bindi 2003

Embed Size (px)

Citation preview

  • 8/7/2019 bindi 2003

    1/52

    PROJECT REPORT ON

    Social Networking Site

    Mypalzz.

    UNDER THE GUIDANCE OF Our H.O.D.

    Mr. Shailendra Jadeja Mr. Parag Raghani

    Senior lect. , Head OfDepartment,

    At Christ College Rajkot.05 At Christ College Rajkot. 05

    SUBMITTED BY

    Manek Bindi

    Roll No:04

    T.y. Bsc (Computer Application) VI Sem.

    1 | P a g e

  • 8/7/2019 bindi 2003

    2/52

    PREFACE

    The rapid growth of social networking that has been observed over the last twoto three years is indicative of its entry into mainstream culture and itsintegration into the daily lives of many people. In parallel with this, there hasalso been considerable media coverage of the growth of social networking, its

    potential positive outcomes and concerns about the way that some people areengaging with it.

    This project is based on social networking. It is a simple web based application.User can create their own social network online using this project it means thatuser can easily create their account and make friends who already have their

    account on this site. User can also send message to any user in his/her friendlist. It also provide to making album using which user can add or removeimages & photos in their own profile.

    2 | P a g e

  • 8/7/2019 bindi 2003

    3/52

    A C K N O W L E D G E M E N T

    The satisfaction that accompanies that the successful completion of

    any task would be incomplete without the mention of people whoseceaseless cooperation made it possible, whose constant guidance andencouragement crown all efforts with success.

    We are grateful to our project guide Mr. Shailendra Jadeja for theguidance, inspiration and constructive suggestions that helpful us inthe preparation of this project.

    We also thank our colleagues who have helped in successfulcompletion of the project.

    3 | P a g e

  • 8/7/2019 bindi 2003

    4/52

  • 8/7/2019 bindi 2003

    5/52

    1. INTRODUCTION

    1.1 PROJECT SUMMARY

    Now days are Internet Era. Most of youngster now time passing their time onSocial Networking Website like orkut and facebook. They are making friendsonline and chatting with each other. My website is also social networkingwebsite. My website inspired from orkut. I tried to make my website user friendly. User can do sign up , make friends , Visit another friend account , user can also send scrap to their friends. They can check scrap inbox and outbox.They also delete the scrap from inbox and outbox. User can also check the scrapof his friends but they cant delete it. User can add his album in their account

    and add photographs in respective album. User can also see the album of another user and also pass the comment on photographs. User can search thefriend by their name, city, and state.

    1.2 OBJECTIVE

    My project is a social networking website. In this user can create an account,make friends, sending messages to their friends, and add album and uploading

    photo in respective album. User can share idea to their friends. Birth datereminder is also useful to know whose birth date is within month so user cancelebrate his friend birth date. They can make new friends in all over internetand there is no restriction of country border, religion and no poor and no reach.If user want to broadcast any message among their friend they can do easilywith help of this website.

    Idea behind this website is to bring friends near and enjoy their life happily with

    their friends.

    1.3 SCOPE

    Several websites are beginning to tap into the power of the social networkingmodel for social good. Such models provide a means for connecting otherwisefragmented industries and small organizations without the resources to reach a

    broader audience with interested users.Examples include Getinvolved.ca,SixDegrees.org, TakingITGlobal, Care2, Idealist.org, WiserEarth,

    5 | P a g e

  • 8/7/2019 bindi 2003

    6/52

    OneWorldTV, FreeRepublic, OneClimate, Causes and Network for Good. Thecharity badge is often used within the above context.

    As the increase in popularity of social networking is on a constant rise, new

    uses for the technology are constantly being observed.At the forefront of emerging trends in social networking sites is the concept of "real time" and "location based." Real time allows users to contribute content,which is then broadcasted as it is being uploaded - the concept is similar to livetelevision broadcasts. Twitter set the trend for "real time" services, where userscan broadcast to the world what they are doing, or what is on their minds withina 140 character limit. Facebook followed suit with their "Live Feed" whereusers' activities are streamed as soon as it happens. While Twitter focuses onwords, Clixtr, another real time service, focuses on group photo sharing whereusers can update their photo streams with photos while at an event. Friends andnearby users can contribute their own photos and comments to that eventstream, thus contributing to the "real time" aspect of broadcasting photos andcomments as it is being uploaded. In the location based social networking space,Foursquare gained popularity as it allowed for users to "check-in" to places thatthey are frequenting at that moment. Gowalla is another such service whichfunctions in much the same way that Foursquare does, leveraging the GPS in

    phones to create a location based user experience. Clixtr, though in the real timespace, is also a location based social networking site since events created byusers are automatically geotagged, and users can view events occurring nearbythrough the Clixtr iPhone app. Recently, Yelp announced its entrance into thelocation based social networking space through check-ins with their mobile app;whether or not this becomes detrimental to Foursquare or Gowalla is yet to beseen as it is still considered a new space in the internet technology industry.

