Download as pdf or txt
Download as pdf or txt
You are on page 1of 112

COLLEGE SOCIAL NETWORKING WEBSITE

INTRODUCTION

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 1


COLLEGE SOCIAL NETWORKING WEBSITE

1.INTRODUCTION

We know about the increasing use of social networking sites, people use various social media

platforms depending on their requirements and interest. Social media is a dynamic platform that

can be used in so many ways to share news, knowledge, entertainment etc.

In this project a social media platform for college campus has been created where everyone

associated with the college campus such as students, staff members can socialize with each

other and share their knowledge about academics, projects, placements and all other activities

going on in the campus.

It will promote teaching and learning through a more dynamic platform without causing any

threat to privacy. They’ll be only allowed to view the details which are relevant to them from

academic or professional point of view. They’ll be able to view the research conducted by

teachers, their department and subjects etc.

Students can register and login into the system once their registration is approved by the admin.

Once the student logged in into the system, he/she can write and post an articles on various

topic of his/her choice. Also he/she chat with the other students. Students can also upload

images with their post. All students can view News Feed posted by individual student.

All the student registration will be approved/rejected by the admin as well as, all the post will

be kept pending until admin approves/rejects each and every post.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 2


COLLEGE SOCIAL NETWORKING WEBSITE

OBJECTIVE AND SCOPE


OF THE SYSTEM

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 3


COLLEGE SOCIAL NETWORKING WEBSITE

2. OBJECTIVE AND SCOPE OF THE SYSTEM

The core function of campus social network system is to facilitate and encourage knowledge

sharing and knowledge creation on campus. Specifically, the core functions of campus social

network system are to support online communication, sharing and collaboration in learning,

teaching and research activities of campus users. Knowledge sharing and knowledge creation

are closely related with and continuously influenced by each other. Because college social

network system provides direct support to knowledge sharing and indirect support to

knowledge creation

Campus members such as students, faculty members are among the most active users of Internet

services, especially emerging services including social networking services. As this social

networking site is confined to the college campus activities, it will increase the likelihood of

usage by the faculty members. This is the major advantage of this project as it will promote the

students and faculty alike to strengthen their educational communications and collaborations.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 4


COLLEGE SOCIAL NETWORKING WEBSITE

THEORETICAL BACKGROUND

DEFINITION OF PROBLEM

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 5


COLLEGE SOCIAL NETWORKING WEBSITE

3. THEORETICAL BACKGROUND
DEFINITION OF PROBLEM

3.1 Theoretical Background:


Online Social Networking allow people to interact with common interests to meet, communicate and share ideas

and information, through network like the web. While doing this, participants develop bonds with each other and

the community as a whole.

We define college social network sites as web-based services that allow individuals to

(1) Construct a public or semi-public profile within a bounded system.

(2) Articulate a list of other users with whom they share a connection.

The main idea behind it is to share the job related details posted by faculty member via adding

a post which can be read by all the student as well as other faculty using the website.

This web application can be handled by the admin and manage student as well as faculty.

3.2 Drawback in Existing System:


 The existing system which we are using in our college is traditional process which is a

complete manual process.

 When the number of records increased, it is difficult to maintain the information of each

student in the old manual system.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 6


COLLEGE SOCIAL NETWORKING WEBSITE

 Maintaining the records manually leads to error prone and required more man power

and it consumes more time for processing the records.

3.3 Proposed System:


As the tremendous success that social network services have gained during the past few years,

it’s also regarded as the third revolutionary application of the Internet after search engine and

Web 2.0 applications. Campus members including students and staff members are among the

most active users of Internet services, especially emerging services including social networking

services.

Although public social network services like Facebook, Twitter, Sina Weibo and RenRen

provide good individual and group communication services to their users. For this reason,

public social network services have two disadvantages. On one hand, because it cannot be

connected with the real environment and activities of college, it cannot support the learning,

teaching, research and cultural activities on campus closely and timely; on the other public

social network systems cannot provide strict information and privacy protection to their users

and organizations that users are belonged to because of their consideration on commercial

interest.

Social interaction positively influences the quality of the knowledge created on other hand,

social network can help students to share experiences and collaborate on relevant topics

3.4Advantages of Proposed Statement:


 Students can make more friends within short span of time.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 7


COLLEGE SOCIAL NETWORKING WEBSITE

 Students will be updated with new thoughts and views.

 Student can share as well as obtain knowledge by using this application.

 Student can communicate easily with faculty Members.

 This social media platform will become an asset for the campus and can be used for

various productive purposes.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 8


COLLEGE SOCIAL NETWORKING WEBSITE

SYSTEM ANALYSIS AND


DESIGN

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 9


COLLEGE SOCIAL NETWORKING WEBSITE

4. SYSTEM ANALYSIS AND DESIGN

4.1System Analysis:
System analysis is the first and foremost step performed in developing the software to solve a

particular problem. In the analysis part, a software developer examines the requirements.

Carrying out preliminary investigation identifies the requirements. Analysis consists of two sub

phases: Planning and Requirement Definition

During planning phase, cost estimates and work schedules will be planned. Requirement

definition is a specification that describes the processing environment, the required software

functions, performance constrains (size, speed, machine configuration) and exception handling.

4.1.1 Principles of System Analysis:


before you begin to create the analysis model.

occur.

ng data, function and behavioural models.

and detailed examination.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 10


COLLEGE SOCIAL NETWORKING WEBSITE

4.1.2 Analysis of College Social Networking Website

a) Functionality:

 Students can register and login into the system once their registration is approved by the

admin.

 Once the student logged in into the system, he/she can write and post an articles on

various topic of his/her choice. Also he/she chat with the other students.

 Students can also upload images with their post.

 All students can view News Feed posted by individual student.

 All the student registration will be approved/rejected by the admin as well as, all the

post will be kept pending until admin approves/rejects each and every post.

b) Efficiency:

The main idea behind it is to share the job related details posted by placement officer via adding

a post which can be read by all the student as well as faculty using the website. This web

application can be handled by the admin and manage student as well as faculty.

c) Accessibility:

Students can register and login into the system once their registration is approved by the admin.

Students post are first sent to admin for approval. It keeps the system stable by not posting

any spam or miscellaneous content on the web.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 11


COLLEGE SOCIAL NETWORKING WEBSITE

4.2 Feasibility study:


The feasibility of the project is analysed in this phase and business proposal is put forth with a

very general plan for the project and some cost estimates. During system analysis the feasibility

study of the proposed system is to be carried out. This is to ensure that the proposed system is

not a burden to the company. For feasibility analysis, some understanding of the major

requirements for the system is essential. Three key considerations involved in the feasibility

analysis are: Economical Feasibility, Technical Feasibility, and Social Feasibility.

a) Economical Feasibility: This study is carried out to check the economic impact that the

system will have on the organization. The amount of fund that the company can pour into the

research and development of the system is limited. The expenditures must be justified. Thus

the developed system as well within the budget and this was achieved because most of the

technologies used are freely available. Only the customized products had to be purchased.

b) Operational Feasibility: Students will get efficient access to information which will help

them grow. Faculty Members can use this platform to share concepts which are relevant in the

current market.

c) Technical Feasibility: Any system developed must not have a high demand on the available

technical resources .The technologies which our System is using are free as XAMPP , Bootstrap

. Therefore this Application is Technically Feasible.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 12


COLLEGE SOCIAL NETWORKING WEBSITE

d) Social Feasibility: The aspect of study is to check the level of acceptance of the system by

the user. This includes the process of training the user to use the system efficiently. The user

must not feel threatened by the system, instead must accept it as a necessity. The level of

acceptance by the users solely depends on the methods that are employed to educate the user

about the system.

4.3 System Design:


Software design sets at the technical kernel of the software engineering process and is applied

regardless of the development paradigm and area of application. Design is the first step in the

development phase for any engineered product or system. The designer’s goal is to produce a

model or representation of an entity that will later be built. Beginning, once system requirement

have been specified and analysed.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 13


COLLEGE SOCIAL NETWORKING WEBSITE

system design is the first of the three technical activities- design, code and test that is required

to build and verify software. The importance can be stated with a single word “Quality”. Design

is the place where quality is fostered in software development. Design provides us with

representations of software that can assess for quality. Design is the only way that we can

accurately translate a customer’s view into a finished software product or system. System

design serves as a foundation for all the software engineering steps that follow. Without a strong

design we risk building an unstable system- one that will be difficult to test, one whose quality

cannot be assessed until the last stage.

4.3.1 Client-Server Architecture

The client-server architecture is the most common distributed system architecture which

decomposes the system into two major subsystems or logical processes −

 Client − This is the first process that issues a request to the second process i.e. the

server.

 Server − This is the second process that receives the request, carries it out, and sends a

reply to the client.

Advantages

 Separation of responsibilities such as user interface presentation and business logic

processing.

 Reusability of server components and potential for concurrency

 Simplifies the design and the development of distributed applications

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 14


COLLEGE SOCIAL NETWORKING WEBSITE

 It makes it easy to migrate or integrate existing applications into a distributed

environment.

 It also makes effective use of resources when a large number of clients are accessing a

high-performance server.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 15


COLLEGE SOCIAL NETWORKING WEBSITE

This Project Includes Modules such as:

1) Admin module

In the Admin Module the system allows the admin to login with username and password and

there is a Menu Bar provided with menu items in which there are items like Register Student,

Register Faculty, Manage Student, Approve Student and Logout.

2) Faculty module

In the Faculty Module the System allows the Faculty Member to Login with Username and Password

which has been provided by the Admin to faculty members via SMS there is a Menu Bar Provided with

Menu items such as Send Notifications where the Faculty Member can Post a Notification that will be

Visible to the Students and Faculty can also view the Earlier Posted Notifications and the Faculty

Member can update its Record.

