Get the complete project »
- The Complete Research Material is averagely 45 pages long and it is in MS Word Format, it has 1-5 Chapters.
- Major Attributes are Sort Code, Abstract.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
Thousands of banks perform millions of monetary transactions every day and thousands of users follow almost the same banking system. the number of users increases more banks and more staff; are needed it means more money has to be put this system. If advanced computerized based banking system is developed, so there is no need to open new branches in remote areas or same branch provides services to other banking system example ATM system.
Banking system requires authenticity and validity if a system provides these basic logic that mean we can developed a new system that authenticate and validate the user and user can do any type of virtual or monetary transaction any time anywhere in minimum amount of time. One of the most authentic codes for recognition of any person is signature. It always appear on almost all types of documents, such as property documents, bank cheques, and credit slips, thus signature has a great importance in our daily life, therefore automatic signature verification is important in the field of document analysis and processing for which a lot of work has been done in the past.
Online monetary transaction system allows customers of financial institutions to conduct financial transactions on secure website operated by the institution, which can be a retail or virtual book, credit union or building society. To access a financial institution’s online banking facility; a customer having personal internet access must register with the institution for the services, and setup some password (under various names) for customer verification.
Financial institutions new routinely allocate customers number (also under various names), whether or not customers intend to access their online monetary transaction system facility. Customer numbers are normally not the same as account numbers, because more than one account numbers can be linked to one customer number. The customer will link to the customer number.
To access online banking, the customer would go to the financial institution’s website, and enter the online banking facility using the customer number and password. Some financial institutions have setup additional security steps for access, but there is no consistency to the approach adopted.
Net banking offers an inexpensive alternative to banking to expand a bank’s customer base and many banks are using online banking to increase the quality of services to their customers. Many banks have opened websites on the internet and many plan to offer banking services over the internet.
1.1 Theoretical Background
Today, it is believed that the application of computer technology in any activity would go a long way in making that activity much easier. To the researcher, this statement remains a theory until proven otherwise by online evolution system for monetary transaction.
It is also believed that the benefits and advantages of using computers outweighs that if the manual methods. This is also wants to be proven beyond all doubts by the researcher through the implementation of the new system.
1.2.Statement of the Problem
This research work is carried out to design or rather computerize the online evolution system for monetary transaction, the expected computerized system aimed at the ending of this work after critical study made up of problems, needs, requirements and specification of Diamond Bank, Uyo.
1.3.Aims and Objectives of the Study
This study to a large extent will influence the existing system of operation. A critical analysis of the present method will be made and factors affecting it will also be determined.
The aims of this study cannot be overemphasized as its usefulness will cut across Uyo. All activities carried out by the entire department are tailored towards the proper functioning of the monetary transaction system.
In other words, the proposed system to be a arrived at as the output of the study will among others aid in the followings:
- Storage of large volume of data with ease of retrieval
- Generation of variable number of reports
- Give major assistance in decision making of Diamond Bank Uyo.
1.4.Significance of the Study
This research project would be unnecessary if it has no significant to humanity.
Firstly, the newly designed system would make customers of Diamond Bank Uyo, to check their account balance anywhere they are by the use of the internet connection.
Secondly, the knowledge that the new system has designed would help customers to create fixed/recurring deposits.
Thirdly, the new system would also aid customers to transfer funds to other accounts of the same bank.
Fourthly, the design of the system would provide jobs for system analyst and programmers contracted to build the system for other banks.
Finally, the research work would serve as a reference material to other scholars interested on further research on the Net banking system.
1.5.Scope of the Study
This research project is restricted to online evolution system for monetary transaction using Diamond Bank as a case study. Data used for the study which include opening of Account, Deposit of fund, withdrawal of funds and transfer were gathered from this source.
The internet provides a secure medium for transferring funds electronically between bank accounts, and also for making banking transaction over the internet. All banking activities that were conventionally carried out by visiting the bank can now be done through a computer with internet access. Credit cards transactions are a form of online transaction.
With online monetary transaction, you cannot only view your account balance but also open Fixed Deposit, transfer funds, pay your electricity telephone or mobile phone bills and much more.
1.6.Organization of the Research
The research project has been arranged in the following order:
Chapter one contains introduction, theoretical background, statement of the problem, objective of the study, significance of the study, scope of the study, organization of the research and definition of terms.
Chapter two focuses on the relevant literature review which highlights the basic concept of the study.
Chapter three is concerned with the research methodology, system design, input format and program flowchart and output format.
Chapter four contains the system implementation and programming environment, which gives the direction of the system and analysis of the modules.
Chapter five summarized and conclude the research work, stating the constraints of the study and some useful recommendations.
1.7.Definition of Terms
Net – Banking: This refers to a numbers of ways in which customers can access their bank without having to be physically present in the banking environment.
Bank: This is an institution offering certain financial services, such as the safe-keeping of money, conversion of domestic into and from foreign currencies, lending of money at interest, and acceptance of bills of exchange.
Implementation: This is the building of systems and installation to ensure that is solve a particular task.
Cheque: This is a bill of exchange drawn on a bank by the holder of a current accounting payable into bank account, if a crossed or on demand, if uncrossed.
Deposit: This is a process whereby money or valuable thing is placed in a bank on similar institution for safekeeping based on pre-defined interest.
Cash: This is a bank note or coins, example in-hand or readily available; money or ready money.
You either get what you want or your money back. T&C Apply
Share a Comment
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE 1.1. BACKGROUND OF THE STUDY When it comes to outsourcing everyone has a tale of woe. Some software vendor that outsources a new developme...Continue Reading »
60 pages | 397 hits | Source: COMPUTER SCIENCE
» ABSTRACT The purpose of the study was to design and implement a computerized temperature control system for a cold room. This work is also designed to...Continue Reading »
31 pages | 241 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE BACKGROUND OF THE STUDY 1.1 INTRODUCTION Web Design is a process of conceptualization, planning, modelling, and execution of electronic me...Continue Reading »
50 pages | 474 hits | Source: COMPUTER SCIENCE
4. Design And Implementation Of Computerized Tourism Information System (A Case Study Of Enugu State Tourism Board)» Abstract Presently, Enugu state tourism board uses the manual system in the projection services and in the documentation of information In this projec...Continue Reading »
51 pages | 220 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.1. BACKGROUND STUDY In the new era of information technology, information overload has become a serious problem to those se...Continue Reading »
108 pages | 255 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.1 Background of the study A user interface (UI) is the intersection of a product and a user. The commands in a computer a...Continue Reading »
81 pages | 337 hits | Source: COMPUTER SCIENCE
7. Design And Implementation Of A Computer Based Seaport Billing System (A Case Study Of Nigerian Port Authority Lagos)» AbstractHandling of cargo has been a circular task all these while in our various ports. And Nigerian Ports Authority (N.P.A) being an organization re...Continue Reading »
60 pages | 335 hits | Source: COMPUTER SCIENCE
» ABSTRACT This study was intended to evaluate the effect of computer usage on academic performance of students. This study was guided by the following ...Continue Reading »
65 pages | 477 hits | Source: COMPUTER SCIENCE
» INTRODUCTIONBACKGROUND OF THE STUDYIn recent times, there has been a great need driven towards the maximizing of data transfer between communication t...Continue Reading »
65 pages | 276 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.0 Introduction An identity document is any document which may be used to verify aspects of a person’s personality. If...Continue Reading »
36 pages | 326 hits | Source: COMPUTER SCIENCE