social networking project report
TRANSCRIPT
-
7/30/2019 social networking project report
1/37
PROJECT REPORT
ON
Social Networking
SUBMITTED TO
SUBMITTED BY
Mrs Tanya SinghVinay Sharma
ENROLLMENT NO.A1000712015
AMITY INSTITUTE OF INFORMATION
TECHNOLOGY
AMITY UNIVERSITY
UTTAR PRADESH
JULY 2013
i
-
7/30/2019 social networking project report
2/37
A Project Report on
Social Networking
Submitted by
Vinay Sharma
A1000712026
In the partial fulfilment of the requirement for the III
Semester M.C.A
SUMMER EVALUATION
In
Information Technology
(AMITY UNIVERSITY)
Under the guidance of
Mrs Tanya Singh
AMITY INSTITUTE OF INFORMATION
TECHNOLOGY
AMITY UNIVERSITY UTTAR PRADESH
JULY 2013
ii
-
7/30/2019 social networking project report
3/37
Acknowledgement
An idea is the first step for generation & development of anything.
The initial idea may have been of any one person, but the
development & improvement on it have always been a result of
hard work, help, inspiration and blessings of several different
people.
It is a pleasure acknowledging with deep sense of gratitude
the invaluable help and guidance the invaluable help and guidance
rendered by Our DIRECTOR SIR and Faculty of our Institute for
the successful completion of this project report.
I would also like to thank my project Guide Mrs Tanya
Singh
who never hesitated in extending their sincere co operation from
time to time to prepare an interesting and challenging project.
Vinay Sharma
MCA 3RD SEM
iii
-
7/30/2019 social networking project report
4/37
AMITY UNIVERSITY
UTTAR PRADESH
CERTIFICATE
This is to certify that the project work entitled Social Networking isan authentic record of the Project work carried out by Vinay sharma,
A1000712026 in partial fulfillment of the requirements for III semester
M.C.A Summer Evaluation in Information Technology of Amity University
during the year 2013.
Name of Project Guide
Signature
Mrs Tanya Singh
..
iv
-
7/30/2019 social networking project report
5/37
INDEX
1. INTRODUCTION & OBJECTIVES
1.1 KEY FEATURES
2. FEASIBILTY STUDY
2.1 ECONOMIC FEASIBILITY2.2 OPERATIONAL FEASIBILITY
2.3 MANAGERIAL FEASIBILITY
3. ANALYSIS
3.1 HARDWARE & SOFTWARE SPECIFICATIONS
4 . Architecture
4.1 DFD
4.2 E-R Diagram
4.3 DATA BASE DESIGN
5. OUTPUT SCREEN
6 TESTING
v
-
7/30/2019 social networking project report
6/37
6.1 UNIT TESTING
6.2 INTEGRATION TESTING
6.3 SYSTEM TESTING
7 CONCLUSION
8 BIBLOGRAPHY
OBJECTIVE
The main objective of the project is to establish a network among the people
residing in all over the world. All the information can be easily accessed and shared
among the people
INTRODUCTION
The main goal of the service is to make your social life and that of your friends,
more active and stimulating. Social network can help you both maintain existing
relationships and establish new one s by reaching out of people you have never met
before. Before getting to know a forever member, you can even see how they are
connecting you through the friends network.
This software is provided as an online only resource so that it may be continually
extended and updated.
In the early days of the web, in 1994 and 1995, several people were working on
enabling email to be accessed on a web browser. In Europe, Soren Vejrum and Luca
Manunza released their "WWW Mail" and "WebMail" applications, whereas in the
United States, Matt Mankins wrote "Webex".
The term Webmail (or Web-based e-mail) is used to describe two things.
1. To describe a Webmail client: an email client implemented as a web
application accessed via a web browser.
vi
-
7/30/2019 social networking project report
7/37
2. To describe a email service offered through a web site (a webmail provider)
such as Hotmail, Yahoo! Mail, Gmail, and AOL Mail;. Practically every
webmail provider offers email access using a webmail client, and many of
them also offer email access by a desktop email client using standard emailprotocols, while many internet service providers provide a webmail client as
part of the email service included in their internet service package.
2. FEASIBILITY STUDY
Once the system objectives have been ascertained by initial investigation, we need to
spell the various possible solutions to meet the various objectives. The feasibility
study is conducted to check whether the candidate system is feasible. The system
which is selected to be the best against the criteria is thereafter designed and
developed. The feasibilitystudy takes into consideration. The risks involved in the
project development beforehand.Feasibility study includes seven distinct but inters
related type of feasibility.
