiency of the system.

Hardware & Software Configuration


Hardware: PROCESSOR: Pentium III computer -700 MHz Minimum
MOTHERBOARD : Intel chipset 800 Minimum
RAM : 256 MB Minimum
HARD DISK : 5 GB Minimum
MONITORS : Color monitor with VGA card having a
resolution 640 X 480 Minimum
10

11 | P a g e

PRINTER: Dot Matrix Printer Minimum

Software:

OPERATING SYSTEM :
WINDOWS 98, 2000, XP,Vista, 7.

Introduction of Visual Basic


What is Visual Basic?
Microsoft Visual Basic development system version 6.0 is the most
productive tool for creating high-performance components and
applications. Visual Basic 6.0 offers developers the ability to create
robust applications that reside on the client or server, or operate in a
distributed n-tier environment. Visual Basic 6.0 is the Rapid Application
Development (RAD) tool available either as a stand-alone product or as
a part of the Visual Studio 6.0 suite of tools.

Areas of Use
Using Visual Basic's tools we can quickly translate
an abstract idea into a program design that we can actually see on the
screen. VB encourages you to experiment, revise, correct, and network
11

12 | P a g e

your design until the new project meets your requirements. However,
most of all, it inspires your imagination and creativity.
Visual Basic is ideal for developing applications that run on the
Windows operating system. Developing applications with VB can be
said to be a 3-step approach:
i)
ii)
iii)

Design the appearance of application.


Assign property settings to the objects of the program.
Write the code to direct specific tasks at runtime.

History Of Visual Basic

Microsoft first released Visual Basic in 1987. It was the first


visual development tool from Microsoft, and it was to compete with C,
C++, Pascal and other well-known programming languages. From the
start, Visual Basic wasn't a hit. It wasn't until release 2.0 that people
really discovered the potential of the language, and with release 3.0 it
had become the fastest-growing programming language on the market.
Below are the order and the approximate year in which a new
version of Visual Basic was released:
o 1991, VB1 Debuts
o 1992, VB2 Debuts
12

13 | P a g e

o 1993, VB3 Debut


o 1996, VB4 Debuts
o 1997, VB5 Debuts
o 1998, VB6 Debuts
o 2001, VB. NET Debuts

Features Of Visual Basic


Integrate Visual database tools
Visual Basic 6.0 provides a complete set of tools for integrating
databases with any Application. Database features include design tools
for creating and modifying Microsoft SQL Server, Oracle 7.3.3 or above,
and AS/400 databases.
Data Environment designer for data connectivity
Visually create reusable record set command objects with dragand-drop functionality. Bind to multiple data sources for data
aggregation and manipulation.

13

14 | P a g e

Drag and drop creation of data bound forms and reports


Using the new Data Environment designer, Developers can quickly
drag-and-drop Custom data-bound controls to create forms; they can
create reports with the new Data Report Designer.
Visual Basic Web class Designer
Create server-side applications and components that are easily
accessible from any Web browser on any platform.
Dynamic HTML Page Designer
Develop multimedia-rich applications using the document object
model and Dynamic HTML surface as the user interface.
New performance enhancements
Use new String Functions and features such as "Retain in Memory"
to create faster, more scalable applications and components.
The ActiveX Technology
It is used to create Internet Enabled applications that are limited
only by your Imagination. Its come with several controls that allow you
to create Web Based application.

Introduction To Access
Database: What they are? And how they work?

A database is collection of information related to particular or


purpose such as tracking customer orders or maintaining a music
collection. If your database isnt stored on a computer or only parts of it

14

15 | P a g e

are, you may be tracking information from varies of source that you
have to coordinate and organize your self.
Using it, you can manage all our information from single database
file. Within file divide your data using into separate storage containers
called tables; view, add, and update table data using forms; find and
retrieve just the data you want using queries and analyze or print data
in specific layout using reports.
To find and retrieve just data that meet condition you specify
including data from multiple tables create a query. A query can also
update multiple records at the same time and perform built-in or custom
calculations on your data. To easily view, enter and change directly in a
table, create a form. When you open a form, it retrieves the data from
one or more tables and displays it on screen using the data from you
chose in the form using a layout that you crated from scratch.

To analyze your data present it a certain way in print, create a


report. For example, you might print one report that raw material and
calculates totals.

TABLES:
A table is a collection of data about a specific topic, such as
products or suppliers. Using as separate table for each topic means you
store that data only once which makes your database more efficient and
reduces data entry errors. Tables organize data into columns and rows.

15

16 | P a g e

In table datasheet view, you can add, edit or view the data in
a table. You can also check the spelling and print your tables data filter
or sort records change the datasheets appearance or change the tables
structure by adding or deleting columns. You can create an entire table
from scratch, or add, delete, or customize existing tables fields.

QUERIES:
You use queries to view, change and analyze data in different
ways. You can also use them as the source of records for forms and
report. The most common type of query is a select query. A select query
retrieves data from one or more tables using criteria you specify and
then display it in the order you want.

Advantages of Access

More Reliable than other RDBMS.


Easy to use and learn.
Data security is high.
Updating database.
Support ODBC, ADO data programming
objects.

16

17 | P a g e

System Study and Analysis


SYSTEM ANALYSIS:System analysis is a process of gathering and interpreting facts,
diagnosing problems and the information to recommend improvements
on the system. It is a problem solving activity that requires intensive
communication between the system users and system developers. System
analysis or study is an important phase of any system development
process. The system is studied to the minutest detail and analyzed.
The system analyst plays the role of the interrogator and dwells deep
into the working of the present system. The system is viewed as a whole
and the input to the system are identified. The outputs from the
organizations are traced to the various processes. System analysis is
concerned with becoming aware of the problem, identifying the relevant
and decisional variables, analyzing and synthesizing the various factors
and determining an optimal or at least a satisfactory solution or
program of action.
A detailed study of the process must be made by various techniques
like interviews, questionnaires etc. The data collected by these sources
must be scrutinized to arrive to a conclusion. The conclusion is an
understanding of how the system functions. This system is called the
existing system. Now the existing system is subjected to close study and
problem areas are identified. The designer now functions as a problem
solver and tries to sort out the difficulties that the enterprise faces. The
solutions are given as proposals.
The Proposal is then weighed with the existing system analytically
and the best one is selected. The proposal is presented to the user for an
endorsement by the user. The proposal is reviewed on user request and
suitable changes are made. This is loop that ends as soon as the user is
satisfied with proposal. Preliminary study is the process of gathering
and interpreting facts, using the information for further studies on the
system.
17

18 | P a g e

Preliminary study is problem solving activity that requires


intensive communication between the system users and system
developers.
It does various feasibility studies. In these studies a rough figure of
the system activities can be obtained, from which the decision about the
strategies to be followed for effective system study and analysis can be
taken.

