social networking site

44
SOCIAL NETWORKING SITE Project Report On Social Network Site (SNS) Submitted as per the course of Master of Computer Applications Of Visvesvaraya Technological University, Belgaum Submitted by Mr.ABHISHEK RANJAN(1RE**MCA**) Under the Guidance of Prof. ********* Assoc. Prof Dept of MCA Reva ITM, Bangalore ______________________________________________________________ ____________ DEPT OF MCA RITM Page 1

description

 

Transcript of social networking site

Page 1: social networking site

SOCIAL NETWORKING SITE

Project Report

On

Social Network Site (SNS)

Submitted as per the course of

Master of Computer Applications

Of

Visvesvaraya Technological University, Belgaum

Submitted by

Mr.ABHISHEK RANJAN(1RE**MCA**)

Under the Guidance of

Prof. *********

Assoc. Prof Dept of MCA

Reva ITM, Bangalore

__________________________________________________________________________

DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT

Kattigenahalli, Yelahanka, Bangalore – 560 064

DEPT OF MCA RITM Page 1

Page 2: social networking site

SOCIAL NETWORKING SITE

2013

DEPT OF MCA RITM Page 2

Page 3: social networking site

SOCIAL NETWORKING SITE

REVA INSTITUTE OF TECHNOLOGY AND

MANAGEMENT

DEPARTMENT OF MASTER OF COMPUTER

APPLICATIONS

Kattigenahalli, Yelahanka, Bangalore – 560 064

Certificate

This is to certify that the project work entitled “SOCIAL NETWORKING

SITE” has been successfully completed by ________having USN

1RE**MCA**, in * semester MCA as prescribed by the Visvesvaraya

Technological University, Belgaum during the academic year 201* - 201*.

Signature of the Guide Signature of

the HOD

External Examination

Name of the Examiners Signature

with Date

1.

DEPT OF MCA RITM Page 3

Page 4: social networking site

SOCIAL NETWORKING SITE

2.

ABSTRACT

A truly Indian social-networking website that is to promote social responsibility (traffic rules,

public hygiene, aversion to bribery etc).Should provide a common platform where people of

India can Voice out violations, injustice, inhumanity, corruption happening in their vicinity.

In Existing System people does not have the ability to tag social discipline violators .Fellow

citizens can’t take the measures to rate, control and monitor the social responsibility of a

given individual. Indirectly the crime is increasing very much, everybody is violating the

rules .No one is taking care. The responsible persons are ignoring because of corruption. The

higher authorities not taking any action towards indiscipline. No one is feeling responsibility

to argue .With this in our country the law and order is going out of control. In this current

system if a person wants to give complaint, he has to go to the concerned office and raise a

complaint. In India many rural people don’t know the rules and regulations of Govt. Hence

they are blackmailed by the corrupt world. As the crimes are increased, it is becoming very

difficult for a common man to survive. Here as the people don’t know the actual duties of the

officers and they don’t even have the sources to reach their voice to the higher authorities,

they are becoming helpless

By this no one will be cheated. Hence all the violations of rules can be reduced to a great

extent. In our current system people coming forward, participating in the debates and fighting

against the crimes in their vicinity. Everybody feels their responsibility to minimize the

corruption. Here each and every person has the authority to discuss on any topic .With these

debates many criminals can come into the picture of real world. With these things the

innocent people can get aware. Then basing on these discussions the right decision can be

taken by the concerned authority.