All these feasibility study used by me.
There are:TECHNICAL FEASIBILITY-
Focus is on establishing whether the technology needed for the proposed system is
available and how this technology can be integrated within the organization.
Technologies include are:
Hardware
Software
Application developed environment
2.1 ECONOMIC FEASIBILITY-
It is concerned with the returns or benefits of the organization are likely to derive
from investment in the system. Estimated costs of new system development and
operation must be balanced against projected tangible as well as intangible benefits.
2.2 OPERATIONAL FEASIBILITY-
vii
-
7/30/2019 social networking project report
8/37
It is an evaluation to determine whether a system is operationally acceptable. Two
impotent dimensions to be accessed are ability and motivation to use the system.
2.3 MANAGERIAL FEASIBILITY-
It determines whether a proposed system will be acceptable to the people or not. Italso determines from the management.
SYSTEM ANALYSIS
System Analysis and Design, is the process of gathering and interpreting
facts, diagnosing problem and using the information to recommend
improvement to the system. Before development of any project can be
pursued, a system study is conducted to learn the details of the current
business solution. Information gathered through the study forms the basis
for creating alternative design strategies .Virtually all organizations are
systems that interact with their environment through receiving input and
producing output.
It is a management technique used in designing a new system, improving
an existing system or solving problem .System analysis does not
guarantee that the user will derive an ideal solution to a problem .This
depends solely on the way one design a system to exploit the potential in
the method To put it in another way, creativity is as much as must pre-
design the study and problem solving process and evaluates every
successive step in the system analysis.
viii
-
7/30/2019 social networking project report
9/37
Taking all these factors into account and with the knowledge of the Inter
-relationship between the various fields and section and their potential
interactions, they are consider for developing the whole system in and
integrated manner .
The management technique is also helps us in develop and design of the
new system or to improve the existing system..
The following Objectives are kept in mind:
1 Identify the customers need.
Evaluate the system concept for feasibility.
Perform economic and technical analysis.
Allocate functions to hardware, software, people, database and
other system elements .
Establish cost and schedule constraints
Create a system definition that forms the foundation for all
subsequent engineering work.
Recording requirements: Requirements might be documented in various
forms, such as natural-language documents, use cases,user stories, or process
specifications.
4 . Architecture
After gathering the requirements and determining that the proposed system is
technically feasible,we will move further towards the designing issues.
ix
http://en.wikipedia.org/wiki/Use_casehttp://en.wikipedia.org/wiki/Use_casehttp://en.wikipedia.org/wiki/User_storyhttp://en.wikipedia.org/wiki/User_storyhttp://en.wikipedia.org/wiki/User_storyhttp://en.wikipedia.org/wiki/Use_case -
7/30/2019 social networking project report
10/37
Here the main goal is to transform the requirements specification into a structure that
is suitable for implementation in some programming language.
Here we determine the individuals constraints to be used further as per requirements.These constraints are than mapped into DATA FLOW DIAGRAMS(DFD)
& ENTITY RELATIONSHIP DIAGRAM(ER-DIAGRAM).
In this chapter we will present the DFDs and ER-DIAGRAMs of the entities like
general detail of user, professional details, login details, personal details of user and
many more.
4.1 DATA FLOW DIAGRAMS(DFDs)
Data flow oriented techniques advocate that the major data items handled by a
system must be first identified and then the processing required on these data items to
produce the desired outputs should be determined. The DFD (also called as bubble
chart) is a simple graphical formalism that can be used to represent a system in terms
of input data to the system, various processing carried out on these data, and the
output generated by the system. It was introduced by De Macro (1978), Gane and
Sarson (1979).The primitive symbols used for constructing DFDs are:
Symbols used in DFD
A circle represents a process.
A rectangle represents external entity
A square defines a source or destination of the system
data.
An arrow identifies dataflow.
x
-
7/30/2019 social networking project report
11/37
4.1.1 0 Level DFD:A level 0 DFD, also called a fundamental system model or
context diagram represents the entire software element as a single bubble with
input and output data indicated by incoming and outgoing arrows, respectively.
FIG 4.1.1 0 Level DFD
UUuUUUUUU
Response received
Login
Views Personal detail Response received
xi
FRIENDS
USER
-
7/30/2019 social networking project report
12/37
Send Invitation
Views Mail Message
Detail Entered new data or
existing
4.1.2 1 Level DFD: This level of DFD provide more detailed structure.it
provides a detailed view of requirements and flow of data from 1 bubble to another.
xii
-
7/30/2019 social networking project report
13/37
FIG 4.1.2 LEVEL 1 DFD
4.2 ENTITY RELATIONSHIP DIAGRAM
The entity relationship model is a high level data model. It is based on a
perception of a real world that consists of a collection of basic objects, called entities,
and of relationship among these objects. It was developed to facilitate database
xiii
-
7/30/2019 social networking project report
14/37
design by allowing specification of an enterprise schema, which represent the overall
logical structure of a database.