3) Student module

In the Student Module the System allows the Students to Login with Username and Password which has

been provided by the Admin to Students via SMS there is a Menu Bar Provided with the Menu items

such as Home where Students can Post Images and Post on the News Feed and the Students can also

change their Details and Message a Friend.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 16


COLLEGE SOCIAL NETWORKING WEBSITE

USER REQUIREMENTS AND


SYSTEM PLANNING

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 17


COLLEGE SOCIAL NETWORKING WEBSITE

5. USER REQUIREMENTS AND


SYSTEM PLANNING

5.1 User Requirements:


A good set of user requirements are needed for any project, especially computer system

projects, to be successful. This is where many projects fail, in that they do not specify correctly

what the system should do. In fact many systems have just been given a deadline for delivery,

a budget to spend, and a value notion of what it should do. The root of this problem is:

dea of how a business runs and should

run, compared with a business user.

ers have little idea of what a computer system could achieve for them.

As a result paralysis sets in and business management time is concentrated on meeting

timescales and budgets, rather than what is going to be delivered.

5.1.1 Requirements Definition:


The truth is that you do not need a great deal of technical knowledge to specify requirements.

In fact it can be a big disadvantage. A requirements for a computer system specifies what you

want or desire from a system. For business in particular this is, “What you want or desire you

a business advantage” This advantage need not just be a reduction in costs, In fact many

systems justified on a reduction in operating costs, fail to deliver as low skilled but relatively

cheap staff, have to be replaced by high skilled, and more expensive staff.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 18


COLLEGE SOCIAL NETWORKING WEBSITE

The advantage can be a reduction in time to process something, which will lead to a reduction

in costs, or being able to better use the unique knowledge base belonging to a business. As you

start to specify what you want or desire, you hit up against technical language of requirements.

Fear not, this is quite straightforward:

-functional Requirements

a) Functional Requirements of College Social Networking Website:

 The Web Application should provide access to an authorized users.

 The Web Application should determine appropriate responses to inputs received.

 The Web Application should accept images below a certain limit.

 The Web Application should provide a SMS to the user registered.

 The Web Application should display PDF document to the users.

 The Web Application should validate the limit of marks given to the users.

 The Web Application should generate a PDF of students which are deleted.

 The Web Application should allow users to Upload PDF and images.

b) Non-functional Requirements:

 User friendly GUI

 Secure.

 Portable

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 19


COLLEGE SOCIAL NETWORKING WEBSITE

c) Gantt Chart:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 20


COLLEGE SOCIAL NETWORKING WEBSITE

d)User Interface Requirements College Social Networking Website:

The interface provided to the user should be a very user-friendly one and it should provide an

optional interactive help for each of the service listed. The interface provided is a menu driven

one and the following screens will be provided.

Login screen is provided in the beginning for entering the required username, password.

An unsuccessful login leads to a reattempt screen for again entering the same information.

The successful login leads to a screen to the displaying the homepage of the user logged in.

Administrator is also provided with a screen that enables him to Register a Student and

Faculty and Admin has the authority to delete a student and Approve and Reject Post

Uploaded.

In case of deleting a student the Administrator must enter appropriate Semester and also

allow the allow to take any backup of student information if needed.

After the login, a screen with a number of options is then shown to the user. It contains all the

options along with their brief description to enable the user to understand their functioning

and select the proper option.

Another screen should be provided to the users to reset password. If the user has forgotten

the password. A Screen will be provided to the user to check their profile.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 21


COLLEGE SOCIAL NETWORKING WEBSITE

5.2 System Planning:


System planning should be affective so that the project begins with well-defined task. Affective

project planning helps to minimize the additional costs incurred while it is in progress. For

effective system planning, some principles are followed. These principles are listed below:

Planning should be done before a project begins. For effective

planning, objectives and schedules should be clear and understandable.

Before starting the project, senior management and the project management

team should consider the risks that may affect the system. For example, the user may desire

changes in requirement while the project is in progress in such a case, the estimation of time

and cost should done according to those requirements

Once the project plan is prepared, it should be tracked and

modified accordingly.

The project plan should

identify processes by which the project management team can ensure quality in software, based

on the process selected for ensuring quality, the time and cost for the project is estimated.

: The result of project planning is

recorded in the form of a project plan, which should allow new changes to be accommodated

when the project is in progress.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 22


COLLEGE SOCIAL NETWORKING WEBSITE

METHODOLOGY ADOPTED

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 23


COLLEGE SOCIAL NETWORKING WEBSITE

6. METHODOLOGY ADOPTED

A software development methodology is a framework that is used to structure, plan, and control

the process of developing an information system, this includes the pre-definition of specific

deliverables and artefacts that are created and completed by a project team to develop or

maintain an application. A wide variety of such frameworks have evolved over the years, each

with its own recognized strengths and weakness. Each of the available methodology

frameworks are best suited to specific kinds of projects, based on various technical,

organizational, project and team considerations. The methodology framework is often defined

in some kind of formal documentation. To implement the project goals, the following

Methodologies need to be followed:

design tools.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 24


COLLEGE SOCIAL NETWORKING WEBSITE

6.1 Software Process Used:

6.1.1 Iterative Model:


The iterative model is a particular implementation of a software development life cycle

(SDLC) that focuses on an initial, simplified implementation, which then progressively gains

more complexity and a broader feature set until the final system is complete. Unlike the more

traditional waterfall model, which focuses on a stringent step-by-step process of development

stages, the iterative model is best thought of as a cyclical process. After an initial planning

phase, a small handful of stages are repeated over and over, with each completion of the cycle

incrementally improving and iterating on the software. Enhancements can quickly be

recognized and implemented throughout each iteration, allowing the next iteration to be at least

marginally better than the last.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 25


COLLEGE SOCIAL NETWORKING WEBSITE

 Planning & Requirements: As with most any development project, the first step is go through

an initial planning stage to map out the specification documents, establish software or

hardware requirements, and generally prepare for the upcoming stages of the cycle.

 Analysis & Design: Once planning is complete, an analysis is performed to nail down the

appropriate business logic, database models, and the like that will be required at this stage in

the project. The design stage also occurs here, establishing any technical requirements

(languages, data layers, services, etc) that will be utilized in order to meet the needs of

the analysis stage.

 Implementation: With the planning and analysis out of the way, the actual implementation and

coding process can now begin. All planning, specification, and design docs up to this point are

coded and implemented into this initial iteration of the project.

 Testing: Once this current build iteration has been coded and implemented, the next step is to

go through a series of testing procedures to identify and locate any potential bugs or issues that

have have cropped up.

 Evaluation: Once all prior stages have been completed, it is time for a thorough evaluation of

development up to this stage. This allows the entire team, as well as clients or other outside

parties, to examine where the project is at, where it needs to be, what can or should change, and

so on.

6.2 Software Description:


The Application of software is produced at the culmination of the analysis task. The function and

performance allocated to software as part of system engineering are refined by

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 26


COLLEGE SOCIAL NETWORKING WEBSITE

Establishing a complete information description as functional representation, a representation of system

behaviour, an indication of performance requirements and design constraints, appropriate validation

criteria

6.2.1 PHP Language (Back end):

PHP code may be embedded into HTML code, or it can be used in combination with

various web template systems, web content management systems, and web frameworks. PHP

code is usually processed by a PHP interpreter implemented as a module in the web server or

as a Common Gateway Interface (CGI) executable. The web server combines the results of the

interpreted and executed PHP code, which may be any type of data, including images, with the

generated web page. PHP code may also be executed with a command-line interface (CLI) and

can be used to implement standalone graphical applications.

The standard PHP interpreter, powered by the Zend Engine, is free software released under

the PHP License. PHP has been widely ported and can be deployed on most web servers on

almost every operating system and platform, free of charge.

The PHP language evolved without a written formal specification or standard until 2014,

leaving the canonical PHP interpreter as a de facto standard. Since 2014 work has gone on to

create a formal PHP specification.

PHP is an html-embedded scripting language. Much of its syntax is borrowed from c, java and

Perl with a couple of unique PHP-specific features thrown in. the goal of the language is to

allow web developers to write dynamically generated pages quickly. This is generally a good

definition of PHP. However, it does contain a lot of terms you may not be used to.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 27


COLLEGE SOCIAL NETWORKING WEBSITE

Another way to think of PHP is a powerful, behind the scenes scripting language that your

visitors won't see! When someone visits your PHP webpage, your web server processes the

PHP code. It then sees which parts it needs to show to visitors (content and pictures) and hides

the other stuff (file operations, math calculations, etc.) then translates your PHP into html. After

the translation into html, it sends the webpage to your visitor's web browser.

6.2.1.1 The PHP Syntax:

Before we talk about PHP's syntax, let us first define what syntax is referring to.

• Syntax - The rules that must be followed to write properly structured code.

PHP's syntax and semantics are similar to most other programming languages (c, java, perl)

with the addition that all PHP code is contained with a tag, of sorts. all PHP code must be

contained within the following <?php ?>.

6.2.1.2 PHP Variable:

A variable is a means of storing a value, such as text string "hello world!" or the integer

value 4. A variable can then be reused throughout your code, instead of having to type out the

actual value over and over again.

