Free Essay

Atm Paper Cis-210

In:

Submitted By Gunny215
Words 1170
Pages 5
Use Cases

CIS210

ATM is an automated teller machine or also knows, as automated banking machine is an electrical telecommunication device, which makes the client to the financial transactions without a bank teller.

Actors
The following actors are involved in the use case of withdrawal action.
Bank Customer
Bank/Bank System
Preconditions
These are some preconditions for withdrawal of money from the bank.
The customer must have an ATM Card
The Machine must contain cash and be working properly
The machine must have a connection to the bank system

Post Condition The bank customer receives the withdraw amount that he wanted from the ATM with a receipt. The customer’s balance is then updated in the bank system.

Flow of Events

Insert the card The use case begins with the actor bank customer inserting the card into the card reader on the machine
Read the card The other actor the bank system reads the bank information off the card submitted.
Validate User The bank system allows the customer to enter a pin so the system can validate the customer’s identification

System Withdrawal The system displays the options, which are currently avaible in the ATM.

Select Amount The bank system displays the standard withdrawal amount on the screen for the customer to choose the amount to be withdrawn from the machine.

Withdrawal Confirmation After selecting the amount the system lets the customer recheck the amount and confirm the withdrawal by selecting conduct withdrawal option

Eject Card The system ejects the card of the customer so the customer can take it back from the machine.

Cash Give The system disburses the amount requested but the customer and prints a receipt slip containing the whole information of the account balance and the use case is done.

Alternative flows There are some alternative flows side by side, which are briefly discussed below only for the sake of information.
Invalid user, wrong amount entered by the customer, amount entered exceeds daily limit, insufficient cash in the account.

Account Deposit The customer can also deposit funds and other amounts through the ATM machine.

Actors
The same actors involved in the deposit amount use case
1. Bank Customer
2.Bank System

Preconditions The user is authenticated and it is a must condition or it

Post Condition The bank customer deposits the funds and the amount, which he wanted to deposit to the ATM machine and the customer is provided with the printed receipt. The customers account balance is updated in the systems.

Basic flow of events

The same functions performed in the start as in withdrawing. New events that are conducted

1. The use case begins with the customers, which inserts the card into the card reader.
2. The other actor named bank system will read the bankcard information from the card submitted into the card reader.
3. The system allows the customer to enter the pin so the system can validate the user and information.
4. User selects the deposit funds option
5. Bank system requests the account number of the customer
6. Customer enters the account number and lets the system verify the account numbers.
7. System request the customer to enter the amount
8. User enters the amount, which he wants to deposit
9. System updates the account balance
10. The system prints the receipt for the customer and ends the system

Alternative Flow
1. Invalid user
2. Rejected card because of wrong pin was entered
3. The system may fail to deposit the amount due to failure of the deposit slot
Amount Transfer
The customer can transfer cash to any of the accounts through the ATM Machine
Actors
The same actors are involved in the transfer event of the ATM Machine
1. Bank Custer
2.Bnnk System
Precondition
Her e the same authentication of the account is needed by the system to allow the transferring event.
Post Condition
The bank customer wants the system to transfer the amount to the account, which he wanted to, and make the system to perform the action. After transferring of that amount the customer is provided with the printed receipt, the account balance is updated in the system.
Basic flow of the event
1. The use case begins with the actor named bank customer, which inserts the card into the card reader of the atm.
2. The other actor named bank system reads out the bankcard information from the card submitted.
3. The system allows the user to enter the pin so the system can validate that user.
4. The customer choses the transfer option on the screen.
5. The customer chooses the account type to transfer the cash from the list displayed.
6. System wants the customer to choose a different account to which the amount is to be transferred.
7. Customer then chooses the amount, which he wants to transfer.
8. System sends the information, which includes the pin, account number, card number and the amount to the bank, which either accepts or declines the current transactions.
9. Receipt is printer for the customer.
Alternatives
Following are the main alternatives, which can occur.
1. Invalid user
2. The transaction failed in the information provided isn’t valid
3. The transaction only completes when the bank approves all of the information