EXISTING SYSTEM
In the existing system the transactions are done only manually but
in proposed system we have to computerize all the banking transaction
using the software banking system.
PROBLEMS WITH EXISTING SYSTEM

Lack of security of data.


More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.
Damage of machines due to lack of attention.
In the current system data related to banking is maintained by
writing it on to various registers.
Registers may lost or damage.
Any unauthorized person can access confidential data.
Each A/C and customer is assigned a unique code. Whenever a
new book or member is added then librarian has to search whether
that code is previously existing or not.
When a particular A/c is to be modified for one or more fields the
user can be modified.
18

19 | P a g e

To avoid all these limitations and make the working more


accurately the system needs to be computerized.

PROPOSED SYSTEM
The aim of proposed system is to develop a system of improved
facilities. The proposed system can overcome all the limitations of the
existing system. The system provides proper security and reduces the
manual work.

ADVANTAGES OF THE PROPOSED SYSTEM


The system is very simple in design and to implement. The system
requires very low system resources and the system will work in almost
all configurations. It has got following features

Security of data.
Ensure data accuracys.
Proper control of the higher officials.
Reduce the damages of the machines.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Minimum time required.
Balance enquiry
Funds transfer to another account in the same bank.
Request for cheque book/change of address/stop payment of
cheques.
Any information can be easily searched.
19

20 | P a g e

All records of A/c`s and customer are stored in separate files.


Which are maintained constantly update by system.
Particular A/c information can be modified.
A particular customer record can be modified for one or more
fields customer name, address by providing A/c number.
A customer record can be easily deleted by providing A/c number.
The proposed system provides faster data access, data entry and
retrieval.

FEASIBILITY STUDY:
Feasibility study is made to see if the project on completion will serve
the purpose of the organization for the amount of work, effort and the
time that spend on it. Feasibility study lets the developer foresee the
future of the project and the usefulness. A feasibility study of a system
proposal is according to its workability, which is the impact on the
organization, ability to meet their user needs and effective use of
resources.
Thus when a new application is proposed it normally goes through a
feasibility study before it is approved for development. The document
provide the feasibility of the project that is being designed and lists
various areas that were considered very carefully during the feasibility
study of this project such as Technical, Economic and Operational
feasibilities. The following are its features:

20

21 | P a g e

a)TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first.
The assessment of this feasibility must be based on an outline design of
the system requirement in the terms of input, output, programs and
procedures. Having identified an outline system, the investigation must
go on to suggest the type of equipment, required method developing the
system, of running the system once it has been designed.
Technical issues raised during the investigation are:
Does the existing technology sufficient for the suggested one?
Can the system expand if developed?
The project should be developed such that the necessary functions
and performance are achieved within the constraints. The project is
developed within latest technology. Through the technology may become
obsolete after some period of time, due to the fact that never version of
same software supports older versions, the system may still be used. So
there are minimal constraints involved with this project. The system has
been developed using Java the project is technically feasible for
development.
b)ECONOMIC FEASIBILITY
The developing system must be justified by cost and benefit. Criteria to
ensure that effort is concentrated on project, which will give best, return
at the earliest. One of the factors, which affect the development of a new
system, is the cost it would require. The following are some of the
important financial questions asked during preliminary investigation:
The costs conduct a full system investigation.
The cost of the hardware and software.
The benefits in the form of reduced costs or fewer costly errors.
21

22 | P a g e

Since the system is developed as part of project work, there is no


manual cost to spend for the proposed system.
Also all the resources are already available, it give an indication of
the system is economically possible for development.
c) BEHAVIORAL FEASIBILITY
This includes the following questions:
Is there sufficient support for the users?
Will the proposed system cause harm?
The project would be beneficial because it satisfies the objectives when
developed and installed. All behavioral aspects are considered carefully
and conclude that the project is behaviorally feasible.

SYSTEM DESIGN:
Design is the first step into the development phase for any
engineered product or system. Design is a creative process. A good
design is the key to effective system. The term design is defined as
the process of applying various techniques and principles for the
purpose of defining a process or a system in sufficient detail to permit its
physical realization. It may be defined as a process of applying various
techniques and principles for the purpose of defining a device, a process
or a system in sufficient detail to permit its physical realization.
Software design sits at the technical kernel of the software engineering
process and is applied regardless of the development paradigm that is
used.
The system design develops the architectural detail required to
build a system or product. As in the case of any systematic approach,
this software too has undergone the best possible design phase fine
tuning all efficiency, performance and accuracy levels.

22

23 | P a g e

The design phase is a transition from a user oriented document to a


document to the programmers or database personnel. System design
goes through two phases of development: Logical and Physical Design.
LOGICAL DESIGN:
The logical flow of a system and define the boundaries of a system.
It includes the following steps:
Reviews the current physical system its data flows, file content,
volumes, frequencies etc.
Prepares output specifications that is, determines the format,
content and frequency of reports.
Prepares input specifications format, content and most of the
input functions.
Prepares edit, security and control specifications.
Specifies the implementation plan.
Prepares a logical design walk through of the information flow,
output, input, controls and implementation plan.
Reviews benefits, costs, target dates and system constraints.
PHYSICAL DESIGN:
Physical system produces the working systems by define the design
specifications that tell the programmers exactly what the candidate
system must do. It includes the following steps.

Design the physical system.


Specify input and output media.
Design the database and specify backup procedures.
Design physical information flow through the system and a
Physical design Walk through.
Plan system implementation.
23

24 | P a g e

Prepare a conversion schedule and target date.


Determine training procedures, courses and timetable.
Update benefits , costs , conversion date and system constraints
MODULE DESIGN:
The Administrator logs in using the admin login. In this module two
operations are done. During login the Login and Password is verified
with that in the database
INPUT DESIGN:
The design of input focuses on controlling the amount of input
required, controlling the errors, avoiding delay, avoiding extra steps and
keeping the process simple. The input is designed in such a way so that
it provides security and ease of use with retaining the privacy. Input
Design considered the following things:
What data should be given as input?
How the data should be arranged or coded?
The dialog to guide the operating personnel in providing input.
Methods for preparing input validations and steps to follow when
error occur.
OUTPUT DESIGN:
A quality output is one, which meets the requirements of the end
user and presents the information clearly. In output design it is
determined how the information is to be displaced for immediate need
and also the hard copy output. It is the most important and direct source
information to the user. Efficient and intelligent output design improves
the Systems relationship to help user decision-making. Designing
computer output should proceed in an organized, well thought out
manner; the right output must be developed while ensuring that each
output element is designed so that people will find the system can use
easily and effectively. When analysis designs Computer output, they
should:
24

25 | P a g e

Identify the specific output that is needed to meet the


requirements.
Select methods for presenting information.