    6 | P a g e

  • 8/7/2019 bindi 2003

    7/52

    1.4 TECHNOLOGIES

    1.4.1 Front End Tool

    PHP,Css,j-Query,HTML

    What is PHP ?

    How PHP came into being ?

    PHP started as a quick Perl hack written by Rasmus Lerdorf in late 1994. Over the next two to three years, it evolved into what we today know as PHP/FI 2.0.

    PHP/FI started to get a lot of users, but things didn't start flying until Zeev Suraski and Andi Gutmans suddenly came along with a new parser in thesummer of 1997, leading to PHP 3.0. PHP 3.0 defined the syntax and semanticsused in both versions 3 and 4.

    Why yet another language ?

    People often ask " why invent yet another language; don't we have enough of them out there"? It is simply a matter of "the right tool for the right job".

    Many Web developers found that existing tools and languages were not idealfor the specific task of embedding code in markup.

    Those developers first collaborated with Rasmus and then later with Zeev andAndi, to develop a server-side scripting language which they felt would be idealfor developing dynamic Web-based sites and applications.

    PHP was created with these particular needs in mind. Moreover, PHP code wasdeveloped for embedment within HTML. In doing so, it was hoped that benefitssuch as quicker response time, improved security, and transparency to the enduser would be achieved. Considering that almost a million and a half sites arecurrently running PHP (at the time of this article's publication), it would appear that these developers were right.

    PHP has evolved into a language, or maybe even an environment, that has a

    very specific range of tasks in mind.

    7 | P a g e

    http://www.zend.com/zend/hof/rasmus.phphttp://www.zend.com/zend/founders.phphttp://www.zend.com/zend/founders.phphttp://www.zend.com/zend/hof/rasmus.phphttp://www.zend.com/zend/founders.phphttp://www.zend.com/zend/founders.php
  • 8/7/2019 bindi 2003

    8/52

    PHP is a tool that lets you create dynamic web pages. PHP-enabled web pagesare treated just like regular HTML pages and you can create and edit them the

    same way you normally create regular HTML pages.What do you need?

    Firstly you need a server that has support for PHP activated and that all filesending in .php are handled by PHP. On most servers this is the default extensionfor PHP files, but ask your server administrator to be sure. If your server supports PHP then you don't need to do anything. Just create your .php files and

    put them in your web directory and the server will magically parse them for you. There is no need to compile anything nor do you need to install any extratools. Think of these PHP-enabled files as simple HTML files with a whole newfamily of magical tags that let you do all sorts of things.

    Language Syntax

    Most of PHP's syntax is borrowed from C, although there are elements borrowed from Perl, C++ and Java as well. This article assumes that you are

    familiar with C's syntax. However, don't panic if you're not.

    Your first PHP-enabled page

    Create a file named hello.php and in it put the following lines:

    PHP Test

    The colours you see are just a visual aid to make it easier to see the PHP tagsand the different parts of a PHP expression.

    Note also that this is not like a CGI script. The file does not need to beexecutable or special in any way.

    8 | P a g e

  • 8/7/2019 bindi 2003

    9/52

    Think of it as a normal HTML file which happens to have a set of special tagsavailable to you that do a lot of interesting things.

    This program is extremely simple and you really didn't need to use PHP to

    create a page like this. All it does is display: Hello WorldThe point of the example is to show the special PHP tag format. In this examplewe used . You may jump inand out of PHP mode in an HTML file like this all you want.

    Something Useful

    Let's do something a bit more useful now. We are going to check what sort of browser the person viewing the page is using.

    In order to do that we check the user agent string that the browser sends as partof its request.

    This information is stored in a variable. Variables always start with a dollar-signin PHP. The variable we are interested in is $HTTP_USER_AGENT. Todisplay this variable we can simply do:

    The result should be something like:

    Mozilla/4.0(compatible; MSIE 6.0; Windows NT 5.0)

    There are many other variables that are automatically set by your web server.

    You can get a complete list of them by creating a file that looks like this:

    Then load up this file in your browser and you will see a page full of information about PHP along with a list of all the variables available to you.

    You can put multiple PHP statements inside a PHP tag and create little blocksof code that do more than just a single echo. For example, if we wanted to check for Internet Explorer we could do something like this:

    9 | P a g e

  • 8/7/2019 bindi 2003

    10/52

    Here we introduce a couple of new concepts.

    We have an "if" statement. If you are familiar with the basic syntax used by theC language this should look logical to you.