DEPT OF MCA RITM Page 4

Page 5: social networking site

SOCIAL NETWORKING SITE

TABLE OF CONTENTS

CHAPTERS

1. INTRODUCTION

1.1 INTRODUCTION TO PROJECT

- STATEMENT OF THE PROBLEM

- BRIEF DESCRIPTION OF THE PROJECT

2. LITERATURE SURVEY

3. SYSTEM DEVELOPMENT STRATEGY

3.1 SYSTEM ENGINEERING

3.2 SYSTEM DEVELOPMENT ENVIRONMENT

4. SYSTEM ANALYSIS

4.1 EXISTING SYSTEM

4.2 LIMITATIONS OF EXISTING SYSTEM

4.3 PROPOSED SYSTEM

4.4 ADVANTAGES OF PROPOSED SYSTEM

4.5 FEASIBILITY STUDY

- TECHNICAL FEASIBILITY

- ECONOMICAL FEASIBILITY

- OPERATIONAL FEASIBILITY

5. SYSTEM DESIGN

5.4 DATAFLOW DIAGRAM

5.5 ENTITY-RELATIONSHIP DIAGRAM

5.6 TABLE DESIGN

6. CODING

PSEUDO CODE

7. TESTING

TEST CASES FOR

- UNIT TESTING

DEPT OF MCA RITM Page 5

Page 6: social networking site

SOCIAL NETWORKING SITE

- INTEGRATION TESTING

- SYSTEM TESTING

SNAPSHOTS

CONCLUSION

BIBILOGRAPHY

CHAPTER 1

INTRODUCTION

1.1 Objective of the Project

A truly Indian social-networking website that is to promote social

responsibility (traffic rules, public hygiene, aversion to bribery etc) .

1.2 Problem Definition

Through the existing system process which is purely manual process and time

taking process. There are chances of having incorrect representation to the traffic

information and aversion to bribery details. In the existing system, people of India

can’t voice out violations, injustice, inhumanity, corruption happening in their

vicinity.

Functional Requirements:

Should provide a common platform where people of India can

o Voice out violations, injustice, inhumanity, corruption happening in their

vicinity

o Endorse someone else’s concern and augment with more proofs, details etc.

o Call for an online debate or discussion on certain topics of broad applicability

Should be highly dynamic, with minimal static content as framework and maximum

content created by site participants

Should have the ability to tag social discipline violators using their UID

Authenticity for adding users is utmost important for such a website. Definitely one

should not be allowed to have more than one profile.

DEPT OF MCA RITM Page 6

Page 7: social networking site

SOCIAL NETWORKING SITE

There should be a placeholder for dealing with disputing situations for the site as it is

quite possible for recipients of negative reward to resist. The dispute resolution

mechanism should not be like traditional court, it should again be based on social

forum like multiple opinions, group actions etc.

Non Functional Requirements:

Secure access of confidential data (user’s details). SSL can be used.

24 X 7 availability

Better component design to get better performance at peak time

Flexible service based architecture will be highly desirable for future extension

Modules:

1. Administrator

2. Friends

3. Users

4. Blogs

5. Comments Rating

6. Registration

Users:

1. Administrator

2. Friends

3. Authenticate Users

4. Public User

DEPT OF MCA RITM Page 7

Page 8: social networking site

SOCIAL NETWORKING SITE

.

CHAPTER 2

LITERATURE SURVEY

Literature survey is a documentation of a comprehensive review of the published and

unpublished work from secondary sources data in the areas of specific interest to the

researcher. Literature survey helps in carrying out the task more easily as it gives information

regarding the work you carry out.

With the development of social network sites, security protection of private information

online has been a serious and important research topic. Research status quo on privacy of

social network sites has been investigated and reviewed in this paper. Two main ways of

obtaining private information on social network sites were summarized as based on privacy

disclosure and attack technique. In each category, actions to threaten privacy were brought

forth. A framework of dangers, which users facing on social network sites, was proposed, and

according to privacy risks, protection methods were also discussed. Finally, new topics about

privacy research directions on social network sites, privacy-preserving collaborative social

network and business model of privacy protection, which need further research, were

presented and discussed. The use of social site by students for academic practice is surpassed

by its use for social engagement, direct communications, and relationship building A larger

percentage of female students use social media technologies despite past studies that have

reported that male students generally demonstrate more competence and a favorable attitude

toward the use of technology. A large percentage of social media use and expertise lies with

college students between the ages of 18-24, also known as Generation Z.

