SlideShare a Scribd company logo
1 of 33
SOCIAL NETWORKING SITE
Project Report
On
Social Network Site (SNS)
Submitted as per the course of
Master of Computer Applications
Of
Visvesvaraya Technological University, Belgaum
Submitted by
Mr.ABHISHEK RANJAN(1RE**MCA**)
Under the Guidance of
Prof. *********
Assoc. Prof Dept of MCA
Reva ITM, Bangalore
__________________________________________________________________________
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT
Kattigenahalli, Yelahanka, Bangalore – 560 064
2013
DEPT OF MCA RITM Page 1
SOCIAL NETWORKING SITE
REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
Kattigenahalli, Yelahanka, Bangalore – 560 064
Certificate
This is to certify that the project work entitled “SOCIAL NETWORKING SITE” has been
successfully completed by ________having USN 1RE**MCA**, in * semester MCA as
prescribed by the Visvesvaraya Technological University, Belgaum during the academic year 201*
- 201*.
Signature of the Guide Signature of the HOD
External Examination
Name of the Examiners Signature with Date
1.
2.
DEPT OF MCA RITM Page 2
SOCIAL NETWORKING SITE
ABSTRACT
A truly Indian social-networking website that is to promote social responsibility (traffic rules,
public hygiene, aversion to bribery etc).Should provide a common platform where people of
India can Voice out violations, injustice, inhumanity, corruption happening in their vicinity.
In Existing System people does not have the ability to tag social discipline violators .Fellow
citizens can’t take the measures to rate, control and monitor the social responsibility of a
given individual. Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care. The responsible persons are ignoring because of corruption. The
higher authorities not taking any action towards indiscipline. No one is feeling responsibility
to argue .With this in our country the law and order is going out of control. In this current
system if a person wants to give complaint, he has to go to the concerned office and raise a
complaint. In India many rural people don’t know the rules and regulations of Govt. Hence
they are blackmailed by the corrupt world. As the crimes are increased, it is becoming very
difficult for a common man to survive. Here as the people don’t know the actual duties of the
officers and they don’t even have the sources to reach their voice to the higher authorities,
they are becoming helpless
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward, participating in the debates and fighting
against the crimes in their vicinity. Everybody feels their responsibility to minimize the
corruption. Here each and every person has the authority to discuss on any topic .With these
debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.
DEPT OF MCA RITM Page 3
SOCIAL NETWORKING SITE
TABLE OF CONTENTS
CHAPTERS
1. INTRODUCTION
1.1 INTRODUCTION TO PROJECT
- STATEMENT OF THE PROBLEM
- BRIEF DESCRIPTION OF THE PROJECT
2. LITERATURE SURVEY
3. SYSTEM DEVELOPMENT STRATEGY
3.1 SYSTEM ENGINEERING
3.2 SYSTEM DEVELOPMENT ENVIRONMENT
4. SYSTEM ANALYSIS
4.1 EXISTING SYSTEM
4.2 LIMITATIONS OF EXISTING SYSTEM
4.3 PROPOSED SYSTEM
4.4 ADVANTAGES OF PROPOSED SYSTEM
4.5 FEASIBILITY STUDY
- TECHNICAL FEASIBILITY
- ECONOMICAL FEASIBILITY
- OPERATIONAL FEASIBILITY
5. SYSTEM DESIGN
5.4 DATAFLOW DIAGRAM
5.5 ENTITY-RELATIONSHIP DIAGRAM
5.6 TABLE DESIGN
6. CODING
PSEUDO CODE
7. TESTING
TEST CASES FOR
- UNIT TESTING
- INTEGRATION TESTING
- SYSTEM TESTING
SNAPSHOTS
CONCLUSION
BIBILOGRAPHY
DEPT OF MCA RITM Page 4
SOCIAL NETWORKING SITE
CHAPTER 1
INTRODUCTION
1.1 Objective of the Project
A truly Indian social-networking website that is to promote social
responsibility (traffic rules, public hygiene, aversion to bribery etc) .
1.2 Problem Definition
Through the existing system process which is purely manual process and time
taking process. There are chances of having incorrect representation to the traffic
information and aversion to bribery details. In the existing system, people of India
can’t voice out violations, injustice, inhumanity, corruption happening in their
vicinity.
Functional Requirements:
• Should provide a common platform where people of India can
o Voice out violations, injustice, inhumanity, corruption happening in their
vicinity
o Endorse someone else’s concern and augment with more proofs, details etc.
o Call for an online debate or discussion on certain topics of broad applicability
• Should be highly dynamic, with minimal static content as framework and maximum
content created by site participants
• Should have the ability to tag social discipline violators using their UID
• Authenticity for adding users is utmost important for such a website. Definitely one
should not be allowed to have more than one profile.
• There should be a placeholder for dealing with disputing situations for the site as it is
quite possible for recipients of negative reward to resist. The dispute resolution
DEPT OF MCA RITM Page 5
SOCIAL NETWORKING SITE
mechanism should not be like traditional court, it should again be based on social
forum like multiple opinions, group actions etc.
• Non Functional Requirements:
• Secure access of confidential data (user’s details). SSL can be used.
• 24 X 7 availability
• Better component design to get better performance at peak time
• Flexible service based architecture will be highly desirable for future extension
Modules:
1. Administrator
2. Friends
3. Users
4. Blogs
5. Comments Rating
6. Registration
Users:
1. Administrator
2. Friends
3. Authenticate Users
4. Public User
DEPT OF MCA RITM Page 6
SOCIAL NETWORKING SITE
.
CHAPTER 2
LITERATURE SURVEY
Literature survey is a documentation of a comprehensive review of the published and
unpublished work from secondary sources data in the areas of specific interest to the
researcher. Literature survey helps in carrying out the task more easily as it gives information
regarding the work you carry out.
With the development of social network sites, security protection of private information
online has been a serious and important research topic. Research status quo on privacy of
social network sites has been investigated and reviewed in this paper. Two main ways of
obtaining private information on social network sites were summarized as based on privacy
disclosure and attack technique. In each category, actions to threaten privacy were brought
forth. A framework of dangers, which users facing on social network sites, was proposed, and
according to privacy risks, protection methods were also discussed. Finally, new topics about
privacy research directions on social network sites, privacy-preserving collaborative social
network and business model of privacy protection, which need further research, were
presented and discussed. The use of social site by students for academic practice is surpassed
by its use for social engagement, direct communications, and relationship building A larger
DEPT OF MCA RITM Page 7
SOCIAL NETWORKING SITE
percentage of female students use social media technologies despite past studies that have
reported that male students generally demonstrate more competence and a favorable attitude
toward the use of technology. A large percentage of social media use and expertise lies with
college students between the ages of 18-24, also known as Generation Z.
CHAPTER 3
SYSTEM DEVELOPMENT STRATEGY
3.1 SYSTEM ENGINEERING
The software development life cycle (SDLC) is the entire process of formal,
logical steps taken to develop a software product. Within the broader context of
Application Lifecycle Management (ALM), the SDLC is basically the part of process in
which coding/programming is applied to the problem being solved by the existing or
planned application.
The phases of SDLC can vary somewhat but generally include the following:
• Conceptualization
• Requirements and cost/benefits analysis
• Detailed specification of the software requirements
• Software design
• Programming
• Testing
• User and technical training
DEPT OF MCA RITM Page 8
SOCIAL NETWORKING SITE
• Maintenance
There are many methodologies or models that can be used to guide the software
development lifecycle either as a core model to the SDLC or as a complementary method.
Prototyping Model
The goal of prototyping based development is to counter the first two limitations of the
waterfall model discussed earlier. The basic idea here is that instead of freezing the
requirements before a design or coding can proceed, a throwaway prototype is built to
understand the requirements. This prototype is developed based on the currently known
requirements. Development of the prototype obviously undergoes design, coding and
testing. But each of these phases is not done very formally or thoroughly. By using this
prototype, the client can get an "actual feel" of the system, since the interactions with
prototype can enable the client to better understand the requirements of the desired
system.
Prototyping is an attractive idea for complicated and large systems for which there is no
manual process or existing system to help determining the requirements. In such
situations letting the client "plan" with the prototype provides invaluable and intangible i
inputs which helps in determining the requirements for the system. It is also an effective
method to demonstrate the feasibility of a certain approach. This might be needed for
novel systems where it is not clear that constraint can be met or that algorithms can be
developed to implement the requirements. The process model of the prototyping approach
is shown in the figure below.
Prototyping Model
The basic reason for little common use of prototyping is the cost involved in this built-it-
twice approach. However, some argue that prototyping need not be very costly and can
actually reduce the overall development cost. The prototype are usually not complete
systems and many of the details are not built in the prototype. The goal is to provide a
DEPT OF MCA RITM Page 9
SOCIAL NETWORKING SITE
system with overall functionality. In addition, the cost of testing and writing detailed
documents are reduced. These factors help to reduce the cost of developing the prototype.
On the other hand, the experience of developing the prototype will very useful for
developers when developing the final system. This experience helps to reduce the cost of
development of the final system and results in a more reliable and better designed system.
Project Development Architecture
As a developer, the .NET framework and Visual Studio present many choices for
choosing the right architecture, from placing the data access code directly in the UI through
datasets and data source controls.
Presentation Layer
The ASP.NET web site or windows forms
application (the UI for the project) is called
the presentation layer. The presentation layer
is the most important layer simply because
it’s the one that everyone sees and uses. Even with a well structured business and data