    All the tricky string and memory manipulation issues you have to deal with in C

    have been eliminated in PHP, but the basic syntax remains.The second concept we introduce here is the strstr() function call. strstr() is afunction built into PHP which searches a string for another string. In this casewe are looking for "MSIE" inside $HTTP_USER_AGENT.

    If the string is found the function returns true and if it isn't, it returns false. If itreturns true the following statement is executed.

    We can take this a step further and show how you can jump in and out of PHPmode even in the middle of a PHP block:

    You are using Internet ExplorerYou are not using Internet Explorer

    Instead of using a PHP echo statement to output something, we jumped out of PHP mode and just sent straight HTML. The important and powerful point to

    10 | P a g e

  • 8/7/2019 bindi 2003

    11/52

    note here is that the logical flow of the script remain intact. Only one of theHTML blocks will end up getting sent to the viewer. Running this script rightnow results in:

    Dealing with Forms

    One of the most powerful features of PHP is the way it handles HTML forms.The basic concept that is important to understand is that any form element in aform will automatically result in a variable with the same name as the element

    being created on the target page. This probably sounds confusing, so here is asimple example. Assume you have a page with a form like this on it:

    Your name: You age:

    There is nothing special about this form. It is a straight HTML form with nospecial tags of any kind. When the user fills in this form and hits the submit

    button, the action.php page is called. In this file you would have something likethis:

    Hi .You are years old.

    It should be obvious what this does. There is nothing more to it. The $name and$age variables are automatically set for you by PHP.

    What is Javascript ?

    JavaScript is a programming language designed for Web pages.

    11 | P a g e

  • 8/7/2019 bindi 2003

    12/52

    Why Use JavaScript?JavaScript enhances Web pages with dynamic and interactive features.JavaScript runs in client software.JavaScript 1.3 works with version 4.0 browsers.

    What Can JavaScript Do?Common JavaScript tasks can replace server-side scripting.JavaScript enables shopping carts, form validation, calculations, special graphic and

    text effects, image swapping, image mapping, clocks, and more.

    JavaScript Syntax.

    Unlike HTML, JavaScript is case sensitive.Dot Syntax is used to combine terms.e.g., document.write("Hello World")

    Certain characters and terms are reserved.JavaScript is simple text (ASCII).

    JavaScript Terminology.JavaScript programming uses specialized terminology.Understanding JavaScript terms is fundamental to understanding the script.

    Objects, Properties, Methods, Events, Functions, Values, Variables, Expressions, Operators.

    What is Css(Cascading Style Sheet) ?

    It wont take you very long to discover that there are a lot of limitations toHTML. There are hundreds of things that you can do with, say, MS Word tomake you document look just right that you just cant do with HTML. So whatit a webmaster to do?

    At least part of the answer is found in something called Cascading Style Sheets,or CSS, and that is the topic of this session.

    12 | P a g e

  • 8/7/2019 bindi 2003

    13/52

    So what are cascading style sheets? Do you remember in our study of HTMLwe learned that tags can have attributes and that attributes have values? Here area couple of examples by way of review.

    Lets suppose for a minute that you wanted all your paragraphs in a multi-pagedocument to be center-aligned. If you omit the attribute and value for the

    tag, what do you think the browser will do? It will simply use its default setting,which is left-aligned. So, every time you create a new paragraph, you have toremember to type in the attribute and the value. If you forget, you documentwont look like you want it to look.

    Now that would be no big deal if you only had to deal with one or two pagesand one or two tags, but what if you are dealing with a website that has 50 pagesand hundreds of different tags. Now we are talking about hours and hours andhours of work. That is when and where CSS becomes invaluable, and it is onlyone place that this technology is a real time and headache saver.

    CSS was introduced in late 1996, as an elegant cousin to HTML that promisedseveral things, including:

    more precise control than ever before over layout, fonts, colors, backgrounds, and other typographical effects;

    a way to update the appearance and formatting of an unlimited number of pages by changing just one document;

    compatibility across browsers and platforms; and less code, smaller pages, and faster downloads.

    CSS represents the Word Wide Web Consortiums (W3Cs) effort toimprove on the tag and attribute based style of formatting. The idea is thatstyle sheets provide a way of customizing a whole page and even whole sites

    at one time and in much richer detail than the simple use of tags andattributes.

    Plus, CSS is sort of like the cornerstone of Dynamic HTML, which isanother subject that you should investigate. We arent going to get into thatsubject too much other than to show you how to add DHTML effects to your web using Front Page and possibly importing some already created DHTMLapplets into your web.

    13 | P a g e

  • 8/7/2019 bindi 2003

    14/52

    So CSS is a technology that gives you, as a webmaster, much more controlover all these things that you would ever have in HTML alone. So lets digin to the basics.

