You are on page 1of 68

NETAJI SUBHAS INSTITUTE OF TECHNOLOGY, BIHTA, PATNA

PROJECT-II REPORT

ON

SOCIAL IMPRESSION

SUBMITTED IN THE PARTIAL FULFILLMENT OF THE REQUIREMENT


OF
BACHELOR OF TECHNOLOGY (COMPUTER SCIENCE & ENGINEERING)
BY
ARYABHATTA KNOWLEDGE UNIVERSITY, PATNA, BIHAR

SUBMITTED BY:
SHAAN RAASTI (151004)
SHABBIR HASSAN (151033)

VIII SEM
SESSION 2018-19

Mr. GOPAL KRISHNA Mrs. SARITA CHAUDHARY


(PROJECT GUIDE) (HOD)

An ISO 9001:2008 Certified Institution


Approved by AICTE, New Delhi
Affiliated to Aryabhatta Knowledge University, Patna, Bihar
SOCIAL IMPRESSION
A
PROJECT-II REPORT
Submitted in partial fulfillment of the requirement
OF

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING
BY
SHAAN RAASTI (151004)
SHABBIR HASSAN (151033)

Under the guidance of


MR.GOPAL KRISHNA
(Assistant professor, CSE )

SESSION 2018-19

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


NETAJI SUBHAS INSTITUTE OF TECHNOLOGY, BIHTA, PATNA

An ISO 9001:2008 Certified Institution


Approved by AICTE, New Delhi
Affiliated to Aryabhatta Knowledge University, Patna, Bihar
NETAJI SUBHAS INSTITUTE OF TECHNOLOGY, BIHTA, PATNA

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SESSION- 2018-19

CERTIFICATE

This is to certify that, SHAAN RAASTI, SHABBIR HASSAN, student(s) of

final year in Computer Science & Engineering department has successfully

completed the project-II work entitled SOCIAL IMPRESSION. This technical

project is hereby approved for submission towards partial fulfillment for the

Bachelor degree in COMPUTER SCIENCE & ENGINEERING from

ARYABHATTA KNOWLEDGE UNIVERSITY, PATNA, BIHAR

Mr. GOPAL KRISHNA Mrs. SARITA CHAUDHARY


(PROJECT GUIDE) (HOD)
NETAJI SUBHAS INSTITUTE OF TECHNOLOGY, BIHTA, PATNA

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SESSION- 2018-19

ACKNOWLEDGMENT

We are very much thankful to our HOD Mrs. SARITA CHAUDRY for providing us
support and guidance to accomplish this project work.
We are very grateful to our Project Guide Mr. GOPAL KRISHNA for being instrumental in
the completion of our project with his complete guidance.
We also thank all the faculties and all staff member of our college and technicians for their help
in making this project a successful one.
Finally, we take this opportunity to extend our deep appreciation to our family and friends, for all
that they meant to us during the crucial time of the completion of our project

SHAAN RAASTI (151004)


SHABBIR HASSAN(151033)
NETAJI SUBHAS INSTITUTE OF TECHNOLOGY, BIHTA, PATNA

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SESSION- 2018-19

APPROVAL SHEET

This is to certify that, SHAAN RAASTI, SHABBIR HASSAN, Student(s) of final


year in COMPUTER SCIENCE & ENGINEERING branch has successfully
completed the project-I work Entitled SOCIAL IMPRESSION, This Technical
Project is hereby approved for submission towards partial fulfillment for the Bachelor
degree in COMPUTER SCIENCE & ENGINEERING From ARYABHATTA
KNOWLEDGE UNIVERSITY,PATNA, BIHAR

(INTERNAL EXAMINER) ( EXTERNAL EXAMINER)

DATE: DATE:
TABLE OF CONTENTS

TITLE Page Number

TITLE PAGE i
CERTIFICATE ii
ACKNOWLEDGEMENT iii
APPROVAL SHEET iv
TABLE OF CONTENTS v
LIST OF TABLES vi
1. DFD Notations 6
2. Usecase Notations 18
LIST OF FIGURES
1. Zero Level DFD 8
2. First Level DFD 15
3. Usecase Diagram 17
4. Class Diagram 21
5. Sequence Diagram 24
6. Activity Diagram 27
7. Statechart Diagram 30
8. E-R Diagram 34
ABSTRACT 1

Chapter 1: INTRODUCTION 2
1.1 About your proposed project
1.2 Proposed Project Objectives