In PHP you define a variable with the following form:

• $variable name = value;

If you forget that dollar sign at the beginning, it will not work. This is a common mistake for

new PHP programmers.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 28


COLLEGE SOCIAL NETWORKING WEBSITE

6.2.1.3 Apache HTTP Server

The Apache HTTP Server, colloquially called Apache, is the world's most widely used web
server software. Originally based on the NCSA HTTP server, development of Apache began in
early 1995 after work on the NCSA code stalled. Apache played a key role in the initial growth
of the World Wide Web, quickly overtaking NCSA HTTP as the dominant HTTP server, and
has remained the most popular HTTP server since April 1996. In 2009, it became the first web
server software to serve more than 100 million websites.

Apache is developed and maintained by an open community of developers under the


auspices of the Apache Software Foundation. Most commonly used on a Unix-like system
(usually Linux), the software is available for a wide variety of operating systems, including
Windows, OS X, Linux, Unix, FreeBSD, Solaris, NetWare, OS/2, TPF and OpenVMS
Released under the Apache License, Apache is free and open-source software.

6.2.1.4 Database MySQL:

A database is a separate application that stores a collection of data. Each database has one or

more distinct APIs for creating, accessing, managing, searching and replicating the data it

holds. Other kinds of data stores can be used, such as files on the file system or large hash

tables in Memory but data fetching and writing would not be so fast and easy with those types

of systems. So nowadays, we use relational database management systems (RDBMS) to store

and manage huge volume of data. This is called relational database because all the data is

stored into different tables and relations are established using primary keys or other keys

known as foreign keys.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 29


COLLEGE SOCIAL NETWORKING WEBSITE

6.2.1.5 MySQL Database:

MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.

MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish company.

MySQL is becoming so popular because of many good reasons:

MySQL is released under an open-source license. So you have nothing to pay to use it.

MySQL is a very powerful program in its own right. It handles a large subset of the

Functionality of the most expensive and powerful database packages.

MySQL uses a standard form of the well-known SQL data language.

MySQL works on many operating systems and with many languages including PHP,

PERL, C, C++, JAVA, etc.

MySQL is customizable. The open-source GPL license allows programmers to modify

The MySQL software to fit their own specific environments.

MySQL works very quickly and works well even with large data sets.

MySQL is very friendly to PHP, the most appreciated language for web development.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 30


COLLEGE SOCIAL NETWORKING WEBSITE

SYSTEM IMPLEMENTATION &

DETAILS OF HARDWARE &

SOFTWARE USED.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 31


COLLEGE SOCIAL NETWORKING WEBSITE

7. SYSTEM IMPLEMENTATION & DETAILS OF


HARDWARE & SOFTWARE USED.

Implementation is the stage in the project where the theoretical design is turned into a working

system and is giving confidence on the new system for the users, which it will work efficiently

and effectively. It involves careful planning, investigation of the current system and its

constraints on implementation, design of methods to achieve the change over an evolution, of

change over methods. Apart of planning major task of preparing the implementation are

education and training of users. The more complex system being implemented, the more

involved will be the system analysis and the design effort required just for implementation.

An implementation co-ordination committee based on policies of individual organization has

been appointed. The implementation process begins with preparing a plan for the

implementation of the system. According to this plan, the activities are to be carried out,

discussions made regarding the equipment and resources and the additional equipment has to

be acquired to implement the new system.

7.1 Steps Taken to Implementation:


Hosting: Rented file space on a hosting company's web server. We put your website files on

this space, and the web server serves the content to web users who request it.

Domain-Name: The unique address where people can find your website,

like http://www.mozilla.org, or http://www.bbc.co.uk. We rent domain name from a domain

registrar.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 32


COLLEGE SOCIAL NETWORKING WEBSITE

In addition, We require a File Transfer Protocol (FTP) program (see How much does it cost:

software for more details) to actually transfer the website files over to the server. FTP programs

vary widely, but generally we have to log on to your web server using details provided by your

hosting company (e.g. username, password, host name).

7.2 System Architecture

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 33


COLLEGE SOCIAL NETWORKING WEBSITE

7.3 SOFTWARE SPECIFICATION FOR SERVER

Operating System -- Windows7, Windows10 or (Any OS)

Web Server -- Apache 2.2

Database -- MySQL

7.4 HARDWARE SPECIFICATION FOR CLIENT

Processor -- INTEL P2 and above

RAM -- 512 MB and above

7.5 SOFTWARE SPECIFICATION FOR CLIENT

Operating System -- Windows7, Windows10 or Any OS.

Web Browser -- Google Chrome or Mozilla FireFox

7.6 HARDWARE SPECIFICATION FOR CLIENT

Hardware specification of the system that is used in this project is,

Processor Dual core or above with min 2.4 GHZ

Memory 1 GB Min RAM

Hard disk 5 GB Min with free space

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 34


COLLEGE SOCIAL NETWORKING WEBSITE

SYSTEM MAINTENANCE &

EVALUATION

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 35


COLLEGE SOCIAL NETWORKING WEBSITE

8. SYSTEM MAINTENANCE & EVALUATION

8.1 System Maintenance:


The results obtained from the evaluation process help the organization to determine whether its

information systems are effective and efficient or otherwise. The process of monitoring

evaluating and modifying of existing information systems to make required or desirable

improvements may be termed as System Maintenance.

System Maintenance is an ongoing activity, which covers a wide variety of activities, including

removing program and design errors, updating documentation and test data and updating user

support. For the purpose of convenience, maintenance may be categorized into three classes,

namely: Corrective Maintenance, Adaptive Maintenance, and Perfective Maintenance.

a) Corrective Maintenance: This type of maintenance implies removing errors in a program,

which might have crept in the system due to faulty design or wrong assumptions. Thus, in

corrective maintenance, processing or performance failures are repaired.

b) Adaptive Maintenance: In adaptive maintenance program functions are changed to enable

the information system to satisfy the information needs of the user. This type of maintenance

may become necessary because of organizational changes which may include:

ds of managers.

c) Perfective Maintenance: Perfective Maintenance means adding new programs or modifying

the existing programs to enhance the performance of the information system. This type of

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 36


COLLEGE SOCIAL NETWORKING WEBSITE

Maintenance undertaken to respond to user’s additional needs which may be due to the changes

within or outside of the organization. Outside changes are primarily environmental changes,

which may in the absence of system maintenance, render the information system in effective

and inefficient. These environmental changes include:

ernmental policies, laws, etc.

8.1.1 Steps Taken To Maintain The Website

 Keep our site secure because websites get hacked, and hacked sites lose visitors and

traffic.

 Preventing from losing everything by keeping a regular backup schedule.

 Prevent disgruntled users because something doesn’t work or we provide a broken

link.

 Keep regular visitor happy by giving them fresh, updated information and exciting

news.

8.1.2 Importance of Software Maintenance:

managerial and technical. Key management

issues are: alignment with customer priorities, staffing, which organization does maintenance,

estimating costs.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 37


COLLEGE SOCIAL NETWORKING WEBSITE

ysis, testing, and maintainability

measurement.

hange the software after it is in operation is considered to be maintenance

work. The purpose is to preserve the value of software over the time. The value can be enhanced

by expanding the customer base, meeting additional requirements, becoming easier to use.

Maintenance may span for 20 years, whereas development may be 1-2 years.

8.2 Evaluation:
8.2.1 Hardware Evaluation Factors:

When we evaluate computer hardware, we should first investigate specific physical and

performance characters for each hardware component to be acquired. These specific questions

must be answered concerning many important factors. These hardware evaluation factors are:

Performance, Cost, Reliability, Availability, Compatibility, Modularity, Technology,

Connectivity, Environmental requirements, Software. There is much more to evaluating

hardware then determining the fastest and cheapest computing device. For example the question

of possible obsolescence much be addressed by making a technology evaluation. The factor of

ergonomics is also very important.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 38


COLLEGE SOCIAL NETWORKING WEBSITE

8.2.2 Software Evaluation Factors:

Software can be evaluated according to many factors similar to hardware evaluation. Thus the

factors of Performance, Cost, Reliability, Availability, Compatibility, Modularity, Technology,

Ergonomics, Connectivity, Environmental requirements, Software, Support should be used to

evaluate proposed software acquisitions. In addition, however, the software evaluation factors

are summarized below. For example some software packages required too much memory

capacity and are notoriously slow, hard to use are poorly documented. They

are not a good selection for most end users, even if offered at attractive prices.

a) Efficiency: It is the software a well-written system of computer instructions that does

not use much memory capacity time?

b) Flexibility: Can it handle its processing assignments easily without major modifications

c) Security: Does it provide control procedures for error, malfunctions and improper use?

d) Language: Do our computer programmers and users write it in a programing language

that is used?

e) Documentation: Is the software well documented? Does it include helpful user

instructions?

f) Hardware: Does existing hardware have the pictures required to best use this software?

8.3 COCOMO Model:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 39


COLLEGE SOCIAL NETWORKING WEBSITE

The Constructive Cost Model (COCOMO) is an algorithmic software cost estimation model

developed by Barry Boehm. The model uses a basic regression formula with parameters that

are derived from historical project data and current as well as future project characteristics.

In detailed COCOMO, the effort is calculated as function of program size and a set of cost

drivers given according to each phase of software life cycle. A Detailed project schedule is

never static. The five phases of detailed COCOMO are:-

➢ Plan and requirement.

➢ System Design and Analysis.

➢ Implement code and test.

➢ Integration and test.

