Sei sulla pagina 1di 36

SRS DOCUMENT

1. INTRODUCTION
1.1 Purpose 1.1.1 The Software is for the securing ATM transaction while shopping. 1.1.2 It maintains two levels of users: 1.2 Scope It can be used in any bank along with any shop to secure transaction while shopping.This will help to implement this web application in real time system. 1.3 Technologies to be used This project will be an application to be developed in ASP.NET having Ms SQL Server as backend. 1.4 Overview

Administrator Level User Level Login page. User registration details Maintaining all the records of customers. Random pin generation

1.1.3 The Software includes:-

Database Design (Ms SQL Server) Form Design (asp.net) Coding (vb.net and c#)

Project is related to securing ATM transaction while shopping. The project maintains two levels of users:Administrator Level User Level-Data Entry

Maintaining records of customers Maintaining registered pen drive. Maintaining a Mini statement Maintaining all the transactions that took place till date Maintaining my account details

2. OVERALL DESCRIPTION
2.1 Product Perspective 2.1.1 System Interfaces: None 2.1.2 User Interfaces: 2.1.2.1 Login screen 2.1.2.2 Registration screen 2.1.2.3 Record update screen 2.1.2.4 Mini statement screen 2.1.2.5 My account screen 2.1.3 Hardware: 2.1.3.1Processor: 2.1.3.2 Memory: 2.1.3.3 Network: 2.1.4 Software: 2.1.4.1 Front End: 2.1.4.2 Backend: ASP.NET MY SQL DATABASE 1.0 GHz and above 256 MB RAM Active Internet Connection

2.1.4.3 Internet Browser

3. SPECIFIC REQUIREMENTS
3.1 User Interfaces: 3.1.1 Login screen: i) User name ii)Password iii) Role: Administrator/customer 3.1.2 Registration screen: i) Name ii) Address iii)Date of birth iv)Opening balance v)Pin number vi)Drive serial number 3.1.3 Record update screen i)Patient name ii)Address iii)Phone number

3.2 Hardware: 3.2.1 Processor: 3.2.2 Memory: 3.2.3 Network: 1.0 GHz and above 256 MB RAM Active Internet Connection

3.3 Software: 3.3.1 Front End: 3.3.2 Backend: ASP.NET MY SQL DATABASE

3.3.3 Internet Browser

3.4 System Features: 3.4.1 Project is related to ATM security. 3.4.2 The project maintains two levels of users: Administrator Level User Level-Data

3.4.3 Main facilities available in this project are: Random pin generator Sms Portal

3.5 Software System Attributes: 3.5.1 Security: The application will be password protected. The main reason for developing this application is security with the help of a random pin generator function 3.5.2 Maintainability: The application will be designed in maintainable manner. It will be able to incorporate new requirements in individual modules. 3.5.3 Portability: The system will be easily portable on any window based system that has MS-SQL server installed. 3.6 Logical Database Requirements: 3.6.1 Customer Information like name, address,phone number,D.O.B,drive number 3.6.2 User account Information

CHAPTER 1: INTRODUCTION
1.1 Purpose
1.1.1 The Software is for the securing ATM transaction while shopping. 1.1.2 It maintains two levels of users:

Administrator Level User Level

1.1.3 The Software includes: Login page. User registration details. Maintaining all the records of customers.

Random pin generation.

1.2 Scope
It can be used in any bank along with any shop to secure transaction while shopping. This will help to implement this web application in real time system

1.3 Technologies to be used:


This project will be an application to be developed in ASP.NET having Ms SQL Server as backend. Database Design (Ms SQL Server) Form Design (asp.net) Coding (vb.net and c#)

1.4 Overview
Project is related to securing ATM transaction while shopping. The project maintains two levels of users:

Administrator Level 5

User Level-Data Entry

Maintaining records of customers Maintaining registered pen drive. Maintaining a Mini statement Maintaining all the transactions that took place till date Maintaining my account details

