It Daibb
It Daibb
It Daibb
1) Requirement gathering and analysis: Business requirements are gathered in this phase. This phase is the main
focus of the project managers and stake holders. Meetings with managers, stake holders and users are held in order to
determine the requirements like; Who is going to use the system? How will they use the system? What data should be
input into the system? What data should be output by the system? These are general questions that get answered during a
requirements gathering phase. After requirement gathering these requirements are analyzed for their validity and the
possibility of incorporating the requirements in the system to be development is also studied.
Finally, a Requirement Specification document is created which serves the purpose of guideline for
the next phase of the model.
2) Design: In this phase the system and software design is prepared from the requirement specifications which were
studied in the first phase. System Design helps in specifying hardware
and system requirements and also helps in defining overall system architecture. The system design
specifications serve as input for the next phase of the model.
3) Implementation / Coding: On receiving system design documents, the work is divided in modules/ units and actual
coding is started. Since, in this phase the code is produced so it is the main focus for the developer. This is the longest
phase of the software development life cycle.
4) Testing : After the code is developed it is tested against the requirements to make sure that the product is actually
solving the needs addressed and gathered during the requirements phase. During
this phase unit testing, integration testing, system testing, acceptance testing are done.
5) Deployment: After successful testing the product is delivered / deployed to the customer for their use.
6) Maintenance: Once when the customers starts using the developed system then the actual problems comes up and
needs to be solved from time to time. This process where the care is taken
for the developed product is known as maintenance.
Parity Check :
A parity check is the process that ensures accurate data transmission between nodes during communication. A parity bit is
appended to the original data bits to create an even or odd bit number; the number of bits with value one. The source then
transmits this data via a link, andbits are checked and verified at the destination. Data is considered accurate ifthe number of bits
(even or odd) matches the number transmitted from the source. Parity checking was created to eliminate data communication
errors, is a simple method of network data verificationand has an easy and understandableworking mechanism.
Party Bit:
A parity bit, or check bit is a bit added to the end of a string of binary code that indicates whether the number of bits in
the string with the value one is even or odd. Parity bits are used as the simplest form of error detecting code.
There are two variants of parity bits: even parity bit and odd parity bit.
[email protected]
Page | 1
Data Center:
A data center is a facility used to house computer systems and associated components, such as telecommunications and
storage systems. It generally includes redundant or backup power supplies, redundant data communications connections,
environmental controls (e.g., air conditioning, fire suppression) and various security devices.
Data Warehouse:
A data warehouse is a central repository for all or significant parts of the data that an enterprise's various business systems
collect.Typically, a data warehouse is housed on an enterprise mainframe server. Data from various online transaction
processing (OLTP) applications and other sources is selectively extracted and organized on the data warehouse database
for use by analytical applications and user queries. Data warehousing emphasizes the capture of data from diverse sources
for useful analysis and access.
Page | 2
Audit Trail:
Paper or 'electronic' trail that gives a step by step documented history of a transaction. It enables an examiner to trace the
financial data from general ledger to the source document (invoice, receipt, voucher, etc.). The presence of a reliable and
easy to follow audit trail is an indicator of good internal controls instituted by a firm, and forms the basis of objectivity.
Online Banking:
Online banking is an electronic payment system that enables customers of a financial institution to conduct financial
transactions on a website operated by the institution, such as a retail bank, virtual bank, credit union or building society.
Online banking is also referred as Internet banking, e-banking, virtual banking and by other terms.
To access a financial institution's online banking facility, a customer with Internet access would need to register with the
institution for the service, and set up some password (under various names) for customer verification. The password for
online banking is normally not the same as for telephone banking
Mobile Banking:
Mobile Banking is a Banking process without bank branch which provides financial services to unbanked communities
efficiently and at affordable cost. To provide banking and financial services, such as cash-in, cash out, merchant payment,
utility payment, salary disbursement, foreign remittance, government allowance disbursement, ATM money withdrawal
through mobile technology devices, i.e. Mobile Phone, is called Mobile Banking.
Page | 3
SMS Banking:
SMS banking is a type of mobile banking, a technology-enabled service offering from banks to its customers, permitting
them to operate selected banking services over their mobile phones using SMS messaging
SWIFT:
The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a network that enables
financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and
reliable environment. Swift also sells software and services to financial institutions, much of it for use on the SWIFTNet
Network.
Online Processing:
A method of using a terminal remote from a company mainframe or an interface to the Internet like an
e-commerce website for taking product orders and dealing with payments. The online processing of orders
offers considerable savings and greater overall efficiency for most business sales operations, although system
down time can be costly in terms of lost sales.
Spam:
spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising. As well
as sending messages repeatedly on the same site. While the most widely recognized form of spam is e-mail spam.
Spyware:
Spyware is software that aids in gathering information about a person or organization without their knowledge and that may
send such information to another entity without the consumer's consent, or that asserts control over a computer without the
consumer's knowledge.
Cash Memory:
Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access
more quickly than it can access regular RAM.
As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous
reading of data), it does not have to do the more time-consuming reading of data from larger memory
ATM:
An automated teller machine or automatic teller machinealso known as an automated banking machineis an
electronic telecommunications device that enables the customers of a financial institution to perform financial
transactions without the need for a human cashier, clerk or bank tellerOn most modern ATMs, the customer is identified
by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip that contains a unique card
number and some security information. Authentication is provided by the customer entering a personal identification
number (PIN).
Smart Card:
A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data,
used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional
use. Smart cards can provide identification, authentication, data storage and application processing.[2] Smart cards may
provide strong security authentication for single sign-on (SSO) within large organizations.
Page | 4
Extranet:
An extranet is a computer network that allows controlled access from outside of an organization's intranet. Extranets are
used for specific use cases including business-to-business (B2B). In a business-to-business context, an extranet can be
viewed as an extension of an organization's intranet that is extended to users outside the organization, usually partners,
vendors and suppliers, in isolation from all other Internet users. It is in context of that isolation that an extranet is different
from an intranet or internet. In contrast, business-to-consumer (B2C) models involve known servers of one or more
companies, communicating with previously unknown consumer users. An extranet is similar to a DMZ in that it provides
access to needed services for channel partners, without granting access to an organization's entire network.
Digital Signature:
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid
digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender
cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit
(integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases
where it is important to detect forgery or tampering.
Data Encryption:
Encryption is the process of using an algorithm to transform information to make it unreadable for unauthorized users.
This cryptographic method protects sensitive data such as credit card numbers by encoding and transforming information
into unreadable cipher text. This encoded data may only be decrypted or made readable with a key. Symmetric-key and
asymmetric-key are the two primary types of encryption. Encryption is essential for ensured and trusted delivery of
sensitive information
Data Decryption:
Decryption is the process of transforming data that has been rendered unreadable through encryption back to its
unencrypted form. In decryption, the system extracts and converts the garbled data and transforms it to texts and images
that are easily understandable not only by the reader but also by the system. Decryption may be accomplished manually or
automatically. It may also be performed with a set of keys or passwords.
Page | 5