SlideShare a Scribd company logo
A WEBSITE FOR PHOTOGRAPHER
Index
 Project
 Abstract
 Introduction
 Scope of project
 objectives
PROJECT
 Project Title :- profotografo.com
 Platform :- any platform
 Back-end (Used) :- My SQL
 Front-end (Used) :- PHP
 Web Server :- Apache Server .
 Development Tools :- Adobe Photoshop CS6.
Adobe Dreamweaver
CC 2015
XAMPP Server 2.0.
ABSTRACT
 Pro Photography (profotografo.com) website is only for
photographers
 This Website provide a platform for bingers or professional
photographer to share there photos and videos in this website
 It provides Online Registration for the users.
 These Website are provide every day top photos in home page as per
there likes .
 To make this website work successfully we have used some latest
technology such as, PHP frame work as the development ,MYSQL as
the Database Management environment and HTML5 as structural
INTRODUCTION
 The system allows user to share there best photos and videos .
 It provides the user to find out there category photos to get knowledge
and idea how others photographer clicks.
 In this website the user can chat or make friend to other user and
share there idea and knowledge .
 This website also provides the user ranking as per there points .
 This website is web-base application, so all people of world can
access it from any where any time .
PROJECT PLAN
METHODOLOGY
Problem definition
 Problem is to find the ideas, tips and tricks for
the bingers .
 Problem to share the photography skills to the
professional world.
 Problem is to get platform for bingers and
professional .
 Problem is to find out best category photos
System analysis
 This site is web-base application, so all people of world can
access it from any where an time.
 Transaction will be risk less.
 Dynamic site with clear and required data.
 This website utilizes ”cookies” and other tracking technologies
 Security must be protected and use tools (encryption,
passwords, physical security, etc.) to protect your personal
information against unauthorized access.
 We provide the best platform for the photographers
STUDY OF EXISTING SYSTEM
 There are very less website which provide the true platform for the
photographers.
 Most of the website are work like as a normal social media .
 There are some website really for photographers but they are only for
specific brand or community .
 In existing system who works for photographer they didnt provide the
user to chatting or making friends and followers .
LIMITATION OF EXISTING
SYSTEM
 Existing system doesn't not for photographers they are just like as
social media .
 There is no disliking button .
 There is no function to flag any particular photo or video
OPERATIONAL FEASIBILITY
 Efforts were made to optimize the human efforts in data collection,
storage, retrieval, security and presentation.
 The proposed system made best efforts in achieving necessary
function and performance, as required by the user and keeping in
mind some infrastructure constraints.
TECHNICAL FEASIBILITY
 What are the hardware and software requirements for the proposed
system was the first major issue of the discussion.
 Windows 10 operating system was used but it can run in any
operating system which support web browser .
 All Computer hardware support required for the development of the
system.
 So, technically the development of the system was feasible.
AIM OF SYSTEM
 System will help to those photographer who are pro or beginners
 System are handle by Technical or Non Technical Visitor Website .
 This system will help pro or beginners photographer get fame .
 Quick to Fast Response
OBJECTIVES OF WEBSITE
 To give a perfect platform for photographer .
 This website is only for photographer so there is no nonsense
photograph as in other website. . Easy for the professional to get
job or fame .
 Easy to get free idea ,knowledge and tips and tricks .
 Member user are easy interact with services such as In security
must be protected and use tools (encryption, passwords, physical
security, etc.) to protect your personal information against
unauthorized access
DATABASE TABLE
 words widgets uservotes
users userprofile userpoints
usernotices usermetas userlogins
userlimits userlevels userfields
userfavorites userevents titlewords
tagwords tagmetas sharedevents
posttags posts postmetas
pages options
messages iplimits cookies
contentwords categorymetas
categories cache blobs
Main MODULE
 Home
 Submit image
 Submit video
 Admin
 Shopping
 MY Account
 Login
 Registration
HOME
 Recent
 Hot!
 Most votes
 Most Comments
 Most views
Submit image
 Title
 Category
 Upload image
 Upload image by url
 Tags - use hyphens to combine words
Submit video
 Title
 Category
 Upload video by url
 Tags - use hyphens to combine words