layer, if the presentation layer is designed poorly, this gives the users a poor view of the
system.
It’s best to remove as much business logic out of the UI and into the business layer. This
usually involves more code, but in my mind, the excess time (which ranges from minimal
to moderate, depending on the size of the application) pays off in the end.
Business Access Layer
Though a web site could talk to the data access layer directly, it usually goes through
another layer called the business layer. The business layer is vital in that it validates the
DEPT OF MCA RITM Page 10
SOCIAL NETWORKING SITE
input conditions before calling a method from the data layer. This ensures the data input
is correct before proceeding, and can often ensure that the outputs are correct as well.
This validation of input is called business rules, meaning the rules that the business layer
uses to make “judgments” about the data.
Data Access Layer
The key component to most applications is the data. The data has to be served to the
presentation layer somehow. The data layer is a separate component, whose sole purpose
is to serve up the data from the database and return it to the caller. Through this approach,
data can be logically reused, meaning that a portion of an application reusing the same
query can make a call to one data layer method, instead of embedding the query multiple
times. This is generally more maintainable.
3.2 SYSTEM DEVELOPMENT ENVIRONMENT
Software Environment
Operating System Server: Windows XP
Database Server: Microsoft SQL Server-2005
Client: Microsoft Internet Explorer
Tools: Microsoft Visual Studio.Net-2008 (Framework 3.5)
User Interface: Asp.Net with Ajax
Hardware Environment
Processor : Intel Pentium or More
RAM : 512 MB Ram
Hard Disk : PC with 20GB
DEPT OF MCA RITM Page 11
SOCIAL NETWORKING SITE
CHAPTER 4
SYSTEM ANALYSIS
4.1 EXISTING SYSTEM
In Existing System people does not have the ability to tag social discipline violators
.Fellow citizens can’t take the measures to rate, control and monitor the social responsibility
of a given individual. Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care. The responsible persons are ignoring because of corruption. The
higher authorities not taking any action towards indiscipline. No one is feeling responsibility
to argue .With this in our country the law and order is going out of control.
4.2 LIMITATIONS OF EXISTING SYSTEM
In this current system if a person wants to give complaint, he has to go to the concerned
office and raise a complaint. In India many rural people don’t know the rules and regulations
of Govt. Hence they are blackmailed by the corrupt world. As the crimes are increased , it is
becoming very difficult for a common man to survive. Here as the people don’t know the
actual duties of the officers and they don’t even have the sources to reach their voice to the
higher authorities, they are becoming helpless.
4.3 PROPOSED SYSTEM
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward , participating in the debates and
fighting against the crimes in their vicinity. Everybody feels their responsibility to minimize
the corruption. Here each and every person has the authority to discuss on any topic .With
these debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.
DEPT OF MCA RITM Page 12
SOCIAL NETWORKING SITE
4.4 ADVANTAGES OF PROPOSED SYSTEM
1 - Some social networks are good opportunities to find a job –
Nowadays the big companies have specialists on human resources that search for
profiles in these kind of sites to recruit new collaborators. If you´re looking for job you can
create a profile (a serious, professional and complete profile) and you might be discovered
and recruited by a company. You can describe your capabilities and publish some of your
works - and with a little luck you can find a job.
2 - You can meet new people –
social networking sites are the perfect spot to meet new people online. With the help of
advanced search tools you can find users who have the same interests you do and that can be
the starting point of a great friendship and/or relationship. Many people meet online and then
establish a relationship in real life - getting married, having children, etc.
3 - You can promote your site or business for free –
If you have a business or site you need to promote you can do it by creating a business
profile on some of these networks. You can load images, your logo, etc. into your profile and
it will be visible for your virtual friends and all the users who visit your profile. You can also
put topics on groups related to your business and establish new contacts that can lead to sales,
subscriptions or anything else.
4- Professional Networking
For professionals and academics, social networking sites allow users to create networks of
like-minded people. Academics find other scholars to share research or ideas, or simply to
talk to and "get their name out there." Professionals find mutual friends and possible clients,
employers, or business partners. Social networking expands the horizons of what sort of
contacts people can make in their professional lives.
DEPT OF MCA RITM Page 13
SOCIAL NETWORKING SITE
4.5 FEASIBILITY STUDY
A feasibility study looks at the viability of an idea with an emphasis on identifying potential
problems and attempts to answer one main question: Will the idea work and should you
proceed with it?
Before you begin writing your business plan you need to identify how, where, and to whom
you intend to sell a service or product. You also need to assess your competition and figure
out how much money you need to start your business and keep it running until it is
established.
Feasibility studies address things like where and how the business will operate. They provide
in-depth details about the business to determine if and how it can succeed, and serve as a
valuable tool for developing a winning business plan.
Economic feasibility
The most frequently used method for evaluating the effectiveness of a new system. More
commonly known as cost/benefit analysis, the procedure is to determine the benefits and
savings that are expected from a candidate system and compare them with costs. If benefits
outweigh costs, then the decision is made to design and implement the system. An
entrepreneur must accurately weigh the cost versus benefits before taking an action.
Cost-based study: It is important to identify cost and benefit factors, which can be
categorized as follows: 1. Development costs; and 2. Operating costs. This is an analysis of
the costs to be incurred in the system and the benefits derivable out of the system.
Time-based study: This is an analysis of the time required to achieve a return on investments.
The future value of a project is also a factor.
DEPT OF MCA RITM Page 14
SOCIAL NETWORKING SITE
CHAPTER 5
SYSTEM DESIGN
System design is a solution, how to approach to the creation of a new system. This important
phase is composed of several steps. It provides the understanding and procedural details
necessary for implementation of the system recommended in the feasibility study. Emphasis
is on translating the performance requirements in to design specification. Design goes
through logical and physical stages of development. Logical design reviews the present
physical system. Prepares input and output specification, makes edit security and control
specification details, and the implementation plan prepares a logical design walkthrough.
The design phase is transition from user-oriented document to a document to the
programmers or database personnel. It describes the input, compatible to database and
procedures all in a format compatible to user requirements. The logical design also specifies
input, output, files and screen layouts. Physical design produces the working system by
defining the design specification that tells the programmers exactly what the system should
do in turn.
5.4 DATAFLOW DIAGRAM
The Dataflow Diagram is a pictorial or graphical representation of the outline of the
system study. The Dataflow Diagram includes all the processes and data storage area which
takes place during any transactions in the system. The Dataflow Diagrams are functionally
divided to Context Level, Zero level, First Level, and Second Level data flow diagrams.
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system. DFDs can also be used for the visualization of data processing
(structured design).
On a DFD, data items flow from an external data source or an internal data store to an
internal data store or an external data sink, via an internal process.
DEPT OF MCA RITM Page 15
SOCIAL NETWORKING SITE
It is common practice to draw a context-level data flow diagram first, which shows the
interaction between the system and external agents which act as data sources and data sinks.
On the context diagram (also known as the 'Level 0 DFD') the system's interactions with the
outside world are modeled purely in terms of data flows across the system boundary. The
context diagram shows the entire system as a single process, and gives no clues as to its
internal organization.
DFD Symbols
This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the
detail of the system being modeled. The Level 1 DFD shows how the system is divided into
sub-systems (processes), each of which deals with one or more of the data flows to or from an
external agent, and which together provide all of the functionality of the system as a whole. It
also identifies internal data stores that must be present in order for the system to do its job,
and shows the flow of data between the various parts of the system.
DFD Diagrams:
Context Level Diagram (0 Level)
DEPT OF MCA RITM Page 16
SOCIAL NETWORKING SITE
Login DFD
Admin Activities DFD
DEPT OF MCA RITM Page 17
SOCIAL NETWORKING SITE
1st
Level
ENTITY-RELATIONSHIP DIAGRAM
DEPT OF MCA RITM Page 18
SOCIAL NETWORKING SITE
tbl_ Blog
blogid
blogtitle
description
username
date
tbl_Comments1
comm1id
commt1itle
comm1desc
date
username
Post_Id
tbl_ Posts
Post_Id
Post_title
Post_desc
date
username
blogid
tbl_ Rank
Rankid
rank
date
username
Post_Id
TblAddFriendRequestDetails
UserId
RequestFrom
RequestDate
RequestMessage
StatusOfRequest
TblAdminLogin
UserName
Password
TblAppCatagory
CatagoryId
CatagoryType
TblGangMember
GangId
MforeName
MlastName
Maddress
Meducation
Mage
Mgender
TblLoginAccountDetails
AccountId
Email
Password
HintQuestion
Answer
RecoveryMail
LastLogin
TblPersonalDetails
AccountId
Height
Weight
EyeColour
HairColour
BodyBuild
IdealDate
RelationShipLike
TblPollAndSawals
SRNO
Question
QuestionFrom
QuestionPostDate
QuestionAnswerFrom
AnswerPostedOn
AnswerPolls
AdminPermission
Answer
CatagoryId
EmailId
UserId
TblUserDetails
UserId
AccountId
ForeName
SirName
HomeAddress
ContactNo
Email
DateOfBirth
Gender
RelationShipStatus
City
State
PostalCode
Country
LanguagesKnown
PhotoToProfile