Chapter 2: Background and Literature Review 3

Chapter 3: Software and Hardware requirements 4


3.1 Software requirements
3.2 Hardware requirements
Chapter 4: Software Design 5
5.1 DFDs in case of Database projects (Includes Context level,level 0 & level 1
diagram.)
5.2 UML diagrams. UML diagrams must include the following
5.2.1Usecase Diagram
5.2.2 Class Diagram
5.2.3 Interaction diagrams-Sequence and Collaboration Diagrams
5.2.4 Activity Diagram
5.2.5 State Chart Diagram
5.3 Control Flow diagrams
5.3.1 E-R Diagrams

Chapter 5: Proposed Methodology 40

Chapter6: Result Analysis 41


6.1 Screen Shots
6.2 Analysis of Data

Chapter7: Conclusion & Future Work 60

References/Bibliography 61
ABSTRACT 1

This mobile application is a pattern of social components comprising posts, likes,


comments, views, and others that can be used for a Android platform. It is
Firebase-based and uses such Firebase features as the database, storage, and
authentication. Firebase queries implemented in it, i.e. data pagination, filtering
data by an author. As well, it is an example of working with Firebase transaction .
Our application is the great example of material design.

The user-friendly animation guides a person by opening screens of details and a


user profile. Hiding Toolbar when the post list is scrolling down and showing it
again when it’s scrolling up. Recycler view with card views Float action button
Snack Bar for messages Refresh a screen loading posts by parts (Progress bar in
the bottom of the screen for loading the next portion of posts). Clickable link in
description Like button animation, add comments Scroll to the first comment by
press on comments counter collapse, expand text in the long comments add
complain for the post page is updated in real time.
Chapter 1: INTRODUCTION 2
-
1.1 Object of proposed project
This application provide a complete solution over the problems faces by peoples to interact
each other. It is very helpful to make a good view towards the profile of the people, families to
friendships,Should provide a common platform where people of India can Voice out violations,
injustice, inhumanity, corruption happening in their vicinity. In Existing System people does
not have the ability to tag social discipline violators .Fellow citizens can’t take the measures to
rate, control and monitor the social responsibility of a given individual. Indirectly the crime is
increasing very much, everybody is violating the rules. No one is taking care. The responsible
persons are ignoring because of corruption. The higher authorities not taking any action towards
in discipline. No one is feeling responsibility to argue .With this in our country the law and order
is going out of control. In this current system if a person wants to give complaint, he has to go to
the concerned office and raise a complaint.

1.2 Motivation
Every peoples wants to connect to there families should be very good and special such that it Is
make special to all over the world, talented wedding planners can show there work in by hosting
online. Unlike social networks, communities usually consist of people from all walks of life who
seem to have no relationship at all. In our current system people coming forward, participating in
the debates and fighting against the crimes in their vicinity. A social media proposal formalizes
your ideas to your client. It’s not a contract (though it can be if we want it to be). This stage often
comes after a consultation and/or research on what the client needs. The social network is
distributed across various computer networks. The social networks are inherently computer
networks, linking people, organization, and knowledge. Social networking services vary in
format and the number of features. They can incorporate a range of new information and
communication tools, operating on desktops and on laptops, on mobile devices such as tablet
computers .
Chapter 2: Background and Literature Review 3

In social networking websites like facebook[4] it can create users profile account and register
them self for matching partners. Social network sites (SNSs) such as My Space, Facebook, and
Youtube[3] have attracted millions of users, many of whom have integrated these sites into their
daily practices. There are hundreds of SNSs, with various technological affordances, supporting
a wide range of interests and practices. However, the impact of SNSs is increasingly pervasive,
with activities ranging from economic and marketing to social and educational. Among the wide
impacts of social network sites, they are, anecdotally, becoming increasingly important in
today’s businesses. Thus, the purpose of this study is to present a literature review of and
classification scheme for research works in business impacts of SNSs, with the aim of clarifying
the ways SNSs impact businesses. The review covers 28 journal articles published from 2000 to
2011 and a few months of 2012. The 28 articles classified SNS applications in businesses into
six distinct categories: the “marketing and advertising,” “knowledge management,” “social
capital,” “relationship management,” “e-commerce,” and “economic model.” The findings reveal
that “marketing and advertising”are the most frequently category has been considered in the
literature. This review provides a source for discovering business impacts of social network sites
and will help to simulate further interest in the area.
Chapter 3: Software and Hardware requirements 4

3.1 Software requirements


ANDRIOD STUDIO: Android Studio is the official Integrated Development Environment
(IDE) for Android app development, based on IntelliJ IDEA [1]

FIREBASE: Firebase gives you the tools to develop high-quality apps, grow your user base,
and earn more money. We cover the essentials so you can monetize your business and focus on
your users.
Firebase Authentication aims to make building secure authentication systems easy, while
improving the sign-in and onboarding experience for end users. It provides an end-to-end
identity solution, supporting email and password accounts, phone auth, and Google, Twitter,
Facebook, and GitHub login, and more.
Firebase SDK for Cloud Storage with mobile connectivity in mind. It will automatically pause
and resume your transfers as the app loses and regains mobile connectivity, saving your users
time and bandwidth.[2]

3.2 Hardware requirements


The system is intended to be a stand-alone, single-user system. The system will run on android
7.0 or later. No further hardware devices or will be required.

