Você está na página 1de 33

SOCIAL NETWORKING SITE

Project Report
On
Social Network Site (SNS)
Submitted as per the course of
Master of Computer Applications
Of
Visvesvaraya Technological University, Belgaum

Submitted by
Mr.ABHISHEK RANJAN(1RE**MCA**)
Under the Guidance of
Prof. *********
Assoc. Prof Dept of MCA
Reva ITM, Bangalore
__________________________________________________________________________

DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS


REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT
Kattigenahalli, Yelahanka, Bangalore 560 064
DEPT OF MCA RITM

Page 1

SOCIAL NETWORKING SITE


2013

DEPT OF MCA RITM

Page 2

SOCIAL NETWORKING SITE


REVA INSTITUTE OF TECHNOLOGY AND
MANAGEMENT

DEPARTMENT OF MASTER OF COMPUTER


APPLICATIONS
Kattigenahalli, Yelahanka, Bangalore 560 064

Certificate
This is to certify that the project work entitled SOCIAL NETWORKING
SITE

has

been

successfully

completed

by

________having

USN

1RE**MCA**, in * semester MCA as prescribed by the Visvesvaraya


Technological University, Belgaum during the academic year 201* - 201*.

Signature of the Guide

Signature of

the HOD

External Examination
Name of the Examiners

Signature

with Date
1.
DEPT OF MCA RITM

Page 3

SOCIAL NETWORKING SITE

2.

ABSTRACT
A truly Indian social-networking website that is to promote social responsibility (traffic rules,
public hygiene, aversion to bribery etc).Should provide a common platform where people of
India can Voice out violations, injustice, inhumanity, corruption happening in their vicinity. In
Existing System people does not have the ability to tag social discipline violators .Fellow
citizens cant take the measures to rate, control and monitor the social responsibility of a
given individual. Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care. The responsible persons are ignoring because of corruption. The
higher authorities not taking any action towards indiscipline. No one is feeling responsibility
to argue .With this in our country the law and order is going out of control. In this current
system if a person wants to give complaint, he has to go to the concerned office and raise a
complaint. In India many rural people dont know the rules and regulations of Govt. Hence
they are blackmailed by the corrupt world. As the crimes are increased, it is becoming very
difficult for a common man to survive. Here as the people dont know the actual duties of the
officers and they dont even have the sources to reach their voice to the higher authorities,
they are becoming helpless
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward, participating in the debates and fighting
against the crimes in their vicinity. Everybody feels their responsibility to minimize the
corruption. Here each and every person has the authority to discuss on any topic .With these
debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.

DEPT OF MCA RITM

Page 4

SOCIAL NETWORKING SITE

TABLE OF CONTENTS
CHAPTERS
1.

INTRODUCTION
1.1 INTRODUCTION TO PROJECT
- STATEMENT OF THE PROBLEM
- BRIEF DESCRIPTION OF THE PROJECT

2.

LITERATURE SURVEY

3.

SYSTEM DEVELOPMENT STRATEGY


3.1 SYSTEM ENGINEERING
3.2 SYSTEM DEVELOPMENT ENVIRONMENT

4.

SYSTEM ANALYSIS
4.1 EXISTING SYSTEM
4.2 LIMITATIONS OF EXISTING SYSTEM
4.3 PROPOSED SYSTEM
4.4 ADVANTAGES OF PROPOSED SYSTEM
4.5 FEASIBILITY STUDY
- TECHNICAL FEASIBILITY
- ECONOMICAL FEASIBILITY
- OPERATIONAL FEASIBILITY

5.

SYSTEM DESIGN
5.4 DATAFLOW DIAGRAM
5.5 ENTITY-RELATIONSHIP DIAGRAM
5.6 TABLE DESIGN

6.

CODING
PSEUDO CODE

7.