Ethical Issue
The one ethical issue is that the use case exposes in connection with the development of the use of the ATM system is the authentication Customer
Banks face great problems concerning the authentication of the customer. People face problems in memorizing their pin numbers. As the privacy of the individual or the security of the dada and information provided to the bank system is the very important thing for an event and transaction. The accuracy of the data and the information is very basic and important thing. Data security, Data accuracy and data integrity are the crucial factors related to authentication of the customer. An authentication mechanism consists of three most prior requirements.
1.memorability
2.secuirty
3.usability

Memorability
This requirement plays a vital role in authentication. A user must memorize the authenticated token given as it directly affects the security of the system as well as the customer.

Security A bank may face a number of problems of security in the authentication process different attacks are defined inn the security, Cameras are put in the ATM room to view any security threats.

Usability In ATM authentication some basic and critical errors are distinguished. Basic errors defined here that one or two times the wrong authentication attempts, and the crucial error is the third attempt by the customer, which is also wrong. ATM’s usually block the bankcard as a safety protocol. When three times with the wrong authentication has been typed into the machine?

Reference: www.bloomberg.com www.banktech.com

Graphical Representation of the Web based input for making Hotel Reservation.
Following is the graphical representation of the web based input for making the reservation in the hotel. It is fully explained through the following activity process which is held in process.

Similar Documents

Premium Essay

Use Cases

...Running head: ASSIGNMENT 2: USE CASES Assignment 2: Use Cases Lawrence A. Mayo, Jr. Dr. Johnnie E. Drake CIS 210 11/4/12 Abstract Your abstract should be one paragraph and should not exceed 120 words. It is a summary of the most important elements of your paper. All numbers in the abstract, except those beginning a sentence, should be typed as digits rather than words. To count the number of words in this paragraph, select the paragraph, and on the Tools menu click Word Count. Assignment 2: Use Cases A use case is a methodology that is used in system analysis as a means to identify, clarify, and organize system requirements. The use cases has make up of several possible sequences for users to interact with a system of a particular environment that is in relation to a particular goal. There are a group of elements that the use case consists of, these elements in be in either the classes or interfaces category. Use cases give a description of how users will perform tasks. There are two main parts of a use case; the steps a user will take to accomplish a particular task on the ATM machine, and the way the ATM should respond to the user's actions. A use case will begin with a user's goal and end when that goal is fulfilled. A use case will describe the interaction sequence between a user and an ATM machine. Each use case captures the actor (the user of the ATM machine), the interaction (what does the user want to do?), and the goal (what is the user's goal?). Writing...

Words: 1139 - Pages: 5

Free Essay

Chemistry

...Diploma Programme Chemistry data booklet First examinations 2009 Diploma Programme Chemistry data booklet First published March 2007 Revised edition published September 2008 International Baccalaureate Peterson House, Malthouse Avenue, Cardiff Gate Cardiff, Wales GB CF23 8GL United Kingdom Phone: +44 29 2054 7777 Fax: +44 29 2054 7778 Website: http://www.ibo.org © International Baccalaureate Organization 2008 The International Baccalaureate (IB) offers three high quality and challenging educational programmes for a worldwide community of schools, aiming to create a better, more peaceful world. The IB is grateful for permission to reproduce and/or translate any copyright material used in this publication. Acknowledgments are included, where appropriate, and, if notified, the IB will be pleased to rectify any errors or omissions at the earliest opportunity. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior written permission of the IB, or as expressly permitted by law or by the IB’s own rules and policy. See http://www.ibo.org/copyright. IB merchandise and publications can be purchased through the IB store at http://store.ibo.org. General ordering queries should be directed to the sales and marketing department in Cardiff. Phone: +44 29 2054 7746 Fax: +44 29 2054 7779 Email: sales@ibo.org Printed in the United Kingdom by Antony Rowe...