Processor : Intel i3 or higher

RAM : 4 GB

Hard Disk : PC with minimum 2Gb or more


Chapter 4: Software Design 5
5.1 DFDs in case of Database projects (Includes Context level, level 0 & level
1 diagram.)

A data flow diagram (DFD) maps out the flow of information for any process or
system. It uses defined symbols like rectangles, circles and arrows, plus short text
labels, to show data inputs, outputs, storage points and the routes between each
destination. Data flowcharts can range from simple, even hand-drawn process
overviews, to in-depth, multi-level DFDs that dig progressively deeper into how
the data is handled. They can be used to analyze an existing system or model a
new one. Like all the best diagrams and charts, a DFD can often visually “say”
things that would be hard to explain in words, and they work for both technical
and nontechnical audiences, from developer to CEO. That’s why DFDs remain so
popular after all these years. While they work well for data flow software and
systems, they are less applicable nowadays to visualizing interactive, real-time or
database-oriented software or systems. Data flow diagrams were popularized in
the late 1970s, arising from the book Structured Design, by computing pioneers
Ed Yourdon and Larry Constantine. They based it on the “data flow graph”
computation models by David Martin and Gerald Estrin. The structured design
concept took off in the software engineering field, and the DFD method took off
with it. It became more popular in business circles, as it was applied to business
analysis, than in academic circles

 Object Oriented Analysis and Design (OOAD), put forth by Yourdon and
Peter Coad to analyze and design an application or system.

 Structured Systems Analysis and Design Method (SSADM), a waterfall


method to analyze and design information systems. This rigorous
documentation approach contrasts with modern agile approaches such as
Scrum and Dynamic Systems Development Method (DSDM.)
6

Three other experts contributing to this rise in DFD methodology were Tom
DeMarco, Chris Gane and Trish Sarson. They teamed up in different
combinations to be the main definers of the symbols and notations used for a data
flow diagram

Two common systems of symbols are named after their creators:

 Yourdon and Coad

 Yourdon and DeMarco

 Gane and Sarson

Fig.1 DFD Notations

One main difference in their symbols is that Yourdon-Coad and Yourdon-


DeMarco use circles for processes, while Gane and Sarson use rectangles with
rounded corners, sometimes called lozenges.
Using any convention’s DFD rules or guidelines, the symbols depict the four
components of data flow diagrams.

1. External entity: an outside system that sends or receives data, communicating


with the system being diagrammed. They are the sources and destinations of
information entering or leaving the system.

2. Process: any process that changes the data, producing an output. It might perform
computations, or sort data based on logic, or direct the data flow based on
business rules.

3. Data store: files or repositories that hold information for later use, such as a
database table or a membership form. Each data store receives a simple label,
such as “Orders.”

4. Data flow: the route that data takes between the external entities, processes and
data stores. It portrays the interface between the other components and is shown
with arrows, typically labeled with a short data name, like “Billing details.”[11]
8