DEPT OF MCA RITM Page 8

Page 9: social networking site

SOCIAL NETWORKING SITE

CHAPTER 3

SYSTEM DEVELOPMENT STRATEGY

3.1 SYSTEM ENGINEERING

The software development life cycle (SDLC) is the entire process of formal,

logical steps taken to develop a software product. Within the broader context of

Application Lifecycle Management (ALM), the SDLC is basically the part of process in

which coding/programming is applied to the problem being solved by the existing or

planned application.

The phases of SDLC can vary somewhat but generally include the following:

Conceptualization

Requirements and cost/benefits analysis

Detailed specification of the software requirements

Software design

Programming

Testing

User and technical training

Maintenance

There are many methodologies or models that can be used to guide the software

development lifecycle either as a core model to the SDLC or as a complementary method.

Prototyping Model

The goal of prototyping based development is to counter the first two limitations of the

waterfall model discussed earlier. The basic idea here is that instead of freezing the

requirements before a design or coding can proceed, a throwaway prototype is built to

understand the requirements. This prototype is developed based on the currently known

DEPT OF MCA RITM Page 9

Page 10: social networking site

SOCIAL NETWORKING SITE

requirements. Development of the prototype obviously undergoes design, coding and

testing. But each of these phases is not done very formally or thoroughly. By using this

prototype, the client can get an "actual feel" of the system, since the interactions with

prototype can enable the client to better understand the requirements of the desired

system.

Prototyping is an attractive idea for complicated and large systems for which there is no

manual process or existing system to help determining the requirements. In such

situations letting the client "plan" with the prototype provides invaluable and intangible i

inputs which helps in determining the requirements for the system. It is also an effective

method to demonstrate the feasibility of a certain approach. This might be needed for

novel systems where it is not clear that constraint can be met or that algorithms can be

developed to implement the requirements. The process model of the prototyping approach

is shown in the figure below.

Prototyping Model

The basic reason for little common use of prototyping is the cost involved in this built-it-

twice approach. However, some argue that prototyping need not be very costly and can

actually reduce the overall development cost. The prototype are usually not complete

systems and many of the details are not built in the prototype. The goal is to provide a

system with overall functionality. In addition, the cost of testing and writing detailed

documents are reduced. These factors help to reduce the cost of developing the prototype.

On the other hand, the experience of developing the prototype will very useful for

developers when developing the final system. This experience helps to reduce the cost of

development of the final system and results in a more reliable and better designed system.

Project Development Architecture

DEPT OF MCA RITM Page 10

Page 11: social networking site

SOCIAL NETWORKING SITE

As a developer, the .NET framework and Visual Studio present many choices for

choosing the right architecture, from placing the data access code directly in the UI through

datasets and data source controls.

Presentation Layer

The ASP.NET web site or windows forms

application (the UI for the project) is called the

presentation layer. The presentation layer

is the most important layer simply because

it’s the one that everyone sees and uses. Even with a well structured business and data

layer, if the presentation layer is designed poorly, this gives the users a poor view of the

system.

It’s best to remove as much business logic out of the UI and into the business layer. This

usually involves more code, but in my mind, the excess time (which ranges from minimal

to moderate, depending on the size of the application) pays off in the end.

Business Access Layer

Though a web site could talk to the data access layer directly, it usually goes through

another layer called the business layer. The business layer is vital in that it validates the

input conditions before calling a method from the data layer. This ensures the data input

is correct before proceeding, and can often ensure that the outputs are correct as well.

This validation of input is called business rules, meaning the rules that the business layer

uses to make “judgments” about the data.

DEPT OF MCA RITM Page 11

Page 12: social networking site

SOCIAL NETWORKING SITE

Data Access Layer

The key component to most applications is the data. The data has to be served to the

presentation layer somehow. The data layer is a separate component, whose sole purpose

is to serve up the data from the database and return it to the caller. Through this approach,

data can be logically reused, meaning that a portion of an application reusing the same

query can make a call to one data layer method, instead of embedding the query multiple

times. This is generally more maintainable.