Requirement Gathering and Analysis = 20 days

System Design and Analysis = 20 days

Implement Code and Test = 48 days

Integration and Test = 5 days

Effort cost Estimation = 120 Rs/day

Total Cost of the Project = 93 * 120 = 11,160 rupees

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 40


COLLEGE SOCIAL NETWORKING WEBSITE

COST AND BENEFIT ANALYSIS

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 41


COLLEGE SOCIAL NETWORKING WEBSITE

9. COST AND BENEFIT ANALYSIS

9.1 Cost and benefit analysis:


Developing an IT application is an investment. Since after developing that application it

provides the organization with profits. Profits can be monetary or in the form of an improved

working environment. However, it carries risks, because in some cases an estimate can be

wrong. And the project might not actually turn out to be beneficial. Cost benefit analysis helps

to give management a picture of the cost, benefits and risks. Cost benefit determines the benefits

and saving that are expected the system and compares them with the expected costs. In

performing cost and benefit analysis it is important to identify cost and benefit factors. Cost

and benefits can be categorized into the following categories:

• Development Costs: Development costs is the costs that are incurred during the development

of the system. It is one time investment.

• Operating Costs: Operating costs are the expenses required for the day to day running

of the system. Examples of operating costs are Wages, Supplies and Overheads.

• Hardware/Software Costs: It includes the cost of purchasing or leasing of computers and its

peripherals. Software costs involve required S/W costs.

• Personnel Costs: It is the money spent on the people involved in the development of the

system.

We can define benefits as Profit or Benefit = Income – Cost

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 42


COLLEGE SOCIAL NETWORKING WEBSITE

Benefits can be accrued by: Increasing Income, Decreasing costs and both.

PROCESS PHASE COST INVOLVED

Requirement Gathering and Analysis Rs. 2400/-

System Design and Analysis Rs. 2400/-

Implement Code and Test Rs. 5760/-

Integration and Test Rs. 600/-

Total Rs. 11,160/-

The estimated income is 15,000 and cost involved in development is 11,160, so the benefit

Figured is = 15,000(Income) – 11,160(Cost involved)

The total Benefit is 3,840.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 43


COLLEGE SOCIAL NETWORKING WEBSITE

DETAILED LIFE CYCLE OF


THE PROJECT

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 44


COLLEGE SOCIAL NETWORKING WEBSITE

10.DETAILED LIFE CYCLE OF THE PROJECT

10.1 Life Cycle:


Life cycle is an organizational process of developing and maintaining systems. It helps in

establishing a system project plan, because it gives overall list of processes and sub processes

required for developing a system. Development life cycle means combination of various

activities. In other words we can say that various activities put together are referred as system

development life cycle. In the system analysis and design terminology, the system development

life cycle means software development life cycle. The different phases of software development

cycle: System study, Feasibility study, System analysis, System design, Coding, Database

creation, Database connectivity, Testing, Implementation, Maintenance.

10.2 Entity Relationship Diagram:


The relation upon the system is structure through a conceptual ER-Diagram, which not only

specifies the existential entities but also the standard relations through which the system exists

and the cardinalities that are necessary for the system state to continue. The Entity Relationship

Diagram (ERD) depicts the relationship between the data objects.

The ERD is the notation that is used to conduct the date modelling activity the attributes of each

data object noted is the ERD can be described resign a data object descriptions. The primary

purpose of the ERD is to represent data objects and their relationships.

The set of primary components that are identified by the ERD are:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 45


COLLEGE SOCIAL NETWORKING WEBSITE

a object

butes

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 46


COLLEGE SOCIAL NETWORKING WEBSITE

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 47


COLLEGE SOCIAL NETWORKING WEBSITE

10.3 Data Flow Diagram:

A data flow diagram is graphical tool used to describe and analyse movement of data through

a system. These are the central tool and the basis from which the other components are

Developed . The transformation of data from input to output, through processed, may be

described logically and independently of physical components associated with the system.

These are known as the logical data flow diagrams. In the DFD, there are four symbols

h the information flows.

outgoing

data flows.

10.3.1 Level 0 DFD:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 48


COLLEGE SOCIAL NETWORKING WEBSITE

10.3.2 Level 1 DFD:

10.3.3 Level 2 DFD

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 49


COLLEGE SOCIAL NETWORKING WEBSITE

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 50


COLLEGE SOCIAL NETWORKING WEBSITE

10.4 Use Case Diagram:

A use case diagram is a graphic depiction of the interactions among the elements of a system.

A use case is a methodology used in system analysis to identify, clarify and organize system

requirements. The use cases, which the specific roles are played by the actors within and around

the system. These are usually referred as behaviour diagrams used to describe a set of actions

(use cases) that some systems (subject) should or can perform in collaboration with one or more

external users of the system (actors). Each use case should provide some observable and

valuable result to the actors or other stakeholders of the system.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 51


COLLEGE SOCIAL NETWORKING WEBSITE

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 52


COLLEGE SOCIAL NETWORKING WEBSITE

SNAPSHOTS

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 53


COLLEGE SOCIAL NETWORKING WEBSITE

11. SNAP SHOTS

College Social Network Main Form:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 54


COLLEGE SOCIAL NETWORKING WEBSITE

Admin Login Form:

Admin Home Page:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 55


COLLEGE SOCIAL NETWORKING WEBSITE

Admin Page (Approve Post):

Student Login:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 56


COLLEGE SOCIAL NETWORKING WEBSITE

Student Homepage:

Faculty Login:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 57


COLLEGE SOCIAL NETWORKING WEBSITE

Faculty Homepage:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 58


COLLEGE SOCIAL NETWORKING WEBSITE

PROCESS INVOLVED

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 59


COLLEGE SOCIAL NETWORKING WEBSITE

12. PROCESS INVOLVED

Project process is also referred to as the development and normal life period of the project. It

is the actual management of a project in practical terms. This is the level when the projects

inputs are transformed into outputs via the project activities following the laid down work

plan. This leads to the attainment of immediate objectives.

It involves the coordinating, monitoring and control of the performance of the various project

groups and the use of project resources in such a way that the project activities are completed

in an orderly and optimal fashion within the constraint of time and resources available.

12.1 Approaches To Project Implementation:

12.1.1 Top-Down Approach:


The top-down methodology has been recently developed to produce provably perform and

designs relative to what is achieved in classical centralized control theory. Ideally the designer

should start from the definition of an objective that involves global quantities, then devise a

centralized optimization algorithm and finally proceed to the synthesis of the decentralized

(agent-based) solution. The design process consists of three steps: modelling, synthesis and

Analysis / optimization

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 60


COLLEGE SOCIAL NETWORKING WEBSITE

a) Modelling: In this phase the designer identifies and categorizes system’s agents according

to the following taxonomy derived from classical Control Theory. Modelling agents collect data

from many information agents and update internal estimates of the “real world” state. Planning

agents use the current world state estimates, the viable action or control options and the current

goals to plan new actions to carry out. These agents may need to ask brokering agents to report

on available resources such as additional state and action information.

b) Synthesis: Agent controllers are designed following the lines of a three-stage top-down

Process:

 At first, it is assumed that each agent can access remote resources local to other agents

instantly and with infinite precision. So a first centralized solution aimed at optimizing

a global objective is designed.

 Next, limitations of the distributed environment are applied and so the visibility of each

agent gradually reduced. Consequently inter-agent communication issues arise for now

each agent needs to replace global resources with local resources with local resources.

 The result is a fully decentralized solution; finally, the obtained solution must be

calibrated via parameter tuning.

d) Analysis/Optimization: The inter-agent communication must be optimized in order for

the distributed system to perform as predicted at the beginning of the synthesis phase. The

Analysis conducted in this phase may lead to review (feedback) of the original Modelling

of the agent system thus creating a cycle.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 61


COLLEGE SOCIAL NETWORKING WEBSITE

12.1.2 Bottom-Up Approach:


The bottom-up design methodology is very popular for producing autonomous, scalable and

adaptable systems often requiring minimal communication. The design process consists of three

steps: Synthesis, Modelling and Analysis, and Optimization.

a) Synthesis: In the Synthesis phase one has to define the agent the controller which can be

described by any automation that is the behavioural representation of an agent. In the case of a

reactive agent the controller can be characterized by a finite state automaton (FSA). Each state

of the automaton represents the action or a behaviour the agent is executing, with transitions

coupling it to other states. Consequently, the behavioural dynamics of a reactive agent can be

considered as an ordinary Markov process.

b) Modelling and Analysis: Once a controllers for individual agents have been constructed,

one need to develop a mathematical model of the collective behaviour. Remarkably, the finite

Automation of a single agent in many cases can be used for adequately describing the

macroscopic or collective behaviour of a large-scale system composed of many such

controllers. The model consists of coupled differential equations describing how the average

group behaviour changes in time. This modelling approach is based on the theory of stochastic

process.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 62


COLLEGE SOCIAL NETWORKING WEBSITE

c) Optimization: Mathematical model can be used not only to validate the controller, but also

to estimate individual parameters that optimize group-level performance. Using mathematical

analysis one can finally answer a number of design questions.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 63


COLLEGE SOCIAL NETWORKING WEBSITE

METHODOLOGY USED FOR


TESTING

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 64


COLLEGE SOCIAL NETWORKING WEBSITE

13. METHODOLOGY USED FOR TESTING

13.1 Type of Testing:

System testing:

Testing phase is very important phase in system developing. No software project is assumed

complete until it is tested and elaborated test data is prepared and the system is tested using that

test data. While testing, error are noted further use both hardware and software securities are

made to run the developed system successfully future.

 Testing is the process of executing a program with the intent of finding error.

 A good test case is the one high probability of finding as undiscovered error.

Unit Testing

This type of testing is performed by the developers before the setup is handed over to the testing

team to formally execute the test cases. Unit testing is performed by the respective developers

on the individual units of source code assigned areas. The developers use test data that is

separate from the test data of the quality assurance team.

The goal of unit testing is to isolate each part of the program and show that individual parts are

correct in terms of requirements and functionality. We have applied unit testing to a particular

module like admin student result and modules.