CHAPTER 2: SYSTEM REQUIREMENTS


2.1 User Requirements: Hardware:
Processor Memory Network : : : 1.0 GHz and above 256 MB RAM Active Internet Connection

Technology Used:
Front End Backend : : ASP.NET MY SQL DATABASE

Software:
Internet Browser Visual studio

CHAPTER 3: SYSTEM ANALYSIS AND FEASIBILITY


7

3 Feasibility Study
Depending on the results of the initial investigation the survey is now expanded to a more detailed feasibility study. FEASIBILITY STUDY is a test of system proposal according to its workability, impact of the organization, ability to meet needs and effective use of the resources. It focuses on these major questions:
1. What are the users demonstrable needs and how does a candidates systemmeet them?

2. 3. 4.

What resources are available for given candidate system? What are the likely impacts of the candidate system on the organization? Whether it is worth to solve the problem?

During feasibility analysis for this project, following primary areas of interest are to beconsidered. Investigation and generating ideas about a new system does this. Steps in feasibility analysis Eight steps involved in the feasibility analysis are:

Form a project team and appoint a project leader. Prepare system flowcharts. Enumerate potential proposed system. Define and identify characteristics of proposed system Determine and evaluate performance and cost effective of each proposed system. Weight system performance and cost data. Select the best-proposed system Prepare and report final project directive to management.

3.1 Technical feasibility


A study of resource availability that may affect the ability to achieve an acceptablesystem. This evaluation determines whether the technology needed for the proposedsystem is available or not. Can the work for the project be done with current equipment existing software technology & available personal? Can the system be upgraded if developed? If new technology is needed then what can be developed? This is concerned with specifying equipment and software that will successfully satisfythe user requirement. The technical needs of the system may include:

Front-end and back-end selection


An important issue for the development of a project is the selection of suitable front-end and back-end. When we decided to develop the project we went through an extensive study to determine the most suitable platform that suits the needs of the organization as well as helps in development of the project. The aspects of our study included the following factors.

Front-end selection:
It must have a graphical user interface that assists employees that are not from ITbackground. Scalability and extensibility. Flexibility. Robustness. According to the organization requirement and the culture.

Must provide excellent reporting features with good printing support


Platform independent. Easy to debug and maintain. Event driven programming facility. Front end must support some popular back end like Ms Access.

Back-end Selection:
Multiple user support. Efficient data handling. Provide inherent features for security. Efficient data retrieval and maintenance. Stored procedures. Popularity. Operating System compatible. Easy to install. Various drivers must be available. Easy to implant with the Front-end.

3.2 Economical feasibility

10

Economic justification is generally the Bottom Line consideration for most systems. Economic justification includes a broad range of concerns that includes cost benefit analysis. In this we weight the cost and the benefits associated with the candidate system and if it suits the basic purpose of the organization i.e. profit making, the project is making to the analysis and design phase. The financial and the economic questions during the preliminary investigation areverified to estimate the following: The cost to conduct a full system investigation. The cost of hardware and software for the class of application being considered. The benefits in the form of reduced cost. The proposed system will give the minute information, as a result the

performance is improved which in turn may be expected to provide increased profits. This feasibility checks whether the system can be developed with the availablefunds. The ATM SECURITY does not require enormous amount ofmoney to be developed. This can be done economically if planned judicially, so itis economically feasible

3.3 Operational Feasibility


It is mainly related to human organizations and political aspects. The points to be considered are: What changes will be brought with the system? What organization structures are disturbed? What new skills will be required? Do the existing staff members have theseskills? If not, can they be trained in due course of time?

The system is operationally feasible as it very easy for the End users to operate it. It only needs basic information about Windows platform.