3.2 SYSTEM DEVELOPMENT ENVIRONMENT

Software Environment

Operating System Server: Windows XP

Database Server: Microsoft SQL Server-2005

Client: Microsoft Internet Explorer

Tools: Microsoft Visual Studio.Net-2008 (Framework 3.5)

User Interface: Asp.Net with Ajax

Hardware Environment

Processor : Intel Pentium or More

RAM : 512 MB Ram

Hard Disk : PC with 20GB

DEPT OF MCA RITM Page 12

Page 13: social networking site

SOCIAL NETWORKING SITE

CHAPTER 4 SYSTEM ANALYSIS

4.1 EXISTING SYSTEM

In Existing System people does not have the ability to tag social discipline

violators .Fellow citizens can’t take the measures to rate, control and monitor the social

responsibility of a given individual. Indirectly the crime is increasing very much, everybody

is violating the rules .No one is taking care. The responsible persons are ignoring because of

corruption. The higher authorities not taking any action towards indiscipline. No one is

feeling responsibility to argue .With this in our country the law and order is going out of

control.

4.2 LIMITATIONS OF EXISTING SYSTEM

In this current system if a person wants to give complaint, he has to go to the concerned

office and raise a complaint. In India many rural people don’t know the rules and regulations

of Govt. Hence they are blackmailed by the corrupt world. As the crimes are increased , it is

becoming very difficult for a common man to survive. Here as the people don’t know the

actual duties of the officers and they don’t even have the sources to reach their voice to the

higher authorities, they are becoming helpless.

4.3 PROPOSED SYSTEM

By this no one will be cheated. Hence all the violations of rules can be reduced to a great

extent. In our current system people coming forward , participating in the debates and

fighting against the crimes in their vicinity. Everybody feels their responsibility to minimize

the corruption. Here each and every person has the authority to discuss on any topic .With

these debates many criminals can come into the picture of real world. With these things the

innocent people can get aware. Then basing on these discussions the right decision can be

taken by the concerned authority.

DEPT OF MCA RITM Page 13

Page 14: social networking site

SOCIAL NETWORKING SITE

4.4 ADVANTAGES OF PROPOSED SYSTEM

1 - Some social networks are good opportunities to find a job –

Nowadays the big companies have specialists on human resources that search for

profiles in these kind of sites to recruit new collaborators. If you´re looking for job you can

create a profile (a serious, professional and complete profile) and you might be discovered

and recruited by a company. You can describe your capabilities and publish some of your

works - and with a little luck you can find a job.

2 - You can meet new people –

social networking sites are the perfect spot to meet new people online. With the help of

advanced search tools you can find users who have the same interests you do and that can be

the starting point of a great friendship and/or relationship. Many people meet online and then

establish a relationship in real life - getting married, having children, etc.

3 - You can promote your site or business for free –

If you have a business or site you need to promote you can do it by creating a business

profile on some of these networks. You can load images, your logo, etc. into your profile and

it will be visible for your virtual friends and all the users who visit your profile. You can also

put topics on groups related to your business and establish new contacts that can lead to sales,

subscriptions or anything else.

4- Professional Networking

For professionals and academics, social networking sites allow users to create networks of

like-minded people. Academics find other scholars to share research or ideas, or simply to

talk to and "get their name out there." Professionals find mutual friends and possible clients,

employers, or business partners. Social networking expands the horizons of what sort of

contacts people can make in their professional lives.

DEPT OF MCA RITM Page 14

Page 15: social networking site

SOCIAL NETWORKING SITE

4.5 FEASIBILITY STUDY

A feasibility study looks at the viability of an idea with an emphasis on identifying potential

problems and attempts to answer one main question: Will the idea work and should you

proceed with it?

Before you begin writing your business plan you need to identify how, where, and to whom

you intend to sell a service or product. You also need to assess your competition and figure

out how much money you need to start your business and keep it running until it is

established.

Feasibility studies address things like where and how the business will operate. They provide

in-depth details about the business to determine if and how it can succeed, and serve as a

valuable tool for developing a winning business plan.

Economic feasibility

The most frequently used method for evaluating the effectiveness of a new system. More

commonly known as cost/benefit analysis, the procedure is to determine the benefits and

savings that are expected from a candidate system and compare them with costs. If benefits

outweigh costs, then the decision is made to design and implement the system. An

entrepreneur must accurately weigh the cost versus benefits before taking an action.