TESTING
TEST CASES FOR
- UNIT TESTING

DEPT OF MCA RITM

Page 5

SOCIAL NETWORKING SITE


- INTEGRATION TESTING
- SYSTEM TESTING
SNAPSHOTS
CONCLUSION
BIBILOGRAPHY

CHAPTER 1
INTRODUCTION
1.1 Objective of the Project
A truly Indian social-networking website that is to promote social
responsibility (traffic rules, public hygiene, aversion to bribery etc) .
1.2 Problem Definition
Through the existing system process which is purely manual process and time
taking process. There are chances of having incorrect representation to the traffic
information and aversion to bribery details. In the existing system, people of India
cant voice out violations, injustice, inhumanity, corruption happening in their
vicinity.
Functional Requirements:

Should provide a common platform where people of India can


o

Voice out violations, injustice, inhumanity, corruption happening in their


vicinity

o Endorse someone elses concern and augment with more proofs, details etc.
o Call for an online debate or discussion on certain topics of broad applicability

Should be highly dynamic, with minimal static content as framework and maximum
content created by site participants

Should have the ability to tag social discipline violators using their UID

Authenticity for adding users is utmost important for such a website. Definitely one
should not be allowed to have more than one profile.

There should be a placeholder for dealing with disputing situations for the site as it is
quite possible for recipients of negative reward to resist. The dispute resolution
mechanism should not be like traditional court, it should again be based on social
forum like multiple opinions, group actions etc.

DEPT OF MCA RITM

Page 6

SOCIAL NETWORKING SITE

Non Functional Requirements:

Secure access of confidential data (users details). SSL can be used.

24 X 7 availability

Better component design to get better performance at peak time

Flexible service based architecture will be highly desirable for future extension

Modules:
1.
2.
3.
4.
5.
6.

Administrator
Friends
Users
Blogs
Comments Rating
Registration

Users:
1.
2.
3.
4.

Administrator
Friends
Authenticate Users
Public User

DEPT OF MCA RITM

Page 7

SOCIAL NETWORKING SITE

CHAPTER 2
LITERATURE SURVEY
Literature survey is a documentation of a comprehensive review of the published and
unpublished work from secondary sources data in the areas of specific interest to the
researcher. Literature survey helps in carrying out the task more easily as it gives information
regarding the work you carry out.
With the development of social network sites, security protection of private information
online has been a serious and important research topic. Research status quo on privacy of
social network sites has been investigated and reviewed in this paper. Two main ways of
obtaining private information on social network sites were summarized as based on privacy
disclosure and attack technique. In each category, actions to threaten privacy were brought
forth. A framework of dangers, which users facing on social network sites, was proposed, and
according to privacy risks, protection methods were also discussed. Finally, new topics about
privacy research directions on social network sites, privacy-preserving collaborative social
network and business model of privacy protection, which need further research, were
presented and discussed. The use of social site by students for academic practice is surpassed
by its use for social engagement, direct communications, and relationship building A larger
percentage of female students use social media technologies despite past studies that have
reported that male students generally demonstrate more competence and a favorable attitude
toward the use of technology. A large percentage of social media use and expertise lies with
college students between the ages of 18-24, also known as Generation Z.

CHAPTER 3
SYSTEM DEVELOPMENT STRATEGY
DEPT OF MCA RITM

Page 8

SOCIAL NETWORKING SITE


3.1 SYSTEM ENGINEERING
The software development life cycle (SDLC) is the entire process of formal,
logical steps taken to develop a software product. Within the broader context of
Application Lifecycle Management (ALM), the SDLC is basically the part of process in
which coding/programming is applied to the problem being solved by the existing or
planned application.
The phases of SDLC can vary somewhat but generally include the following:

There

Conceptualization
Requirements and cost/benefits analysis
Detailed specification of the software requirements
Software design
Programming
Testing
User and technical training
Maintenance
are many methodologies or models that can be used to guide the software

development lifecycle either as a core model to the SDLC or as a complementary method.


Prototyping Model
The goal of prototyping based development is to counter the first two limitations of the
waterfall model discussed earlier. The basic idea here is that instead of freezing the
requirements before a design or coding can proceed, a throwaway prototype is built to
understand the requirements. This prototype is developed based on the currently known
requirements. Development of the prototype obviously undergoes design, coding and
testing. But each of these phases is not done very formally or thoroughly. By using this
prototype, the client can get an "actual feel" of the system, since the interactions with
prototype can enable the client to better understand the requirements of the desired
system.
Prototyping is an attractive idea for complicated and large systems for which there is no
manual process or existing system to help determining the requirements. In such
situations letting the client "plan" with the prototype provides invaluable and intangible i
inputs which helps in determining the requirements for the system. It is also an effective
method to demonstrate the feasibility of a certain approach. This might be needed for
novel systems where it is not clear that constraint can be met or that algorithms can be
developed to implement the requirements. The process model of the prototyping approach
is shown in the figure below.