Admin
 RSS
 POINTS
 SPAM
 STATS
 MAILING
 PLUGINS
 MODERATE
 FLAGGED
 HIDDEN
 GENERAL
 EMAILS
 USERS
 LAYOUT
 VIEWING
 LISTS
 CATEGORIES
 PERMISSIONS
 MENU
Shopping
MY Account
 User vikaskc1
 My details
 My favorites
 Wall
 All Media
Login
 Username or email
 Password
Registration
 Username
 email
 Password
 About your camera
 Anti-spam verification
Thank You

More Related Content

What's hot

Sql injection bypassing hand book blackrose
Sql injection bypassing hand book blackroseSql injection bypassing hand book blackrose
Sql injection bypassing hand book blackrose
Noaman Aziz
 
System hacking
System hackingSystem hacking
System hacking
CAS
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
Manish Kumar
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber security
Cyber securityCyber security
Cyber security
abithajayavel
 
Sql injection
Sql injectionSql injection
Sql injection
Zidh
 
Metasploitable
MetasploitableMetasploitable
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL Injection
Sina Manavi
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
OWASP Delhi
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
Chris Gates
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
yatendrakumar47
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
Cyber security
Cyber securityCyber security
Cyber security
Komal Samdariya
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
slametarrokhim1
 
Windows İşletim Sistemi Yetki Yükseltme Çalışmaları
Windows İşletim Sistemi Yetki Yükseltme ÇalışmalarıWindows İşletim Sistemi Yetki Yükseltme Çalışmaları
Windows İşletim Sistemi Yetki Yükseltme Çalışmaları
BGA Cyber Security
 
Web security
Web securityWeb security
Web security
Padam Banthia
 
Web uygulama açıklıklarından faydalanarak sistem ele geçirme
Web uygulama açıklıklarından faydalanarak sistem ele geçirmeWeb uygulama açıklıklarından faydalanarak sistem ele geçirme
Web uygulama açıklıklarından faydalanarak sistem ele geçirme
BTRisk Bilgi Güvenliği ve BT Yönetişim Hizmetleri
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 

What's hot (20)

Sql injection bypassing hand book blackrose
Sql injection bypassing hand book blackroseSql injection bypassing hand book blackrose
Sql injection bypassing hand book blackrose
 
System hacking
System hackingSystem hacking
System hacking
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Sql injection
Sql injectionSql injection
Sql injection
 
Metasploitable
MetasploitableMetasploitable
Metasploitable
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL Injection
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
Cyber security
Cyber securityCyber security
Cyber security
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Windows İşletim Sistemi Yetki Yükseltme Çalışmaları
Windows İşletim Sistemi Yetki Yükseltme ÇalışmalarıWindows İşletim Sistemi Yetki Yükseltme Çalışmaları
Windows İşletim Sistemi Yetki Yükseltme Çalışmaları
 
Web security
Web securityWeb security
Web security
 
Web uygulama açıklıklarından faydalanarak sistem ele geçirme
Web uygulama açıklıklarından faydalanarak sistem ele geçirmeWeb uygulama açıklıklarından faydalanarak sistem ele geçirme
Web uygulama açıklıklarından faydalanarak sistem ele geçirme
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to My website Pro Photography (profotografo.com)

MegaShot
MegaShotMegaShot
Project
Project Project
Project
SaiRoyals10
 
media a2 evaluation Q3
media a2 evaluation Q3media a2 evaluation Q3
media a2 evaluation Q3
AnnabelCarden
 
Fuel for a great web experience
Fuel for a great web experienceFuel for a great web experience
Fuel for a great web experience
Christian Heilmann
 
How did you integrate technologies - software^J.pptx
How did you integrate technologies - software^J.pptxHow did you integrate technologies - software^J.pptx
How did you integrate technologies - software^J.pptx
mishaalok
 
Technology
TechnologyTechnology
Technology
sb7640
 
Day 2-presentation
Day 2-presentationDay 2-presentation
Day 2-presentation
Deb Forsten
 