Title
TblUserDraft
UserId
DraftId
DraftBody
DateOfDraft
DraftTitle
TblUserFriends
UserId
FriendForeName
FriendUserId
TblUserGangs
UserId
GangName
GangDescription
GangOwner
GangCoOwner
GangPhoto
GangActivity
DateCreated
GangMember
GangCatagory
GangLanguage
AdminPaermission
GangId
TblUserPhotoGalary
UserId
PhotoId
PhotoDescription
Photo
TblUserProfessionalDetails
AccountId
Degree
University
YearOfPassing
Occupation
Industry
Company
CompWebSite
JobDescription
WorkEmail
WorkContact
CareerSkill
CareerInterest
TblUserProfileSetting
UserId
ShowImageToWhom
AllowToSeeWhom
TblUserScrap
UserId
ScrapFrom
ScrapMessage
ScrapDate
ScrapId
TblUserSentMessages
UserId
MessageTo
MessageBody
MessageTitle
SentedOn
FriendUserId
MarksFrom
MarksTo
MessageId
MessageFrom
TblUserSocial
AccountId
Childrens
Ethinisity
Religion
HomeTown
AboutMe
WebPage
Sports
Books
Music
Movies
SunShine
5.3.2 Use Case Diagram
UML is a standard language for specifying, visualizing, constructing, and documenting the
artifacts of software systems.
DEPT OF MCA RITM Page 19
SOCIAL NETWORKING SITE
UML was created by Object Management Group (OMG) and UML 1.0 specification draft
was proposed to the OMG in January 1997.
OMG is continuously putting effort to make a truly industry standard.
• UML stands for Unified Modeling Language.
• UML is different from the other common programming languages like C++, Java,
COBOL etc.
• UML is a pictorial language used to make software blue prints.
Goals of UML:
A picture is worth a thousand words, this absolutely fits while discussing about UML. Object
oriented concepts were introduced much earlier than UML. So at that time there were no
standard methodologies to organize and consolidate the object oriented development. At that
point of time UML came into picture.
There are a number of goals for developing UML but the most important is to define some
general purpose modeling language which all modelers can use and also it needs to be made
simple to understand and use.
UML diagrams are not only made for developers but also for business users, common people
and anybody interested to understand the system. The system can be a software or non
software. So it must be clear that UML is not a development method rather it accompanies
with processes to make a successful system.
.
A conceptual model of UML:
DEPT OF MCA RITM Page 20
SOCIAL NETWORKING SITE
To understand conceptual model of UML first we need to clarify What is a conceptual
model? and Why a conceptual model is at all required?
• A conceptual model can be defined as a model which is made of concepts and
their relationships.
• A conceptual model is the first step before drawing a UML diagram. It helps to
understand the entities in the real world and how they interact with each other.
Structural modeling:
Structural modeling captures the static features of a system. They consist of the followings:
• Classes diagrams
• Objects diagrams
• Deployment diagrams
• Package diagrams
• Composite structure diagram
Behavioral Modeling:
Behavioral model describes the interaction in the system. It represents the interaction among
the structural diagrams. Behavioral modeling shows the dynamic nature of the system. They
consist of the following:
• Activity diagrams
• Interaction diagrams
• Use case diagrams
DEPT OF MCA RITM Page 21
SOCIAL NETWORKING SITE
Activity Diagrams:
Registration:
`
DEPT OF MCA RITM Page 22
Get the Details
Validate Data
Invalid Accept
Enter User Registration Details
Submit
No
Yes
Returns Error Message
Successfully Registered
SOCIAL NETWORKING SITE
Use case diagrams:
System
adm in
Regist rat ion
Login
Add applicat ion cat ageries
Grant sawal request
Send m ails
Add friends
Search friends
search users
creat e album
send m sgs and scraps
Creat e Blogs
post com m ent s
Log out
fiends
User
DEPT OF MCA RITM Page 23
SOCIAL NETWORKING SITE
Admin:
DEPT OF MCA RITM Page 24
System
admin
Login
add application catageries
Add sawal relating to catageries
grant sawals
grant gangs
send mails
Log out
SOCIAL NETWORKING SITE
TABLE DESIGN:
AddFriendRequest Table:
NAME TYPE SIZE
userid varchar 30
requestfrom varchar 50
requestdate datetime
requestmessage varchar max
Statusofrequest varchar 20
UserProfileSetting Table :
NAME TYPE SIZE
userid varchar 30
Showimagetowhom varchar 10
allowtoseewhom varchar 10
UserDatiels Table:
NAME TYPE SIZE
userid Varchar 30
Accounted Int
Forename varchar 30
Homeaddress varchar 50
Sirname varchar 50
Contactno varchar 30
Email varchar 10
Dateofbirth Datetime
Gender Varchar 10
Relationshipstatus Varcahar 50
City Varchar 40
State Varchar 50
DEPT OF MCA RITM Page 25
SOCIAL NETWORKING SITE
CHAPTER 6
CODING
Source code
<%@ Page Language="C#" AutoEventWireup="true" CodeFile="frmfirststep.aspx.cs"
Inherits="Authentication_frmfirststep"
EnableSessionState="True" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<title>Untitled Page</title>
<style type="text/css">
.style1
{
width: 100%;
height: 196px;
}
.style2
{
text-align: center;
font-weight: bold;
font-size: medium;
color: #006600;
text-transform: uppercase;
text-decoration: underline;
font-family: Arial;
}
</style>
</head>
<body>
<form id="form1" runat="server" defaultbutton="btnsubmit" defaultfocus="txtfirstname">
<div align="right">
<table class="style1">
<tr style="background-image: url('SnsHead.JPG')">
<td align="left" valign="top" colspan="2">
</td>
</tr>
</table>
</div>
<p class="style2">
CREATE&nbsp; Sns.com Account</p>
<table class="style1">
<tr>
<td class="style14">
DEPT OF MCA RITM Page 26
SOCIAL NETWORKING SITE
Get Started With SNS.com
</td>
<td class="style24">
<asp:Label ID="lblerror" runat="server" Text="."></asp:Label>
</td>
<td class="style4">
&nbsp;
</td>
</tr>
<tr>
<td class="style21">
<p class="style3">
First Name</p>
</td>
<td class="style24">
<asp:TextBox ID="txtfirstname" runat="server" Width="219px"
BorderColor="#666666"
BorderStyle="Solid" BorderWidth="1px"></asp:TextBox>
&nbsp;
</td>
<td class="style4">
<asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server"
ControlToValidate="txtfirstname"
Display="Dynamic" ErrorMessage="Required" TabIndex="10" Font-
Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="style20">
<p class="style3">
Last Name</p>
</td>
<td class="style25">
<asp:TextBox ID="txtlastname" runat="server" TabIndex="1" Width="219px"
BorderColor="#666666"
BorderStyle="Solid" BorderWidth="1px"></asp:TextBox>
</td>
<td class="style5">
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="txtlastname"
Display="Dynamic" ErrorMessage="Required" TabIndex="11" Font-
Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
DEPT OF MCA RITM Page 27
SOCIAL NETWORKING SITE
<td class="style16"<p class="style3"> </td> <td
class="style26"><asp:TextBox ID="txtemail" runat="server" TabIndex="2" Width="219px"
BorderColor="#666666BorderStyle="Solid" BorderWidth="1px"></asp:TextBox>
&nbsp;<span class="style22"><br />
<span class="style23">This Will Be A User Name</span>.</span>
</td>
<td class="style6">
<asp:RequiredFieldValidator ID="RequiredFieldValidator3" runat="server"
ControlToValidate="txtemail"
Display="Dynamic" ErrorMessage="Required" TabIndex="12" Font-
Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator>
&nbsp;
<asp:RegularExpressionValidator ID="RegularExpressionValidator1"
runat="server" ControlToValidate="txtemail" Display="Dynamic" ErrorMessage="Not Valid
Email" TabIndex="13" ValidationExpression="w+([-+.']w+)*@w+([-.]w+)*.w+
([-.]w+)*"
Font-Names="Arial" Font-Size="Small"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
<td class="style19">
&nbsp;
</td>
<td align="left" class="style27" valign="top">
<asp:Button ID="btncheckavail" runat="server"
DEPT OF MCA RITM Page 28
SOCIAL NETWORKING SITE
CHAPTER 7
TESTING
TEST CASES FOR
In any endeavor, testing is always important before the actual implementation. SDLC is no
different, in fact testing in SDLC is so important these days that developers have to work in
testing longer that most stages in SDLC.
Types of Testing:
Testing by developers – Developers will have to test the software themselves extensively.
Even though they are also the one who have developed the software, they still have to run it
extensively. These are the usual steps developers follow in testing their software:
1. Checking of Syntax – The software is checked as it is. Developers just run software and
look for possible errors. A very basic checking to know if there are major functions and
errors that will occur.
.2. Module Testing – After the walk through, developers will again check the software in
terms of individual modules. Each module will be tested extensively for possible errors.
3. Integration Testing – Once the module has been tested, it is time to test them as being
integrated to other modules.
4. System Testing – After the integration, the whole program will again be tested. Case
studies will again be applied with integrated software.
Testing by Users - Once the developers have finished their own testing with the help of other
professional developers, the software is ready for release to the public or to the intended
users.
The stages usually followed are:
Alpha Testing – Developers usually choose the users who will try out the program. For the
general public, it is often tested on known users or even technology bloggers who can
honestly give their opinion of the software. It is also the time where developers try to create
scenarios for their software such as:
• Recovery – Developers will try recovering the software or the program in case it
crashes.
DEPT OF MCA RITM Page 29
SOCIAL NETWORKING SITE
SNAPSHOTS
SCREENS
Admin:
DEPT OF MCA RITM Page 30
SOCIAL NETWORKING SITE
DEPT OF MCA RITM Page 31
SOCIAL NETWORKING SITE
CONCLUSION
Voice out violations, injustice, inhumanity, corruption happening in their vicinity.
In India many rural people don’t know the rules and regulations of Govt. Hence they are
blackmailed by the corrupt world. As the crimes are increased, it is becoming very difficult
for a common man to survive. Here as the people don’t know the actual duties of the officers
and they don’t even have the sources to reach their voice to the higher authorities, they are
becoming helpless.
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward, participating in the debates and fighting
against the crimes in their vicinity. Everybody feels their responsibility to minimize the
corruption. Here each and every person has the authority to discuss on any topic .With these
debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.
DEPT OF MCA RITM Page 32
SOCIAL NETWORKING SITE
BIBLIOGRAPHY
• FOR .NET INSTALLATION
www.support.mircosoft.com
• FOR DEPLOYMENT AND PACKING ON SERVER
www.developer.com
www.15seconds.com
• FOR SQL
www.msdn.microsoft.com
• FOR ASP.NET
Asp.Net 3.5 Unleashed
www.msdn.microsoft.com/net/quickstart/aspplus/default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx
• Software Engineering (Roger’s Pressman)
DEPT OF MCA RITM Page 33