Entity: An entity is an object that has its existence in the real world. It includes
all those things about which data is collected. An entity may be a tangible object
such as a student, a place or a part. It may also be non-tangible such as an event, a
job title or a customer account. For example, if we say that a customer buys goods, it
means customer and goods are entities.
Diagrammatically, entities are represented in rectangles.
An Entity Set: It is a set of entities of the same type that share the same properties,
or attributes. The set of all persons who are customers at a given bank, example, can
be defined as the entity set customer.
Attributes: Attributes are units that describe the characteristics or properties of
entities. In a database, entities are represented by tables and attributes by columns.
For example, a customer entity might have numerous attributes such as code, name
and addresses. Similarly, the goods entity may have attributes like code and price.They are drawn in elliptical shapes along with the entity rectangles.
The entity relationship diagram of mailing system is drawn on the next page:
xiv
-
7/30/2019 social networking project report
15/37
4.3 Database design
xv
-
7/30/2019 social networking project report
16/37
Coding
xvi
-
7/30/2019 social networking project report
17/37
Registration page coding
protectedvoid ImageButton1_Click(object sender, ImageClickEventArgs e)
{ if(male.Checked == true)
value = "Male";
else
value = "Female";
male.Checked = false;
female.Checked = false;
product obj = new product();
obj.checkemail("select * from logintable where email='" + Tno9.Text + "'");
if(obj.dt.Rows.Count != 0)
{
Label1.Text = "choose another email id";
}
else
{
MultiView1.ActiveViewIndex = 1;
}
}
protectedvoid ImageButton2_Click(object sender, ImageClickEventArgs e)
{
string question = "1234";
product obj = new product();
if(count == 0)
question = questionDropDownList4.Text;
else
question = questionTextBox2.Text;
xvii
-
7/30/2019 social networking project report
18/37
string s = "insert into logintable values('"+Tno1.Text+"','" + Tno2.Text +
"','"+Tno3.Text+"','"+Tno4.Text+"','"+Tno5.Text+"','"+Tno6.Text+"','"+Tno7.Text+"'
,'"+value+"','"+Tno8.Text+"','"+Tno9.Text+"','"+TextBox1.Text+"','"+Tno10.Text+"',
'"+country1+"','"+state1+"','"+city1+"','"+question+"','"+answerbox.Text+"','"+Dro
pDownList1.Text+"','"+DropDownList2.Text+"','"+DropDownList3.Text+"','"+finalurl
+"')";
obj.insertdata(s);
Session["emailid"] = Tno9.Text;
}
protectedvoid questionDropDownList4_SelectedIndexChanged(object sender,
EventArgs e)
{
if(questionDropDownList4.SelectedIndex == 5)
{
count = 1;
questionDropDownList4.Visible = false;
questionTextBox2.Visible = true;
}
else
{ count = 0;
questionTextBox2.Visible = false;
}
}
}
Testing
INTRODUCTION
xviii
-
7/30/2019 social networking project report
19/37
Testing is the process of running a system
with the intention of finding errors. Testing enhances the
integrity of a system by detecting deviations in design
and errors in the system. Testing aims at detectingerror-prone areas. This helps in the prevention of errors
in a system. Testing also adds value to the product by
conforming to the user requirements.
The main purpose of testing is to detect errors
and error-prone areas in a system. Testing must be
thorough and well-planned. A partially tested system is
as bad as an untested system. And the price of an
untested and under-tested system is high.
The implementation is the final and important
phase. It involves user-training, system testing in order
to ensure successful running of the proposed system.
The user tests the system and changes are made
according to their needs. The testing involves the
testing of the developed system using various kinds of
data. While testing, errors are noted and correctness is
the mode.
OBJECTIVES OF TESTING:
The objectives of testing are:
Testing is a process of executing a program with the
intent of finding errors.
A Successful test case is one that uncovers an as- yet-
undiscoverederror.
xix
-
7/30/2019 social networking project report
20/37
The various types of testing on the
system are:
1. Unit Testing.
2. Integration Testing
3. System testing
4. User Acceptance Testing
6.1. Unit Testing:
Unit testing focuses efforts on the smallest unit of
software design. This is known as module testing. The
modules are tested separately. The test is carried out
during programming stage itself. In this step, eachmodule is found to be working satisfactory as regards to
the expected output from the module.