3.4 Schedule feasibility

11

Time evaluation is the most important consideration in the development of project. The time schedule required for the developed of this project is very important since more development time effect machine time, cost and cause delay in the development of other systems. A reliableATM SECURITY SYSTEM can be developed in the considerable amount of time. Schedule of my project will be as follows:
FEASIBILITY ANALYSIS MARKET RESEARCH DESIGNING CODING MODULE TESTING SYSTEM TESTING PROJECT SUBMISSION 7TH JANUARY,2012 21ST JANUARY,2012 1ST FEBRUARY,2012 3RD MARCH 2012 15THMARCH,2012 22ND MARCH,2012 25THMARCH,2012

CHAPTER 4: PROJECT PLANNING


12

FEATURES OF SOFTWARE 4.1 Microsoft Visual Studio


Microsoft Visual Studio is Microsofts flagship software development product for computer programmers. It centers on an integrated distribution environment which has programmers create stand alone, and web services that run on any platforms supported by Microsofts .Net Framework (for all versions after 6). Supported platforms include Microsoft windows, servers and workstations, Pocket PC, Smart Phones and World Wide Web browsers not the Java Virtual Machine that all other java tools target.

4.2 Visual Studio 2010


The most important language added in this version was the introduction of generics, which are similar in many aspects to C++ templates. This potentially increases the number of bugs caught at compile- time instead of run- time by encouraging the use of strict type checking in areas where it was not possible before, C++ also got a similar upgrade with the addition of C+ +/CLI which is slated to replace the use of Managed C++. Other new features of Visual Studio 2005 include the Development Designer which allows application designs to be validated before deployments, an improved environment for web publishing when combined with ASP.NET 2.0 and load testing to see application performance under various sorts of user loads. Visual Studio 2010 also added extensive 64- bit support. While the development environment itself only available as a 32- bit application, visual C++ 2010. supports compiling for (x64AMD64 and EM64T) as well as IA- 64 (Itanium). The platforms SDK include 64- bit and 64-bit versions of the libraries.

4.3 NET Framework SDK


The .NET framework is an integral windows component that supports building and running the next generation of applications and XML web services. The key component of the .NET frame work are the common language run time and the. NET frame work class library, which includes ADO.NET, ASP.NET and windows forms. The .NET framework provides a managed execution environment simplified development and deployment and integration with a wide variety of programming languages.

13

This framework is made up of the following parts: The common language runtime(CLR) The base class libraries. Object oriented internet development with ASP.NET Rich client user interface using windows forms RAD for the internet using web forms

4.4 Overview of the .NET Framework


The .NET framework is a new computing platform that simplifies application development in the highly distributed environment of the internet. The .NET framework is designed to fulfill following objectives: To provide a consistent object oriented programming environment whether object code is stored and executed locally but internet- distributed or executed remotely. To provide a code execution environment that minimizes software deployment and versioning conflicts. To provide a code execution environment that guarantees safe execution of code, including code created by an unknown or semi trusted third party. To provide a code execution environment that eliminates the performance problem of scripted or interpreted environments. To make the developer experience consistent across widely types of application, such as windows based applications and web based applications. To build all communication on industry standards to ensure that code based on the .NET framework can integrate with any other code.

14

Fig 4.1 .NET Framework The .NET framework has two main components: the common language runtime and the .Net framework class library. The common language runtime is the foundation of the .NET framework. You can think of the runtime as an agent that manages code at execution time, and removing while also enforcing strict type safely and other forms of code accuracy that ensure security and robustness in fact the concept of code management is a fundamental principle of the runtime.

4.5 Common Language Runtime (CLR)


The common language runtime (CLR) is responsible for runt-time services such as language integration; security enforcement; and memory, process and thread management. In addition, it has a roll at development time when features such as life cycle management strong type naming, cross-language exception handling, dynamic binding and so on, reduce the amount of code that a developer must write to turn the business logic the reusable component. The runtime can be hosted by high performance, server-side applications, such an s Microsoft Internet Information Services (IIS) for building web applications with ASP.NE and the next release of Microsoft SQL Server. This infrastructure enables you to use code managed by

15

the .NET framework to write your business logic, while still enjoying the superior performance of the industrys best enterprises servers that support runtime hosting.