Create document, report, or other formats that contain


information produced by the system.
DATABASE DESIGN:
A database is an organized mechanism that has the capability of
storing information through which a user can retrieve stored
information in an effective and efficient manner.
The data is the purpose of any database and must be protected. The
database design is a two level process. In the first step, user
requirements are gathered together and a database is designed which
will meet these requirements as clearly as possible. This step is called
Information Level Design and it is taken independent of any individual
DBMS.
In the second step, this Information level design is transferred into a
design for the specific DBMS that will be used to implement the system
in question. This step is called Physical Level Design, concerned with
the characteristics of the specific DBMS that will be used. A database
design runs parallel with the system design. The organization of the
Data in the database is aimed to achieve the following two major
objectives.
Data Integrity
Data independence
Normalization is the process of decomposing the attributes in an
application, which results in a set of tables with very simple structure.
The purpose of normalization is to make tables as simple as possible.
Normalization is carried out in this system for the following reasons.
To structure the data so that there is no repetition of data, this
helps in saving.
To permit simple retrieval of data in response to query and report
request.
To simplify the maintenance of the data through updates,
insertions, deletions.
25

26 | P a g e

To reduce the need to restructure or reorganize data which new


application requirements arise.

Relational Database Management System (RDBMS):


A relational model represents the database as a collection of
relations. Each relation resembles a table of values or file of records. In
formal relational model terminology, a row is called a topple, a column
header is called an attribute and the table is called a relation. A
relational database consists of a collection of tables, each of which is
assigned a unique name. A row in a tale represents a set of related
values.
RELATIONS, DOMAINS & ATTRIBUTES:
A table is a relation. The rows in a table are called topples. A topple
is an ordered set of n elements. Columns are referred to as attributes.
Relationships have been set between every table in the database. This
ensures both Referential and Entity Relationship Integrity.
A domain D is a set of atomic values. A common method of specifying
a domain is to specify a data type from which the data values forming
the domain are drawn. It is also useful to specify a name for the domain
to help in interpreting its values. Every value in a relation is atomic, that
is not decomposable.
RELATIONSHIPS:
Table relationships are established using Key. The two main keys of
prime importance are Primary Key & Foreign Key. Entity Integrity and
Referential Integrity Relationships can be established with these keys.
Entity Integrity enforces that no Primary Key can have null values.
Referential Integrity enforces that no Primary Key can have null values.
Referential Integrity for each distinct Foreign Key value, there must
exist a matching Primary Key value in the same domain. Other key are
26

27 | P a g e

Super Key and Candidate Keys. Relationships have been set between
every table in the database. This ensures both Referential and Entity
Relationship Integrity.

NORMALIZATION:
As the name implies, it denoted putting things in the normal form. The
application developer via normalization tries to achieve a sensible
organization of data into proper tables and columns and where names
can be easily correlated to the data by the user.
Normalization eliminates repeating groups at data and thereby avoids
data redundancy which proves to be a great burden on the computer
resources. These include:
Normalize the data.
Choose proper names for the tables and columns.
Choose the proper name for the data.
First Normal Form:
The First Normal Form states that the domain of an attribute must
include only atomic values and that the value of any attribute in a topple
must be a single value from the domain of that attribute.
In other words 1NF disallows relations within relations or
relations as attribute values within topple. The only attribute values
permitted by 1NF are single atomic or indivisible values. The first step
is to put the data into First Normal Form. This can be donor by moving
data into separate tables where the data is of similar type in each table.
Each table is given a Primary Key or Foreign Key as per requirement of
the project. In this we form new relations for each non atomic attribute
or nested relation. This eliminated repeating groups of data.
27

28 | P a g e

A relation is said to be in first normal form if only if it satisfies the


constraints that contain the primary key only.
Second Normal Form:
According to Second Normal Form, for relations where primary key
contains multiple attributes, no non key attribute should be functionally
dependent on a part of the primary key.
In this we decompose and setup a new relation for each partial key
with its dependent attributes. Make sure to keep a relation with the
original primary key and any attributes that are fully functionally
dependent on it. This step helps in taking out data that is only dependant
on apart of the key.
A relation is said to be in second normal form if and only if it
satisfies all the first normal form conditions for the primary key and
every non-primary key attributes of the relation is fully dependent on its
primary key alone.
Third Normal Form:
According to Third Normal Form, Relation should not have a non key
attribute functionally determined by another non key attribute or by a
set of non key attributes. That is, there should be no transitive
dependency on the primary key. In this we decompose and set up
relation that includes the non key attributes that functionally determines
other non key attributes. This step is taken to get rid of anything that
does not depend entirely on the Primary Key. A relation is said to be in
third normal form if only if it is in second normal form and more over
the non key tributes of the relation should not be depend on other non
key attribute.

SYSTEM IMPLEMENTATION AND TESTING


Implementation is the stage of the project where the
theoretical design is turned into a working system. It can be considered
to be the most crucial stage in achieving a successful new system
gaining the users confidence that the new system will work and will be
28

29 | P a g e

effective and accurate. It is primarily concerned with user training and


documentation. Conversion usually takes place about the same time the
user is being trained or later.
Implementation simply means convening a new system design into
operation, which is the process of converting a new revised system
design into an operational one.

SYSTEM TESTING:
Software Testing is the process of executing software in a controlled
manner, in order to answer the question - Does the software behave as
specified?. Software testing is often used in association with the terms
verification and validation. Validation is the checking or testing of items,
includes software, for conformance and consistency with an associated
specification. Software testing is just one kind of verification, which also
uses techniques such as reviews, analysis, inspections, and
walkthroughs. Validation is the process of checking that what has been
specified is what the user actually wanted.
Validation: Are we doing the right job?
Verification: Are we doing the job right?
Software testing should not be confused with debugging. Debugging
is the process of analyzing and localizing bugs when software does not
behave as expected. Although the identification of some bugs will be
obvious from playing with the software, a methodical approach to
software testing is a much more thorough means for identifying bugs.
Debugging is therefore an activity which supports testing, but cannot
replace testing.
Other activities which are often associated with software testing are
static analysis and dynamic analysis. Static analysis investigates the
source code of software, looking for problems and gathering metrics
without actually executing the code. Dynamic analysis looks at the
behavior of software while it is executing, to provide information such
as execution traces, timing profiles, and test coverage information.
29

30 | P a g e

Testing is a set of activity that can be planned in advanced and


conducted systematically.
Testing begins at the module level and work towards the
integration of entire computers based system. Nothing is complete
without testing, as it vital success of the system testing objectives, there
are several rules that can serve as testing objectives.
They are Testing is a process of executing a program with the
intend of finding an error.A good test case is one that has high
possibility of finding an undiscovered error.A successful test is one that
uncovers an undiscovered error. If a testing is conducted successfully
according to the objectives as stated above, it would uncovered errors in
the software also testing demonstrate that the software function appear
to be working according to the specification, that performance
requirement appear to have been met.
There are three ways to test program.
For correctness
For implementation efficiency
For computational complexity
Test for correctness are supposed to verify that a program does
exactly what it was designed to do. This is much more difficult than it
may at first appear, especially for large programs.