6.2. Integration Testing:
Data can be lost across an interface. One module
can have an adverse effect on another, sub functions,
when combined, may not be linked in desired manner inmajor functions. Integration testing is a systematic
approach for constructing the program structure, while
at the same time conducting test to uncover errors
associated within the interface. The objective is to take
unit tested modules and builds program structure. All
the modules are combined and tested as a whole.
xx
-
7/30/2019 social networking project report
21/37
6.3. System Testing:
System testing is the stage of implementation. This is to
check whether the system works accurately and
efficiently before live operation commences. Testing is
vital to the success of the system. The candidate system
is subject to a variety of tests: on line response, volume,
stress, recovery, security and usability tests. A series of
tests are performed for the proposed system is ready for
user acceptance testing.
6.4. User Acceptance Testing:
User acceptance of a system is the key factor for
the success of any system. The system under
consideration is tested for the user acceptance by
constantly keeping in touch with the prospective system
users at the time of developing and making changes
whenever required.
Validation:
At the culmination of the integration testing,
Software is completely assembled as a package.
Interfacing errors have been uncovered and corrected
and a final series of software test begin in validationtesting. Validation testing can be defined in many ways,
but a simple definition is that the validation succeeds
when the software functions in a manner that is
expected by the customer. After validation test has
been conducted, one of the three possible conditions
exists.
xxi
-
7/30/2019 social networking project report
22/37
a) The function or performance characteristics confirm to
specification and are accepted.
b) A deviation from specification is uncovered and a
deficiency lists is created.
c) Proposed system under consideration has been tested
by using validation test and found to be working
satisfactory.
Output Testing:
After performing the validation testing, the next
step is output testing of the proposed system, since no
system could be useful if it does not produce the
required output in a specific format. The output format
on the screen is found to be correct; the format was
designed in the system design time according to the
user needs. For the hard copy also; the output comes as
per the specified requirements by the user. Hence
output testing did not result in any correction for the
system.
Login:
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1 Email Empty Please Enter valid EMAIL
ID OR PASSWORD
Success
ful
2 Password Empty Please Enter valid EMAIL
ID OR PASSWORD
Success
ful
5 Password If
wrong
Please Enter valid EMAIL
ID OR PASSWORD
Success
ful
xxii
-
7/30/2019 social networking project report
23/37
Passwor
d
Registration :
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1. First Name Empty It must not be empty Success
ful
2 Last Name Empty Last Name must not be
empty
Success
ful
3 Email Empty Enter valid Email ID. Successful
4 Password Empty Enter valid Password. Success
ful
5 Password Length Minimum 8 characters
required
Success
ful
6 Confirm
Password
Empty Password and
confirmation password
must be same
Success
ful
7 Date Of
Birth
Select Enter valid Username
and Password.
Success
ful
Edit Profile :
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1. First Name Null First Name must not be Success
xxiii
-
7/30/2019 social networking project report
24/37
empty ful
2 Last Name Empty Last Name must not be
empty
Success
ful
3 City Empty City must not be empty Successful
4 State Empty state must not be empty Success
ful
5 Pin code Empty PIN code must not be
empty
Success
ful
6 Country SELECT Please select country Success
ful
7 HighSchool
Empty High School must not beempty
Successful
8 College SELECT Please select college Success
ful
9 Course Empty Course must not be
empty
Success
ful
Scrap :
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1. STATUS Null STATUS SHOULD NOT
UPLOADED
Success
ful
2 Message Null Please enter message intext
Successful
Question and Answers :
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1. Question null Please add Question. Success
xxiv
-
7/30/2019 social networking project report
25/37
ful
2 Options null Please Enter Options. Success
ful
3 Answer Select Please Select valid
answer
Success
ful
Photos:
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1. Image
Title
Null Image title must not be
empty
Success
ful
2 Add Image BROWSE Please browse image Success
ful
PUBLIC DOCUMENTS :
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1. PROJECT
TITTLE
NULL Please enter FILE name Success
ful
2 FILE
UPLOAD
Empty Please CHOOSE FILE
Name r section
Success
ful
Send emails :
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
xxv
-
7/30/2019 social networking project report
26/37
1. File upload Empty Please upload file Success
ful
2 File name Empty Please enter file name Success
ful
Upload music :
Sl
No
Input
Values
Test
case
Conditional being
checked
Result
1. File upload Empty Please upload file Success
ful
2 File name Empty Please enter song name Success
ful
Amity Institute of Information Technology
This is to certify that I have scanned the project report/
dissertation/summer training report / seminar report/ research paper
titled _Social networking Website of Vinay Sharma (Enrollment No).