More Related Content

What's hot

WinkShare: A Social Network to Connect with Strangers
WinkShare: A Social Network to Connect with StrangersWinkShare: A Social Network to Connect with Strangers
WinkShare: A Social Network to Connect with StrangersSanjay Rao
 
Social Networking Site Documentation
Social Networking Site Documentation Social Networking Site Documentation
Social Networking Site Documentation Sammi Kumar
 
Software requirement specification for online examination system
Software requirement specification for online examination systemSoftware requirement specification for online examination system
Software requirement specification for online examination systemkarthik venkatesh
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networkingmaaano786
 
Quizz app By Raihan Sikdar
Quizz app By Raihan SikdarQuizz app By Raihan Sikdar
Quizz app By Raihan Sikdarraihansikdar
 
online news portal system
online news portal systemonline news portal system
online news portal systemArman Ahmed
 
E learning project report (Yashraj Nigam)
E learning project report (Yashraj Nigam)E learning project report (Yashraj Nigam)
E learning project report (Yashraj Nigam)Yashraj Nigam
 
Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"Harsh Verma
 
quiz game project report.pdf
quiz game project report.pdfquiz game project report.pdf
quiz game project report.pdfzccindia
 
online quiz application project presentation
online quiz application project presentationonline quiz application project presentation
online quiz application project presentationGyanuRana
 
Quiz app android ppt
Quiz app android pptQuiz app android ppt
Quiz app android pptAditya Nag
 
Social Media Project Presentation (PPT) for NIIT
Social Media Project Presentation (PPT) for NIITSocial Media Project Presentation (PPT) for NIIT
Social Media Project Presentation (PPT) for NIITNIIT
 
online blogging system
online blogging systemonline blogging system
online blogging system001vaibhav
 
Synopsis on social networking
Synopsis on social networkingSynopsis on social networking
Synopsis on social networkingManish Chaurasia
 
Quiz application
Quiz applicationQuiz application
Quiz applicationHarsh Verma
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONAtul Kushwaha
 

What's hot (20)

WinkShare: A Social Network to Connect with Strangers
WinkShare: A Social Network to Connect with StrangersWinkShare: A Social Network to Connect with Strangers
WinkShare: A Social Network to Connect with Strangers
 
Social Networking Site Documentation
Social Networking Site Documentation Social Networking Site Documentation
Social Networking Site Documentation
 
Software requirement specification for online examination system
Software requirement specification for online examination systemSoftware requirement specification for online examination system
Software requirement specification for online examination system
 