DEPT OF MCA RITM

Page 9

SOCIAL NETWORKING SITE

Prototyping Model
The basic reason for little common use of prototyping is the cost involved in this built-ittwice approach. However, some argue that prototyping need not be very costly and can
actually reduce the overall development cost. The prototype are usually not complete
systems and many of the details are not built in the prototype. The goal is to provide a
system with overall functionality. In addition, the cost of testing and writing detailed
documents are reduced. These factors help to reduce the cost of developing the prototype.
On the other hand, the experience of developing the prototype will very useful for
developers when developing the final system. This experience helps to reduce the cost of
development of the final system and results in a more reliable and better designed system.
Project Development Architecture
As a developer, the .NET framework and Visual Studio present many choices for
choosing the right architecture, from placing the data access code directly in the UI through
datasets and data source controls.

Presentation Layer
The

ASP.NET

web

site or windows forms

application (the UI for

the project) is called

the presentation layer.

The presentation layer

is the most important

layer simply because

DEPT OF MCA RITM

Page 10

SOCIAL NETWORKING SITE


its the one that everyone sees and uses. Even with a well structured business and data
layer, if the presentation layer is designed poorly, this gives the users a poor view of the
system.
Its best to remove as much business logic out of the UI and into the business layer. This
usually involves more code, but in my mind, the excess time (which ranges from minimal
to moderate, depending on the size of the application) pays off in the end.
Business Access Layer
Though a web site could talk to the data access layer directly, it usually goes through
another layer called the business layer. The business layer is vital in that it validates the
input conditions before calling a method from the data layer. This ensures the data input is
correct before proceeding, and can often ensure that the outputs are correct as well. This
validation of input is called business rules, meaning the rules that the business layer uses
to make judgments about the data.

Data Access Layer


The key component to most applications is the data. The data has to be served to the
presentation layer somehow. The data layer is a separate component, whose sole purpose
is to serve up the data from the database and return it to the caller. Through this approach,
data can be logically reused, meaning that a portion of an application reusing the same
query can make a call to one data layer method, instead of embedding the query multiple
times. This is generally more maintainable.
3.2 SYSTEM DEVELOPMENT ENVIRONMENT
Software Environment
Operating System Server: Windows XP
Database Server: Microsoft SQL Server-2005

Client: Microsoft Internet Explorer


DEPT OF MCA RITM

Page 11

SOCIAL NETWORKING SITE


Tools: Microsoft Visual Studio.Net-2008 (Framework 3.5)
User Interface: Asp.Net with Ajax

Hardware Environment
Processor : Intel Pentium or More
RAM

: 512 MB Ram

Hard Disk : PC with 20GB

CHAPTER 4
SYSTEM ANALYSIS
4.1 EXISTING SYSTEM
In Existing System people does not have the ability to tag social discipline violators
.Fellow citizens cant take the measures to rate, control and monitor the social responsibility
of a given individual. Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care. The responsible persons are ignoring because of corruption. The
higher authorities not taking any action towards indiscipline. No one is feeling responsibility
to argue .With this in our country the law and order is going out of control.
4.2 LIMITATIONS OF EXISTING SYSTEM
In this current system if a person wants to give complaint, he has to go to the concerned
office and raise a complaint. In India many rural people dont know the rules and regulations
of Govt. Hence they are blackmailed by the corrupt world. As the crimes are increased , it is
becoming very difficult for a common man to survive. Here as the people dont know the
actual duties of the officers and they dont even have the sources to reach their voice to the
higher authorities, they are becoming helpless.
DEPT OF MCA RITM

Page 12

SOCIAL NETWORKING SITE


4.3 PROPOSED SYSTEM
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward , participating in the debates and
fighting against the crimes in their vicinity. Everybody feels their responsibility to minimize
the corruption. Here each and every person has the authority to discuss on any topic .With
these debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.