    Open Notepad and create a new document. Save it in the My Documents folder in your folder call it

    stylesheets101.htm. Put this code in your document. Take a look at the document in your browser. Anywhere inside the tag in your document enter this code.

    Save the changes and take a look at your page in your browser. As youcan see, there have been some serious changes in the way your pagelooks. Add another line to your page. (This is really cool!)

    Now add another paragraph to your page. (I need to learn more aboutthis!)

    Save your changes and view them in your browser. You will notice thatthe attributes of each tag continue to be applied each time you add that

    tag. That is important. So now, instead of adding those attributes to everysingle and

    tag in your document (and ultimately in your wholeweb), you can just do it once and have those attributes applied to theentire document. Cool? Now lets take this stuff apart and see what isgoing on here.

    Cascading Style Sheets are made up of rules. The first example here is asimple rule. The next one, as you can see, is a little more complex.

    The first rule here tells the browser that all text surrounded by the tag should be displayed in green. The second one tells the browser that

    background color of the page should be white and the color of the all textshould be black. (All text unless there is another rule that specificallysays that a certain text should be another color, such as { color:black })

    Each rule has two components. The first one is called the selector. Theselector is the HTML tag to which the style is being attached. AnyHTML tag can be used as a selector. So, you can attach stylesheet

    14 | P a g e

  • 8/7/2019 bindi 2003

    15/52

    information to any kind of element, from normal

    text to content. You can even use some cascading stylesheet properties ongraphics by applying them to . And, as we may see a little later,you can even create your own selector. So the possibilities are prettylimitless.

    The stuff between the brackets is called the declaration and it actuallydefines what the style is.

    As you can see, the declaration portion of the rule is also broken downinto two different pieces, the property and the value. Here are someexamples of a few properties and values. There are hundreds to choosefrom .

    1.4.2 Back End Tool

    MySql

    15 | P a g e

  • 8/7/2019 bindi 2003

    16/52

    2.0 PROJECT MENAGEMENT

    2.1 Project planning and scheduling

    2.1.1 Project Development Approach

    To solve actual problems in an industry setting, a software development

    strategy must be incorporated that encompasses the process, methods and toolsfor software engineering. This strategy is often referred to as software processmodel and software engineering paradigm. A software process model for software engineering is chosen based on the nature of project and application,the methods and tool to be used and the controls and deliverables that arerequired.

    For the development and implementation of windows based moduleseveral distinct approaches are in practice occurs. Among them, a very popular one is the classical system development life cycle model (SDLC) or thewaterfall model. The waterfall model has following phase of its development:

    1) System/Information Engineering and modeling2) Software Requirement Analysis3) System Analysis and Design4) Code Generation5) Testing and Maintenance

    16 | P a g e

  • 8/7/2019 bindi 2003

    17/52

    Classical WaterFall Model.

    System Information Engineering and Modeling:As software is always of a largesystem (or business), work begins by establishing requirements for all systemelements and then allocating some subset of these requirements to software.This system view is essential when software must interface with other elementssuch as adware, people and other resources. System is the basic and very critical

    requirement for the existence of software in any entity. So if the system is not in place, the system should be engineering and put in place. In some cases to

    17 | P a g e

    Maintenance

    Integration

    Implementation

    Design

    Specification

    Requirements

    UpdatedRequirement

    VerifyVerify

    Verify

    Verify

    Test

    Test

    Development

    Maintenances

    Product

    deliverable

  • 8/7/2019 bindi 2003

    18/52

    extract the maximum output, system should be re-engineered and spices up.Interactive Water fall Model

    Software Requirement Analysis

    This is also known as feasibility study. In this phase, the development team

    visits the need for possible software automation in the given system. By theend of the feasibility study, the team furnishes a document that holds thedifferent specific recommendations for the candidate system.

    System Analysis and DesignIn this phase, the softwares overall structure and its nuances are defined. Interms of the end user/server technology, the number of tiers needed for the

    package architecture, the database design, the data structure design etc are alldefined in this phase. Any glitch in the design phase could be very expensiveto solve in the later stage of the software development. The logical system of the product is developed in this phase.

    Code GenerationThe design must be translated into a machine-readable form. The codegeneration step performs this task. If design is performed in detailed manner,code generation can be accomplished with out much complication.Programming tools like Compilers, Interpreters, and Debuggers are used togenerate the code. Different high level programming languages like C, C++,Pascal, Java, ASP.NET and Php are used for coding. Here I have used c#.NET for the implementation .

    Testing and Maintenance

    Once the code is generated, the program testing begins. Different testingmethodologies are available to unravel the bugs that were committed during

    18 | P a g e

  • 8/7/2019 bindi 2003

    19/52

    the previous phases. Different testing tools and methodologies are alreadyavailable.