Social networking
Social networkingSocial networking
Social networking
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networking
 
Project report on blogs
Project report on blogsProject report on blogs
Project report on blogs
 
Srs for project
Srs for projectSrs for project
Srs for project
 
Quizz app By Raihan Sikdar
Quizz app By Raihan SikdarQuizz app By Raihan Sikdar
Quizz app By Raihan Sikdar
 
online news portal system
online news portal systemonline news portal system
online news portal system
 
E learning project report (Yashraj Nigam)
E learning project report (Yashraj Nigam)E learning project report (Yashraj Nigam)
E learning project report (Yashraj Nigam)
 
Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"
 
quiz game project report.pdf
quiz game project report.pdfquiz game project report.pdf
quiz game project report.pdf
 
online quiz application project presentation
online quiz application project presentationonline quiz application project presentation
online quiz application project presentation
 
Quiz app android ppt
Quiz app android pptQuiz app android ppt
Quiz app android ppt
 
Social Media Project Presentation (PPT) for NIIT
Social Media Project Presentation (PPT) for NIITSocial Media Project Presentation (PPT) for NIIT
Social Media Project Presentation (PPT) for NIIT
 
Online Social Networking Site
Online Social Networking SiteOnline Social Networking Site
Online Social Networking Site
 
online blogging system
online blogging systemonline blogging system
online blogging system
 
Synopsis on social networking
Synopsis on social networkingSynopsis on social networking
Synopsis on social networking
 
Quiz application
Quiz applicationQuiz application
Quiz application
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATION
 

Similar to social networking site

Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET Journal
 
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET-  	  A Social Webbing Service Vivified on Design PatternsIRJET-  	  A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design PatternsIRJET Journal
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporationDhavamani Prakash
 
46393833 e banking
46393833 e banking46393833 e banking
46393833 e bankingdipali2009
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)S3 Infotech IEEE Projects
 
Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainSurvey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainIRJET Journal
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentationsireesha nimmagadda
 
Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)Kishan Maurya
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
Survey Based Reviewof Elicitation Problems
Survey Based Reviewof Elicitation ProblemsSurvey Based Reviewof Elicitation Problems
Survey Based Reviewof Elicitation ProblemsIJERA Editor
 

Similar to social networking site (20)

Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
 
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET-  	  A Social Webbing Service Vivified on Design PatternsIRJET-  	  A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design Patterns
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporation
 
46393833 e banking
46393833 e banking46393833 e banking
46393833 e banking
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
online banking system
online banking systemonline banking system
online banking system
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)
 
Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainSurvey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using Blockchain
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentation
 
Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Survey Based Reviewof Elicitation Problems
Survey Based Reviewof Elicitation ProblemsSurvey Based Reviewof Elicitation Problems
Survey Based Reviewof Elicitation Problems
 
Sdpl1
Sdpl1Sdpl1
Sdpl1
 
Analysis and Design of Information Systems
Analysis and Design of Information SystemsAnalysis and Design of Information Systems
Analysis and Design of Information Systems
 
J017648994
J017648994J017648994
J017648994
 

Recently uploaded

Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubaihf8803863
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhidelhiescort
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project17mos052
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 

Recently uploaded (20)

looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 

social networking site

  • 1. SOCIAL NETWORKING SITE Project Report On Social Network Site (SNS) Submitted as per the course of Master of Computer Applications Of Visvesvaraya Technological University, Belgaum Submitted by Mr.ABHISHEK RANJAN(1RE**MCA**) Under the Guidance of Prof. ********* Assoc. Prof Dept of MCA Reva ITM, Bangalore __________________________________________________________________________ DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Yelahanka, Bangalore – 560 064 2013 DEPT OF MCA RITM Page 1
  • 2. SOCIAL NETWORKING SITE REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS Kattigenahalli, Yelahanka, Bangalore – 560 064 Certificate This is to certify that the project work entitled “SOCIAL NETWORKING SITE” has been successfully completed by ________having USN 1RE**MCA**, in * semester MCA as prescribed by the Visvesvaraya Technological University, Belgaum during the academic year 201* - 201*. Signature of the Guide Signature of the HOD External Examination Name of the Examiners Signature with Date 1. 2. DEPT OF MCA RITM Page 2
  • 3. SOCIAL NETWORKING SITE ABSTRACT A truly Indian social-networking website that is to promote social responsibility (traffic rules, public hygiene, aversion to bribery etc).Should provide a common platform where people of India can Voice out violations, injustice, inhumanity, corruption happening in their vicinity. In Existing System people does not have the ability to tag social discipline violators .Fellow citizens can’t take the measures to rate, control and monitor the social responsibility of a given individual. Indirectly the crime is increasing very much, everybody is violating the rules .No one is taking care. The responsible persons are ignoring because of corruption. The higher authorities not taking any action towards indiscipline. No one is feeling responsibility to argue .With this in our country the law and order is going out of control. In this current system if a person wants to give complaint, he has to go to the concerned office and raise a complaint. In India many rural people don’t know the rules and regulations of Govt. Hence they are blackmailed by the corrupt world. As the crimes are increased, it is becoming very difficult for a common man to survive. Here as the people don’t know the actual duties of the officers and they don’t even have the sources to reach their voice to the higher authorities, they are becoming helpless By this no one will be cheated. Hence all the violations of rules can be reduced to a great extent. In our current system people coming forward, participating in the debates and fighting against the crimes in their vicinity. Everybody feels their responsibility to minimize the corruption. Here each and every person has the authority to discuss on any topic .With these debates many criminals can come into the picture of real world. With these things the innocent people can get aware. Then basing on these discussions the right decision can be taken by the concerned authority. DEPT OF MCA RITM Page 3
  • 4. SOCIAL NETWORKING SITE TABLE OF CONTENTS CHAPTERS 1. INTRODUCTION 1.1 INTRODUCTION TO PROJECT - STATEMENT OF THE PROBLEM - BRIEF DESCRIPTION OF THE PROJECT 2. LITERATURE SURVEY 3. SYSTEM DEVELOPMENT STRATEGY 3.1 SYSTEM ENGINEERING 3.2 SYSTEM DEVELOPMENT ENVIRONMENT 4. SYSTEM ANALYSIS 4.1 EXISTING SYSTEM 4.2 LIMITATIONS OF EXISTING SYSTEM 4.3 PROPOSED SYSTEM 4.4 ADVANTAGES OF PROPOSED SYSTEM 4.5 FEASIBILITY STUDY - TECHNICAL FEASIBILITY - ECONOMICAL FEASIBILITY - OPERATIONAL FEASIBILITY 5. SYSTEM DESIGN 5.4 DATAFLOW DIAGRAM 5.5 ENTITY-RELATIONSHIP DIAGRAM 5.6 TABLE DESIGN 6. CODING PSEUDO CODE 7. TESTING TEST CASES FOR - UNIT TESTING - INTEGRATION TESTING - SYSTEM TESTING SNAPSHOTS CONCLUSION BIBILOGRAPHY DEPT OF MCA RITM Page 4
  • 5. SOCIAL NETWORKING SITE CHAPTER 1 INTRODUCTION 1.1 Objective of the Project A truly Indian social-networking website that is to promote social responsibility (traffic rules, public hygiene, aversion to bribery etc) . 1.2 Problem Definition Through the existing system process which is purely manual process and time taking process. There are chances of having incorrect representation to the traffic information and aversion to bribery details. In the existing system, people of India can’t voice out violations, injustice, inhumanity, corruption happening in their vicinity. Functional Requirements: • Should provide a common platform where people of India can o Voice out violations, injustice, inhumanity, corruption happening in their vicinity o Endorse someone else’s concern and augment with more proofs, details etc. o Call for an online debate or discussion on certain topics of broad applicability • Should be highly dynamic, with minimal static content as framework and maximum content created by site participants • Should have the ability to tag social discipline violators using their UID • Authenticity for adding users is utmost important for such a website. Definitely one should not be allowed to have more than one profile. • There should be a placeholder for dealing with disputing situations for the site as it is quite possible for recipients of negative reward to resist. The dispute resolution DEPT OF MCA RITM Page 5
  • 6. SOCIAL NETWORKING SITE mechanism should not be like traditional court, it should again be based on social forum like multiple opinions, group actions etc. • Non Functional Requirements: • Secure access of confidential data (user’s details). SSL can be used. • 24 X 7 availability • Better component design to get better performance at peak time • Flexible service based architecture will be highly desirable for future extension Modules: 1. Administrator 2. Friends 3. Users 4. Blogs 5. Comments Rating 6. Registration Users: 1. Administrator 2. Friends 3. Authenticate Users 4. Public User DEPT OF MCA RITM Page 6
  • 7. SOCIAL NETWORKING SITE . CHAPTER 2 LITERATURE SURVEY Literature survey is a documentation of a comprehensive review of the published and unpublished work from secondary sources data in the areas of specific interest to the researcher. Literature survey helps in carrying out the task more easily as it gives information regarding the work you carry out. With the development of social network sites, security protection of private information online has been a serious and important research topic. Research status quo on privacy of social network sites has been investigated and reviewed in this paper. Two main ways of obtaining private information on social network sites were summarized as based on privacy disclosure and attack technique. In each category, actions to threaten privacy were brought forth. A framework of dangers, which users facing on social network sites, was proposed, and according to privacy risks, protection methods were also discussed. Finally, new topics about privacy research directions on social network sites, privacy-preserving collaborative social network and business model of privacy protection, which need further research, were presented and discussed. The use of social site by students for academic practice is surpassed by its use for social engagement, direct communications, and relationship building A larger DEPT OF MCA RITM Page 7
  • 8. SOCIAL NETWORKING SITE percentage of female students use social media technologies despite past studies that have reported that male students generally demonstrate more competence and a favorable attitude toward the use of technology. A large percentage of social media use and expertise lies with college students between the ages of 18-24, also known as Generation Z. CHAPTER 3 SYSTEM DEVELOPMENT STRATEGY 3.1 SYSTEM ENGINEERING The software development life cycle (SDLC) is the entire process of formal, logical steps taken to develop a software product. Within the broader context of Application Lifecycle Management (ALM), the SDLC is basically the part of process in which coding/programming is applied to the problem being solved by the existing or planned application. The phases of SDLC can vary somewhat but generally include the following: • Conceptualization • Requirements and cost/benefits analysis • Detailed specification of the software requirements • Software design • Programming • Testing • User and technical training DEPT OF MCA RITM Page 8
  • 9. SOCIAL NETWORKING SITE • Maintenance There are many methodologies or models that can be used to guide the software development lifecycle either as a core model to the SDLC or as a complementary method. Prototyping Model The goal of prototyping based development is to counter the first two limitations of the waterfall model discussed earlier. The basic idea here is that instead of freezing the requirements before a design or coding can proceed, a throwaway prototype is built to understand the requirements. This prototype is developed based on the currently known requirements. Development of the prototype obviously undergoes design, coding and testing. But each of these phases is not done very formally or thoroughly. By using this prototype, the client can get an "actual feel" of the system, since the interactions with prototype can enable the client to better understand the requirements of the desired system. Prototyping is an attractive idea for complicated and large systems for which there is no manual process or existing system to help determining the requirements. In such situations letting the client "plan" with the prototype provides invaluable and intangible i inputs which helps in determining the requirements for the system. It is also an effective method to demonstrate the feasibility of a certain approach. This might be needed for novel systems where it is not clear that constraint can be met or that algorithms can be developed to implement the requirements. The process model of the prototyping approach is shown in the figure below. Prototyping Model The basic reason for little common use of prototyping is the cost involved in this built-it- twice approach. However, some argue that prototyping need not be very costly and can actually reduce the overall development cost. The prototype are usually not complete systems and many of the details are not built in the prototype. The goal is to provide a DEPT OF MCA RITM Page 9
  • 10. SOCIAL NETWORKING SITE system with overall functionality. In addition, the cost of testing and writing detailed documents are reduced. These factors help to reduce the cost of developing the prototype. On the other hand, the experience of developing the prototype will very useful for developers when developing the final system. This experience helps to reduce the cost of development of the final system and results in a more reliable and better designed system. Project Development Architecture As a developer, the .NET framework and Visual Studio present many choices for choosing the right architecture, from placing the data access code directly in the UI through datasets and data source controls. Presentation Layer The ASP.NET web site or windows forms application (the UI for the project) is called the presentation layer. The presentation layer is the most important layer simply because it’s the one that everyone sees and uses. Even with a well structured business and data layer, if the presentation layer is designed poorly, this gives the users a poor view of the system. It’s best to remove as much business logic out of the UI and into the business layer. This usually involves more code, but in my mind, the excess time (which ranges from minimal to moderate, depending on the size of the application) pays off in the end. Business Access Layer Though a web site could talk to the data access layer directly, it usually goes through another layer called the business layer. The business layer is vital in that it validates the DEPT OF MCA RITM Page 10