A1000712026 on _____________ (date).
I found that 90 (%) of the report is original according to the Turnitin
Software.
xxvi
-
7/30/2019 social networking project report
27/37
Based on it I recommend it to be accepted in its current form / with
minor revisions/ with major revisions /to be rejected.
Signature: _______________________
Name of the user: __________________
Date: ____________________________
xxvii
-
7/30/2019 social networking project report
28/37
SCREEN SHOTS
xxviii
-
7/30/2019 social networking project report
29/37
xxix
-
7/30/2019 social networking project report
30/37
xxx
-
7/30/2019 social networking project report
31/37
xxxi
-
7/30/2019 social networking project report
32/37
xxxii
-
7/30/2019 social networking project report
33/37
CONCLUSION
Social Networking website is a revolutionary idea with a very bright future with
further scope for advancements. The opportunities provided from this mediumare immense and many organisations are making use of this medium to better
their practices. Organisations are no longer at the mercy of the media toadvertise or convey their message. With the help of social networking they can
advertise or communicate in a more efficient way. For example, Starbucks havestarted a very successful program in which a person from any part of the worldcan login to a website to write comments and discuss issues. Similarly peopledont have to rely on newspapers or TV to get their daily dose of news it can allbe obtained from a social networking site. People can follow or get informationfrom any part of the world. For example Twitter allows a user to follow anythingfrom airline timing to the next breaking news from China. It is even used bypoliticians to get their message across.
Online communities and Blogs are becoming very popular and moreover since
the advancement of embedded systems people can use them on the go withthe help of handheld devices like cell phones or palmtops. They can getinformation which is more interactive in nature with the help of embedd photoand video. Iphone is an example of a handheld device through which people canshare information. People can also take part in the social network by using manytools available to them. Users can tag particular pages of interest in aninteractive manner or can just bookmark them for further interaction. The kind of
interaction a user wants from these social networks depends on the type ofinformation the user is interested in. Wikis can be used for academic purpose, it
can greatly enhance the way people learn. People can watch videos tounderstand a topic better or look at photos which might help them to visualize a
concept, after all a picture speaks a thousand words.
The world is getting closer everyday and everyone wants to be connected. Staticblogs and websites are losing popularity. World is moving more towards"information streams". The information comes to users rather than users have tomake effort to get the information. The social networks can be extended to othermedia, for example Television now integrates Twitter feeds. In terms of personal
relationships too the social networking is connecting people. Dating sites havebecome very popular to find partners and to be connected with each other.
Social networking can also be very crucial in medical help. Illnesssupport communities can be created from which people can get informationabout common diseases and also first aid tips.
After all the advantages, the problem that arises is of information overload andsecurity. Social networks, unlike the common media, do not have a pattern as tohow much information has to be conveyed and where to draw the line. Too muchof information may confuse users. Security might be another area of concernwhere people can get illegal access to a users information. The future of social
networking looks very promising but still it has to deal with the problemsassociated with it.
xxxiii
http://bcu-msc-cs.wikidot.com/starthttp://bcu-msc-cs.wikidot.com/photos-and-videoshttp://bcu-msc-cs.wikidot.com/photos-and-videoshttp://bcu-msc-cs.wikidot.com/bookmarks-and-folksonomieshttp://bcu-msc-cs.wikidot.com/online-communityhttp://bcu-msc-cs.wikidot.com/starthttp://bcu-msc-cs.wikidot.com/photos-and-videoshttp://bcu-msc-cs.wikidot.com/photos-and-videoshttp://bcu-msc-cs.wikidot.com/bookmarks-and-folksonomieshttp://bcu-msc-cs.wikidot.com/online-community -
7/30/2019 social networking project report
34/37
xxxiv
-
7/30/2019 social networking project report
35/37
Amity Institute of Information Technology
This is to certify that I have scanned the project report/
dissertation/summer training report / seminar report/ research paper
titled _Social networking Website
of Vinay Sharma (Enrollment No). A1000712026 on _____________
(date).
I found that 90 (%) of the report is original according to the Turnitin
Software.
Based on it I recommend it to be accepted in its current form / with
minor revisions/ with major revisions /to be rejected.
Signature: _______________________
Name of the user: __________________
Date: ____________________________
xxxv
-
7/30/2019 social networking project report
36/37
xxxvi
-
7/30/2019 social networking project report
37/37