Cost-based study: It is important to identify cost and benefit factors, which can be

categorized as follows: 1. Development costs; and 2. Operating costs. This is an analysis of

the costs to be incurred in the system and the benefits derivable out of the system.

Time-based study: This is an analysis of the time required to achieve a return on investments.

The future value of a project is also a factor.

DEPT OF MCA RITM Page 15

Page 16: social networking site

SOCIAL NETWORKING SITE

CHAPTER 5

SYSTEM DESIGN

System design is a solution, how to approach to the creation of a new system. This important

phase is composed of several steps. It provides the understanding and procedural details

necessary for implementation of the system recommended in the feasibility study. Emphasis

is on translating the performance requirements in to design specification. Design goes

through logical and physical stages of development. Logical design reviews the present

physical system. Prepares input and output specification, makes edit security and control

specification details, and the implementation plan prepares a logical design walkthrough.

The design phase is transition from user-oriented document to a document to the

programmers or database personnel. It describes the input, compatible to database and

procedures all in a format compatible to user requirements. The logical design also specifies

input, output, files and screen layouts. Physical design produces the working system by

defining the design specification that tells the programmers exactly what the system should

do in turn.

5.4 DATAFLOW DIAGRAM

The Dataflow Diagram is a pictorial or graphical representation of the outline of the

system study. The Dataflow Diagram includes all the processes and data storage area which

takes place during any transactions in the system. The Dataflow Diagrams are functionally

divided to Context Level, Zero level, First Level, and Second Level data flow diagrams.

A data flow diagram (DFD) is a graphical representation of the "flow" of data through an

information system. DFDs can also be used for the visualization of data processing

(structured design).

On a DFD, data items flow from an external data source or an internal data store to an

internal data store or an external data sink, via an internal process.

It is common practice to draw a context-level data flow diagram first, which shows the

interaction between the system and external agents which act as data sources and data sinks.

On the context diagram (also known as the 'Level 0 DFD') the system's interactions with the

outside world are modeled purely in terms of data flows across the system boundary. The

DEPT OF MCA RITM Page 16

Page 17: social networking site

SOCIAL NETWORKING SITE

context diagram shows the entire system as a single process, and gives no clues as to its

internal organization.

DFD Symbols

This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the

detail of the system being modeled. The Level 1 DFD shows how the system is divided into

sub-systems (processes), each of which deals with one or more of the data flows to or from an

external agent, and which together provide all of the functionality of the system as a whole. It

also identifies internal data stores that must be present in order for the system to do its job,

and shows the flow of data between the various parts of the system.

DFD Diagrams:

Context Level Diagram (0 Level)