  • 11. SOCIAL NETWORKING SITE input conditions before calling a method from the data layer. This ensures the data input is correct before proceeding, and can often ensure that the outputs are correct as well. This validation of input is called business rules, meaning the rules that the business layer uses to make “judgments” about the data. Data Access Layer The key component to most applications is the data. The data has to be served to the presentation layer somehow. The data layer is a separate component, whose sole purpose is to serve up the data from the database and return it to the caller. Through this approach, data can be logically reused, meaning that a portion of an application reusing the same query can make a call to one data layer method, instead of embedding the query multiple times. This is generally more maintainable. 3.2 SYSTEM DEVELOPMENT ENVIRONMENT Software Environment Operating System Server: Windows XP Database Server: Microsoft SQL Server-2005 Client: Microsoft Internet Explorer Tools: Microsoft Visual Studio.Net-2008 (Framework 3.5) User Interface: Asp.Net with Ajax Hardware Environment Processor : Intel Pentium or More RAM : 512 MB Ram Hard Disk : PC with 20GB DEPT OF MCA RITM Page 11
  • 12. SOCIAL NETWORKING SITE CHAPTER 4 SYSTEM ANALYSIS 4.1 EXISTING SYSTEM In Existing System people does not have the ability to tag social discipline violators .Fellow citizens can’t take the measures to rate, control and monitor the social responsibility of a given individual. Indirectly the crime is increasing very much, everybody is violating the rules .No one is taking care. The responsible persons are ignoring because of corruption. The higher authorities not taking any action towards indiscipline. No one is feeling responsibility to argue .With this in our country the law and order is going out of control. 4.2 LIMITATIONS OF EXISTING SYSTEM In this current system if a person wants to give complaint, he has to go to the concerned office and raise a complaint. In India many rural people don’t know the rules and regulations of Govt. Hence they are blackmailed by the corrupt world. As the crimes are increased , it is becoming very difficult for a common man to survive. Here as the people don’t know the actual duties of the officers and they don’t even have the sources to reach their voice to the higher authorities, they are becoming helpless. 4.3 PROPOSED SYSTEM By this no one will be cheated. Hence all the violations of rules can be reduced to a great extent. In our current system people coming forward , participating in the debates and fighting against the crimes in their vicinity. Everybody feels their responsibility to minimize the corruption. Here each and every person has the authority to discuss on any topic .With these debates many criminals can come into the picture of real world. With these things the innocent people can get aware. Then basing on these discussions the right decision can be taken by the concerned authority. DEPT OF MCA RITM Page 12
  • 13. SOCIAL NETWORKING SITE 4.4 ADVANTAGES OF PROPOSED SYSTEM 1 - Some social networks are good opportunities to find a job – Nowadays the big companies have specialists on human resources that search for profiles in these kind of sites to recruit new collaborators. If you´re looking for job you can create a profile (a serious, professional and complete profile) and you might be discovered and recruited by a company. You can describe your capabilities and publish some of your works - and with a little luck you can find a job. 2 - You can meet new people – social networking sites are the perfect spot to meet new people online. With the help of advanced search tools you can find users who have the same interests you do and that can be the starting point of a great friendship and/or relationship. Many people meet online and then establish a relationship in real life - getting married, having children, etc. 3 - You can promote your site or business for free – If you have a business or site you need to promote you can do it by creating a business profile on some of these networks. You can load images, your logo, etc. into your profile and it will be visible for your virtual friends and all the users who visit your profile. You can also put topics on groups related to your business and establish new contacts that can lead to sales, subscriptions or anything else. 4- Professional Networking For professionals and academics, social networking sites allow users to create networks of like-minded people. Academics find other scholars to share research or ideas, or simply to talk to and "get their name out there." Professionals find mutual friends and possible clients, employers, or business partners. Social networking expands the horizons of what sort of contacts people can make in their professional lives. DEPT OF MCA RITM Page 13
  • 14. SOCIAL NETWORKING SITE 4.5 FEASIBILITY STUDY A feasibility study looks at the viability of an idea with an emphasis on identifying potential problems and attempts to answer one main question: Will the idea work and should you proceed with it? Before you begin writing your business plan you need to identify how, where, and to whom you intend to sell a service or product. You also need to assess your competition and figure out how much money you need to start your business and keep it running until it is established. Feasibility studies address things like where and how the business will operate. They provide in-depth details about the business to determine if and how it can succeed, and serve as a valuable tool for developing a winning business plan. Economic feasibility The most frequently used method for evaluating the effectiveness of a new system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. An entrepreneur must accurately weigh the cost versus benefits before taking an action. Cost-based study: It is important to identify cost and benefit factors, which can be categorized as follows: 1. Development costs; and 2. Operating costs. This is an analysis of the costs to be incurred in the system and the benefits derivable out of the system. Time-based study: This is an analysis of the time required to achieve a return on investments. The future value of a project is also a factor. DEPT OF MCA RITM Page 14
  • 15. SOCIAL NETWORKING SITE CHAPTER 5 SYSTEM DESIGN System design is a solution, how to approach to the creation of a new system. This important phase is composed of several steps. It provides the understanding and procedural details necessary for implementation of the system recommended in the feasibility study. Emphasis is on translating the performance requirements in to design specification. Design goes through logical and physical stages of development. Logical design reviews the present physical system. Prepares input and output specification, makes edit security and control specification details, and the implementation plan prepares a logical design walkthrough. The design phase is transition from user-oriented document to a document to the programmers or database personnel. It describes the input, compatible to database and procedures all in a format compatible to user requirements. The logical design also specifies input, output, files and screen layouts. Physical design produces the working system by defining the design specification that tells the programmers exactly what the system should do in turn. 5.4 DATAFLOW DIAGRAM The Dataflow Diagram is a pictorial or graphical representation of the outline of the system study. The Dataflow Diagram includes all the processes and data storage area which takes place during any transactions in the system. The Dataflow Diagrams are functionally divided to Context Level, Zero level, First Level, and Second Level data flow diagrams. A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. DFDs can also be used for the visualization of data processing (structured design). On a DFD, data items flow from an external data source or an internal data store to an internal data store or an external data sink, via an internal process. DEPT OF MCA RITM Page 15
  • 16. SOCIAL NETWORKING SITE It is common practice to draw a context-level data flow diagram first, which shows the interaction between the system and external agents which act as data sources and data sinks. On the context diagram (also known as the 'Level 0 DFD') the system's interactions with the outside world are modeled purely in terms of data flows across the system boundary. The context diagram shows the entire system as a single process, and gives no clues as to its internal organization. DFD Symbols This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the detail of the system being modeled. The Level 1 DFD shows how the system is divided into sub-systems (processes), each of which deals with one or more of the data flows to or from an external agent, and which together provide all of the functionality of the system as a whole. It also identifies internal data stores that must be present in order for the system to do its job, and shows the flow of data between the various parts of the system. DFD Diagrams: Context Level Diagram (0 Level) DEPT OF MCA RITM Page 16
  • 17. SOCIAL NETWORKING SITE Login DFD Admin Activities DFD DEPT OF MCA RITM Page 17
  • 18. SOCIAL NETWORKING SITE 1st Level ENTITY-RELATIONSHIP DIAGRAM DEPT OF MCA RITM Page 18
  • 19. SOCIAL NETWORKING SITE tbl_ Blog blogid blogtitle description username date tbl_Comments1 comm1id commt1itle comm1desc date username Post_Id tbl_ Posts Post_Id Post_title Post_desc date username blogid tbl_ Rank Rankid rank date username Post_Id TblAddFriendRequestDetails UserId RequestFrom RequestDate RequestMessage StatusOfRequest TblAdminLogin UserName Password TblAppCatagory CatagoryId CatagoryType TblGangMember GangId MforeName MlastName Maddress Meducation Mage Mgender TblLoginAccountDetails AccountId Email Password HintQuestion Answer RecoveryMail LastLogin TblPersonalDetails AccountId Height Weight EyeColour HairColour BodyBuild IdealDate RelationShipLike TblPollAndSawals SRNO Question QuestionFrom QuestionPostDate QuestionAnswerFrom AnswerPostedOn AnswerPolls AdminPermission Answer CatagoryId EmailId UserId TblUserDetails UserId AccountId ForeName SirName HomeAddress ContactNo Email DateOfBirth Gender RelationShipStatus City State PostalCode Country LanguagesKnown PhotoToProfile Title TblUserDraft UserId DraftId DraftBody DateOfDraft DraftTitle TblUserFriends UserId FriendForeName FriendUserId TblUserGangs UserId GangName GangDescription GangOwner GangCoOwner GangPhoto GangActivity DateCreated GangMember GangCatagory GangLanguage AdminPaermission GangId TblUserPhotoGalary UserId PhotoId PhotoDescription Photo TblUserProfessionalDetails AccountId Degree University YearOfPassing Occupation Industry Company CompWebSite JobDescription WorkEmail WorkContact CareerSkill CareerInterest TblUserProfileSetting UserId ShowImageToWhom AllowToSeeWhom TblUserScrap UserId ScrapFrom ScrapMessage ScrapDate ScrapId TblUserSentMessages UserId MessageTo MessageBody MessageTitle SentedOn FriendUserId MarksFrom MarksTo MessageId MessageFrom TblUserSocial AccountId Childrens Ethinisity Religion HomeTown AboutMe WebPage Sports Books Music Movies SunShine 5.3.2 Use Case Diagram UML is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems. DEPT OF MCA RITM Page 19