4.6 ASP.NET
ASP.NET is a set of Microsoft.NET framework technologies used for building web applications and XML Web services. ASP.NET page execute on the server and generate mark up such as HTML, WML or XML that is sent to a desktop or mobile browser. ASP.NET pages use a compiled, event-driven programming model that improves performance and enables the separation of application logic and user interface. Both ASP.NET pages and ASP.NET web services files contain server-side (as opposed to client side logic) written in Visual basic .NET, C#.NET or any .NET compatible language, Web applications and XML Web Services take advantage of the features of the common language runtime, such as type safety, inheritance, language, interoperability, versioning, and integrated security.

4.7 IIS
Microsoft Internet Information S4ervices (IIS; formerly called Server is a set of Internet-based services for servers using Microsoft Windows. It is the worlds second most popular web server in terms of overall websites. As of September 2007 it served 34.94% of all websites and 36.63% of all active websites according to Net craft. The servers currently include FTP, SMTP, NNTOP, and HTTP/HTTPS.

4.8 ADO.NET
ADO.NET provides consistent access to data sources such a Microsoft SQL Server and XML, as well as to data sources exposed through OLE DB and ODBC. Data sharing consumer applications can use ADO.NET to connect to these data sources and retrieve, manipulate and update the data that they contain. ADO.NET separates data access from data manipulation into discrete components that can be used separately or in tandem. ADO.NET includes .NET Frame work data providers for connecting to a database, executing commands and retrieving results. Those results are either processed directly, placed in and ADO.NET Dataset objects in order to be exposed to the used in

16

an ad hoc manner, combined with data from multiple sources or remote between tiers. The ADO.NET Dataset object can also be used independently of a .NET Framework data provider to manage data local to the application or sourced from XML. The ADO.NET classes are found in System.Data.dll and are integrated with the XML classes found in System.Xml.dll. When compiling code that uses the System. Data, namespace reference both System.Data.dll and System.Xml.dll. ADO.NET provided functionality to developers writing managed code similar to the functionality provided to native component object model (COM) developers by ActiveX Data Objects (ADO).

4.9 ADO.NET Components


There are two components of ADO.NET that you can use to access and manipulate data: .NET Framework data providers. The DataSet

4.10 NET Framework Data Providers


The .NET Framework Data providers are components that have been explicitly designed for data manipulation and fast, forward-only, read-only access to data. The connection object provides connectivity to a data source. The command object enables access to database commands to return data, modify data, run stored procedures and send or retrieve parameter information. The Data Adapter provides a high-performance stream of data from the data source. Finally, the Data Adapter provides the bridge between the DataSet object and the data source. The Data Adapter uses command object to execute SQL commands at the data source to both load the DataSet with data and reconcile changes made to the data in the DataSet back to the data source.

17

4.11 The DataSet


The ADO.NET DataSet is explicitly designed for data access independent of any data source. As a result, it can be used with multiple and differing data sources used with XML data or used to manage data local to the application. The DataSet contains a collection n of one or more DataTable objects made up to rows and columns of data as well as primary key, foreign key, constraint and relation information about the data in the DataTable objects. 4.12 Benefits of ADO.NET ADO.NET offers several advantages over previous versions of ADO and over other data access components. These benefits fall into the following categories: 1. Interoperability 2. Maintainability 3. Programmability
4. Salability.

4.13 Chosen Database: SQL Server Management Studio


SQL Server Management Studio is a software application first launched with the Microsoft SQL Server 2005 that is used for configuring, managing, and administering all components within Microsoft SQL Server. The tool includes both script editors and graphical tools which work with objects and features of the server. A central feature of SQL Server Management Studio is the Object Explorer, which allows the user to browse, select, and act upon any of the objects within the server. It also has an "express" version that can be freely downloaded.