110419 ENSWERS INTRODUCTION
110419 ENSWERS INTRODUCTION110419 ENSWERS INTRODUCTION
110419 ENSWERS INTRODUCTION
Jack Kim
 
OSDC - Open and Accessible
OSDC - Open and AccessibleOSDC - Open and Accessible
OSDC - Open and Accessible
Christian Heilmann
 
Fuel for a great web experience.
Fuel for a great web experience.Fuel for a great web experience.
Fuel for a great web experience.
elliando dias
 
Social Networking Website
Social Networking WebsiteSocial Networking Website
Social Networking Website
guestec05a4
 
19840612-Slideshare-net.ppt
19840612-Slideshare-net.ppt19840612-Slideshare-net.ppt
19840612-Slideshare-net.ppt
OmarSiraj5
 
Portfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer NetworkPortfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer Network
Habib Ullah Bahar
 
Evaluation Question Four
Evaluation Question FourEvaluation Question Four
Evaluation Question Four
AlexDriscoll
 
Open source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment systemOpen source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment system
Arjun Rajeswaran
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
isaacrandall
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
Evaluation
EvaluationEvaluation
Evaluation
PAULINEKmedia17
 
Yahoo for the Masses
Yahoo for the MassesYahoo for the Masses
Yahoo for the Masses
Christian Heilmann
 
ALA 2010--Free software-now what?
ALA 2010--Free software-now what?ALA 2010--Free software-now what?
ALA 2010--Free software-now what?
Andrew Shuping
 

Similar to My website Pro Photography (profotografo.com) (20)

MegaShot
MegaShotMegaShot
MegaShot
 
Project
Project Project
Project
 
media a2 evaluation Q3
media a2 evaluation Q3media a2 evaluation Q3
media a2 evaluation Q3
 
Fuel for a great web experience
Fuel for a great web experienceFuel for a great web experience
Fuel for a great web experience
 
How did you integrate technologies - software^J.pptx
How did you integrate technologies - software^J.pptxHow did you integrate technologies - software^J.pptx
How did you integrate technologies - software^J.pptx
 
Technology
TechnologyTechnology
Technology
 
Day 2-presentation
Day 2-presentationDay 2-presentation
Day 2-presentation
 
110419 ENSWERS INTRODUCTION
110419 ENSWERS INTRODUCTION110419 ENSWERS INTRODUCTION
110419 ENSWERS INTRODUCTION
 
OSDC - Open and Accessible
OSDC - Open and AccessibleOSDC - Open and Accessible
OSDC - Open and Accessible
 
Fuel for a great web experience.
Fuel for a great web experience.Fuel for a great web experience.
Fuel for a great web experience.
 
Social Networking Website
Social Networking WebsiteSocial Networking Website
Social Networking Website
 
19840612-Slideshare-net.ppt
19840612-Slideshare-net.ppt19840612-Slideshare-net.ppt
19840612-Slideshare-net.ppt
 
Portfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer NetworkPortfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer Network
 
Evaluation Question Four
Evaluation Question FourEvaluation Question Four
Evaluation Question Four
 
Open source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment systemOpen source CMS tool for web based job portal and recruitment system
Open source CMS tool for web based job portal and recruitment system
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
 
Evaluation
EvaluationEvaluation
Evaluation
 
Yahoo for the Masses
Yahoo for the MassesYahoo for the Masses
Yahoo for the Masses
 
ALA 2010--Free software-now what?
ALA 2010--Free software-now what?ALA 2010--Free software-now what?
ALA 2010--Free software-now what?
 

Recently uploaded

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 

Recently uploaded (20)

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 

My website Pro Photography (profotografo.com)