DEPT OF MCA RITM Page 17

Page 18: social networking site

SOCIAL NETWORKING SITE

Login DFD

Admin Activities DFD

DEPT OF MCA RITM Page 18

Page 19: social networking site

SOCIAL NETWORKING SITE

1st Level

ENTITY-RELATIONSHIP DIAGRAM

DEPT OF MCA RITM Page 19

Page 20: social networking site

SOCIAL NETWORKING SITE

tbl_Blogblogid

blogtitle

description

username

date

tbl_Comments1comm1id

commt1itle

comm1desc

date

username

Post_Id

tbl_PostsPost_Id

Post_title

Post_desc

date

username

blogid

tbl_RankRankid

rank

date

username

Post_Id

TblAddFriendRequestDetailsUserId

RequestFrom

RequestDate

RequestMessage

StatusOfRequest

TblAdminLoginUserName

Password

TblAppCatagoryCatagoryId

CatagoryType

TblGangMemberGangId

MforeName

MlastName

Maddress

Meducation

Mage

Mgender

TblLoginAccountDetailsAccountId

Email

Password

HintQuestion

Answer

RecoveryMail

LastLogin

TblPersonalDetailsAccountId

Height

Weight

EyeColour

HairColour

BodyBuild

IdealDate

RelationShipLike

TblPollAndSawalsSRNO

Question

QuestionFrom

QuestionPostDate

QuestionAnswerFrom

AnswerPostedOn

AnswerPolls

AdminPermission

Answer

CatagoryId

EmailId

UserId

TblUserDetailsUserId

AccountId

ForeName

SirName

HomeAddress

ContactNo

Email

DateOfBirth

Gender

RelationShipStatus

City

State

PostalCode

Country

LanguagesKnown

PhotoToProfile

Title

TblUserDraftUserId

DraftId

DraftBody

DateOfDraft

DraftTitle

TblUserFriendsUserId

FriendForeName

FriendUserId

TblUserGangsUserId

GangName

GangDescription

GangOwner

GangCoOwner

GangPhoto

GangActivity

DateCreated

GangMember

GangCatagory

GangLanguage

AdminPaermission

GangId

TblUserPhotoGalaryUserId

PhotoId

PhotoDescription

Photo

TblUserProfessionalDetailsAccountId

Degree

University

YearOfPassing

Occupation

Industry

Company

CompWebSite

JobDescription

WorkEmail

WorkContact

CareerSkill

CareerInterest

TblUserProfileSettingUserId

ShowImageToWhom

AllowToSeeWhom

TblUserScrapUserId

ScrapFrom

ScrapMessage

ScrapDate

ScrapId

TblUserSentMessagesUserId

MessageTo

MessageBody

MessageTitle

SentedOn

FriendUserId

MarksFrom

MarksTo

MessageId

MessageFrom

TblUserSocialAccountId

Childrens

Ethinisity

Religion

HomeTown

AboutMe

WebPage

Sports

Books

Music

Movies

SunShine

5.3.2 Use Case Diagram

DEPT OF MCA RITM Page 20

Page 21: social networking site

SOCIAL NETWORKING SITE

UML is a standard language for specifying, visualizing, constructing, and documenting the

artifacts of software systems.

UML was created by Object Management Group (OMG) and UML 1.0 specification draft

was proposed to the OMG in January 1997.

OMG is continuously putting effort to make a truly industry standard.

UML stands for Unified Modeling Language.

UML is different from the other common programming languages like C++, Java,

COBOL etc.

UML is a pictorial language used to make software blue prints.

Goals of UML:

A picture is worth a thousand words, this absolutely fits while discussing about UML. Object

oriented concepts were introduced much earlier than UML. So at that time there were no

standard methodologies to organize and consolidate the object oriented development. At that

point of time UML came into picture.

There are a number of goals for developing UML but the most important is to define some

general purpose modeling language which all modelers can use and also it needs to be made

simple to understand and use.

UML diagrams are not only made for developers but also for business users, common people

and anybody interested to understand the system. The system can be a software or non

software. So it must be clear that UML is not a development method rather it accompanies

with processes to make a successful system.

.

A conceptual model of UML:

DEPT OF MCA RITM Page 21

Page 22: social networking site

SOCIAL NETWORKING SITE

To understand conceptual model of UML first we need to clarify What is a conceptual

model? and Why a conceptual model is at all required?

A conceptual model can be defined as a model which is made of concepts and

their relationships.

A conceptual model is the first step before drawing a UML diagram. It helps to

understand the entities in the real world and how they interact with each other.

Structural modeling:

Structural modeling captures the static features of a system. They consist of the followings:

Classes diagrams

Objects diagrams

Deployment diagrams

Package diagrams

Composite structure diagram

Behavioral Modeling:

Behavioral model describes the interaction in the system. It represents the interaction among

the structural diagrams. Behavioral modeling shows the dynamic nature of the system. They

consist of the following:

Activity diagrams

Interaction diagrams

Use case diagrams

Activity Diagrams:

DEPT OF MCA RITM Page 22

Page 23: social networking site

SOCIAL NETWORKING SITE

Registration:

`

Use case diagrams:

DEPT OF MCA RITM Page 23

Get the Details

Validate Data

Invalid Accept

Enter User Registration Details

Submit

No

Yes

Returns Error Message

Successfully Registered

Page 24: social networking site

SOCIAL NETWORKING SITE

System

admin

Registration

Login

Add application catageries

Grant sawal request

Send mails

Add friends

Search friends

search users

create album

send msgs and scraps

Create Blogs

post comments

Log out

fiends

User

DEPT OF MCA RITM Page 24

Page 25: social networking site

SOCIAL NETWORKING SITE

Admin:

TABLE DESIGN:

DEPT OF MCA RITM Page 25

System

admin

Login

add application catageries

Add sawal relating to catageries

grant sawals

grant gangs

send mails

Log out

Page 26: social networking site

SOCIAL NETWORKING SITE

AddFriendRequest Table:

NAME TYPE SIZE

userid varchar 30

requestfrom varchar 50

requestdate datetime

requestmessage varchar max

Statusofrequest varchar 20

UserProfileSetting Table :

NAME TYPE SIZE

userid varchar 30

Showimagetowhom varchar 10

allowtoseewhom varchar 10

UserDatiels Table:

NAME TYPE SIZE

userid Varchar 30

Accounted Int

Forename varchar 30

Homeaddress varchar 50

Sirname varchar 50

Contactno varchar 30

Email varchar 10

Dateofbirth Datetime

Gender Varchar 10

Relationshipstatus Varcahar 50

City Varchar 40

State Varchar 50

DEPT OF MCA RITM Page 26

Page 27: social networking site

SOCIAL NETWORKING SITE

CHAPTER 6

CODING

Source code<%@ Page Language="C#" AutoEventWireup="true" CodeFile="frmfirststep.aspx.cs" Inherits="Authentication_frmfirststep" EnableSessionState="True" %>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head runat="server"> <title>Untitled Page</title> <style type="text/css"> .style1 { width: 100%; height: 196px; } .style2 { text-align: center; font-weight: bold; font-size: medium; color: #006600; text-transform: uppercase; text-decoration: underline; font-family: Arial; } </style></head><body> <form id="form1" runat="server" defaultbutton="btnsubmit" defaultfocus="txtfirstname"> <div align="right"> <table class="style1"> <tr style="background-image: url('SnsHead.JPG')"> <td align="left" valign="top" colspan="2"> </td> </tr> </table> </div> <p class="style2"> CREATE&nbsp; Sns.com Account</p> <table class="style1"> <tr> <td class="style14"> Get Started With SNS.com </td>

DEPT OF MCA RITM Page 27

Page 28: social networking site

SOCIAL NETWORKING SITE

<td class="style24"> <asp:Label ID="lblerror" runat="server" Text="."></asp:Label> </td> <td class="style4"> &nbsp; </td> </tr> <tr> <td class="style21"> <p class="style3">

First Name</p> </td> <td class="style24"> <asp:TextBox ID="txtfirstname" runat="server" Width="219px" BorderColor="#666666" BorderStyle="Solid" BorderWidth="1px"></asp:TextBox> &nbsp; </td> <td class="style4"> <asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server" ControlToValidate="txtfirstname" Display="Dynamic" ErrorMessage="Required" TabIndex="10" Font-Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator> </td> </tr> <tr> <td class="style20"> <p class="style3"> Last Name</p> </td> <td class="style25"> <asp:TextBox ID="txtlastname" runat="server" TabIndex="1" Width="219px" BorderColor="#666666" BorderStyle="Solid" BorderWidth="1px"></asp:TextBox> </td> <td class="style5"> <asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server" ControlToValidate="txtlastname" Display="Dynamic" ErrorMessage="Required" TabIndex="11" Font-Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator> </td> </tr> <tr>

<td class="style16"<p class="style3"> </td> <td class="style26"><asp:TextBox ID="txtemail" runat="server" TabIndex="2" Width="219px" BorderColor="#666666BorderStyle="Solid" BorderWidth="1px"></asp:TextBox>