Fig.3 Zero level DFD


0 level DFD 9
Sometimes, it is called as a Context Diagram.
It visualizes the glance as if you are looking into a system through a
helicopter.
It’s a basic overview of the whole system. It shows the system as a single
high-level process, along with its relationship to the external entities .Easily
understood by a Layman. At this point should have a good idea of the system
boundary. All components within the system boundary are included within a
single system/process box in the DFD. External entities lie outside the
system boundary; internal entities will become locations for processes. The
data flow arrows to and from the external entities will indicate the system’s
relationship with its environment. Remember that information always flows
to or from a process, an external entity, or a data store. You can use a dashed
line to show data flows between external entities outputs and outputs, and
use one process for each source or destination from the DFD. De Marco's
work is mainly concerned with the analysis phase of a project, and here DFD
splay a central role. Analysis is observed by DeMarco as part of an overall
methodology .which, in overview, involves first a survey or feasibility study
of the possible benefits and constraints of the project, secondly a structured
analysis of the existing information system and changes.Thirdly, a more
detailed structured design of the system together with a study of the
necessary hardware and finally, implementation of the system .Looking in
more detail at the analysis phase, it involves the following. First, the present
situation is studied and depicted in a Current Physical DFD which describes
the information system works currently. This DFD will include, for example,
individual departmental or personal names as processors of information. The
Physical DFD is then converted into the Current Logical DFD which shows
what is done, stripped of the particular way it is done.
10
Requirements, defined in the survey stage, are then incorporated to produce
a New Logical DFD which can then be used to create a number of possible
relations of this in different New Physical DFDs. The best of these is then
selected and used to form a structured specification which from diagram 0
that a DFD consists of blobs and arrows - the arrows showing flows of data
and the blobs the processes which convert the input flow into the output
flow. Two other elements can be shown in a DFD although they do not
appear in this example - files which are seen as temporary stores of data, and
sources/sinks which are the origin and destination of the data. The processes,
being activities, should all be verbs and De Marco stresses that both the
flows and the processes should be accurately named. Each process can then
be decomposed into a lower-level DFD showing that particular process in
more The whole forms what is called a levelled DFD. Consistency between
the levels is emphasized as in, for example, a correspondence between their
inputs and outputs. The context diagram is really the top-level diagram
showing the overall input(s), transformation and output(s)of the system .In
constructing a DFD, primary importanceis placed on the data flows rather
than the processes - it should depict the situation from the data's point of
view. The arrows are seen as pipes through which packets of data flow, and
these are laid out first. The processes are then the transformations necessary
to convert the input into the output. DFDs are not supposed to show control
as in a flow chart, nor any operations of the people processing the data, In a
DFD, the arrows represent flows of data as if they were actual pipes with
chunks of data flowing through them. They are named 'to represent not only
the data which moves over the pipeline, but also what we know about the
data' (p. 54).2 In a CM, the arrows are more general, representing the logical
relations between activities - i.e. the dependence of one activity on others.
Such dependence might, of course, be because one activity requires-the
information produced by another, so that a CM could be made specific to a
set of information.
11
processing activities and their flows. Both diagrams, however, show logical
flow, not a flow of control as in a flow chart. 'A data flow is not a
representation of a flow of control... another thing a data flow is not is an
activator of a process' Both involve the same top-down decomposition
approach. Beginning with the top-level diagram, each bubble can be split up
into its own set of activities and flows. These can be shown either in
different diagrams or the same one. In the SSM this process of splitting up an
activity is helped by defining a root definition for each higher-level activity
and then expanding this into its own set of minimum necessary activities.
There is no equivalent approach in DFD, although guidelines are offered).2
Both stress that the lower-level diagram must match up logically with the
rest of the higher-level diagram. Thus the inputs and outputs of a lower-level
diagram must correspond exactly with its parent activity.(v) Finally, both
emphasise developing models which depict what happens logically, rather
than how it happens to be realised in a particular situation. In some ways this
is the heart of the SSM - the logical development of a concept away from the
actuality of the situation in order to provide a contrast or comparison. As
Check land states: In order to service this debate [about potential changes -
it should be clear that the below the line" models of some human activity
systems are not models of "what is" in the real world. Real world
manifestations of human activity are of a quite extraordinary richness and
complexity. "Below the line" a model will contain a structured set of
activities which expresses with great purity a particular view of the system
named in the Root Definition' Similarly, after describing the current situation
n a physical DFD, De Marco's next step is to logicalize" our model of the
current environment we remove the physical checkpoint items, replacing
each one with its logical equivalent... A particular implementation of policy
is replaced by a representation of the policy itself. The underlying
objectives... are divorced from the methods of carrying out those objectives'
12
Are fundamental differences, most of which stem of rom the methodologies
as a whole and their respective philosophy. In De Marco's DFD the flows of
data have primacy, the activities are merely those processes which convert
the input flow into the output flow. In SSM, in contrast, it is the activities
which play the central role. The development of a CM begins by specifying a
list of the activities necessary for the named system to be as described. If
information is involved, it would be that produced by, or necessary to
support, the activities. This seems much better as a means of justifying the
particular data flows. It must surely be the case that the activities of a system
come first it is, after all, the activities which it carries out that are the whole
reason for the organization's existence. A company exists to make and sell
products, not to transform. To the extent that this is lost sight of in actual
organizations, problems develop, and to formalize this displacement of ends
by means in a methodology is surely to demand trouble. The DFD, and De
Marco's whole approach, is based on a description of the current situation as
it is even though it is expressed in logical rather than physical terms. It
appears to take for granted that it is largely the current system (warts and all)
thatis to be reproduced, albeit with some extra facilities. Indeed, it explicitly
limits itself to the process of analysis and has very little to say about the
design of systems or the generation of agreed objectives. It offers no help in
addressing questions such as: Why does the system exist as it does? Is it the
best system? Is there agreement about what the system should be doing?
What if this is an entirely new development with no existing system? It may
be argued that logical DFD could be entirely new, but there is little guidance
or help in DeMarco's method for developing one .A CM, on the other hand,
is not intended as a model of what exists, nor even a model of what ought to
exist, but a model of a concept or notional system that may be helpful in
agreeing beneficial changes. It could be that the concept is intended to match
what is there(Wilson's approach3 recommends developing an agreed model .
13
primary task' of the organization or department) but it could equally well be
something radically new. What is important, however, is that it is the result
of the development of a single concept from are relevant system through an,
and as such is likely to provide a much more coherent and consistent model
than the reproduction of the inevitable of the historical contingencies of the
existing system. DFDs take a strongly objectivist stance towards the data. In
common with the data analysis approach in general, it assumes that there is
only one way of looking at or organizing the data. Indeed, that the data
contains its own unique and unambiguous structure. In contrast to this, it can
be argued that data by itself is intrinsically meaningless. It only becomes
information when it is invested with meaning by people. Information is not
therefore an objective fact, but dependent on the meanings and practices of
the people, organizations and societies which use it. This is a deep
philosophical issue beyond the scope of this article (for a useful discussion
see Klein and Hirschheim), but it is the case that the basic philosophy of the
SSM is one that takes this subjectivist viewpoint seriously. Most generally,
the whole SSAD approach essentially restricts itself to defining problems as
'how' problems and then producing well-structured technical solutions. Itis a
hard as opposed to a soft systems approach, assuming a well-defined
problem, perceived in the same way, and agreed on by all involved -
including the operators of and users of the system - which merely requires an
efficient solution. Whilst it is admitted that the politics and culture of the
organization are important, De Marco explicitly (and honestly) recognises
that they are ignored in this approach. Of course, analysis is an intentionaly
political subject...But most political problems do not lend themselves to
simple solutions... Political problems aren't going to go a way and they won't
be "solved". The most we can hope for is to limit the effect of disruption due
to politics' (p. 13).8It is precisely this which the SSM recognizes and is
designed for...to attempt to bring rationality to bear on.
14
Part of human activity systems in which a complex and often contradictory
pattern of perceptions and meanings have to be structured and organised in
order to achieve successful change. A failure to recognise this explains the
lack of success of many computer systems. DFDs and conceptual models do
have a number of strong resemblances both in wha tthey portray and in how
they portray it.However, there are also major differences, stemming mainly
from the different philosophies of the methodologies in which they are
embedded. The points outlined above suggest that the Conceptual Model,
developed within the SSM, provides a much more flexible, consistent and
realistic approach to the analysis of computer systems. Benyon's conclusions
that they are more or less the same, with the DFD to be preferred because it
is diagrammatic, seem to stem from some mistaken ideas. First that CMs are
merely lists rather than diagrams. In fact a CM is most centrally a diagram,
as a look at the published work .Secondly, a lack of awareness of the gulf
separating the philosophies behind the two approaches. Having said that,
however, DFDs are more specialised towards computer systems, with for
example files, sources/sinks and the links into data dictionaries and
structured English.This can be very valuable in the more detailed stages of
analysis and design, and so a well constructed and detailed Conceptual
Model might usefully and easily be converted .[6]
15