18

CHAPTER 5: PROBLEM STATEMENT EXISTING SYSTEM


In existing system of ATM card we dont have the proper security for a user as if his or her card is lost or incase misplaced by any chance he can face a big financial loss within the time he will get to know about his card. As in anyone can take anyones card and without the registered user any transaction can take place. To prevent this security in the present system we will be applying our new idea of securing the transaction with the help of random pin generator and sms portal. The problem which exists in the current system has made the many go victim of this credit card or ATM card defaulter for which in the end either the user or the bank has to pay the amount as it will be too late by the time it comes in knowledge of registered user about his loss which can be at higher scale too. This system will prove to be beneficial due to its low cost and more benefits it provides to the card users as well as bank.This low on cost web application will enhance security to a level which will raise standards of security in India. This web application can be implemented into real time system efficiently.

CHAPTER 6:
19

DESIGN AND IMPLEMENTATION


Project Planning

Fig 6.1 Project Planning

20

Fig 6.2 E-R Diagram


With the help of following these steps we were successfully able to build our web application (1) The process to be followed to identify an individual through a username and password. (2) The process will follow in authorizing a transaction through an ATM system will identify. (3) The integration model will develop public portal will be used to send the message to the user

and random code generator will be used to generate the code which is to be sent for the safer authentication.

21

MODULE-Random Pin Generator

Random pin Generator is a function which produces a unique random pin every time for a new transaction for each and every user. This uses the technique of encryption of alphabets and digits. The digits are ENCRYPTED from 0 to 9 and the alphabets are ENCRYPTED from A to Z. Here we take an empty string Rendompass and then this string takes the value of the new password generated each time. Every time the password is generated this password is updated and pen drives serial number is selected with the help of select command along with the users mobile number so that this transaction password can be send successfully. Here we use a function of .net Rnd.next and a loop to each time generate a new password of 6 digits which could either be a numeric or alphanumeric. This random pin will be send to the user with the help of a SMS portal to users mobile number. With the help of this Random pin generated each time we would be able to make our transactions very secure and we will be able to prevent all the threats , frauds happening in our daily life due to the lost or stolen or misplaced cards. Now a days stolen cards are easily accessed during shopping just swap and can any signature can fulfill the purpose. This low cost effective technique will be prove to be beneficial both to the bank authority and customers .In this modern world sending SMS are very cheap and provide ease of communication so this web application can be implemented in Real Time Systems too.

User Requirements:
22

Hardware:
Processor Memory Network : : : 1.0 GHz and above 256 MB RAM Active Internet Connection

Technology Used:
Front End Backend : : ASP.NET MY SQL DATABASE

Software:
Internet Browser Visual studio

MethodologyAdopted:
1. One and the main modifications made in this very project is the usage of a Pen Drive

instead of an ATM card as per the technology. 2. We insert a Pen Drive to the system, this shall lead us to a Login Interface.
3. This Login Interface requires us to fill in details, the username and the password. On

filling these up, the system enters our account. 4. On the other hand as the user enters the account the random pin generator generates a random pin. This pin is sent to the users mobile phone number in a SMS. 5. To complete the transaction the user now needs to enter this pin. 6. If the pin matches the correct pin the transaction is completed, otherwise an error message shall appear.

CHAPTER 7:
23

RECOMMENDATIONS
As we have applied SMS portal in our web application in future as we see the number of users increasing on using this web application then there may be a chance of having a heavy traffic on the server due to which it may delay in sending a SMS to the registered user because of which a user may back out to use the proposed application. To prevent this heavy traffic on SMS server we can implement the idea of biometric usage in which in future for every card user we can have the record of every distinct users finger print and use it as an alternative to authenticate the transaction instead of SMS which will be 100% secure of any financial transaction taking place regarding that card. This delaying of reaching SMS can surely cause the downfall of this web application so on the basis of that to prevent it we can use the best of biometric usage in this web application.

CHAPTER 8: SYSTEM TESTING


The testing and implementation they are important and final phases. All the process that has been done is just a trail or by assumption. All the required hardware & software is prepared for the testing so that some errors or some modifications may be required for further proceeding.