Integration Testing

The testing of combined parts of an application to determine if they function correctly together

is Integration testing. There are two methods of doing Integration Testing Bottom-Up

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 65


COLLEGE SOCIAL NETWORKING WEBSITE

Integration testing and Top down Integration testing. We have applied integration testing on

three modules and have integrated it and we have also checked the communication by applying

integration testing.

We have applied integration testing on three modules and have integrated it and we have also

checked the communication by applying integration testing.

In a comprehensive software development environment, bottom-up testing is usually done first,

followed by top-down testing. The process concludes with multiple tests of the complete

application, preferably in scenarios designed to mimic those it will encounter in customers'

computers, systems and network.

Validation testing:

At the culmination of integration testing, software is said to be completely assembled as a

package, interfacing error have been uncovered and corrected. Then as final series of software

Test: Validation tests were carried out.

We have applied validation on each field like login phase registration phase etc.

Output testing:

After performing the validation testing the next step is output of the developed system since no

system would be useful if it does not produce the desired output. The outputs were perfectly

according to the specification.

13.2 Methodology used for testing:


Types of testing:
BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 66
COLLEGE SOCIAL NETWORKING WEBSITE

13.2.1 Black Box Testing

The technique of testing without having any knowledge of the interior workings of the

application is Black Box testing. The tester is oblivious to the system architecture and does not

have access to the source code. Typically, when performing a black box test, a tester will

interact with the system's user interface by providing inputs and examining outputs without

knowing how and where the inputs are worked up on.

Advantages Disadvantages

Well suited and efficient for large code • Limited Coverage since only a
segments. selected number of test scenarios are
actually performed.

• Code Access not required. • Inefficient testing, due to the fact that
the tester only has limited knowledge
about an application.

• Clearly separates user's perspective from • Blind Coverage, since the specific
the developer's perspective through visibly code segments or error prone areas.
defined roles.

• Large numbers of moderately • The test cases are difficult to design.


skilled testers can test the
application with no knowledge of
implementation, programming
language or operating systems

13.2.2 White Box Testing


White box testing is the detailed investigation of internal logic and structure of the code. White

box testing is also called glass testing or open box testing. In order to perform white box testing

on an application, the tester needs to possess knowledge of the internal working of the code.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 67


COLLEGE SOCIAL NETWORKING WEBSITE

The tester needs to have a look inside the source code and find out which unit/chunk of the code

is behaving inappropriately.

Advantages Disadvantages

• As the tester has knowledge of the source • Due to the fact that a skilled tester is

code, it becomes very easy to find out which needed to perform white box testing, the

type of data can help in testing the costs are increased.

application effectively.

• It helps in optimizing the code. • Sometimes it is impossible to look into

every nook and corner to find out hidden

errors that may create problems as many

paths will go untested.

• Extra lines of code can be removed which • It is difficult to maintain white box testing

can bring in hidden defects as the use of specialized tools like code

analysers and debugging tools are required.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 68


COLLEGE SOCIAL NETWORKING WEBSITE

13.3 Test Cases Used


Test Testing Unit Input Expected Actual Test Case
Case Output Output Pass/Fail
No.

T.1 Admin login screen Valid Admin Admin Passed


Username homepage homepage
and will be will be
Password displayed displayed
Invalid Error Error Passed
Username Message Message
and Displayed Displayed
Password
If fields are Give an Give an error Passed
kept empty error to fill to fill the
the missing missing
fields fields
T.2 Faculty registration Valid Faculty Faculty Passed
Faculty data registered registered
successfully

Invalid Faculty not Faculty not Passed


Faculty data registered registered

If fields are Give an Give an error Passed


kept empty error to fill to fill the
the missing missing
fields fields

T.3 Student registration Valid Student Student Passed


Student data registered registered
successfully

Invalid Student not Student not Passed


student data registered registered

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 69


COLLEGE SOCIAL NETWORKING WEBSITE

SOURCE CODE

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 70


COLLEGE SOCIAL NETWORKING WEBSITE

14. SOURCE CODE

INDEX.php
<?php

include 'connection.php';

session_start();

if(isset($_REQUEST['stdlog'])) //Login for Student

$u=$_POST['suname'];

$p=$_POST['spass'];

$result=mysql_query("select id from studreg where userstud='$u'


and passtud='$p'");

$row= mysql_fetch_assoc($result);

$id=$row['id'];

if(mysql_num_rows($result)>0)

$_SESSION['uid']=$id;

header("location:stuhome.php");

?>

<script>

alert("You have logged in");

</script>

<?php

else

?>

<script>

alert("Please Sign-Up first");

</script>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 71


COLLEGE SOCIAL NETWORKING WEBSITE

<?php

if(isset($_REQUEST['faclog'])) //Login for Faculty

$u=$_POST['funame'];

$p=$_POST['fpass'];

$result=mysql_query("select id from facreg where userfac='$u' and


password='$p'");

$row= mysql_fetch_assoc($result);

$id=$row['id'];

if(mysql_num_rows($result)>0)

$_SESSION['uid']=$id;

header("location:fachome.php");

?>

<script>

alert("You have logged in");

</script>

<?php

else

?>

<script>

alert("Please Sign-Up first");

</script>

<?php

if(isset($_REQUEST['adminlog'])){ //Login for Admin

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 72


COLLEGE SOCIAL NETWORKING WEBSITE

$u=$_POST['adusn'];

$p=$_POST['adpass'];

$result=mysql_query("select * from adminreg where username='$u' and


password='$p'");

if(mysql_num_rows($result)>0)

$_SESSION['useradmin']=$u;

header("location:adhome.php");

?>

<script>

alert("You have logged in");

</script>

<?php

else

?>

<script>

alert("Please Sign-Up first");

</script>

<?php

?>

<!DOCTYPE html>

<html>

<head>

<title>

College Social Network

</title>

<link rel="stylesheet" href="navdes.css">

<script>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 73


COLLEGE SOCIAL NETWORKING WEBSITE

function val()

if(!/^[a-zA-Z]*$/g.test(document.myForm.suname.value))

alert('Enter Only Name');

document.myForm.suname.focus();

return false;

return true;

function val1()

if(!/^[a-zA-Z]*$/g.test(document.myForm1.adusn.value))

alert('Enter Only Name');

document.myForm.adusn.focus();

return false;

return true;

function val2()

if(!/^[a-zA-Z]*$/g.test(document.myForm2.funame.value))

alert('Enter Only Characters');

document.myForm.funame.focus();

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 74


COLLEGE SOCIAL NETWORKING WEBSITE

return false;

return true;

function myFunction() {

var x = document.getElementById("myTopnav");

if (x.className === "topnav") {

x.className += " responsive";

} else {

x.className = "topnav";

</script>

</head>

<link href="css/bootstrap.css" rel="stylesheet" />

<link href="css/bootstrap-theme.css" rel="stylesheet" />

<meta name="viewport" content="width=device-width intital-scale=1">

<style>

.box/* Used for the rectangular Div */

width:85%;

margin-left:auto;

margin-right:auto;

border: 1px solid;

padding:154px;

margin-top:10%;

text-align:center;

border-style:double;

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 75


COLLEGE SOCIAL NETWORKING WEBSITE

.nav-pills /*used for the Menu Bar */

font-size:20px;

background-color:#20282e;

margin-top:0px;

padding:25px;

.header

position: sticky;

top: 0;

z-index: 100;

background-color:black;

.login {

margin: 20px auto;

width: 800px;

.login-screen {

background-color: #FFF;

padding: 20px;

border-radius: 5px

.app-title {

text-align: center;

color: #777;

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 76


COLLEGE SOCIAL NETWORKING WEBSITE

.login-form {

text-align: center;

.control-group {

margin-bottom: 10px;

input {

text-align: center;

background-color: #ECF0F1;

border: 2px solid transparent;

border-radius: 3px;

font-size: 16px;

font-weight: 200;

padding: 10px 0;

width: 250px;

transition: border .5s;

input:focus {

border: 2px solid #3498DB;

box-shadow: none;

.btn {

border: 2px solid transparent;

background: #3498DB;

color: #ffffff;

font-size: 16px;

line-height: 25px;

padding: 10px 0;

text-decoration: none;

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 77


COLLEGE SOCIAL NETWORKING WEBSITE

text-shadow: none;

border-radius: 3px;

box-shadow: none;

transition: 0.25s;

display: block;

width: 250px;

margin: 0 auto;

.btn:hover {

background-color: #2980B9;

.login-link {

font-size: 12px;

color: #444;

display: block;

margin-top: 12px;

.container-fluid {

padding-right: 0px !important;

padding-left: 0px !important;

#myPageContent, section {

height:100% !important;

width:100% !important;

/* Slider */

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 78


COLLEGE SOCIAL NETWORKING WEBSITE

#textSlider.row {

position: absolute;

top: 50%;

left: 50%;

transform: translate(-50%, -50%);

width: 100% !important;

#textSlider div {

color: #FFF;

font-family: 'Lato', sans-serif;

text-transform: uppercase;

.iamCol {

text-align: right;

float: left;

font-weight: 300;

font-size:30pt;

.iamCol p:nth-child(2) { margin-top: -20pt !important; }

.slideCol {

text-align: left;

overflow: hidden;

font-weight: 900;

font-size:70pt;

display: block;

white-space: nowrap;

.slideCol p { margin: 0px !important; }

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 79


COLLEGE SOCIAL NETWORKING WEBSITE

.scroller {

height: 70pt;

line-height: 70pt;

overflow: hidden;