Fig.4 First level DFD


1 level DFD 16

It provides a more detailed view of the Context Level Diagram Here, the main
functions carried out by the system are highlighted as we break into its sub-processes.
DFDs can be expressed as a series of levels. The outermost level (Level 0) is
concerned with how the system interacts with the outside world. Subsequent levels
examine the system in more detail, and use the same symbols and syntax as with Level
0. When producing a first-level DFD, the relationship of the system with its
environment must be preserved. In other words, the data flow in and out of the system
in the Level 1 DFD must be exactly the same as those data flows in Level 0. If you
discover new data flows crossing the system boundary when drawing the Level 1 DFD,
then the Level 0 DFD must be amended to reflect the changes in the Level 1 DFD. It is
important that the system relationship with its environment be preserved no matter how
many levels deep you model. In other words, you can’t have new data flows crossing
the system boundary in Level 1. The next section deals with such non-valid data flows.
The Level 1 DFD provides a high-level view of the system that identifies the major
processes and data stores. Identify or list each incoming and outgoing dataflow with a
corresponding process that receives or generates data. Make sure you refer to your data
it emutable for any missing internal data flows and to identify data stores. If your table
contains documents with the same source and destination, they might be data stores.
Some processes share data stores while some data stores are used by one process. It
may be possible to move the single process • data store inside the process itself.
Identify those processes that only address internal.[7]
5.2 UML diagrams. UML diagrams must include the following 17
5.2.1 Usecase Diagram