  • 20. SOCIAL NETWORKING SITE UML was created by Object Management Group (OMG) and UML 1.0 specification draft was proposed to the OMG in January 1997. OMG is continuously putting effort to make a truly industry standard. • UML stands for Unified Modeling Language. • UML is different from the other common programming languages like C++, Java, COBOL etc. • UML is a pictorial language used to make software blue prints. Goals of UML: A picture is worth a thousand words, this absolutely fits while discussing about UML. Object oriented concepts were introduced much earlier than UML. So at that time there were no standard methodologies to organize and consolidate the object oriented development. At that point of time UML came into picture. There are a number of goals for developing UML but the most important is to define some general purpose modeling language which all modelers can use and also it needs to be made simple to understand and use. UML diagrams are not only made for developers but also for business users, common people and anybody interested to understand the system. The system can be a software or non software. So it must be clear that UML is not a development method rather it accompanies with processes to make a successful system. . A conceptual model of UML: DEPT OF MCA RITM Page 20
  • 21. SOCIAL NETWORKING SITE To understand conceptual model of UML first we need to clarify What is a conceptual model? and Why a conceptual model is at all required? • A conceptual model can be defined as a model which is made of concepts and their relationships. • A conceptual model is the first step before drawing a UML diagram. It helps to understand the entities in the real world and how they interact with each other. Structural modeling: Structural modeling captures the static features of a system. They consist of the followings: • Classes diagrams • Objects diagrams • Deployment diagrams • Package diagrams • Composite structure diagram Behavioral Modeling: Behavioral model describes the interaction in the system. It represents the interaction among the structural diagrams. Behavioral modeling shows the dynamic nature of the system. They consist of the following: • Activity diagrams • Interaction diagrams • Use case diagrams DEPT OF MCA RITM Page 21
  • 22. SOCIAL NETWORKING SITE Activity Diagrams: Registration: ` DEPT OF MCA RITM Page 22 Get the Details Validate Data Invalid Accept Enter User Registration Details Submit No Yes Returns Error Message Successfully Registered
  • 23. SOCIAL NETWORKING SITE Use case diagrams: System adm in Regist rat ion Login Add applicat ion cat ageries Grant sawal request Send m ails Add friends Search friends search users creat e album send m sgs and scraps Creat e Blogs post com m ent s Log out fiends User DEPT OF MCA RITM Page 23
  • 24. SOCIAL NETWORKING SITE Admin: DEPT OF MCA RITM Page 24 System admin Login add application catageries Add sawal relating to catageries grant sawals grant gangs send mails Log out
  • 25. SOCIAL NETWORKING SITE TABLE DESIGN: AddFriendRequest Table: NAME TYPE SIZE userid varchar 30 requestfrom varchar 50 requestdate datetime requestmessage varchar max Statusofrequest varchar 20 UserProfileSetting Table : NAME TYPE SIZE userid varchar 30 Showimagetowhom varchar 10 allowtoseewhom varchar 10 UserDatiels Table: NAME TYPE SIZE userid Varchar 30 Accounted Int Forename varchar 30 Homeaddress varchar 50 Sirname varchar 50 Contactno varchar 30 Email varchar 10 Dateofbirth Datetime Gender Varchar 10 Relationshipstatus Varcahar 50 City Varchar 40 State Varchar 50 DEPT OF MCA RITM Page 25
  • 26. SOCIAL NETWORKING SITE CHAPTER 6 CODING Source code <%@ Page Language="C#" AutoEventWireup="true" CodeFile="frmfirststep.aspx.cs" Inherits="Authentication_frmfirststep" EnableSessionState="True" %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head runat="server"> <title>Untitled Page</title> <style type="text/css"> .style1 { width: 100%; height: 196px; } .style2 { text-align: center; font-weight: bold; font-size: medium; color: #006600; text-transform: uppercase; text-decoration: underline; font-family: Arial; } </style> </head> <body> <form id="form1" runat="server" defaultbutton="btnsubmit" defaultfocus="txtfirstname"> <div align="right"> <table class="style1"> <tr style="background-image: url('SnsHead.JPG')"> <td align="left" valign="top" colspan="2"> </td> </tr> </table> </div> <p class="style2"> CREATE&nbsp; Sns.com Account</p> <table class="style1"> <tr> <td class="style14"> DEPT OF MCA RITM Page 26
  • 27. SOCIAL NETWORKING SITE Get Started With SNS.com </td> <td class="style24"> <asp:Label ID="lblerror" runat="server" Text="."></asp:Label> </td> <td class="style4"> &nbsp; </td> </tr> <tr> <td class="style21"> <p class="style3"> First Name</p> </td> <td class="style24"> <asp:TextBox ID="txtfirstname" runat="server" Width="219px" BorderColor="#666666" BorderStyle="Solid" BorderWidth="1px"></asp:TextBox> &nbsp; </td> <td class="style4"> <asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server" ControlToValidate="txtfirstname" Display="Dynamic" ErrorMessage="Required" TabIndex="10" Font- Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator> </td> </tr> <tr> <td class="style20"> <p class="style3"> Last Name</p> </td> <td class="style25"> <asp:TextBox ID="txtlastname" runat="server" TabIndex="1" Width="219px" BorderColor="#666666" BorderStyle="Solid" BorderWidth="1px"></asp:TextBox> </td> <td class="style5"> <asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server" ControlToValidate="txtlastname" Display="Dynamic" ErrorMessage="Required" TabIndex="11" Font- Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator> </td> </tr> <tr> DEPT OF MCA RITM Page 27
  • 28. SOCIAL NETWORKING SITE <td class="style16"<p class="style3"> </td> <td class="style26"><asp:TextBox ID="txtemail" runat="server" TabIndex="2" Width="219px" BorderColor="#666666BorderStyle="Solid" BorderWidth="1px"></asp:TextBox> &nbsp;<span class="style22"><br /> <span class="style23">This Will Be A User Name</span>.</span> </td> <td class="style6"> <asp:RequiredFieldValidator ID="RequiredFieldValidator3" runat="server" ControlToValidate="txtemail" Display="Dynamic" ErrorMessage="Required" TabIndex="12" Font- Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator> &nbsp; <asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server" ControlToValidate="txtemail" Display="Dynamic" ErrorMessage="Not Valid Email" TabIndex="13" ValidationExpression="w+([-+.']w+)*@w+([-.]w+)*.w+ ([-.]w+)*" Font-Names="Arial" Font-Size="Small"></asp:RegularExpressionValidator> </td> </tr> <tr> <td class="style19"> &nbsp; </td> <td align="left" class="style27" valign="top"> <asp:Button ID="btncheckavail" runat="server" DEPT OF MCA RITM Page 28
  • 29. SOCIAL NETWORKING SITE CHAPTER 7 TESTING TEST CASES FOR In any endeavor, testing is always important before the actual implementation. SDLC is no different, in fact testing in SDLC is so important these days that developers have to work in testing longer that most stages in SDLC. Types of Testing: Testing by developers – Developers will have to test the software themselves extensively. Even though they are also the one who have developed the software, they still have to run it extensively. These are the usual steps developers follow in testing their software: 1. Checking of Syntax – The software is checked as it is. Developers just run software and look for possible errors. A very basic checking to know if there are major functions and errors that will occur. .2. Module Testing – After the walk through, developers will again check the software in terms of individual modules. Each module will be tested extensively for possible errors. 3. Integration Testing – Once the module has been tested, it is time to test them as being integrated to other modules. 4. System Testing – After the integration, the whole program will again be tested. Case studies will again be applied with integrated software. Testing by Users - Once the developers have finished their own testing with the help of other professional developers, the software is ready for release to the public or to the intended users. The stages usually followed are: Alpha Testing – Developers usually choose the users who will try out the program. For the general public, it is often tested on known users or even technology bloggers who can honestly give their opinion of the software. It is also the time where developers try to create scenarios for their software such as: • Recovery – Developers will try recovering the software or the program in case it crashes. DEPT OF MCA RITM Page 29
  • 31. SOCIAL NETWORKING SITE DEPT OF MCA RITM Page 31
  • 32. SOCIAL NETWORKING SITE CONCLUSION Voice out violations, injustice, inhumanity, corruption happening in their vicinity. In India many rural people don’t know the rules and regulations of Govt. Hence they are blackmailed by the corrupt world. As the crimes are increased, it is becoming very difficult for a common man to survive. Here as the people don’t know the actual duties of the officers and they don’t even have the sources to reach their voice to the higher authorities, they are becoming helpless. By this no one will be cheated. Hence all the violations of rules can be reduced to a great extent. In our current system people coming forward, participating in the debates and fighting against the crimes in their vicinity. Everybody feels their responsibility to minimize the corruption. Here each and every person has the authority to discuss on any topic .With these debates many criminals can come into the picture of real world. With these things the innocent people can get aware. Then basing on these discussions the right decision can be taken by the concerned authority. DEPT OF MCA RITM Page 32
  • 33. SOCIAL NETWORKING SITE BIBLIOGRAPHY • FOR .NET INSTALLATION www.support.mircosoft.com • FOR DEPLOYMENT AND PACKING ON SERVER www.developer.com www.15seconds.com • FOR SQL www.msdn.microsoft.com • FOR ASP.NET Asp.Net 3.5 Unleashed www.msdn.microsoft.com/net/quickstart/aspplus/default.com www.asp.net www.fmexpense.com/quickstart/aspplus/default.com www.asptoday.com www.aspfree.com www.4guysfromrolla.com/index.aspx • Software Engineering (Roger’s Pressman) DEPT OF MCA RITM Page 33