  • 1. A WEBSITE FOR PHOTOGRAPHER
  • 2. Index  Project  Abstract  Introduction  Scope of project  objectives
  • 3. PROJECT  Project Title :- profotografo.com  Platform :- any platform  Back-end (Used) :- My SQL  Front-end (Used) :- PHP  Web Server :- Apache Server .  Development Tools :- Adobe Photoshop CS6. Adobe Dreamweaver CC 2015 XAMPP Server 2.0.
  • 4. ABSTRACT  Pro Photography (profotografo.com) website is only for photographers  This Website provide a platform for bingers or professional photographer to share there photos and videos in this website  It provides Online Registration for the users.  These Website are provide every day top photos in home page as per there likes .  To make this website work successfully we have used some latest technology such as, PHP frame work as the development ,MYSQL as the Database Management environment and HTML5 as structural
  • 5. INTRODUCTION  The system allows user to share there best photos and videos .  It provides the user to find out there category photos to get knowledge and idea how others photographer clicks.  In this website the user can chat or make friend to other user and share there idea and knowledge .  This website also provides the user ranking as per there points .  This website is web-base application, so all people of world can access it from any where any time .
  • 6. PROJECT PLAN METHODOLOGY Problem definition  Problem is to find the ideas, tips and tricks for the bingers .  Problem to share the photography skills to the professional world.  Problem is to get platform for bingers and professional .  Problem is to find out best category photos
  • 7. System analysis  This site is web-base application, so all people of world can access it from any where an time.  Transaction will be risk less.  Dynamic site with clear and required data.  This website utilizes ”cookies” and other tracking technologies  Security must be protected and use tools (encryption, passwords, physical security, etc.) to protect your personal information against unauthorized access.  We provide the best platform for the photographers
  • 8. STUDY OF EXISTING SYSTEM  There are very less website which provide the true platform for the photographers.  Most of the website are work like as a normal social media .  There are some website really for photographers but they are only for specific brand or community .  In existing system who works for photographer they didnt provide the user to chatting or making friends and followers .
  • 9. LIMITATION OF EXISTING SYSTEM  Existing system doesn't not for photographers they are just like as social media .  There is no disliking button .  There is no function to flag any particular photo or video
  • 10. OPERATIONAL FEASIBILITY  Efforts were made to optimize the human efforts in data collection, storage, retrieval, security and presentation.  The proposed system made best efforts in achieving necessary function and performance, as required by the user and keeping in mind some infrastructure constraints.
  • 11. TECHNICAL FEASIBILITY  What are the hardware and software requirements for the proposed system was the first major issue of the discussion.  Windows 10 operating system was used but it can run in any operating system which support web browser .  All Computer hardware support required for the development of the system.  So, technically the development of the system was feasible.
  • 12. AIM OF SYSTEM  System will help to those photographer who are pro or beginners  System are handle by Technical or Non Technical Visitor Website .  This system will help pro or beginners photographer get fame .  Quick to Fast Response
  • 13. OBJECTIVES OF WEBSITE  To give a perfect platform for photographer .  This website is only for photographer so there is no nonsense photograph as in other website. . Easy for the professional to get job or fame .  Easy to get free idea ,knowledge and tips and tricks .  Member user are easy interact with services such as In security must be protected and use tools (encryption, passwords, physical security, etc.) to protect your personal information against unauthorized access
  • 14. DATABASE TABLE  words widgets uservotes users userprofile userpoints usernotices usermetas userlogins userlimits userlevels userfields userfavorites userevents titlewords tagwords tagmetas sharedevents posttags posts postmetas pages options messages iplimits cookies contentwords categorymetas categories cache blobs
  • 15. Main MODULE  Home  Submit image  Submit video  Admin  Shopping  MY Account  Login  Registration
  • 16. HOME  Recent  Hot!  Most votes  Most Comments  Most views
  • 17.
  • 18. Submit image  Title  Category  Upload image  Upload image by url  Tags - use hyphens to combine words
  • 19.
  • 20. Submit video  Title  Category  Upload video by url  Tags - use hyphens to combine words 
  • 21.
  • 22. Admin  RSS  POINTS  SPAM  STATS  MAILING  PLUGINS  MODERATE  FLAGGED  HIDDEN  GENERAL  EMAILS  USERS  LAYOUT  VIEWING  LISTS  CATEGORIES  PERMISSIONS  MENU
  • 23.
  • 25. MY Account  User vikaskc1  My details  My favorites  Wall  All Media
  • 26.
  • 27. Login  Username or email  Password
  • 28.
  • 29. Registration  Username  email  Password  About your camera  Anti-spam verification
  • 30.

Editor's Notes

  1. Created by: Nikha Rajawat Chirag Gupta