Fig.5 Usecase diagram of Login system


WHAT IS A USE CASE DIAGRAM? 18

In the Unified Modeling Language (UML), a use case diagram can summarize the details of your
system's users (also known as actors) and their interactions with the system. To build one, you'll
use a set of specialized symbols and connectors. An effective use case diagram can help your
team discuss and represent:

 Scenarios in which your system or application interacts with people, organizations, or


external systems
 Goals that your system or application helps those entities (known as actors) achieve
 The scope of your system

Fig.2 Usecase Notations

WHEN TO APPLY USE CASE DIAGRAMS

A use case diagram doesn't go into a lot of detail—for example, don't expect it to model the order
in which steps are performed. Instead, a proper use case diagram depicts a high-level overview
of the relationship between use cases, actors, and systems. Experts recommend that use case
diagrams be used to supplement a more descriptive textual use case.
19

UML is the modeling toolkit that you can use to build your diagrams. Use cases are represented
with a labeled oval shape. Stick figures represent actors in the process, and the actor's
participation in the system is modeled with a line between the actor and use case.

UML use case diagrams are ideal for:

 Representing the goals of system-user interactions


 Defining and organizing functional requirements in a system
 Specifying the context and requirements of a system
 Modeling the basic flow of events in a use case

USE CASE DIAGRAM COMPONENT

To answer the question, "What is a use case diagram?" you need to first understand its building
blocks. Common components include:

 Actors: The users that interact with a system. An actor can be a person, an organization,
or an outside system that interacts with your application or system. They must be external
objects that produce or consume data.
 System: A specific sequence of actions and interactions between actors and the system.
A system may also be referred to as a scenario.
 Goals: The end result of most use cases. A successful diagram should describe the
activities and variants used to reach the goa
20

USE CASE DIAGRAM SYMBOLS AND NOTATION

The notation for a use case diagram is pretty straightforward and doesn't involve as many types
of symbols as other UML diagrams. Here are all the shapes you will be able to find in
Lucidchart:

 Use cases: Horizontally shaped ovals that represent the different uses that a user might
have.
 Actors: Stick figures that represent the people actually employing the use cases.
 Associations: A line between actors and use cases. In complex diagrams, it is important
to know which actors are associated with which use cases.
 System boundary boxes: A box that sets a system scope to use cases. All use cases
outside the box would be considered outside the scope of that system. For example,
Psycho Killer is outside the scope of occupations in the chainsaw example found
below.[8]
5.2.2 Class Diagram 21

Fig.6 Class Diagram of Login System


WHAT IS A CLASS DIAGRAM IN UML? 22

The Unified Modeling Language (UML) can help you model systems in various ways. One of
the more popular types in UML is the class diagram. Popular among software engineers to
document software architecture, class diagrams are a type of structure diagram because they
describe what must be present in the system being modeled. No matter your level of familiarity
with UML or class diagrams, our UML software is designed to be simple and easy to use.

UML was set up as a standardized model to describe an object-oriented programming approach.


Since classes are the building block of objects, class diagrams are the building blocks of UML.
The various components in a class diagram can represent the classes that will actually be
programmed, the main objects, or the interactions between classes and objects.

The class shape itself consists of a rectangle with three rows. The top row contains the name of
the class, the middle row contains the attributes of the class, and the bottom section expresses the
methods or operations that the class may use. Classes and subclasses are grouped together to
show the static relationship between each object.

The UML shape library in Lucidchart can help you create nearly any custom class diagram using
our UML diagram tool.

BENEFITS OF CLASS DIAGRAMS

Class diagrams offer a number of benefits for any organization. Use UML class diagrams to:

 Illustrate data models for information systems, no matter how simple or complex.

 Better understand the general overview of the schematics of an application.


23

 Visually express any specific needs of a system and disseminate that information
throughout the business.

 Create detailed charts that highlight any specific code needed to be programmed and
implemented to the described structure.

 Provide an implementation-independent description of types used in a system that are


later passed between its components.

BASIC COMPONENTS OF A CLASS DIAGRAM

The standard class diagram is composed of three sections:

 Upper section: Contains the name of the class. This section is always required, whether
you are talking about the classifier or an object.

 Middle section: Contains the attributes of the class. Use this section to describe the
qualities of the class. This is only required when describing a specific instance of a class.

 Bottom section: Includes class operations (methods). Displayed in list format, each
operation takes up its own line. The operations describe how a class interacts with data.