Test Plan:
A test plan implies a series of desired course of action to be
followed in accomplishing various testing methods. The Test Plan acts
as a blue print for the action that is to be followed. The software
engineers create a computer program, its documentation and related
data structures. The software developers is always responsible for
testing the individual units of the programs, ensuring that each performs
the function for which it

30

31 | P a g e

was designed. There is an independent test group (ITG) which is to


remove the inherent problems associated with letting the builder to test
the thing that has been built.
The specific objectives of testing should be stated in measurable
terms. So that the mean time to failure, the cost to find and fix the
defects, remaining defect density or frequency of occurrence and test
work-hours per regression test all should be stated within the test plan.
The levels of testing include:
Unit testing.
Integration Testing.
Data validation Testing & Output Testing.
UNIT TESTING:
Unit testing focuses verification effort on the smallest unit of
software design the software component or module. Using the
component level design description as a guide, important control paths
are tested to uncover errors within the boundary of the module. The
relative complexity of tests and uncovered scope established for unit
testing. The unit testing is white-box oriented, and step can be
conducted in parallel for multiple components. The modular interface is
tested to ensure that information properly flows into and out of the
program unit under test. The local data structure is examined to ensure
that data stored temporarily maintains its integrity during all steps in an
algorithms
Execution. Boundary conditions are tested to ensure that all statements
in a module have been executed at least once. Finally, all error handling
paths are tested.
Tests of data flow across a module interface are required before
any other test is initiated. If data do not enter and exit properly, all other
tests are moot. Selective testing of execution paths is an essential task
during the unit test. Good design dictates that error conditions be
anticipated and error handling paths set up to reroute or cleanly
terminate processing when an error does occur. Boundary testing is the
last task of unit testing step.

31

32 | P a g e

Software often fails at its boundaries. Unit testing was done in SellSoft System by treating each module as separate entity and testing each
one of them with a wide spectrum of test inputs. Some flaws in the
internal logic of the modules were found and were rectified.
INTEGRATION TESTING:
Integration testing is systematic technique for constructing the
program structure while at the same time conducting tests to uncover
errors associated with interfacing.
The objective is to take unit tested components and build a program
structure that has beendictated by design. The entire program is tested
as whole. Correction is difficult because isolation of causes is
complicated by vast expanse of entire program. Once these errors are
corrected, new ones appear and the process continues in a seemingly
endless loop.
After unit testing in Sell-Soft System all the modules were integrated
to test for any inconsistencies in the interfaces. Moreover differences in
program structures were removed and a unique program structure was
evolved.
Validation Testing or System Testing:
This is the final step in testing. In this the entire system was tested
as a whole with all forms, code, modules and class modules. This form
of testing is popularly known as Black Box testing or System tests.
Black Box testing method focuses on the functional requirements of
the software. That is, Black Box testing enables the software engineer to
derive sets of input conditions that will fully exercise all functional
requirements for a program. Black Box testing attempts to find errors in
the following categories; incorrect or missing functions, interface
errors, errors in data structures or external data access, performance
errors and initialization errors and termination errors.

Output Testing or User Acceptance Testing:


The system considered is tested for user acceptance; here it
should satisfy the firms need. The software should keep in touch with
32

33 | P a g e

perspective system; user at the time of developing and making changes


whenever required. This done with respect to the Following points
Input Screen Designs,
Output Screen Designs,
Online message to guide the user and the like.
The above testing is done taking various kinds of test data.
Preparation of test data plays a vital role in the system testing. After
preparing the test data, the system under study is tested using that test
data.
While testing the system by which test data errors are again uncovered
and corrected by using above testing steps and corrections are also
noted for future use.

Training:
Once the system is successfully developed the next important
step is to ensure that the administrators are well trained to handle the
system. This is because the success of a system invariably depends on
how they are operated and used. The implementation depends upon the
right people being at the right place at the right time. Education
involves creating the right atmosphere and motivating the user. The
administrators are familiarized with the run procedures of the system,
working through the sequence of activities on an ongoing basis.
Implementation is the state in the project where the theoretical
design is turned into a working system. By this, the users get the
confidence that the system will work effectively. The system can be
implemented only after through testing. The systems personnel check the
feasibility of the system. The actual data were inputted to the system and
the working of the system was closely monitored. The master option was
selected from the main menu and the actual data were input through the
corresponding input screens. The data movement was studied and found
to be correct queries option was then selected and this contains various
reports. Utilities provide various data needed for inventory was input
33

34 | P a g e

and the module was test run. Satisfactory results were obtained. Reports
related to these processes were also successfully generated.
Various input screen formats are listed in the appendix.
Implementation walkthroughs ensure that the completed system actually
solves the original problem. This walkthrough occurs just before the
system goes into use, and it should include careful review of all
manuals, training materials and system documentation.

34

35 | P a g e

ACC. NO.

ADDRESS.

NAME

BALANCE.

START

BANK
CUSTOMER

has

TRANSACTION
Done by

DEBIT

CREDIT

35

36 | P a g e

START

CUSTOMER

Has

Has

FIXED DEPOSITE

ACCOUNT

AMOUNT

ID. NO.

DURATION

BALANCE

36

ACC. ID.

37 | P a g e

TRANSACTION

CUSTOMER

CURRENT BALANCE

DEBIT

CREDIT

UPDATE BALANCE

UPDATE BALANCE

BALANCE

DFD Diagram For Bank Management System


37

38 | P a g e

Level 0:

Banking
Customer

Accountin
g

System

Level 1:
Custom
er
Customer
Query

Transmission

Check
Requirement

Form

Bankin
g

Self

Schedule
Purpose

Amount

Account

Account

Balance

Amount
Informati
on

SNAP SHOTS
38

39 | P a g e

39

40 | P a g e

40

41 | P a g e

41

42 | P a g e

42

43 | P a g e

43

44 | P a g e

44

45 | P a g e

45

46 | P a g e

46

47 | P a g e

47

48 | P a g e

48

49 | P a g e

49

50 | P a g e

Coding
Main Form

Main Form Coding


Private Sub Form_Activate()
Dim read As String
Open App.Path & "\data\log" For Input As #1
50

51 | P a g e

Input #1, read


If read = 1 Then
Me.mnu_file_log_on.Enabled = False
Me.Mnu_file_login_off.Enabled = True
Me.mnu_file_lock.Enabled = True
ElseIf read = 0 Then
Me.mnu_file_log_on.Enabled = True
Me.Mnu_file_login_off.Enabled = False
Me.mnu_file_lock.Enabled = False
End If
Close #1
End Sub
Private Sub Form_Load()
act_user.Caption = Login.user.Text
bg.Height = Me.ScaleHeight
bg.Width = Me.ScaleWidth
End Sub
Private Sub Form_Resize()
bg.Height = Me.Height
bg.Width = Me.Width
End Sub
Private Sub Form_Unload(Cancel As Integer)
If MsgBox("Are You sure? You Want To Log out", vbYesNo + vbQuestion,
"Log out Application") = vbYes Then
51