4.4 ADVANTAGES OF PROPOSED SYSTEM


1 - Some social networks are good opportunities to find a job
Nowadays the big companies have specialists on human resources that search for
profiles in these kind of sites to recruit new collaborators. If youre looking for job you can
create a profile (a serious, professional and complete profile) and you might be discovered
and recruited by a company. You can describe your capabilities and publish some of your
works - and with a little luck you can find a job.
2 - You can meet new people
social networking sites are the perfect spot to meet new people online. With the help of
advanced search tools you can find users who have the same interests you do and that can be
the starting point of a great friendship and/or relationship. Many people meet online and then
establish a relationship in real life - getting married, having children, etc.
3 - You can promote your site or business for free
If you have a business or site you need to promote you can do it by creating a business
profile on some of these networks. You can load images, your logo, etc. into your profile and
it will be visible for your virtual friends and all the users who visit your profile. You can also

DEPT OF MCA RITM

Page 13

SOCIAL NETWORKING SITE


put topics on groups related to your business and establish new contacts that can lead to sales,
subscriptions or anything else.
4- Professional Networking
For professionals and academics, social networking sites allow users to create networks of
like-minded people. Academics find other scholars to share research or ideas, or simply to
talk to and "get their name out there." Professionals find mutual friends and possible clients,
employers, or business partners. Social networking expands the horizons of what sort of
contacts people can make in their professional lives.

4.5 FEASIBILITY STUDY


A feasibility study looks at the viability of an idea with an emphasis on identifying potential
problems and attempts to answer one main question: Will the idea work and should you
proceed with it?
Before you begin writing your business plan you need to identify how, where, and to whom
you intend to sell a service or product. You also need to assess your competition and figure
out how much money you need to start your business and keep it running until it is
established.
Feasibility studies address things like where and how the business will operate. They provide
in-depth details about the business to determine if and how it can succeed, and serve as a
valuable tool for developing a winning business plan.
Economic feasibility
The most frequently used method for evaluating the effectiveness of a new system. More
commonly known as cost/benefit analysis, the procedure is to determine the benefits and
savings that are expected from a candidate system and compare them with costs. If benefits
DEPT OF MCA RITM

Page 14

SOCIAL NETWORKING SITE


outweigh costs, then the decision is made to design and implement the system. An
entrepreneur must accurately weigh the cost versus benefits before taking an action.
Cost-based study: It is important to identify cost and benefit factors, which can be
categorized as follows: 1. Development costs; and 2. Operating costs. This is an analysis of
the costs to be incurred in the system and the benefits derivable out of the system.
Time-based study: This is an analysis of the time required to achieve a return on investments.
The future value of a project is also a factor.

CHAPTER 5
SYSTEM DESIGN
System design is a solution, how to approach to the creation of a new system. This important
phase is composed of several steps. It provides the understanding and procedural details
necessary for implementation of the system recommended in the feasibility study. Emphasis
is on translating the performance requirements in to design specification. Design goes
through logical and physical stages of development. Logical design reviews the present
physical system. Prepares input and output specification, makes edit security and control
specification details, and the implementation plan prepares a logical design walkthrough.
The design phase is transition from user-oriented document to a document to the
programmers or database personnel. It describes the input, compatible to database and
procedures all in a format compatible to user requirements. The logical design also specifies
input, output, files and screen layouts. Physical design produces the working system by
defining the design specification that tells the programmers exactly what the system should
do in turn.

DEPT OF MCA RITM

Page 15

SOCIAL NETWORKING SITE


5.4 DATAFLOW DIAGRAM
The Dataflow Diagram is a pictorial or graphical representation of the outline of the
system study. The Dataflow Diagram includes all the processes and data storage area which
takes place during any transactions in the system. The Dataflow Diagrams are functionally
divided to Context Level, Zero level, First Level, and Second Level data flow diagrams.
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system. DFDs can also be used for the visualization of data processing
(structured design).
On a DFD, data items flow from an external data source or an internal data store to an
internal data store or an external data sink, via an internal process.
It is common practice to draw a context-level data flow diagram first, which shows the
interaction between the system and external agents which act as data sources and data sinks.
On the context diagram (also known as the 'Level 0 DFD') the system's interactions with the
outside world are modeled purely in terms of data flows across the system boundary. The
context diagram shows the entire system as a single process, and gives no clues as to its
internal organization.
DFD Symbols

This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the
detail of the system being modeled. The Level 1 DFD shows how the system is divided into
sub-systems (processes), each of which deals with one or more of the data flows to or from an
external agent, and which together provide all of the functionality of the system as a whole. It
also identifies internal data stores that must be present in order for the system to do its job,
and shows the flow of data between the various parts of the system.