Member access modifiers

All classes have different access levels depending on the access modifier (visibility).

 Public (+)

 Private (-)[9]
5.2.3 Interaction diagrams-Sequence and Collaboration Diagram 24

Fig. 7 Sequence Diagram


WHAT IS A SEQUENCE DIAGRAM IN UML? 25

To understand what a sequence diagram is, it's important to know the role of the Unified
Modeling Language, better known as UML. UML is a modeling toolkit that guides the creation
and notation of many types of diagrams, including behavior diagrams, interaction diagrams, and
structure diagrams.

A sequence diagram is a type of interaction diagram because it describes how—and in what


order—a group of objects works together. These diagrams are used by software developers and
business professionals to understand requirements for a new system or to document an existing
process. Sequence diagrams are sometimes known as event diagrams or event scenarios.

Note that there are two types of sequence diagrams: UML diagrams and code-based diagrams.
The latter is sourced from programming code and will not be covered in this guide. Lucidchart’s
UML diagramming software is equipped with all the shapes and features you will need to model
both.

BENEFITS OF SEQUENCE DIAGRAMS

1. Sequence diagrams can be useful references for businesses and other organizations.
Try drawing a sequence diagram to:
2. Represent the details of a UML use case.
3. Model the logic of a sophisticated procedure, function, or operation.
4. See how objects and components interact with each other to complete a process.
5. Plan and understand the detailed functionality of an existing or future scenario.
USE CASES FOR SEQUENCE DIAGRAMS 26

 Usage scenario: A usage scenario is a diagram of how your system could potentially be
used. It's a great way to make sure that you have worked through the logic of every usage
scenario for the system.
 Method logic: Just as you might use a UML sequence diagram to explore the logic of a
use case, you can use it to explore the logic of any function, procedure, or complex
process.
 Service logic: If you consider a service to be a high-level method used by different
clients, a sequence diagram is an ideal way to map that out.
 Sequence diagram Visio : Any sequence diagram that you create with Visio can also be
uploaded into Lucidchart supports .vsd and .vdx file import and is a great Microsoft
Visio alternative. Almost all of the images you see in the UML section of this[10]
5.2.4 Activity Diagram 27

Fig. 8 Activity Diagram


WHAT IS AN ACTIVITY DIAGRAM? 28

The Unified Modeling Language includes several subsets of diagrams, including structure
diagrams, interaction diagrams, and behavior diagrams. Activity diagrams, along with use
case and state machine diagrams, are considered behavior diagrams because they describe what
must happen in the system being modeled.

Stakeholders have many issues to manage, so it's important to communicate with clarity and
brevity. Activity diagrams help people on the business and development sides of an organization
come together to understand the same process and behavior. You'll use a set of specialized
symbols—including those used for starting, ending, merging, or receiving steps in the flow—to
make an activity diagram, which we’ll cover in more depth within this activity diagram guide.

BENEFITS OF ACTIVITY DIAGRAMS

Activity diagrams present a number of benefits to users. Consider creating an activity diagram
to:

 Demonstrate the logic of an algorithm.


 Describe the steps performed in a UML use case.
 Illustrate a business process or workflow between users and the system.
 Simplify and improve any process by clarifying complicated use cases.
 Model software architecture elements, such as method, function, and operation.
BASIC COMPONENTS OF AN ACTIVITY DIAGRAM 29

Before you begin making an activity diagram, you should first understand its makeup. Some of
the most common components of an activity diagram include:

 Action: A step in the activity wherein the users or software perform a given task. In
Lucidchart, actions are symbolized with round-edged rectangles.
 Decision node: A conditional branch in the flow that is represented by a diamond. It
includes a single input and two or more outputs.
 Control flows: Another name for the connectors that show the flow between steps in the
diagram.
 Start node: Symbolizes the beginning of the activity. The start node is represented by a
black circle.
 End node: Represents the final step in the activity. The end node is represented by an
outlined black circle.[11]
5.2.5 State Chart Diagram 30

Fig. 9 State Chart Diagram


WHAT IS A STATE DIAGRAM IN UML? 31

A state machine is any device that stores the status of an object at a given time and can change
status or cause other actions based on the input it receives. States refer to the different
combinations of information that an object can hold, not how the object behaves. In order to
understand the different states of an object, you might want to visualize all of the possible states
and show how an object gets to each state, and you can do so with a UML state diagram.

Each state diagram typically begins with a dark circle that indicates the initial state and ends with
a bordered circle that denotes the final state. However, despite having clear start and end points,
state diagrams are not necessarily the best tool for capturing an overall progression of events.
Rather, they illustrate specific kinds of behavior—in particular, shifts from one state to another.