52 | P a g e

Dim f As Form
For Each f In Forms
Unload f
Set f = Nothing
Next f
Else
Cancel = True
End If
End Sub
Private Sub mnu_admin_cust_acc_Click()
Cust_profile.Show
Cust_profile.acc_info.Recordset.AddNew
Me.Enabled = False
End Sub
Private Sub mnu_admin_cust_custs_Click()
Me.Enabled = False
All_cust.Show
End Sub
Private Sub mnu_file_add_Click()
AddUser.Show
Me.Enabled = False
End Sub
Private Sub mnu_file_ext_Click()

52

53 | P a g e

Unload Me
End Sub
Private Sub mnu_file_logo_Click()
Me.Enabled = False
Login.Show
End Sub
Private Sub mnu_file_lock_Click()
Me.Enabled = False
With Locked
.user.Text = act_user.Caption
.Show
End With
End Sub
Private Sub mnu_file_log_on_Click()
Dim val As String
Dim read As String
val = 1
Open App.Path & "\data\log" For Output As #1
Print #1, val
Close #1
Open App.Path & "\data\log" For Input As #1
Input #1, read
If read = 1 Then
Me.mnu_file_log_on.Enabled = False
53

54 | P a g e

Me.Mnu_file_login_off.Enabled = True
End If
Close #1
End Sub
Private Sub Mnu_file_login_off_Click()
Dim val As String
val = 0
Open App.Path & "\data\log" For Output As #1
Print #1, val
Close #1
Open App.Path & "\data\log" For Input As #1
Input #1, read
If read = 0 Then
Me.mnu_file_log_on.Enabled = True
Me.Mnu_file_login_off.Enabled = False
End If
Close #1
End Sub
Private Sub mnu_file_users_Click()
Users.Show
Me.Enabled = False
End Sub
Private Sub mnu_hlp_top_Click()
About.Show
54

55 | P a g e

Me.Enabled = False
End Sub
Private Sub mnu_report_deprep_Click()
Deposit_rep.Show
Me.Enabled = False
End Sub
Private Sub mnu_report_trans_Click()
Transfer_rep.Show
Me.Enabled = False
End Sub
Private Sub mnu_report_withdraw_Click()
withdraw_rep.Show
Me.Enabled = False
End Sub
Private Sub mnu_tra_dip_Click()
deposit.Dep_Rep1.Recordset.AddNew
deposit.Show
Me.Enabled = False
End Sub
Private Sub mnu_tra_trans_Click()
transfer.rep2.Recordset.AddNew
transfer.Show
Me.Enabled = False

55

56 | P a g e

End Sub
Private Sub mnu_tra_with_Click()
withdraw.rep1.Recordset.AddNew
withdraw.Show
Me.Enabled = False

Splash Form
Splash Form Coding
Option Explicit
Dim a As Integer
Private Sub Form_Load()
Label2.Caption = "Company : " & App.CompanyName
Label3.Caption = "Version : " & App.Major & "." & App.Minor & "." &
App.Revision
Label4.Caption = "Copyright : " & App.LegalCopyright
Label5.Caption = "LicenseTo : " & Environ("USERName")
End Sub
Private Sub Timer1_Timer()
If a = 10 Then
Label1.Caption = "Loading.

" & a & "%"

ElseIf a = 20 Then
Label1.Caption = "Loading.. " & a & "%"
ElseIf a = 30 Then
56

57 | P a g e

Label1.Caption = "Loading... " & a & "%"


ElseIf a = 40 Then
Label1.Caption = "Loading.

" & a & "%"

ElseIf a = 50 Then
Label1.Caption = "Loading.. " & a & "%"
ElseIf a = 60 Then
Label1.Caption = "Loading... " & a & "%"
ElseIf a = 70 Then
Label1.Caption = "Loading.

" & a & "%"

ElseIf a = 80 Then
Label1.Caption = "Loading.. " & a & "%"
ElseIf a = 90 Then
Label1.Caption = "Loading... " & a & "%"
End If
If a = 100 Then
Main.bg.Picture = LoadPicture(App.Path & "\Data\Extra\BMS_BG.jpg")
Dim read As String
Open App.Path & "\data\log" For Input As #1
Input #1, read
If read = 1 Then
Login.Show
Unload Me
Close #1
Else
Main.Show
57

58 | P a g e

Unload Me
End If
End If
Close #1
a=a+5
End Sub

Login Form
Login Form Coding
Private Sub Command1_Click()
If validuser(user, pwd) = True Then
Main.Enabled = True
Main.Show
Main.act_user.Caption = Me.user.Text
info.Caption = ""
Main.Caption = "Banking Management System...[Login User:" &
Main.act_user.Caption & " Login Time:" & Time & "]"
Me.Hide
Else
info.Caption = "Failed! Please Entered correct Password."
Me.user.Text = ""
Me.pwd.Text = ""
End If
End Sub
Private Sub Command2_Click()
58

59 | P a g e

Unload Me
End Sub

Lock Form
Lock Form Coding
Private Sub pwd_Click()
info.Caption = ""
End Sub
Private Sub unlock_Click()
If validuser(user, pwd) = True Then
Main.Enabled = True
Main.Show
Me.Hide
Me.user.Text = ""
Me.pwd.Text = ""
info.Caption = ""
Else
info.Caption = "Failed! Please Entered correct Password."
Me.pwd.Text = ""
End If
End Sub

Add User Form


Add User Form Coding
Private Sub Command1_Click()

59

60 | P a g e

If CHECK(User) = True Then


MsgBox "Username Already Exist! Please select Valid Username.",
vbInformation, "Username"
ElseIf chkpwd.Text = pwd.Text = False Then
MsgBox "Password Can't Matched! Please Enter Correct Password.",
vbRetryCancel + vbCritical, "Password Error!"
Else
add_usr.Recordset.Update
User.Text = ""
pwd.Text = ""
Unload Me
Users.Show
End If
End Sub
Private Sub Command3_Click()
Unload Me
End Sub
Private Sub Form_Load()
add_usr.Recordset.AddNew
End Sub
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub
Private Sub Timer1_Timer()
60

61 | P a g e

If User.Text = "" Then


Command1.Enabled = False
End If
If pwd.Text = "" Then
Command1.Enabled = False
End If
If chkpwd.Text = "" Then
Command1.Enabled = False
End If
If User.Text = "" = False And pwd.Text = "" = False And chkpwd.Text = "" =
False Then
Command1.Enabled = True
End If
End Sub