DEPT OF MCA RITM Page 28

Page 29: social networking site

SOCIAL NETWORKING SITE

&nbsp;<span class="style22"><br /> <span class="style23">This Will Be A User Name</span>.</span> </td> <td class="style6"> <asp:RequiredFieldValidator ID="RequiredFieldValidator3" runat="server" ControlToValidate="txtemail" Display="Dynamic" ErrorMessage="Required" TabIndex="12" Font-Names="Arial" Font-Size="Small"></asp:RequiredFieldValidator> &nbsp; <asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server" ControlToValidate="txtemail" Display="Dynamic" ErrorMessage="Not Valid Email" TabIndex="13" ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-.]\w+)*" Font-Names="Arial" Font-Size="Small"></asp:RegularExpressionValidator> </td> </tr> <tr> <td class="style19"> &nbsp; </td> <td align="left" class="style27" valign="top"> <asp:Button ID="btncheckavail" runat="server"

DEPT OF MCA RITM Page 29

Page 30: social networking site

SOCIAL NETWORKING SITE

CHAPTER 7 TESTING

TEST CASES FOR

In any endeavor, testing is always important before the actual implementation. SDLC is no

different, in fact testing in SDLC is so important these days that developers have to work in

testing longer that most stages in SDLC.

Types of Testing:

Testing by developers – Developers will have to test the software themselves extensively.

Even though they are also the one who have developed the software, they still have to run it

extensively. These are the usual steps developers follow in testing their software:

1. Checking of Syntax – The software is checked as it is. Developers just run software and

look for possible errors. A very basic checking to know if there are major functions and

errors that will occur.

.2. Module Testing – After the walk through, developers will again check the software in

terms of individual modules. Each module will be tested extensively for possible errors.

3. Integration Testing – Once the module has been tested, it is time to test them as being

integrated to other modules.

4. System Testing – After the integration, the whole program will again be tested. Case

studies will again be applied with integrated software.

Testing by Users - Once the developers have finished their own testing with the help of other

professional developers, the software is ready for release to the public or to the intended

users.

The stages usually followed are:

Alpha Testing – Developers usually choose the users who will try out the program. For the

general public, it is often tested on known users or even technology bloggers who can

honestly give their opinion of the software. It is also the time where developers try to create

scenarios for their software such as:

Recovery – Developers will try recovering the software or the program in case it

crashes.

DEPT OF MCA RITM Page 30

Page 31: social networking site

SOCIAL NETWORKING SITE

SNAPSHOTS

SCREENS

Admin:

DEPT OF MCA RITM Page 31

Page 32: social networking site

SOCIAL NETWORKING SITE

DEPT OF MCA RITM Page 32

Page 33: social networking site

SOCIAL NETWORKING SITE

CONCLUSION

Voice out violations, injustice, inhumanity, corruption happening in their vicinity.

In India many rural people don’t know the rules and regulations of Govt. Hence they are

blackmailed by the corrupt world. As the crimes are increased, it is becoming very difficult

for a common man to survive. Here as the people don’t know the actual duties of the officers

and they don’t even have the sources to reach their voice to the higher authorities, they are

becoming helpless.

By this no one will be cheated. Hence all the violations of rules can be reduced to a great

extent. In our current system people coming forward, participating in the debates and fighting

against the crimes in their vicinity. Everybody feels their responsibility to minimize the

corruption. Here each and every person has the authority to discuss on any topic .With these

debates many criminals can come into the picture of real world. With these things the

innocent people can get aware. Then basing on these discussions the right decision can be

taken by the concerned authority.

DEPT OF MCA RITM Page 33

Page 34: social networking site

SOCIAL NETWORKING SITE

BIBLIOGRAPHY

FOR .NET INSTALLATION

www.support.mircosoft.com

FOR DEPLOYMENT AND PACKING ON SERVER

www.developer.com

www.15seconds.com

FOR SQL

www.msdn.microsoft.com

FOR ASP.NET

Asp.Net 3.5 Unleashed

www.msdn.microsoft.com/net/quickstart/aspplus/default.com

www.asp.net

www.fmexpense.com/quickstart/aspplus/default.com

www.asptoday.com

www.aspfree.com

www.4guysfromrolla.com/index.aspx

Software Engineering (Roger’s Pressman)

DEPT OF MCA RITM Page 34