    Software will definitely undergo change once it is delivered to the end user.

    There are many reasons for the change. Change could happen because of some unexpected input values into the system. In addition, the changes in thesystem could directly affect the software operations. The software should bedeveloped to accommodate changes that could happen during theimplementation period.

    2.1.2 Project Plan

    A plan is drawn up at the start of the project, should be used as the driver of the project. The project planning consists of:

    Selection of suitable software development process model which I haveselected Interactive Water Fall Model.

    Risk Management Plan, which involves the risk identification and risk assessments.

    Project Scheduling, which involves the tasks and duration required for performing tasks. This is described by task representation and the Timelinechart representation.

    Cost and Effort estimation, which involves estimation of cost as well aseffort applied by the developers.

    Milestones and DeliverablesManagement needs information. As software is intangible, this

    information can only be provided as a document that describes the state of thesoftware being developed. Without this information, it is impossible to judge

    progress and cost estimates and schedules cannot be updated.

    When planning a project series of milestones are established.

    Milestones: Milestone is an end-point of the software process activity.

    19 | P a g e

  • 8/7/2019 bindi 2003

    20/52

    At each milestone there should be formal output, such as report, that can be represented to the management.

    Milestone report need not be large document; they are the short report of achievements in software project activity.

    Milestone represents the end of the distinct, logical stage in the project.

    Deliverables: Deliverable is a project report that is delivered to customer. Deliverables are delivered to the customer at the end of the same major

    project phase such as specification, design, etc. Deliverables are usually milestones. Milestones may be internal project results that are used by the project

    manager to check progress but which are not delivered to the customer.

    First I study orkut and facebook website. What they provide functionality totheir respective user? That website are totally dynamic website. After study thewebsite I am started the designing of database. In database I make five tablerespectively detail, scrap, outbox, album, photo. Detail table is for the store theuser information like username, password, name, middle name, last name andother personal information. User friend list, Recent Visitor list, request list is

    also in the detail table. In scrap table contain the messages send by User friends.In outbox table contain the messages send by user. In album table contain thelist of users album. And photo table contain photo upload by user.

    First I design the sign up page then log in page. Then I make master page thatcommon to all other web pages. Master page contain User photo search box andother pages link. Then I make home page that display user information likename, age and it display the recent 8 visitors and display friends list whose

    birthday is in within 30 days and then display the request of friends.

    20 | P a g e

  • 8/7/2019 bindi 2003

    21/52

    I make search page that search the friend by name, city, state. User canvisit to friend home page by clicking on user photo. Then I make friends pagethat display the all user friends photo with name. Then I make friend home pagethat display the friend information and his friend list. Then I make message

    page that provide facility to send message to his friend and show message ininbox and outbox. Then I make friend_scrap page that display the list of friendsmessages. Then I make album page that provide facility of add album and add

    photographs to album. Then I make friend_album page that display photographof each album of respective friend. Then I make detail page that allow to user toupdate his persona information.

    2.2 RISK MANAGEMENT

    Social networking sites are the new fashion in today's world. Every other person belongs to one social networking site or another. If you don't have aFacebook account you have a My Space or Twitter account. There are literallyhundreds of social networking sites online. People use social networking sites

    for a variety of reasons with the inclusion of socializing, debating, advertisingand networking. Social networking sites are geared towards helping peopleconnect with other people who share similar intrests. According to Wikipediasocial networking can be explained as "Social networking has created powerfulnew ways to communicate and share information. Social networking websitesare being used regularly by millions of people, and it now seems that socialnetworking will be an enduring part of everyday life. The main types of socialnetworking services are those which contain directories of some categories

    (such as former classmates), means to connect with friends (usually with self-description pages), and recommender systems linked to trust."

    The security and safety dangers of social networking are exuberant.According to several reliable reports, it has been discovered without a doubtthat unwanted and dangerous software programs are spreading through socialnetworking sites. The dangers of social networking sites are so severe andserious that some people are literally making the decision to stay off them dueto the dangers involved. Facebook can be said to have become Faceboot and theFaceBook Danger are huge.It must be emphasized that the numerous dangers

    21 | P a g e

  • 8/7/2019 bindi 2003

    22/52

    involved are both social and technical. Social networking sites are becoming thenew way of targeting people online and gaining their personal information for their own selfish intentions. It is crucial that every person who belongs to asocial networking site understands the dangers and risks involved.

    Here are only some of the many dangers of social networking sites:

    URL spoofing. URL spoofing involves one website posing as another website for malicious reasons. Eg: People create fake Facebook pages.