Customer Form
Customer Form Coding
Private Sub add_Click()
With Cust_profile
.Show
.acc_info.Recordset.AddNew
.updt.Enabled = False
Me.Hide
Main.Enabled = False

61

62 | P a g e

End With
End Sub
Private Sub del_Click()
If Ado_grid.Recordset.EOF And Ado_grid.Recordset.BOF Then
MsgBox "Data can't Selected Or Data row Empaty", vbExclamation,
"Delection error!"
ElseIf cust_list.Text = "" Then
MsgBox "Data can't Selected Or Data row Empaty", vbExclamation,
"Delection error!"
ElseIf MsgBox("Are You sure?", vbYesNo + vbInformation, "Delete") =
vbYes Then
If img_path.Caption = "" = False Then
Kill App.Path & "\data\picture\" & img_path.Caption
End If
Me.Ado_grid.Recordset.Delete
Ado_grid.Refresh
End If
Ado_grid.Refresh
End Sub
Private Sub exit_Click()
Unload Me
Main.Show
End Sub
Private Sub Form_Load()
cust_list.Columns.Remove (12)
62

63 | P a g e

End Sub
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub
Private Sub Refresh_Click()
Ado_grid.Refresh
Me.cust_list.Refresh
End Sub
Private Sub Timer1_Timer()
Dim pt As String
Cust_profile.get_acc.Enabled = False
pt = App.Path & "\data\picture\" & img_path.Caption
If img_path.Caption <> "" Then
Img.Picture = LoadPicture(pt)
Else
Img.Picture = LoadPicture(App.Path & "\data\Extra\default.jpg")
End If
End Sub
Private Sub Update_Click()
If Ado_grid.Recordset.EOF Then
MsgBox "Data can't Selected Or Data row Empaty", vbExclamation,
"Delection error!"
ElseIf cust_list.Text = "" Then
63

64 | P a g e

MsgBox "Data can't Selected Or Data row Empaty", vbExclamation,


"Delection error!"
Else
With Cust_profile
.Show
.Gender.Text = .acc_info.Recordset.Fields(3)
.State.Text = .acc_info.Recordset.Fields(4)
.Acc_type = .acc_info.Recordset.Fields(13)
.Acc_no.Enabled = False
.add_cust.Enabled = False
.cust_pic.Enabled = False
.acc_info.Recordset.AbsolutePosition =
All_cust.Ado_grid.Recordset.AbsolutePosition
.Frame3.Enabled = False
End With
End If
End Sub
Add Customer Form

Add Customer Form Coding


Dim sri, acc As Integer
Dim src, dst, f_title As String
Private Sub add_cust_Click()
If Pic_path.Caption = "" Then
MsgBox "Please Select Customer Profile Picture", vbInformation, "Picture"
Else
64

65 | P a g e

If C_Name.Text = "" Or F_Name.Text = "" Or Gender.Text = "" Or _


state.Text = "" Or Dist.Text = "" Or Adds.Text = "" Or Acc_type.Text = "" Or
_
Amount.Text = "" Or Pic_path.Caption = "" Then
MsgBox "Please Given full Information", vbInformation, "Message"
Else
FileCopy src, dst
Name App.Path & "\Data\Picture\" & f_title As App.Path & "\Data\Picture\" &
"img_" & Acc_no.Text & ".jpg"
Me.acc_info.Recordset.Update
Me.updt.Enabled = True
Unload Me
All_cust.Show
All_cust.Ado_grid.Refresh
End If
End If
End Sub
Private Sub Amount_KeyPress(KeyAscii As Integer)
If (KeyAscii >= vbKey0 And KeyAscii <= vbKey9) Or KeyAscii = vbKeyBack
Then
Exit Sub
Else
KeyAscii = 0
End If
End Sub

65

66 | P a g e

Private Sub Command1_Click()


acc_info.Recordset.Update
Unload Me
Main.Enabled = True
End Sub
Private Sub Command2_Click()
acc_info.Recordset.Update
End Sub
Private Sub Dir_Change()
File.Path = Dir.Path
End Sub
Private Sub Driv_Change()
On Error Resume Next
Dir.Path = Driv.Drive
If Err.Number <> 0 Then
MsgBox "Drive selected is unavailable.", vbInformation, "Drive
Unavailable"
Drive1.Drive = mstrDrive
Else
mstrDrive = Drive.Drive
End If
End Sub
Private Sub exit_Click()
Unload Me
66

67 | P a g e

End Sub
Private Sub File_Click()
cust_pic.Picture = LoadPicture(File.Path & "\" & File.List(File.ListIndex))
f_title = File.FileName
dst = App.Path & "\Data\Picture\" & f_title
src = File.Path & "\" & File.FileName
Pic_path.Caption = "img_" & Acc_no.Text & ".jpg"
If cust_pic.Picture = LoadPicture("") Then
Pic_path.Caption = ""
End If
End Sub
Private Sub Form_Activate()
If Acc_no.Enabled = True Then
Dim valu As Long
valu = "100000"
get_acc.Refresh
If get_acc.Recordset.EOF Then
Acc_no.Text = val(1) + val(valu)
Else
get_acc.Recordset.MoveLast
Acc_no.Text = val(pre_acc.Caption) + val(1)
End If
Dim Today As Variant
Today = Now
67

68 | P a g e

date.Text = Format(Today, "d/mm/yyyy")


End If
End Sub
Private Sub Form_Load()
With Acc_type
.AddItem "Currunt Account"
.AddItem "Saving Account"
End With
With Gender
.AddItem "Male"
.AddItem "Female"
End With
With state
.AddItem "Andhra Pradesh"
.AddItem "Arunachal Pradesh"
.AddItem "Assam"
.AddItem "Chhattisgarh"
.AddItem "Chandigarh"
.AddItem "Delhi "
.AddItem "Goa"
.AddItem "Gujarat"
.AddItem "Haryana"
.AddItem "Himachal Pradesh"
.AddItem "Jammu and Kashmir"

68

69 | P a g e

.AddItem "Jharkhand"
.AddItem "Karnataka"
.AddItem "Kerala"
.AddItem "Madhya Pradesh"
.AddItem "Maharashtra"
.AddItem "Manipur"
.AddItem "Meghalaya"
.AddItem "Mizoram"
.AddItem "Nagaland"
.AddItem "Orissa"
.AddItem "Punjab"
.AddItem "Rajasthan"
.AddItem "Sikkim"
.AddItem "Tamil Nadu"
.AddItem "Tripura "
.AddItem "Uttar Pradesh "
.AddItem "Uttarakhand "
.AddItem "West Bengal "
End With
End Sub
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub

69

70 | P a g e

Private Sub Mobno_KeyPress(KeyAscii As Integer)