Words: 5621 - Pages: 23

Premium Essay

Nothing

...TELECOMMUNICATION SWITCHING AND NETWORKS TElECOMMUNICATION SWITCHING NffiWRKS AND THIS PAGE IS BLANK Copyright © 2006, 2005 New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (10) : 81-224-2349-3 ISBN (13) : 978-81-224-2349-5 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com PREFACE This text, ‘Telecommunication Switching and Networks’ is intended to serve as a onesemester text for undergraduate course of Information Technology, Electronics and Communication Engineering, and Telecommunication Engineering. This book provides in depth knowledge on telecommunication switching and good background for advanced studies in communication networks. The entire subject is dealt with conceptual treatment and the analytical or mathematical approach is made only to some extent. For best understanding, more diagrams (202) and tables (35) are introduced wherever necessary in each chapter. The telecommunication switching is the fast growing field and enormous research and development are undertaken by...

Words: 115682 - Pages: 463

Free Essay

Analyse de La Trajectoire Historique de La Monnaie Electronique

...Article « Analyse de la trajectoire historique de la monnaie électronique » Marc Lacoursière Les Cahiers de droit, vol. 48, n° 3, 2007, p. 373-448. Pour citer cet article, utiliser l'information suivante : URI: http://id.erudit.org/iderudit/043936ar DOI: 10.7202/043936ar Note : les règles d'écriture des références bibliographiques peuvent varier selon les différents domaines du savoir. Ce document est protégé par la loi sur le droit d'auteur. L'utilisation des services d'Érudit (y compris la reproduction) est assujettie à sa politique d'utilisation que vous pouvez consulter à l'URI http://www.erudit.org/apropos/utilisation.html Érudit est un consortium interuniversitaire sans but lucratif composé de l'Université de Montréal, l'Université Laval et l'Université du Québec à Montréal. Il a pour mission la promotion et la valorisation de la recherche. Érudit offre des services d'édition numérique de documents scientifiques depuis 1998. Pour communiquer avec les responsables d'Érudit : erudit@umontreal.ca Document téléchargé le 30 janvier 2014 01:23 analyse de la trajectoire historique de la monnaie électronique Marc « l a C o u rsiè re Le développement de l’argent et des mécanismes de paiement est d’abord apparu par la création du troc, lequel a engendré la monnaie métallique, qui a donné naissance à la monnaie papier pour être graduellement remplacée par la monnaie électronique. À chacune de ces étapes, le degré d’acceptation de la monnaie est tributaire...

Words: 39741 - Pages: 159

Free Essay

Environmental Pollation

...HG AFTER GATE GUIDE 2015 ENGISTAN.COM From Team Engistan Desk Dear students, As the GATE 2015 is over, now the next step is to apply for M.Tech courses (through GATE 2014/2015 or NON GATE exam 2015 ) and for PSU’s recruiting through GATE score which is quite complicated. To make M.Tech and PSU application process easy for students engistan.com have launched this After Gate Guide 2015 which contain cutoff analysis of IITs, NITs, IIITs, regional colleges etc, written test and interview preparation tips, complete information about PSUs, Preference Order of Institutes & Disciplines, Career options after gate exam at one place. One thing we want to highlight is scoring high in gate exam does not grantee your admission in IIT or a job in PSU, remember the battle is still on. Keep revising basic concepts regularly for interview and written test (for M.tech and PSU both), both got weight age of 30% or more in complete selection procedure. Preference Order of Institutes & Disciplines we have provided are on the basis of previous year cutoffs (2012, 2013 and 2014), Faculty, Infrastructure and Application, Research Collaborations, Placements, Industry Linkages, Quality of Students. So you are free to choose any college or discipline. We gave you a rough guideline for M.tech Admissions and PSU recruitments. And we advice students to read this guide thoroughly. These few pages will serve as a quick reference guide for top institutes (and PSUs) and their selection process. With Best wishes...