    Phishing. Phishing refers to high tech scams using fake websites with actual brands created in order to steal valuable personal information.

    Botnet attacks. Botnet attacks are very serious. A botnet creator is able tocontrol an army of infected computers secretly via a means eg: Facebook.

    Identity theft. Identity theft is literally a way of stealing someone else'sidentity and using it for a variety of purposes including financial.

    Storm worm attacks. A storm worm attack can be used to trick people by providing fake information about the FBI and Facebook.

    Child identity theft. Child identity theft is literally stealing the identity of a

    child and using it for your own personal gains. Trojans. Trojans plant themselves on the user's computer, and the moment

    you log onto a social networking site, it sends automatic invitations toeverybody on the users contact list.

    Cyberstalking. Cyberstalking is literally harassing and following another person online. Social networking sites open up many doors for cyber stalking.

    22 | P a g e

    http://www.pc1news.com/news/0144/much-ado-about-spoofing.htmlhttp://www.pc1news.com/news/0152/dkim-could-this-mean-the-end-of-phishing-attacks.htmlhttp://www.pc1news.com/news/0179/storm-botnet-the-storm-is-not-over.htmlhttp://www.pc1news.com/news/0085/identity-theft-got-you-going-crazy.htmlhttp://www.pc1news.com/news/0073/fbi-and-facebook-involved-in-a-new-storm-worm-attack.htmlhttp://www.pc1news.com/news/0187/lost-your-child-s-identity.htmlhttp://www.pc1news.com/news/0118/following-the-cyberstalking-epidemic.htmlhttp://www.pc1news.com/news/0118/following-the-cyberstalking-epidemic.htmlhttp://www.pc1news.com/news/0144/much-ado-about-spoofing.htmlhttp://www.pc1news.com/news/0152/dkim-could-this-mean-the-end-of-phishing-attacks.htmlhttp://www.pc1news.com/news/0179/storm-botnet-the-storm-is-not-over.htmlhttp://www.pc1news.com/news/0085/identity-theft-got-you-going-crazy.htmlhttp://www.pc1news.com/news/0073/fbi-and-facebook-involved-in-a-new-storm-worm-attack.htmlhttp://www.pc1news.com/news/0187/lost-your-child-s-identity.htmlhttp://www.pc1news.com/news/0118/following-the-cyberstalking-epidemic.html
  • 8/7/2019 bindi 2003

    23/52

    Many social networking sites like Blogger.com from Google are completely public which means that anybody can read any information at any time. Theamount of information that people seem to put online without really consideringthe consequences are literally haunting. It is strongly advised by manycomputer experts that you invest in an effective firewall and antivirus software. It is also important for every person who has a computer to beware of

    home computer security and to take the necessary precautions.

    It is important that every parent is aware of the risks children face online .Social networking sites are an easy way for hackers and online predators totarget children. The amount of damage that can be caused by social networkingis extreme and safety precautions should be taken at all times. Besides all thedisadvantages and dangers of social networking sites there are also many

    benefits. Social networking sites are a fantastic way to make connections with

    people with similar interests and goals. It also is a great way of promoting a business or product with no cost involved that has the potential to reachthousands of people. If you chose to use a social networking site, make sure thatyou are "rather safe than sorry".

    23 | P a g e

    http://www.pc1news.com/news/0207/firing-it-up-with-firewalls.htmlhttp://www.pc1news.com/news/0180/warning-get-effective-antivirus-software-or-else.htmlhttp://www.pc1news.com/news/0180/warning-get-effective-antivirus-software-or-else.htmlhttp://www.pc1news.com/news/0200/feeling-at-home-with-home-computer-security.htmlhttp://www.pc1news.com/news/0171/what-every-parent-should-know-internet-safety-for-children.htmlhttp://www.pc1news.com/news/0207/firing-it-up-with-firewalls.htmlhttp://www.pc1news.com/news/0180/warning-get-effective-antivirus-software-or-else.htmlhttp://www.pc1news.com/news/0180/warning-get-effective-antivirus-software-or-else.htmlhttp://www.pc1news.com/news/0200/feeling-at-home-with-home-computer-security.htmlhttp://www.pc1news.com/news/0171/what-every-parent-should-know-internet-safety-for-children.html
  • 8/7/2019 bindi 2003

    24/52

    2.3 ESTIMATION

    2.3.1 EFFORT ESTIMATON

    Analysis

    I had complete this analysis after gathering all requirements about this topicand preparing diagrams like Entity Relationship, Activity, Context, Data

    Flow within one month

    Database design and coding

    I had worked on creating designing first by on paper drawing and than makeit on system within few days and than I had done coding for it.

    Page Designing

    First I have designed log in page. Then I designed home page, friend home page, friends page, album page and last design scrap page.