If (KeyAscii >= vbKey0 And KeyAscii <= vbKey9) Or KeyAscii = vbKeyBack
Then
Exit Sub
Else
KeyAscii = 0
End If
End Sub
Private Sub Phno_KeyPress(KeyAscii As Integer)
If (KeyAscii >= vbKey0 And KeyAscii <= vbKey9) Or KeyAscii = vbKeyBack
Then
Exit Sub
Else
KeyAscii = 0
End If
End Sub
Private Sub updt_Click()
Me.acc_info.Recordset.Update
Me.Frame3.Enabled = True
Me.add_cust.Enabled = True
Unload Me
All_cust.Show
All_cust.Ado_grid.Refresh
End Sub
Private Sub Wit_KeyPress(KeyAscii As Integer)
70

71 | P a g e

If (KeyAscii >= vbKey0 And KeyAscii <= vbKey9) Or KeyAscii = vbKeyBack


Then
Exit Sub
Else
KeyAscii = 0
End If
End Sub

Deposit Form
Deposit Form Coding
Private Sub Acc_list_Click()
info_lod.Recordset.AbsolutePosition = Acc_list.ListIndex + 1
dep_acc.Caption = info_lod.Recordset.Fields(0)
End Sub
Private Sub Acc_list_KeyPress(KeyAscii As Integer)
If (KeyAscii >= vbKey0 And KeyAscii <= vbKey9) Or KeyAscii = vbKeyBack
Then
Exit Sub
Else
KeyAscii = 0
End If
End Sub
Private Sub Command1_Click()
Dim a As Integer
If Amount.Text = "" Or val(Amount.Text) <= 99 Then
71

72 | P a g e

MsgBox "Please enter the Amount Greater than Rs 100", vbInformation,


"Amount info"
Else
info_lod.Recordset.Fields(14).Value = val(Bal.Text) + val(Amount.Text)
info_lod.Recordset.Update
Dep_Rep1.Recordset.Update
a = Amount.Text
Amount.Text = ""
MsgBox "Deposit Rs. " & a & " Sucessfully", vbInformation, "Deposit"
Unload Me
End If
End Sub
Private Sub Command2_Click()
Unload Me
End Sub
Private Sub Form_Activate()
T_Mode.Text = "Deposit"
T_Date.Text = Format(Now, "d/mm/yyyy")
End Sub
Private Sub Form_Load()
i=0
While Not Acc_lists.rsinfo.EOF
Acc_list.List(i) = Acc_lists.rsinfo(0)
Acc_lists.rsinfo.MoveNext

72

73 | P a g e

i=i+1
Wend
Acc_lists.rsinfo.Close
End Sub
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub
Private Sub Timer1_Timer()
If Acc_list.Text = "" Then
Command1.Enabled = False
Else
Command1.Enabled = True
End If
End Sub
Deposit Report Form
Report Form Coding
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub

Transfer Form

Transfer Form Coding


73

74 | P a g e

Dim cash As Integer


Private Sub Acc_list_Click()
info_lod2.Recordset.AbsolutePosition = Acc_list.ListIndex + 1
Acc_no.Caption = info_lod2.Recordset.Fields(0)
End Sub
Private Sub Acc_list_KeyPress(KeyAscii As Integer)
If (KeyAscii >= vbKey0 And KeyAscii <= vbKey9) Or KeyAscii = vbKeyBack
Then
Exit Sub
Else
KeyAscii = 0
End If
End Sub
Private Sub Command1_Click()
If info_lod2.Recordset.AbsolutePosition =
Ado_T_no.Recordset.AbsolutePosition Then
MsgBox "Invalid Account Seleted", vbCritical, "Account Error"
ElseIf Amount.Text = "" Or val(Amount.Text) <= 99 Then
MsgBox "Please enter the Amount Greater than Rs 100", vbInformation,
"Amount info"
ElseIf Bal.Text = "" Or val(Bal.Text) <= 499 Then
MsgBox "You Can't Transfer Amount to Another Account because your
Account Balance is Low", vbInformation, "Transfer Error!"
ElseIf val(Bal.Text) <= val(Amount.Text) Then
MsgBox "You Can't Transfer Amount to Another Account because your
Account Balance is Low", vbInformation, "Transfer Error!"
74

75 | P a g e

Else
info_lod2.Recordset.Fields(14).Value = val(Bal.Text) - val(Amount.Text)
info_lod2.Recordset.Update
info_lod2.Refresh
Ado_T_no.Recordset.Fields(14).Value = val(Bal_T.Text) +
val(Amount.Text)
Ado_T_no.Recordset.Update
Ado_T_no.Refresh
rep2.Recordset.Update
MsgBox "Transfer Rs. " & Amount.Text & " To Account No. " & To_Acc.Text
& " Sucessfully", vbInformation, "Transfer"
Amount.Text = ""
Unload Me
End If
End Sub
Private Sub Command2_Click()
Unload Me
End Sub
Private Sub Form_Activate()
T_Mode.Text = "Transfer"
T_Date.Text = Format(Now, "d/mm/yyyy")
End Sub
Private Sub Form_Load()
i=0
l=0
75

76 | P a g e

While Not Acc_lists.rsinfo.EOF


Acc_list.List(i) = Acc_lists.rsinfo(0)
To_Acc.List(i) = Acc_lists.rsinfo(0)
Acc_lists.rsinfo.MoveNext
i=i+1
Wend
Acc_lists.rsinfo.Close
End Sub
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub
Private Sub Timer1_Timer()
If Acc_list.Text = "" Or To_Acc.Text = "" Then
Command1.Enabled = False
Else
Command1.Enabled = True
End If
End Sub
Private Sub Tim1_Timer()
Dim i As Variant
i=1
Tim1.Enabled = False
End Sub
76

77 | P a g e

Private Sub To_Acc_Click()


Ado_T_no.Recordset.AbsolutePosition = To_Acc.ListIndex + 1
trans_acc.Caption = Ado_T_no.Recordset.Fields(0)
End Sub

Transfer Report Form


Transfer Report Form Coding
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub
User Form

User Form Coding


Private Sub Command1_Click()
AddUser.Show
Unload Me
End Sub
Private Sub Command2_Click()
If Ado_user.Recordset.EOF And Ado_user.Recordset.BOF Then
MsgBox "Data can't Selected Or Data row Empaty", vbExclamation,
"Delection error!"
ElseIf User_list.Text = "" Then
MsgBox "Data can't Selected Or Data row Empaty", vbExclamation,
"Delection error!"
ElseIf MsgBox("Are You sure?", vbYesNo + vbInformation, "Delete") =
vbYes Then
77

78 | P a g e

Me.Ado_user.Recordset.Delete
Ado_user.Refresh
End If
Ado_user.Refresh
End Sub
Private Sub Command3_Click()
Unload Me
End Sub
Private Sub Form_Load()
Ado_user.Refresh
End Sub
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Ado_user.Refresh
Main.Show
End Sub