DEPT OF MCA RITM

Page 16

SOCIAL NETWORKING SITE


DFD Diagrams:
Context Level Diagram (0 Level)

Login DFD

Admin Activities DFD

DEPT OF MCA RITM

Page 17

SOCIAL NETWORKING SITE


1st

Level

ENTITY-RELATIONSHIP DIAGRAM

DEPT OF MCA RITM

Page 18

SOCIAL NETWORKING SITE


TblAddFriendRequestDetails
UserId

TblAdminLogin

TblUserProfileSetting

TblPollAndSawals

UserId

RequestFrom

ShowImageToWhom

RequestDate

UserName

RequestMessage

Password

StatusOfRequest

AllowToSeeWhom

TblUserDraft
TblUserGangs
UserId

TblUserDetails

blogid

Question

blogtitle

QuestionFrom

description

QuestionPostDate

username

QuestionAnswerFrom

date

AnswerPostedOn

UserId

AnswerPolls

DraftId

AdminPermission

DraftBody

Answer

GangName

UserId

DateOfDraft

GangDescription

CatagoryId

AccountId

DraftTitle

GangOwner

EmailId

ForeName

GangCoOwner

SirName

GangPhoto

HomeAddress

GangActivity

ContactNo

UserId

DateCreated

Email

ScrapFrom

GangMember

DateOfBirth

ScrapMessage

GangCatagory

Gender

ScrapDate

GangLanguage

RelationShipStatus

ScrapId

AdminPaermission

City

GangId

State

UserId

TblUserSentMessages

TblGangMember

Country

UserId

LanguagesKnown

MessageTo

PhotoToProfile

MessageBody

Title

MessageTitle

GangId

SentedOn

MforeName

Meducation

UserId

Mage

PhotoId

Mgender

PhotoDescription

MessageFrom

CatagoryType

tbl_ Rank
Rankid
rank

UserId

AccountId

FriendForeName

TblUserSocial

FriendUserId

AccountId

EyeColour

Childrens

HairColour

Ethinisity

BodyBuild

Religion

IdealDate

HomeTown

RelationShipLike

AboutMe
WebPage
Sports
Books
Music
Movies

tbl_ Comments1

date

comm1id

username

commt1itle

Post_Id

comm1desc
date
username

TblUserProfessionalDetails

Post_Id

AccountId
University

TblUserFriends

TblPersonalDetails

Weight

CatagoryId

Degree

Photo

Height

Post_desc

blogid

MarksTo
MessageId

Post_title

TblAppCatagory

MarksFrom

TblUserPhotoGalary

Maddress

Post_Id

username

FriendUserId

MlastName

tbl_ Posts

date

TblUserScrap

PostalCode

tbl_ Blog

SRNO

YearOfPassing
Occupation
Industry
Company
CompWebSite
J obDescription
WorkEmail

TblLoginAccountDetails

WorkContact

AccountId

CareerSkill

Email

CareerInterest

Password
HintQuestion
Answer
RecoveryMail
LastLogin

SunShine

5.3.2 Use Case Diagram


UML is a standard language for specifying, visualizing, constructing, and documenting the
artifacts of software systems.

DEPT OF MCA RITM

Page 19

SOCIAL NETWORKING SITE


UML was created by Object Management Group (OMG) and UML 1.0 specification draft
was proposed to the OMG in January 1997.
OMG is continuously putting effort to make a truly industry standard.

UML stands for Unified Modeling Language.


UML is different from the other common programming languages like C++, Java,

COBOL etc.
UML is a pictorial language used to make software blue prints.

Goals of UML:
A picture is worth a thousand words, this absolutely fits while discussing about UML. Object
oriented concepts were introduced much earlier than UML. So at that time there were no
standard methodologies to organize and consolidate the object oriented development. At that
point of time UML came into picture.
There are a number of goals for developing UML but the most important is to define some
general purpose modeling language which all modelers can use and also it needs to be made
simple to understand and use.
UML diagrams are not only made for developers but also for business users, common people
and anybody interested to understand the system. The system can be a software or non
software. So it must be clear that UML is not a development method rather it accompanies
with processes to make a successful system.
.

A conceptual model of UML:


To understand conceptual model of UML first we need to clarify What is a conceptual model?
and Why a conceptual model is at all required?

A conceptual model can be defined as a model which is made of concepts and


their relationships.