.scroller .inner { animation: 10s normal infinite running scroll; }

@keyframes scroll {

0% {margin-top: 0px;}

15% {margin-top: 0px;}

25% {margin-top: -70pt;}

40% {margin-top: -70pt;}

50% {margin-top: -140pt;}

65% {margin-top: -140pt;}

75% {margin-top: -210pt;}

90% {margin-top: -210pt;}

100% {margin-top: 0px;}

/*========== Mobile First Method ==========*/

/* Custom, iPhone Retina */

@media only screen and (min-width : 320px) and (max-width : 479px) {

#textSlider.row { margin-right: 0px !important; margin-left:


0px !important; }

.iamCol { text-align: center; font-size:20pt; }

.iamCol p { display: inline !important; }

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 80


COLLEGE SOCIAL NETWORKING WEBSITE

.slideCol { font-size: 25pt; text-align: center; margin-top:


-20px; }

/* Extra Small Devices, Phones */

@media only screen and (min-width : 480px) and (max-width : 765px) {

#textSlider.row { margin-right: 0px !important; margin-left:


0px !important; }

.iamCol { text-align: center; font-size:25pt; }

.iamCol p { display: inline !important; }

.slideCol { font-size: 38pt; text-align: center; margin-top:


-20px; }

/* Small Devices, Tablets */

@media only screen and (min-width : 768px) and (max-width : 992px) {

#textSlider.row { margin-right: 0px !important; margin-left:


0px !important; }

.iamCol { text-align: center; font-size:30pt; }

.iamCol p { display: inline !important; }

.slideCol { font-size: 50pt; text-align: center; margin-top:


5px; }

/* Medium Devices, Desktops */

@media only screen and (min-width : 992px) and (max-width : 1200px) {

#textSlider.row { margin-right: 0px !important; margin-left:


0px !important; }

.iamCol { text-align: right; font-size:30pt; }

.slideCol { font-size: 55pt; text-align: left; }

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 81


COLLEGE SOCIAL NETWORKING WEBSITE

</style>

<script src="js/bootstrap.min.js"></script>

<link href="backdes.css" rel="stylesheet" />

<body >

<div class="topnav header nav-pills" id="myTopnav" style="background-


color:#20282e; padding:15px;">

<a href="index.php" > <img src="ASHOK logo1.png" height="45px"


width="55px" /></a>

<div style="margin-left:50%">

<a href="#home" class="active "><span class="glyphicon glyphicon-home">


</span>Home</a>

<a href="#about" > <span class="glyphicon glyphicon-info-sign">


</span>About</a>

<a href="#student"> <span class="glyphicon glyphicon-user">


</span>Student</a>

<a href="#admin"> <span class="glyphicon glyphicon-cog"></span>


Admin</a>

<a href="#faculty"> <span class="glyphicon glyphicon-


briefcase"></span> Faculty</a>

</div>

<a href="javascript:void(0);" class="icon"


onclick="myFunction()">&#9776;</a>

</div>

<div class="container" id="about" >

<div class="row " >

<div class="col-md-12" style="margin-top:10%;" >

<div id="myPageContent" class="container-fluid" >

<section id="home">

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 82


COLLEGE SOCIAL NETWORKING WEBSITE

<div id="textSlider" class="row" >

<div class="col-xs-12 col-sm-12 col-md-3 col-lg-4 iamCol">

<p>College Social </p>

<p>Network</p>

</div>

<div class="col-xs-12 col-sm-12 col-md-7 col-lg-8 slideCol">

<div class="scroller">

<div class="inner">

<p>Dreamers</p>

<p>Thinkers</p>

<p>Doers</p>

</div>

</div>

</div>

</div>

</section>

</div>

</div>

<div class="col-md-12 centered" style="margin-bottom:40%;margin-


top:20%;">

<h3>About</h3>

<h4 style="padding:2px;">The College Program affiliated to Mumbai


University is designed for students who are interested in pursuing
rewarding careers in the field of Information Technology. The program
encompasses foundational courses, core courses dealing with latest tools
and techniques, with an optimal blend of theory and practice. It is
comprehensive incorporating the study of both hardware and software and
their underlying principles. Students learn in the areas of Electronics,
Programming Languages, Computer Organization & Architecture, Visual
Programming, System Programming, Microprocessors, Internet Programming,
Computer Graphics, E-Commerce & Web Designing, Data Base Management
Systems, Software Engineering, etc.Students get opportunities for industry-
based project work. Practical experience in design projects and lab study
supplement theoretical education.The course prepares students to
demonstrate professional competence in computer applications and developing
software. </h4>

</div>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 83


COLLEGE SOCIAL NETWORKING WEBSITE

<div class="col-md-8 col-md-offset-2" id="student" style="margin-


bottom:40%;margin-top:20%;background-color:white;"
onmouseover="this.style.background='#3498DB';"
onmouseout="this.style.background='white';this.style.color='black';"><!--
For Student -->

<h3 class="well" style="margin-bottom:10%;"> <center> Login </center></h3>


<h3><center> Student Login </center> </h3>

<form method="POST" name="myForm" sttyle="margin-top:90%" >

<div class="login-screen">

<div class="app-title">

</div>

<div class="login-form">

<div class="control-group">

<span class="glyphicon glyphicon-user"></span> <input type="text"


maximum="8" name="suname" placeholder="Username" >

</div>

<div class="control-group">

<span class="glyphicon glyphicon-lock"></span> <input


type="password" maximum="8" name="spass" placeholder="Password" >

<label class="login-field-icon fui-lock"


for="login-pass"></label>

</div>

<button class="btn btn-primary btn-large btn-


block" name="stdlog" onclick="val()"><span class="glyphicon glyphicon-log-
in"> </span> &nbsp;Login</button>

<a href="changepass.php" style="text-decoration:none;color:black;


"> Forget/Reset Password </a>

</div>

</div>

</form>

</div><!-- End For Div of Student -->

<div class="col-md-8 col-md-offset-2" id="admin" style="margin-


bottom:40%;margin-top:20%;background-color:white;"
onmouseover="this.style.background='#3498DB';"
onmouseout="this.style.background='white';this.style.color='black';" ><!--
For Admin-->

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 84


COLLEGE SOCIAL NETWORKING WEBSITE

<h3 class="well" style="margin-bottom:10%;"> <center> Login </center></h3>


<center> <h3>Admin Login</h3> </center>

<form method="POST" name="myForm1" >

<div class="login-screen">

<div class="app-title">

</div>

<div class="login-form">

<div class="control-group">

<span class="glyphicon glyphicon-user"></span> <input type="text"


class="login-field" id="utxt" maximum="8" name="adusn"
placeholder="Username" >

</div>

<div class="control-group">

<span class="glyphicon glyphicon-lock"></span> <input


type="password" class="login-field" maximum="8" name="adpass"
placeholder="Password" >

</div>

<button class="btn btn-primary btn-large btn-block" name="adminlog"


onclick="val1()"><span class="glyphicon glyphicon-log-in"> </span> &nbsp;
Login</button>

</div>

</div>

</form>

</div>

<div class="col-md-8 col-md-offset-2" id="faculty" style="margin-


bottom:40%;margin-top:20%;background-color:white;"
onmouseover="this.style.background='#3498DB';"
onmouseout="this.style.background='white';this.style.color='black';" ><!--
For Faculty -->

<form method="POST" name="myForm2" >

<h3 class="well" style="margin-bottom:10%;"> <center> Login


</center></h3><center> <h3> Faculty Login </h3> </center><div
class="login-screen" >

<div class="app-title"></div>

<div class="login-form" >

<div class="control-group">

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 85


COLLEGE SOCIAL NETWORKING WEBSITE

<span class="glyphicon glyphicon-user"></span> <input type="text"


class="login-field" id="utxt" maximum="8" name="funame"
placeholder="Username">

<label class="login-field-icon fui-user" for="login-name"></label>

</div>

<div class="control-group">

<span class="glyphicon glyphicon-lock"></span> <input type="password"


class="login-field" placeholder="password" maximum="8" name="fpass"
placeholder="Password" >

<label class="login-field-icon fui-lock" for="login-pass"></label>

</div>

<button class="btn btn-primary btn-large btn-block" onclick="val2()"


name="faclog"><span class="glyphicon glyphicon-log-in"> </span> &nbsp;
Login</button>

<a href="fchangepass.php" style="text-decoration:none;color:black; " >


Forget/Reset Password </a></div>

</div>

</form>

</div>

</div>

</div>

<div class="navbar navbar-default navbar-fixed-bottom">

<div class="container">

<p class="text-justify"><strong><center> College Social Network


&copy;</center> </strong> </p>

</div>

</div>

</body>

</html>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 86


COLLEGE SOCIAL NETWORKING WEBSITE

Adminhome.php
<?php

include 'connection.php';

if(isset($_REQUEST['rfac']))

$fname=$_POST['fname'];

$fdes=$_POST['fdesig'];

$fdob=$_POST['dob'];

$fmail=$_POST['femail'];

$funame=$_POST['funame'];

$fpass=$_POST['fpass'];

$fmob=$_POST['mob'];

$fprofile=$_FILES['fProfile']['name'];

$ftemp=$_FILES['fProfile']['tmp_name'];

if($_FILES['fProfile']['size'] > 2000000 )

echo "<script>alert('File to Large Please Select another


File')</script>";

else

move_uploaded_file($ftemp,"profile/$fprofile");

$val=mysql_query("select userfac,password from facreg where


userfac='$funame' and password='$fpass' ");

if(mysql_num_rows($val)>0)

echo "<script> alert('Already Registered'); </script>";

else

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 87


COLLEGE SOCIAL NETWORKING WEBSITE

/*Start of SMS Package */

// Authorisation details.