    Testing

    From last 10 to 15 days I had completed testing.

    24 | P a g e

  • 8/7/2019 bindi 2003

    25/52

    3.1 SYSTEM REQUIREMENT

    3.1.1 User Characteristics

    Any user can create account in the friends.com website. Make friends,send scrap to his friends and create his album and upload the photographs torespective album. User need knowns only basic internet uses. This website isvery user friendly. User can also update detail. If user knows orkut then heeasily surf friends.com.

    3.1.2 Hardware Specifications:

    25 | P a g e

  • 8/7/2019 bindi 2003

    26/52

    Processor : Intel Pentium or more

    Ram : 512 MB or more

    Cache : 512 KB

    Hard disk : 16 GB hard disk recommended for primary partion.

    3.1.3 Software Specifications:

    Operating system : Windows XP/95

    Front End Software : Notepad++, Dreamweaver

    BackEnd Software : MySql(Wamp Server)

    4.0 SYSTEM ANALYSIS

    4.1 Study of current system

    My project provides totally dynamic website. That allows user to create anaccount, making friends, send scrap to each other friends, and add album anduploading the photo to respective album. Pass comment on photographs of hisfriends and delete photographs or albums. My project also provides pagingfacility to every most of pages. Another user cant see your outbox they onlysee the outbox only. User can also remove friend from friends list. Friendshiprelationship is removing from both accounts. User can check also inbox and

    outbox in which every scarp total information about scrap like when scrap issend how many days ago and scrap is send to whom and scrap send by whom.

    26 | P a g e

  • 8/7/2019 bindi 2003

    27/52

    User can update his personal information. If user forget password then he canrecover the password

    4.2 Problem and Weakness

    First problem is also there every one see your account there is no restrictionon user if thats your friend or visitor. They can see your profile, album andscrap.

    Second problem is that if user attach large size photograph then it display inwebsite in it original size that disturb layout of the website .

    4.3 Requirement of new system

    In past work system was fully manual. All type of property selling andranting processes are done by man. So for selling/Ranting property either youhave to find buyer or hire a broker.In both situations you are in loss, either youhave to waste your time or spend more money.

    After millennium also people choosing this oldest way. Thus in thisworking system people who wants to sell or buy property have to suffer frommany politicians activities. Any person has to contact a broker and pay for hiswork. Thus any one can cheat easily if buyer has not enough knowledge aboutthis. In newly development system we are providing all the facilities like

    property details, builder details or any supplier details for people online withoutmaking contact to any broker also and no waste of money. So its make thewhole system speedily, effective and accurate .

    4.4 Feasibility Analysis

    4.4.1 Technical Feasibility

    Evaluating the technical feasibility is the trickiest part of a feasibility study.This is because, at this point in time, not too many detailed design of thesystem, making it difficult to access issues like performance, costs on (onaccount of the kind of technology to be deployed) etc. A number of issues haveto be considered while doing a technical analysis .

    27 | P a g e

  • 8/7/2019 bindi 2003

    28/52

    1) Understand the different technologies involved in the proposed system:Before commencing the project, we have to be very clear about what are thetechnologies that are to be required for the development of the new system.

    2) Find out whether the organization currently possesses the requiredtechnologies:Is the required technology available with the organization? If so is the

    capacity sufficient?

    4.4.2 Operation Feasibility

    Proposed projects are beneficial only if they can be turned into

    information systems that will meet the organizations operating requirements.Simply stated, this test of feasibility asks if the system will work when it isdeveloped and installed. Are there major barriers to Implementation? Here arequestions that will help test the operational feasibility of a project:

    Is there sufficient support for the project from management fromusers? If the current system is well liked and used to the extent that persons willnot be able to see reasons for change, there may be resistance.

    Are the current business methods acceptable to the user? If they arenot,Users may welcome a change that will bring about a more operationaland useful systems.

    Have the user been involved in the planning and development of the project?Early involvement reduces the chances of resistance to the system andin,General and increases the likelihood of successful project.

    4.4.3 Economical Feasibility

    28 | P a g e

  • 8/7/2019 bindi 2003

    29/52

    Economic feasibility attempts 2 weigh the costs of developing andimplementing a new system, against the benefits that would accrue from havingthe new system in place. This feasibility study gives the top management theeconomic justification for the new system.

    A simple economic analysis which gives the actual comparison of costsand benefits are much more meaningful in this case. In addition, this proves to

    be a useful point of reference to compare actual costs as the project progresses.There could be various types of intangible benefits on account of automation.These could include increased customer satisfaction, improvement in productquality better decision making timeliness of information, expediting activities,improved accuracy of operations, better documentation and record keeping,

    faster retrieval of information, better employee morale.4.5 REQUIREMENT VALIDATION

    Username and Password validation that is compulsory to enter within system(Not for visitor).