DEPT OF MCA RITM

Page 20

SOCIAL NETWORKING SITE

A conceptual model is the first step before drawing a UML diagram. It helps to
understand the entities in the real world and how they interact with each other.

Structural modeling:
Structural modeling captures the static features of a system. They consist of the followings:

Classes diagrams
Objects diagrams
Deployment diagrams
Package diagrams
Composite structure diagram

Behavioral Modeling:
Behavioral model describes the interaction in the system. It represents the interaction among
the structural diagrams. Behavioral modeling shows the dynamic nature of the system. They
consist of the following:

Activity diagrams
Interaction diagrams
Use case diagrams

Activity Diagrams:
Registration:

DEPT OF MCA RITM

Page 21

SOCIAL NETWORKING SITE

Enter User Registration Details


Returns Error Message Get the Details

Submit
Validate Data

Yes

Invalid

Accept

No

Successfully Registered

Use case diagrams:

DEPT OF MCA RITM

Page 22

SOCIAL NETWORKING SITE


System
Registration

Login

Add application catageries


fiends
Grant sawal request

Send mails

Add friends

Search friends

admin

User

search users

create album

send msgs and scraps

Create Blogs

post comments

Log out

DEPT OF MCA RITM

Page 23

SOCIAL NETWORKING SITE


Admin:
System
Login

add application catageries

Add sawal relating to catageries

admin

grant sawals

grant gangs

send mails

Log out

TABLE DESIGN:
DEPT OF MCA RITM

Page 24

SOCIAL NETWORKING SITE


AddFriendRequest Table:
NAME
userid
requestfrom
requestdate
requestmessage
Statusofrequest

TYPE
varchar
varchar
datetime
varchar
varchar

SIZE
30
50
max
20

UserProfileSetting Table :
NAME

TYPE

SIZE

userid

varchar

30

Showimagetowhom

varchar

10

allowtoseewhom

varchar

10

UserDatiels Table:
NAME

TYPE

SIZE

userid

Varchar

30

Accounted

Int

Forename

varchar

30

Homeaddress

varchar

50

Sirname

varchar

50

Contactno

varchar

30

Email

varchar

10

Dateofbirth

Datetime

Gender

Varchar

10

Relationshipstatus

Varcahar

50

City

Varchar

40

State

Varchar

50

CHAPTER 6
CODING
DEPT OF MCA RITM

Page 25

SOCIAL NETWORKING SITE


Source code
<%@ Page Language="C#" AutoEventWireup="true" CodeFile="frmfirststep.aspx.cs"
Inherits="Authentication_frmfirststep"
EnableSessionState="True" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<title>Untitled Page</title>
<style type="text/css">
.style1
{
width: 100%;
height: 196px;
}
.style2
{
text-align: center;
font-weight: bold;
font-size: medium;
color: #006600;
text-transform: uppercase;
text-decoration: underline;
font-family: Arial;
}
</style>
</head>
<body>
<form id="form1" runat="server" defaultbutton="btnsubmit" defaultfocus="txtfirstname">
<div align="right">
<table class="style1">
<tr style="background-image: url('SnsHead.JPG')">
<td align="left" valign="top" colspan="2">
</td>
</tr>
</table>
</div>
<p class="style2">
CREATE&nbsp; Sns.com Account</p>
<table class="style1">
<tr>
<td class="style14">
Get Started With SNS.com
</td>
<td class="style24">
<asp:Label ID="lblerror" runat="server" Text="."></asp:Label>
</td>
<td class="style4">
&nbsp;
DEPT OF MCA RITM

Page 26

SOCIAL NETWORKING SITE


</td>
</tr>
<tr>
<td class="style21">
<p class="style3">
First Name</p>
</td>
<td class="style24">
<asp:TextBox ID="txtfirstname" runat="server" Width="219px"
BorderColor="#666666"
BorderStyle="Solid" BorderWidth="1px"></asp:TextBox>
&nbsp;
</td>
<td class="style4">
<asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server"
ControlToValidate="txtfirstname"
Display="Dynamic" ErrorMessage="Required" TabIndex="10" FontNames="Arial" Font-Size="Small"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="style20">
<p class="style3">
Last Name</p>
</td>
<td class="style25">
<asp:TextBox ID="txtlastname" runat="server" TabIndex="1" Width="219px"
BorderColor="#666666"
BorderStyle="Solid" BorderWidth="1px"></asp:TextBox>
</td>
<td class="style5">
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="txtlastname"
Display="Dynamic" ErrorMessage="Required" TabIndex="11" FontNames="Arial" Font-Size="Small"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>