24

8.1 SYSTEM TESTING Testing is vital to the success of the system. System testing makes a logical assumption that if all parts of the system are correct. The goal will be successfully achieved. There are four steps with in, they are, Unit Testing Integration Testing Validation testing Output Testing

8.1.1 UNIT TESTING In this testing, the smaller part of the project is tested first that is modules and the sub functions present in the project. It seems to be working satisfactorily with out the errors and that shows the unit testing is successful. 8.1.2 INTEGRATION TESTING The integration testing is a part that the software makes all functions behaviors and process required. The errors which are uncovered are integrated testing, are corrected during this phase. The collection of the functions are tested and found with errors are rectified .So that the result can be easily obtained in a successful manner.

8.1.3 VALIDATION TESTING The validation part is very much essential for each every application projects so that each data can be validated in a good manner. In some cases the records are created according to the key of the corresponding table to which it has been referenced for data constraint for good secured database. While testing the system by using test data errors are again uncovered and corrected by using above

25

testing steps and corrections are also noted for future use. If there is any error then it is allowed for testing from the beginning. 8.1.4 OUTPUT TESTING The output is major required part of the development of the project. The output is tested for required format, if it does not acquire such format then the testing is done or any screen modification is alone for the further operations. The output testing is mainly for the two things they are, On screen format Print format The screen is found to be correct as the format designed according to the user needs for the hard copy also; the output comes out as specified by the user. Hence output testing doesnt result in any correction in the system.

8.2 SYSTEM IMPLEMENTATION Training the operating staff Installing hardware Installing terminals Installing telecommunication network before system is up and running.

In the implementation phase, the project reached its fruition. After the development phase of the SDLC is complete, the system is implemented. The software, which was designed in design and programmed in development phase of the SDLC, was installed on all the PCs that require it. The personas using the program was trained during this phase of the SDLC. Moreover, both the hardware and software are tested. Although we found and fixed many problems, almost invariably, the users helped us to uncover problems that we were unable to simulate. These were the main activities performed by us in the course of the project, which lead to its proper completion.

26

8.3 POST IMPLEMENTATON REVEIW


When computer based systems are built therefore we must develop mechanism for evaluating controlling and making modifications, maintenance issued to improve the case with which the changes can be accommodated and reduce the amount of expended on its maintenance activity occurs because it is unreasonable to assume that software testing will uncover all latest errors in a large software system. The final event in the post implementation flow is review that revalidates all elements of the system configuration and ensures correctness, after the software maintenance, software reviews is being conducted for future maintenance effort and provides feedback, which is important to effectively management of software organization.

CHAPTER 9: RESULTS AND DISCUSSIONS

27

Fig 9.1 Admin Login screen

Fig 9.2 ICICI Bank Timer

Fig 9.3 User Registration Form

28

Fig 9.4 Account Type Form

Fig 9.5 Withdraw Form

29

Fig 9.6 Generation of Ministatement

Fig 9.7 Balance Enquiry Form

30

Fig 9.8 Generation of Random Pin

CHAPTER 10: CONCLUSION


Here we have applied all the tools in improvising the ATM card security as we aimed to develop with this security. Our project being designed to increase the security of credit card defaults have been implemented to prevent the misuse of them in future. Our research has shown us how being a little carefree can lead misuse of it to a highly financial loss. We have applied our aim and research to do the best to the prevention of all. In recommending for future usage at high scale level implement of better technologies in our project will help more better and faster results. This technology will surely bring results when implemented in Real time applications as it would prove to be more reliable and cost effective as it will include a random pin generator along with an SMS application.

ADVANTAGES
It is fast, efficient and reliable

31

Avoids data redundancy and inconsistency Very user-friendly Easy accessibility of data Number of personnel required is considerably less Provides more security and integrity to data

10.1 ATM Security Module Lets You:


Managing the Database Accurately and Efficiently
Whether your organization is a small business, a non-profit organization, or a multinational corporation, you must have an accurate and timely way to manage the database of the company, and generate the proper reports fulfilling all the requirements. This, more often than not, means the implementation of registration module software into your accounting system. Without registration software, the detailed elements involved with this task could quickly become overwhelming.