Words: 17720 - Pages: 71

Free Essay

Analytical Chem

...Chemistry David Harvey DePauw University Boston Burr Ridge, IL Dubuque, IA Madison, WI New York San Francisco St. Louis Bangkok Bogotá Caracas Lisbon London Madrid Mexico City Milan New Delhi Seoul Singapore Sydney Taipei Toronto McGraw-Hill Higher Education A Division of The McGraw-Hill Companies MODERN ANALYTICAL CHEMISTRY Copyright © 2000 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 KGP/KGP 0 9 8 7 6 5 4 3 2 1 0 ISBN 0–07–237547–7 Vice president and editorial director: Kevin T. Kane Publisher: James M. Smith Sponsoring editor: Kent A. Peterson Editorial assistant: Jennifer L. Bensink Developmental editor: Shirley R. Oberbroeckling Senior marketing manager: Martin J. Lange Senior project manager: Jayne Klein Production supervisor: Laura Fuller Coordinator of freelance design: Michelle D. Whitaker Senior photo research coordinator: Lori Hancock Senior supplement coordinator: Audrey A. Reiter Compositor: Shepherd, Inc. Typeface: 10/12 Minion Printer: Quebecor Printing Book Group/Kingsport Freelance cover/interior designer: Elise Lansdon Cover image: © George Diebold/The Stock Market Photo research:...

Words: 88362 - Pages: 354

Premium Essay

Internship Report on Marketing Strategy of Shahjalal Islami Bank

...Internship Report on Marketing Strategy of Shahjalal Islami bank Background of the Study Now-a- day’s banking sector is modernizing and expanding its hand in different financial events every day. At the same time he banking process is becoming faster, easier and is becoming eider. In order to survive in the competitive field of the banking sector all organizations are looking for better service opportunities to provide their fellow clients. So it has becoming essential for every person to have some idea on the bank and banking procedure. Internship program so called work attachment program an essential for every BBA student because it helps him or her to acquaint with the real life situation. As bank is one of the most important financial intermediaries. So I have selected Shahjalal Islami Bank Limited, which is one of the most leading banks of the new bank arena. 1.2 Objective of the Study There have two types of objective 1.2.1. The main objectives of the study are: • To find out the reality in the practical life. • To fulfill the requirement for the completion of BBA program. 1.2.2. The Secondary objectives of this report are: • To develop the practical knowledge by the practical orientation of work. • To build up the pillar of the career for near future. • To know about Shahjalal Islami Bank Limited (SJIBL) operational activities which is based on Islami Shariah. • To know about Human Resource Departments Practices of SJIBL. • To know distinguishing fractures...

Words: 28402 - Pages: 114

Free Essay

Magt

...i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University complexitybook@gmail.com Not to be reproduced or distributed without the authors’ permission This is an Internet draft. Some chapters are more finished than others. References and attributions are very preliminary and we apologize in advance for any omissions (but hope you will nevertheless point them out to us). Please send us bugs, typos, missing references or general comments to complexitybook@gmail.com — Thank You!! DRAFT ii DRAFT About this book Computational complexity theory has developed rapidly in the past three decades. The list of surprising and fundamental results proved since 1990 alone could fill a book: these include new probabilistic definitions of classical complexity classes (IP = PSPACE and the PCP Theorems) and their implications for the field of approximation algorithms; Shor’s algorithm to factor integers using a quantum computer; an understanding of why current approaches to the famous P versus NP will not be successful; a theory of derandomization and pseudorandomness based upon computational hardness; and beautiful constructions of pseudorandom objects such as extractors and expanders. This book aims to describe such recent achievements of complexity theory in the context of the classical results. It is intended to both serve as a textbook as a reference for self-study. This means...