    Name must be character not in digit. Password is of 6 digits. For every new entry of enter all data manually, made entry by adjustment

    form. So it reduces mismatch in data. The field denoted by (*) are compulsory. Most of the data are enter from the master table so it also reduces the

    chances of mismatch data.

    4.6 FUNCTION OF SYSTEM

    4.6.1 USE CASE DIAGRAM

    29 | P a g e

    Accept

    FriendsRequest

    Login

  • 8/7/2019 bindi 2003

    30/52

    MyPalzz

    4.7.1 Data Flow Diagram Level-0

    Register

    View details

    30 | P a g e

    user

    See Photosand videos

    Add Friend

    SearchFriends

    Add Photos

    Add Videos

    Send andreceiveScrap

    Logout

    User

    MyPalz

    z

  • 8/7/2019 bindi 2003

    31/52

    Login

    4.7.1 Data Flow Diagram Level-1

    Login

    Update PhotoesAdd Friends

    Scrap

    Edit Information

    Register

    5.0 SYSTEM DESIGN

    5.1.1 DATABASE DESIGN

    5.1.1 User & profile table

    31 | P a g e

    user MyPalzz

    Profile

    Photos

    Videos

    Scrap

  • 8/7/2019 bindi 2003

    32/52

  • 8/7/2019 bindi 2003

    33/52

    We also say this table as inbox. This table store list of scrap send to each other friend. Send_by means who send message and send_to who receive message.

    Name, last name, image is the information of send_by user. Date storeinformation when scrap is send. Message column store message send by user.

    5.1.3 photo

    This table contains information of users photo of respective album.Photo_name is name of photograph. Photo is give address of photo,profile

    picture.album name.

    33 | P a g e

  • 8/7/2019 bindi 2003

    34/52

    5.1.4 Friends

    5.1.5 Video

    This table contains details about the video added by the user and its user id will be stored in order to show videos of the same user

    34 | P a g e

  • 8/7/2019 bindi 2003

    35/52

    5.1.2 SCREEN SHOTS

    5.1.2.1

    Login page

    35 | P a g e

  • 8/7/2019 bindi 2003

    36/52

  • 8/7/2019 bindi 2003

    37/52

    5.1.2.3 profile page(view profile)

    37 | P a g e

  • 8/7/2019 bindi 2003

    38/52

    5.1.2.4 Profile Page(Update Page)

    38 | P a g e

  • 8/7/2019 bindi 2003

    39/52

    39 | P a g e

  • 8/7/2019 bindi 2003

    40/52

    5.1.2.4 Scrap Page

    40 | P a g e

  • 8/7/2019 bindi 2003

    41/52

    5.1.2.5 Image Upload Page

    41 | P a g e

  • 8/7/2019 bindi 2003

    42/52

    42 | P a g e

  • 8/7/2019 bindi 2003

    43/52

    5.1.2.6 CreateAlbum

    43 | P a g e

  • 8/7/2019 bindi 2003

    44/52

    5.1.2.7 See Album List

    44 | P a g e

  • 8/7/2019 bindi 2003

    45/52

    5.1.2.8 View Album Photos

    45 | P a g e

  • 8/7/2019 bindi 2003

    46/52

    5.1.2.8 Upload Video Page

    46 | P a g e

  • 8/7/2019 bindi 2003

    47/52

    5.1.2.9 Video List Page

    47 | P a g e

  • 8/7/2019 bindi 2003

    48/52

    5.1.2.10 See Video Page

    48 | P a g e

  • 8/7/2019 bindi 2003

    49/52

    5.1.2.11 Friends Page

    49 | P a g e

  • 8/7/2019 bindi 2003

    50/52

    50 | P a g e

  • 8/7/2019 bindi 2003

    51/52

    Conclusion

    This website is social networking website in this any user can create anaccount and enjoy the surfing of website. User can make new friends, sendscraps to their friends and receive scrap from friends. User can create album intheir account and upload photographs in their account. User can find his friend

    by name, city and state. User can visit another users account and show their scraps and albums. User can also give a comment on their friends album s

    photographs.

    REFERANCES / BIBLIOGRAPHY

    51 | P a g e

  • 8/7/2019 bindi 2003

    52/52

    The following website were referred during the analysis and execution phase of the project.

    www.w3schools.com

    www.orkut.com

    www.facebook.com

    www.msdn.com

    http://www.w3schools.com/http://www.orkut.com/http://www.facebook.com/http://www.msdn.com/http://www.w3schools.com/http://www.orkut.com/http://www.facebook.com/http://www.msdn.com/