Withdraw Form
Withdraw Form Coding
Private Sub Acc_list_Click()
info_lod1.Recordset.AbsolutePosition = Acc_list.ListIndex + 1
with_acc.Caption = info_lod1.Recordset.Fields(0)
End Sub
Private Sub Command1_Click()
78

79 | P a g e

If Amount.Text = "" Or val(Amount.Text) <= 99 Then


MsgBox "Please enter the Amount Greater than Rs 100", vbInformation,
"Amount info"
Else
info_lod1.Recordset.Fields(14).Value = val(Bal.Text) - val(Amount.Text)
info_lod1.Recordset.Update
rep1.Recordset.Update
MsgBox "Withdraw Rs. " & Amount.Text & " Sucessfully", vbInformation,
"Withdraw"
Amount.Text = ""
Unload Me
End If
End Sub
Private Sub Command2_Click()
Unload Me
End Sub
Private Sub Form_Activate()
T_Mode.Text = "Withdraw"
T_Date.Text = Format(Now, "d/mm/yyyy")
End Sub
Private Sub Form_KeyPress(KeyAscii As Integer)
If (KeyAscii >= vbKey0 And KeyAscii <= vbKey9) Or KeyAscii = vbKeyBack
Then
Exit Sub
Else
79

80 | P a g e

KeyAscii = 0
End If
End Sub
Private Sub Form_Load()
i=0
While Not Acc_lists.rsinfo.EOF
Acc_list.List(i) = Acc_lists.rsinfo(0)
Acc_lists.rsinfo.MoveNext
i=i+1
Wend
Acc_lists.rsinfo.Close
T_Mode.Text = "Deposit"
T_Date.Text = Format(Now, "d/mm/yyyy (dddd)")
End Sub
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub
Private Sub Timer1_Timer()
If Acc_list.Text = "" Then
Command1.Enabled = False
Else
Command1.Enabled = True
End If
80

81 | P a g e

End Sub

Withdraw Report Form


Withdraw Report Form Coding
Private Sub Form_Unload(Cancel As Integer)
Main.Enabled = True
Main.Show
End Sub
About Form

About Form Coding


Private Sub cmdOK_Click()
Unload Me
End Sub
Private Sub Form_Load()
Me.Caption = "About " & App.ProductName
lblVersion.Caption = "Version :
"." & App.Revision

" & App.Major & "." & App.Minor &

lblTitle.FontBold = True
lblTitle.Caption = App.Title
lblDescription.Caption = "Description :

" & App.FileDescription

Label1.Caption = "copyright:

" & App.LegalCopyright

Label2.Caption = "Company:

" & App.CompanyName

Lbl_license.Caption = "License To: " & Environ("USERName")


End Sub

81

82 | P a g e

Private Sub Form_MouseMove(Button As Integer, Shift As Integer, X


As Single, Y As Single)
Image2.Picture = LoadPicture(App.Path & "\Data\extra\app_icon.jpg")
End Sub
Private Sub Image1_Click()
Dim URL As String
URL = "http://www.luckhysoft.blogspot.com"
Call Shell("explorer.exe " & URL, vbNormalFocus)
End Sub
Private Sub Image2_Click()
Unload Me
Main.Enabled = True
Main.Show
End Sub
Private Sub Image2_MouseMove(Button As Integer, Shift As Integer, X
As Single, Y As Single)
Image2.Picture = LoadPicture(App.Path & "\data\Extra\exit.jpg")
End Sub
Coding of module.
Public Function validuser(User As String, pwd As String)
Dim db As String
Dim Cmd As String
Dim sql As String
Dim Cn As ADODB.Connection
82

83 | P a g e

Dim rs As ADODB.Recordset
db = App.Path & "\Data\Bank_Data.MDB"
Cmd = "Provider=Microsoft.Jet.OLEDB.4.0;" & _
"Data Source=" & db & ""
Set Cn = New ADODB.Connection
With Cn
.ConnectionString = Cmd
.Open
End With
Set rs = New ADODB.Recordset
sql = "Select * From [Login] where User LIKE '" & User & "' and Password
LIKE '" & pwd & "'"
rs.Open sql, Cn, adOpenForwardOnly, adLockReadOnly
If Not rs.EOF Then
validuser = True
Else
validuser = False
End If
rs.Close
Set rs = Nothing
Cn.Close
Set Cn = Nothing
End Function
Public Function CHECK(User As String)
Dim db As String
83

84 | P a g e

Dim Cmd As String


Dim sql As String
Dim Cn As ADODB.Connection
Dim rs As ADODB.Recordset
db = App.Path & "\Data\Bank_Data.MDB"
Cmd = "Provider=Microsoft.Jet.OLEDB.4.0;" & _
"Data Source=" & db & ""
Set Cn = New ADODB.Connection
With Cn
.ConnectionString = Cmd
.Open
End With
Set rs = New ADODB.Recordset
sql = "Select * From [Login] where User LIKE '" & User & "'"
rs.Open sql, Cn, adOpenForwardOnly, adLockReadOnly
If Not rs.EOF Then
CHECK = True
Else
CHECK = False
End If
rs.Close
Set rs = Nothing
Cn.Close
Set Cn = Nothing
End Function
84

85 | P a g e

Future Enhancement

For any system, present satisfaction in job is important, but it is also


necessary to for see and visualizes the future scope. Future enhancement
is necessary for the system as the limitations that cannot be denied
today, can be overcome by better technologies.

In the future more software companies will hire this software


program because now a day the need for the speed in the day-to-day life
has become essential. As competition increases, companies by
considering old version, they develop more efficient versions for
individual success.
For example, in my project, records of the customer, their
transactions are maintained which will be helpful in the future as
reference prior to dealings well as evidence. Also limitations can be
overcome by better technologies and system can be made more efficient.

85

86 | P a g e

Thus we can conclude that we have successfully developed the


BANK MANAGEMENT SYSTEM.
It has got the following advantages over Manual System:
Manual work takes more time and cost due to staff and other
materials such as papers and registers.
Data retrieval process becomes easy when it is needed, if we use
computer management instead of manually.
Storage capacity of the computer is also excellent.
Generating the invoice by printer using computer is also useful
feature.
Updating of data is easy in computerized system.
Data consistency is required for neat and proper management that
is achieved by computer easily.
With the help of software, data redundancy reduces as compared to
manual.
Time is precious and speed is the order of today. Our software
supports this statement.
86

87 | P a g e

Bibliography

BOOKS:

1.
2.
3.
4.

Herbert Schildt (2000) Visual Basic 6.0 Tata McGraw Hill


John Zukowski (2000) Visual Basic 6.0 BPB Publications
Rajeev mall Software engineering
Elmasri Navathe Fundamentals of database systems

ONLINE REFERENCE:
www.w3schools.com
www.theserverside.com
www.visual.com

87

You might also like