$username = "naikashok08@gmail.com";

$hash =
"486dbbf9b90cbe85b8e6581058e0616b8d8747ecb537d3dbc1000d1e0df76b66";

// Config variables. Consult http://api.textlocal.in/docs for more info.

$test = "0";

// Data for text message. This is the text message data.

$sender = "TXTLCL"; // This is who the message appears to be from.

// $numbers = "8879920190,$fmob";

// A single number or a comma-seperated list of numbers

$message = " Your Username=".$funame."password=".$fpass." now you are a


part of college Socail network .";

// 612 chars or less

// A single number or a comma-seperated list of numbers

$message = urlencode($message);

$data =
"username=".$username."&hash=".$hash."&message=".$message."&sender=".$sende
r."&numbers=".$fmob."&test=".$test;

$ch = curl_init('http://api.textlocal.in/send/?');

curl_setopt($ch, CURLOPT_POST, true);

curl_setopt($ch, CURLOPT_POSTFIELDS, $data);

curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);

$result = curl_exec($ch); // This is the result from the API

curl_close($ch);

/*

echo "<pre>";

print_r($result);

exit;

End of SMS Package */

$query=mysql_query("INSERT INTO
facreg(name,Designation,DOB,email,fac_pic,mob,userfac,password)
Values('$fname','$fdes','$fdob','$fmail','$fprofile','$fmob','$funame','$fp
ass')");

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 88


COLLEGE SOCIAL NETWORKING WEBSITE

if($query)

echo "<script> alert('Faculty Member Registered');</script>";

// die(mysql_error());

// echo "<script> window.location.href='adhome.php';</script>" ;

if (isset($_REQUEST['rstud'])){

$sname=$_POST['sname'];

$suname=$_POST['suname'];

$spass=$_POST['spass'];

$sem=$_POST['sem'];

$sreg=$_POST['sreg'];

$dob=$_POST['dob'];

$smob=$_POST['smob'];

$smail=$_POST['smail'];

$sprofile=$_FILES['sProfile']['name'];

$stemp=$_FILES['sProfile']['tmp_name'];

if($_FILES['sProfile']['size'] > 2000000 )

echo "<script>alert('File to Large Please Select another


File')</script>";

else

move_uploaded_file($stemp,"sprofile/$sprofile");

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 89


COLLEGE SOCIAL NETWORKING WEBSITE

$val1=mysql_query("select userstud,passtud from studreg where


userstud='$suname' and passtud='$spass' ");

if(mysql_num_rows($val1)>0) //Checking the value already exists.

?>

<script>

alert(" You have already Registered");

</script>

<?php

else {

/*Start of SMS Package */

// Authorisation details.

$username = "naikashok08@gmail.com";

$hash =
"486dbbf9b90cbe85b8e6581058e0616b8d8747ecb537d3dbc1000d1e0df76b66";

// Config variables. Consult http://api.textlocal.in/docs


for more info.

$test = "0";

// Data for text message. This is the text message data.

$sender = "TXTLCL"; // This is who the message appears to be


from.

// $numbers = "8879920190,$smob";

// A single number or a comma-seperated list of numbers

$message = " Your Username=".$suname." and


password=".$spass." now you are a part of College Socail Network .";

// 612 chars or less

// A single number or a comma-seperated list of numbers

$message = urlencode($message);

$data =
"username=".$username."&hash=".$hash."&message=".$message."&sender=".$sende
r."&numbers=".$smob."&test=".$test;

$ch = curl_init('http://api.textlocal.in/send/?');

curl_setopt($ch, CURLOPT_POST, true);

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 90


COLLEGE SOCIAL NETWORKING WEBSITE

curl_setopt($ch, CURLOPT_POSTFIELDS, $data);

curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);

$result = curl_exec($ch); // This is the result from the


APIcurl_close($ch);

$query=mysql_query("INSERT INTO
studreg(name,semester,reg_no,dob,stu_pic,mob,email,userstud,passtud)
Values('$sname','$sem','$sreg','$dob','$sprofile','$smob','$smail','$suname
','$spass')");

if($query)

echo "<script> alert('Student Registred');</script>";

echo "<script> window.location.href='adhome.php';</script>";

?>

<!DOCTYPE html>

<html>

<head>

<title>

College Social Network

</title>

</head>

<link rel="stylesheet" href="navdes.css">

<link rel="stylesheet" href="formdes.css">

<link rel="stylesheet" href="restable.css">

<link href="css/bootstrap.css" rel="stylesheet" />

<link href="css/bootstrap-theme.css" rel="stylesheet" />

<meta name="viewport" content="width=device-width intital-scale=1">

<link href="backdes2.css" rel="stylesheet" />

<style>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 91


COLLEGE SOCIAL NETWORKING WEBSITE

table{

margin: 0 auto;

.box1

width:85%;

margin-left:auto;

margin-right:auto;

border:solid;

padding:50px;

margin-top:10%;

font-size:large;

.nav-pills

font-size:1.7em;

background-color:black;

opacity:.8;

margin-top:0px;

padding:15px;

.header

position: sticky;

top: 0;

z-index: 100;

</style>

<script>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 92


COLLEGE SOCIAL NETWORKING WEBSITE

function alert_once() {

var size=2000000;

var file_size=document.getElementById('file_upload').files[0].size;

if(file_size>size)

alert('File Size to Large');

return false;

return true;

function validate1() {

var size=2000000;

var file_size=document.getElementById('file_up').files[0].size;

if(file_size>size)

alert('File Size to Large');

return false;

return true;

function myFunction() {

var x = document.getElementById("myTopnav");

if (x.className === "topnav") {

x.className += " responsive";

} else {

x.className = "topnav";

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 93


COLLEGE SOCIAL NETWORKING WEBSITE

</script>

<body>

<div class="topnav header nav-pills" id="myTopnav" style="background-


color:#20282e; padding:10px;">

<a href="index.php" > <img src="ASHOK logo1.png" height="45px"


width="55px" /></a>

<div style="margin-left:20%">

<a href="adhome.php" class="active " ><span class="glyphicon glyphicon-


home"> </span>Home</a>

<a href="#regfact" > <span class="glyphicon glyphicon glyphicon-


pencil"> </span>Register Faculty</a>

<a href="#regstud"> <span class="glyphicon glyphicon-pencil">


</span>Register Student</a>

<a href="#apppost"> <span class=" glyphicon glyphicon-


check"></span> Approve Post</a>

<a href="delstudent.php"> <span class=" glyphicon glyphicon-


cog"></span> Manage Student</a>

<a href="studlogout.php"> <span class=" glyphicon glyphicon-log-


out"></span> Logout</a>

</div>

<a href="javascript:void(0);" class="icon"


onclick="myFunction()">&#9776;</a>

</div>

<?php

session_start();

if($_SESSION['useradmin']=="")

header("location:index.php");

?>

<div id="regfact" class="container" style="border:solid ;background:


#3AAFAB;

color: black;">

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 94


COLLEGE SOCIAL NETWORKING WEBSITE

<h3 class="text-center">Register Faculty</h3>

<form method="POST" class="form form-group-lg" style ="padding-


top:12px;" action="" enctype="multipart/form-data" >

<ul class="flex-outer">

<li>

<label for="first-name"> <span class="glyphicon glyphicon-


user"> </span> Name</label>

<input type="text" id="first-name" class="form-control"


name="fname" pattern="[A-Za-z\s]{1,32}" title="Name Should Contains
Only Characters" required >

</li>

<li>

<label for="for-des"><span class="glyphicon glyphicon-


briefcase"> </span> Designation:</label>

<input type="text" id="last-name" class="form-control"


name="fdesig" pattern="[A-Za-z]{1,32}" title="Designation Should
Contains Only Characters" required >

</li>

<li>

<label for="Date of Birth"><span class="glyphicon glyphicon-


calendar"> </span> Date of Birth:</label>

<input type="text" onfocus="(this.type='date')"


class="form-control" name="dob" required/>

</li>

<li>

<label for="email"> <span class="glyphicon glyphicon-


envelope"> </span>Email</label>

<input type="email" id="email" name="femail" class="form-


control" >

</li>

<li>

<label for="pofil-pic"> <span class="glyphicon glyphicon-


camera"> </span>Profile-Picture:</label>

<input type="file" name="fProfile" onChange='alert_once()'


class="form-control" id="file_upload" accept=".jpg,.png,.JPEG" />

</li>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 95


COLLEGE SOCIAL NETWORKING WEBSITE

<li>

<label for="phone"><span class="glyphicon glyphicon-phone">


</span>Mobile No</label>

<input type="tel" id="phone" class="form-control"


name="mob" >

</li>

<li>

<label for="phone"><span class="glyphicon glyphicon-pencil">


</span>Username:</label>

<input type="text" name="funame" class="form-control"


pattern="[A-Za-z\s]{1,32}" required >

</li>

<li>

<label for="phone"><span class="glyphicon glyphicon-lock">


</span>Password:</label>

<input type="text" maximum="8" name="fpass" class="form-


control" >

</li>

<button class="btn btn-primary pull-right " name="rfac" ><span


class="glyphicon glyphicon-pencil"></span>Register </button>

<button type="reset " class="btn btn-primary " name="refac" >Reset


</button>

</form>

</div>

<div id="regstud" class="container" style="border:solid ;background:


#3AAFAB;margin-top:10%;

color: black;">

<h3 class="text-center">Register Student</h3>

<form class=" form-group-lg"method="POST" style ="padding-


top:12px;" action="" enctype="multipart/form-data" >

<ul class="flex-outer">

<li>

<label for="first-name"> <span class="glyphicon glyphicon-


user"> </span> Name:</label>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 96