Words: 210134 - Pages: 841

Premium Essay

Information Technology

...Review Questions for Test-1 (with Answers): Chapter 1: Introduction to Data Communications Outline 1.1 Network Basics 1.2 Network Layer Model (most important) 1.3 Network Standards 1.4 Future Trends (least important) Answers to End-of-Chapter Questions 1. Describe the progression of communications systems from the 1800s to the present. Communications systems progression from the 1800s to the present: 1837 Invention of the telegraph 1876 Invention of the telephone 1877 Telephone system regulation begins in Canada 1878 Telephone system regulation begins in the United States 1879 Direct dialed long distance service begins 1880 Satellites begin to transmit international telephone calls 1881 Caterfone court decision permits non-Bell telephone equipment to be used 1970 Court permits MCI to provide long distance services 1984 Breakup of AT&T 1985 Cellular phones enter service 1996 Telecommunications Act of 1996 deregulates American telephone system 2. Why are network layers important? Communication networks are often broken into a series of layers, each of which can be defined separately, to enable vendors to develop software and hardware that can work together in the overall network. 3. Describe the four layers in the network model used in this book and what they do. • The application layer is the application software used by the user. • The network layer takes the message generated...

Words: 29622 - Pages: 119

Premium Essay

Data Communications and Networking by Behrouz A.Forouzan

...Don't forget to check out the Online Learning Center, www.mhhe.com/forouzan for additional resources! Instructors and students using Data Communications and Networking, Fourth Edition by Behrouz A. Forouzan will find a wide variety of resources available at the Online Learning Center, www.mhhe.comlforouzan Instructor Resources Instructors can access the following resources by contacting their McGraw-Hill Representative for a secure password. PowerPoint Slides. Contain figures, tables, highlighted points, and brief descriptions of each section. Complete Solutions Manual. Password-protected solutions to all end-of-chapter problems are provided. a Pageout. A free tool that helps you create your own course website. D Instructor Message Board. Allows you to share ideas with other instructors using the text. a o Student Resources The student resources are available to those students using the book. Once you have accessed the Online Learning Center, click on "Student Resources," then select a chapter from the drop down menu that appears. Each chapter has a wealth of materials to help you review communications and networking concepts. Included are: Chapter Summaries. Bulleted summary points provide an essential review of major ideas and concepts covered in each chapter. a Student Solutions Manual. Contains answers for odd-numbered problems. Glossary. Defines key terms presented in the book. Flashcards. Facilitate learning through practice and review. a Animated Figures...

Words: 59848 - Pages: 240

Premium Essay

Some Problems in Symmetric and

...Some Problems in Symmetric and Asymmetric Cryptography A thesis submitted for the partial fulfillment of the degree of Doctor of Philosophy in Mathematics By SANTOSH KUMAR YADAV Under the supervision of Prof. Sunder Lal and Prof. S. C. Arora DEPARTMENT OF MATHEMATICS DR. B. R. AMBEDKAR UNIVERSITY, AGRA (FORMERLY AGRA UNIVERSITY) 2010 *Sanskrit verse dating back to the pre-Christian era Dedicated to my Teachers, Friends, Students and Family Members DECLARATION I do hereby declare that the present research work has been carried out by me under the supervision of Prof. Sunder Lal and Prof. S. C. Arora. This work has not been submitted elsewhere for any other degree, diploma, fellowship or any other similar title. Santosh Kumar Yadav Research Scholar CERTIFICATE This is to certify that the thesis entitled “Some Problems in Symmetric and Asymmetric Cryptography” submitted to Dr. B.R.Ambedkar University, Agra for the degree of Doctor of Philosophy by Mr. Santosh Kumar Yadav, is a bonafide record of research work done by him under our supervision. To the best of our knowledge, this thesis has not previously formed the basis for the award to any candidate of any degree, diploma, fellowship or any other similar title and the work has not been submitted to any university or institution, for the award of any other degree. S. C. ARORA SUNDER LAL (Co-supervisor) (Supervisor) Professor Professor of Mathematics, and Department of Mathematics Pro-Vice Chancellor ...