Automating Tasks with Registration Module Software


Once the initial information is inputted into the system, registration module software can automatically update figures and log them in the appropriate sections. These actions make registration a much simpler and quicker process than if trying to perform these duties manually.

Minimizing Errors and Saving Time


The two biggest advantages to using registration module software are undoubtedly speed and accuracy. The administration of this can be complex and prone to errors. Timely and accurate company, trade and banking registrationare critical to any business of any size. Delays in such 32

updations can result in the wrong and out of date storage of data in the database.Registration module software assures accuracy and timeliness.

Manage Regional Enrolments

Leverage on one core payroll engine to manage your regional payroll activities. The Payroll Module supports multi-country, taking into account pre-determined statutory compliance for each individual country. This way, companies can manage payroll and compensation with one payroll engine that utilizes country-specific localizations. Even non-permanent staff can be included in the payroll system.

Synchronize with Global System


Ability to interface with Enterprise Resource Planning System (ERP), in addition to the traditional input methods. This can be done via MS Excel files. For Bonus and Variable Bonus projections, there is a hypothetical worksheet modelling. This tool allows the extraction and manipulation of raw data with queries while filters create scenarios and build projections. Upon approval by management, results are ported to the employees payroll.

Monitor Performance and Security

Consistent and accurate reports on payroll and a comprehensive audit trail of all progress and updates.

Automate payroll calculation and printing of paychecks Eliminate tax penalties for inaccurate returns or late payments Improve payroll accuracy with automatic tax and deduction calculations Improve organization with consolidation of payroll records and reports Reduce time spent calculating and completing government payroll forms Improve management reports by tracking labor paid by job, cost center, or

account

33

CHAPTER 11: FUTURE SCOPE AND ESTIMATED COST


In future we can implement this project for the higher scale and we can see easier ways to provide security to cardholders by various methods. To use few methods can be used instead of sms system we can apply biometric safety system which uses the finger print of an authorized person which will genuinely end all the transaction frauds. Our project may go slow on higher traffic using sms portal where the number of users increase they might have to wait longer for sms to be received. T or prevent this in future we can come with more different ideas which should be highly confidential. With more brains and time on our project we are sure we can make it better for the use in market. My SQL: Rs. 700/Conveyance charges for research travel: Rs. 1200/SMS portal: Rs 1000/-

Following are some of the benefits:

Better Control

Control is in your hands. On-going validation procedures automatically result in higher quality input, and errors can be detected and corrected immediately.

34

Added Flexibility

Because you use your source documents, screen input is customized by order or by company. You'll experience fewer time restraints since registration is entered in batches and balanced daily if desired.

Registration Information at your Fingertips

Because up-to-date registration and personnel information is always available online, you'll save the time of looking up information on separate paper reports.

Time and Labor Savings

You'll reduce the time required to do a registration since it's no longer necessary to pre-sort input documents, accumulate control totals or prepare d. Data transmission takes only minutes and can be set up to send payroll data automatically even when you are not present.

Cost savings

Computerized accounting programs reduce staff time doing accounts and reduce audit expenses as records are neat, up-to-date and accurate.

Confidentiality

Company access by company Id , trade licenses by license number and banking details by bank code .

Withdrawal Processing
A computerized registration system has direct-registering capability, which saves money spent on live checks and reconciliation. Additionally, paycheck and pay stub generation occurs quickly, regardless of volume.

Up-to-date information
35

The accounting records are automatically updated and so account balances will always be up-todate.

CHAPTER 12: REFERENCES


http://www.1000projects.com/new/java/major/46.html http://en.wikipedia.org/wiki/Microsoft_SQL_Server
http://www.asp.net/sql-server/videos

http://dotnetkicks.com/mvc/Multi_tenant_ASP_NET_Foundation http://www.asp.net/mvc/tutorials#Overview http://en.wikipedia.org/wiki http://www.asp.net/sql-server/videos

36

Potrebbero piacerti anche