COLLEGE SOCIAL NETWORKING WEBSITE

<input type="text" class="form-control" name="sname"


pattern="[A-Za-z\s]{1,32}" title="Name Should Contains Only Characters"
required >

</li>

<li>

<label for="for-des"><span class="glyphicon glyphicon-


education"> </span> Semester:</label>

<select class="form-control"
name="sem"><option>1<sup>st</sup> Semester</option>

<option>2<sup>nd</sup> Semester</option>

<option>3<sup>rd</sup> Semester</option>

<option>4<sup>th</sup> Semester</option>

<option>5<sup>th</sup> Semester</option>

<option>6<sup>th</sup> Semester</option>

</select>

</li>

<li>

<li>

<label for="first-name"> <span class="glyphicon glyphicon-


user"> </span> Register Number:</label>

<input type="text" type="text" class="form-control"


maximum="8" name="sreg" pattern="[A-Za-z0-9]+" title="Name Should
Contains Only Characters" required > </li> <li>

<label for="Date of Birth"><span class="glyphicon glyphicon-calendar">


</span> Date of Birth:</label>

<input type="text" onfocus="(this.type='date')"


class="form-control" name="dob" required/>

</li>

<li>

<label for="email"> <span class="glyphicon glyphicon-


envelope"> </span>Email</label>

<input type="email" class="form-control" id="email"


name="smail" >

</li>

<li>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 97


COLLEGE SOCIAL NETWORKING WEBSITE

<label for="pofil-pic"> <span class="glyphicon glyphicon-


camera"> </span>Profile-Picture:</label>

<input type="file" name="sProfile" class="form-control"


onChange='validate1()' id="file_up" accept=".jpg,.png,.JPEG" />

</li>

<li>

<label for="phone"><span class="glyphicon glyphicon-phone">


</span>Mobile No</label>

<input type="tel" id="phone" class="form-control"


pattern="[0-9]+" name="smob" >

</li>

<li>

<label for="phone"><span class="glyphicon glyphicon-pencil">


</span>Username:</label>

<input type="text" name="suname" class="form-control"


pattern="[A-Za-z0-9]+" required >

</li>

<li>

<label for="phone"><span class="glyphicon glyphicon-lock">


</span>Password:</label>

<input type="text" maximum="8" class="form-control"


name="spass" required >

</li>

<button class="btn btn-primary pull-right " name="rstud" ><span


class="glyphicon glyphicon-pencil"></span>Register </button>

<button type="reset " class="btn btn-primary " name="refac" >Reset


</button>

</form>

</div>

<div class="box1" id="apppost" style="padding:90px;">

<?php

$st=0;

$tb=mysql_query("select * from Feed where app_post='$st' order


by id DESC ");

$res=mysql_num_rows($tb);

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 98


COLLEGE SOCIAL NETWORKING WEBSITE

if($res == 0)

echo "<h3 ><center> No Post Uploaded</center></h3>";

else

echo "<div class='table'>

<div class='row header'>

<div class='cell'>

Post Id

</div>

<div class='cell'>

Username

</div>

<div class='cell'>

Post Text

</div>

<div class='cell'>

Image

</div>

<div class='cell'>

Upload Time

</div>

<div class='cell'>

Upload Date

</div>

<div class='cell'>

Approve Post

</div>

</div>";

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 99


COLLEGE SOCIAL NETWORKING WEBSITE

while($res=mysql_fetch_array($tb))

$u=$res['username'];

$tb1=mysql_query("select stu_pic from studreg where


userstud='$u'");

$res1=mysql_fetch_assoc($tb1);

$p1= $res['image'];

$p2=$res1['stu_pic'];

?>

<div class="row">

<div class="cell" data-title="Name">

<?php echo $res['id']; ?>

</div>

<div class="cell" data-title="Username">

<?php echo $res['username']; ?>

</div>

<div class="cell" data-title="PostText">

<?php echo $res['ptext']; ?>

</div>

<div class="cell" data-title="Image">

<?php echo "<img src='images/$p1' width='100px'


height='100px' >" ?>

</div>

<div class="cell" data-title="Upload Time">

<?php echo $res['uptime']; ?>

</div>

<div class="cell" data-title="Upload Date">

<?php echo $res['upldate']; ?>

</div>

<div class="cell" data-title="Approve">

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 100


COLLEGE SOCIAL NETWORKING WEBSITE

<form method="POST"> <input type="text" name="pid"


value="<?php echo $res['id'] ?>" style="display:none;"/> <button
class="btn btn-primary" name="sub" type="submit">Approve</button> <br/>
<br/> <button class="btn btn-primary" name="del" type="submit"
onclick="return confirm('Do You want to delete it');" >Delete</button>
</form>

</div>

</div>

<?php

}}

?>

</div>

<?php

if(isset($_POST['sub'])){

$query=mysql_query("Update feed set app_post='1' where app_post='0' ");

if($query)

echo "<script> alert('Post Approved'); </script>";

echo "<script> window.location.href='adhome.php'</script>";

else

die(mysql_error());

if(isset($_POST['del'])){

$pid=$_POST['pid'];

$del=mysql_query("delete from feed where id='$pid'");

if($del)

echo "<script> alert('Post Deleted');</script>";

echo "<script> window.location.href='adhome.php'; </script>";

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 101


COLLEGE SOCIAL NETWORKING WEBSITE

else

die(mysql_error());

?>

</div>

<div id="footer">

</div>

</body>

</html>

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 102


COLLEGE SOCIAL NETWORKING WEBSITE

USER MANUAL

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 103


COLLEGE SOCIAL NETWORKING WEBSITE

15. USER MANUAL

1. To Open the Application

User should enter the web address to be redirected to the Homepage of the System. User has

to enter the valid parameters in the textbox to get logged in.

2. Users Registration

The Administrator should enter valid Users Data to register the Faculty and Students.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 104


COLLEGE SOCIAL NETWORKING WEBSITE

3. Students Home Page

The Students can Post on its TimeLine, Update his details and View Notifications , Send

Messages.

3. Faculty Home Page

The Faculty can Post a Notification, Update his details and View Posted Notifications , Enter

Marks ,Upload both Notes and Time-Table.

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 105


COLLEGE SOCIAL NETWORKING WEBSITE

ANNEXURE

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 106


COLLEGE SOCIAL NETWORKING WEBSITE

16. ANNEXURE

16.1 Data Dictionary


A Data Dictionary is a catalogue- a repository of element in a system. As the name suggest,

these elements centre around data and the way these are structured to meet the user requirement

and system needs. In Data Dictionary we find list of all the elements are data flows, data stores,

and process. A Data Dictionary contains a list of all files in the database, the number of records

in each file, and the names and types of each field. Most database management system keep the

data dictionary hidden form users to prevent them from accidentally destroying its contents.

Data Dictionaries contains:

l schema objects in the database (tables, indexes, clusters,

, sequences, procedures, functions, packages, triggers, and so on)

ity constraints information

The data dictionary is structured in tables and views, just like other database data. All the data

dictionary tables and views for a given database are stored in the database’s system table space.

16.1.1 Important of data dictionary:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 107


COLLEGE SOCIAL NETWORKING WEBSITE

where system changes should be made.

The following tables are used in the system:

Admin Login Table:

Student Table:

Faculty Table:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 108


COLLEGE SOCIAL NETWORKING WEBSITE

Messages Table:

Feeds Table:

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 109


COLLEGE SOCIAL NETWORKING WEBSITE

16.2 List of Abbreviations, Figures and Tables:

16.2.1 Abbreviations:

 PHP – Hypertext Preprocessor

 SQL – Structured Query Language

 HTML – Hypertext Markup Language

 CSS – Cascading Style Sheet

 RDMS – Relational Database Management System

 SDLC – Software Development Life Cycle

 DFD – Data flow Diagram

 ERD – Entity Relationship Diagram

 SQL – Structured Query Language

16.2.2 Figures:

 4.2 Design Phase

 6.1.1 Iterative Model

 7.2 System Architecture

 10.2 Entity Relationship Diagram

 10.3 Data Flow Diagram

 10.3.1 Data Flow Diagram Level-0

 10.3.2 Data Flow Diagram Level-1

 10.3.3 Data Flow Diagram Level-2

 10.4 Use Case Diagram

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 110


COLLEGE SOCIAL NETWORKING WEBSITE

16.2.3 Tables:

Table 13.2.1 – Details showing the Advantages and Disadvantages of Black Box Testing

Table 13.2.2 – Details showing the Advantages and Disadvantages of White Box Testing

Table 13.3 – Details showing the Test Cases of Black Box Testing

16.3 References

Text Book:
 Software Engineering
Author: Summerville
 Software Testing principles and Practices

Author: Pearson

 Introduction To Programming with PHP Complete reference

 Beginning PHP and MYSQL: from Novice to Professional(Third Edition)

 Beginning PHP6, Apache, MySql web development

Author: Timothy Boronczyk, Elizabeth Naramore


Jason Gerner , Jeremy stolz

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 111


COLLEGE SOCIAL NETWORKING WEBSITE

Web Sites

 https://www.pinterest.com/pin/97249673173266393

 http://www.slideshare.net/search/slideshow?searchfrom=

header&q=social+networking+site

 http://www.w3schools.com

 http://php.net

 http://www.w3schools.com/php/php_intro.asp

 http://www.w3schools.com/php/php_mysql_intro.asp

BHARATESH COLLEGE OF COMPUTER APPLICATIONS, BELAGAVI Page 112

You might also like