Words: 37424 - Pages: 150

Premium Essay

Tev Study

...Part-A: - Executive Summary: 1. Project background & promoters 1.1 PROJECT AT GLANCE 6 MVA * 1 Sub merged Arc Furnace for Manufacture of Ferro Manganese, Silico Manganese SHARANYA NATURAL RESOURCES & INFRA PROJECTS PRIVATE LIMITED H NO 1-2-110 Shanthi Nagar, Adilabad Andhra Pradesh 1. Sri Sanjay Kumar Makhariya 2. Sri P Shankar 3. Smt P Uma Adilabad, Andhra Pradesh Ferro Alloys - Silico Manganese (SiMn.) / Ferro Manganese (FeMn.) Used in Steel Industry 6*1 MVA Furnace Sub merged Arc Furnace for Ferro Manganese, Silico Manganese (4800 TPA SiMn and 7000 TPA FeMn based on equal utilization for both the products) Rs. 1792.33 Lakhs (Say 1792 lakhs) 60% 85% 90% Rs.868.00 lakhs Existing Proposed Term Loan – NIL Rs. 925.00 Lacs CC Limit – NIL Rs. 403.00 Lacs LC/FLC -NIL Rs. 50.00 Lacs One (1) Year Moratorium from Commercial production + 6 Years – Total Seven (7) years from Commercial production Name of the Company Registered Office Names of the Board of Directors Plant location Product Application Installed capacity Project Cost Capacity utilization of Year 2013-14 Year 2014-15 Year 2015-16 & onwards Promoter’s Contribution Banking limit - Term loan - Cash credit - LC/FLC Repayment Period Debt-Equity Ratio Project total (overall) TERM Loan (only) 1.53 : 1 1.07 : 1 3.49 times 5.05 times 40.51% Average DSCR - Gross - Net IRR SHARANYA NATURAL RESOURCES & INFRA PROJECTS PRIVATE LIMITED H NO 1-2-110 Shanthi Nagar, Adilabad Andhra Pradesh Page 1 of 76 1.2. ABOUT...

Words: 26448 - Pages: 106

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Free Essay

Maglev

...*3963103* [3963] – 103 T.E. (Petroleum) (Semester – I) Examination, 2011 DRILLING & PRODUCTION OPERATIONS (2003 Course) Time : 3 Hours Max. Marks : 100 Instructions : 1) Question Nos. 1 and 5 are compulsory. Out of the remaining attempt 2 questions from Section I and 2 questions from Section II. 2) Answers to the two Sections should be written in separate books. 3) Neat diagrams must be drawn wherever necessary. 4) Black figures to the right indicate full marks. 5) Use of Logarithmic Tables, Slide Rule, Mollier Charts, Electronic Pocket Calculator and Steam Tables is allowed. 6) Assume suitable data, if necessary. SECTION – I 1. What are different systems on a drilling rig ? Explain any one in detail with suitable diagramme. 18 2. a) Calculate Bottom hole pressure if well depth is 2500 m and mud weight is 1.2 gm/cc. b) Calculate mud weight if mud gradient is 0.87 psi/ft. ′ c) Calculate volume bbl/meter for drill pipe O.D. = 5′ inch and I.D. = 4.276 inch. 2 2 2 10 8 8 16 d) Draw circulation system on a drilling rig. 3. a) Discuss IADC classification of a bit in details. b) Discuss different factors affecting rate of penetration in details. 4. Write short note on : i) Coring ii) Fishing tools iii) BOP iv) Directional well P.T.O. [3963] – 103 -2- *3963103* SECTION – II 5. a) Discuss different types of casings and function of the casings in brief. b) Discuss different types of well completion techniques. 6. a) Discuss primary cementation process with...

Words: 172166 - Pages: 689

Free Essay

Global Warming

...Physical Chemistry Understanding our Chemical World Physical Chemistry Understanding our Chemical World Paul Monk Manchester Metropolitan University, UK Copyright  2004 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): cs-books@wiley.co.uk Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to permreq@wiley.co.uk, or faxed to (+44) 1243 770620. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Other Wiley...

Words: 233668 - Pages: 935