<td class="style16"<p class="style3">


</td> <td
class="style26"><asp:TextBox ID="txtemail" runat="server" TabIndex="2" Width="219px"
BorderColor="#666666BorderStyle="Solid" BorderWidth="1px"></asp:TextBox>
&nbsp;<span class="style22"><br />
<span class="style23">This Will Be A User Name</span>.</span>
</td>
<td class="style6">
DEPT OF MCA RITM

Page 27

SOCIAL NETWORKING SITE


<asp:RequiredFieldValidator ID="RequiredFieldValidator3" runat="server"
ControlToValidate="txtemail"
Display="Dynamic" ErrorMessage="Required" TabIndex="12" FontNames="Arial" Font-Size="Small"></asp:RequiredFieldValidator>
&nbsp;
<asp:RegularExpressionValidator ID="RegularExpressionValidator1"
runat="server" ControlToValidate="txtemail" Display="Dynamic" ErrorMessage="Not Valid
Email" TabIndex="13" ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+
([-.]\w+)*"
Font-Names="Arial" Font-Size="Small"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
<td class="style19">
&nbsp;
</td>
<td align="left" class="style27" valign="top">
<asp:Button ID="btncheckavail" runat="server"

DEPT OF MCA RITM

Page 28

SOCIAL NETWORKING SITE

CHAPTER 7
TESTING
TEST CASES FOR
In any endeavor, testing is always important before the actual implementation. SDLC is no
different, in fact testing in SDLC is so important these days that developers have to work in
testing longer that most stages in SDLC.
Types of Testing:
Testing by developers Developers will have to test the software themselves extensively.
Even though they are also the one who have developed the software, they still have to run it
extensively. These are the usual steps developers follow in testing their software:
1. Checking of Syntax The software is checked as it is. Developers just run software and
look for possible errors. A very basic checking to know if there are major functions and errors
that will occur.
.2. Module Testing After the walk through, developers will again check the software in
terms of individual modules. Each module will be tested extensively for possible errors.
3. Integration Testing Once the module has been tested, it is time to test them as being
integrated to other modules.
4. System Testing After the integration, the whole program will again be tested. Case
studies will again be applied with integrated software.
Testing by Users - Once the developers have finished their own testing with the help of other
professional developers, the software is ready for release to the public or to the intended
users.
The stages usually followed are:
Alpha Testing Developers usually choose the users who will try out the program. For the
general public, it is often tested on known users or even technology bloggers who can
honestly give their opinion of the software. It is also the time where developers try to create
scenarios for their software such as:

Recovery Developers will try recovering the software or the program in case it
crashes.

DEPT OF MCA RITM

Page 29

SOCIAL NETWORKING SITE

SNAPSHOTS
SCREENS
Admin:

DEPT OF MCA RITM

Page 30

SOCIAL NETWORKING SITE

DEPT OF MCA RITM

Page 31

SOCIAL NETWORKING SITE

CONCLUSION
Voice out violations, injustice, inhumanity, corruption happening in their vicinity.
In India many rural people dont know the rules and regulations of Govt. Hence they are
blackmailed by the corrupt world. As the crimes are increased, it is becoming very difficult
for a common man to survive. Here as the people dont know the actual duties of the officers
and they dont even have the sources to reach their voice to the higher authorities, they are
becoming helpless.
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward, participating in the debates and fighting
against the crimes in their vicinity. Everybody feels their responsibility to minimize the
corruption. Here each and every person has the authority to discuss on any topic .With these
debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.

BIBLIOGRAPHY

FOR .NET INSTALLATION


www.support.mircosoft.com

FOR DEPLOYMENT AND PACKING ON SERVER


www.developer.com

DEPT OF MCA RITM

Page 32

SOCIAL NETWORKING SITE


www.15seconds.com

FOR SQL
www.msdn.microsoft.com

FOR ASP.NET
Asp.Net 3.5 Unleashed
www.msdn.microsoft.com/net/quickstart/aspplus/default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx

Software Engineering (Rogers Pressman)

DEPT OF MCA RITM

Page 33

Você também pode gostar