State diagrams mainly depict states and transitions. States are represented with rectangles with
rounded corners that are labeled with the name of the state. Transitions are marked with arrows
that flow from one state to another, showing how the states change. Below, you can see both
these elements at work in a basic diagram for student life. Our UML diagram tool can help you
design any custom state machine diagram.

You can include many different shapes in a state diagram, particularly if you choose to combine
it with another diagram. This list summarizes the most common shapes you may encounter.

Composite state

A state that has substates nested into it. See the university state diagram example below.
“Enrollment” is the composite state in this example because it encompasses various substates in
the enrollment process.
Choice pseudostate 32

A diamond symbol that indicates a dynamic condition with branched potential results.

Event

An instance that triggers a transition, labeled above the applicable transition arrow. In this case,
“classes end” is the event that triggers the end of the “Being taught” state and the beginning of
the “Final exams” state.

Exit point

The point at which an object escapes the composite state or state machine, denoted by a circle
with an X through it. The exit point is typically used if the process is not completed but has to be
escaped for some error or other issue.

First state

A marker for the first state in the process, shown by a dark circle with a transition arrow.

Guard

A Boolean condition that allows or stops a transition, written above the transition arrow.

State

A rectangle with rounded corners that indicates the current nature of an object.
Substate 33

A state contained within a composite state's region.found below, “Open for enrollment” is a
substate in the larger “Enrollment” composite state.

Terminator

A circle with a dot in it that indicates that a process is terminated.

Transition

An arrow running from one state to another that indicates a changing state.

Transitional behavior

A behavior that results when a state transitions, written above the transition arrow.

Trigger

A type of message that actively moves an object from state to state, written above the transition
arrow. In this example, “Issue with reservation” is the trigger that would send the person to the
airport travel agency instead of the next step in the process.[12]
5.3 Control Flow diagrams 34
5.3.1 E-R Diagrams

Fig.10 ER Diagram
WHAT IS AN ER DIAGRAM? 35

An Entity Relationship (ER) Diagram is a type of flowchart that illustrates how “entities” such as
people, objects or concepts relate to each other within a system. ER Diagrams are most often
used to design or debug relational databases in the fields of software engineering, business
information systems, education and research. Also known as ERDs or ER Models, they use a
defined set of symbols such as rectangles, diamonds, ovals and connecting lines to depict the
interconnectedness of entities, relationships and their attributes. They mirror grammatical
structure, with entities as nouns and relationships as verbs.

ER diagrams are related to data structure diagrams (DSDs), which focus on the relationships of
elements within entities instead of relationships between entities themselves. ER diagrams also
are often used in conjunction with data flow diagrams (DFDs), which map out the flow of
information for processes or systems.

HISTORY OF ER MODELS

Peter Chen (a.k.a. Peter Pin-Shan Chen), currently a faculty member at Carnegie-Mellon
University in Pittsburgh, is credited with developing ER modeling for database design in the
1970s. While serving as an assistant professor at MIT’s Sloan School of Management, he
published a seminal paper in 1976 titled “The Entity-Relationship Model: Toward a Unified
View of Data.”
In a broader sense, the depiction of the interconnectedness of things dates back to least ancient
Greece, with the works of Aristotle, Socrates and Plato. It’s seen more recently in the 19th
and 20th Century works of philosopher-logicians like Charles Sanders Peirce and Gottlob
Frege.[13]
USES OF ENTITY RELATIONSHIP DIAGRAMS 36

 Database design: ER diagrams are used to model and design relational databases, in
terms of logic and business rules (in a logical data model) and in terms of the specific
technology to be implemented (in a physical data model.) In software engineering, an ER
diagram is often an initial step in determining requirements for an information systems
project. It’s also later used to model a particular database or databases. A relational
database has an equivalent relational table and can potentially be expressed that way as
needed.

 Database troubleshooting: ER diagrams are used to analyze existing databases to find


and resolve problems in logic or deployment. Drawing the diagram should reveal where
it’s going wrong.

 Business information systems: The diagrams are used to design or analyze relational
databases used in business processes. Any business process that uses fielded data
involving entities, actions and interplay can potentially benefit from a relational database.
It can streamline processes, uncover information more easily and improve results.

 Business process re-engineering (BPR): ER diagrams help in analyzing databases used


in business process re-engineering and in modeling a new database setup.

 Education: Databases are today’s method of storing relational information for


educational purposes and later retrieval, so ER Diagrams can be valuable in planning
those data structures.

 Research: Since so much research focuses on structured data, ER diagrams can play a
key role in setting up useful databases to analyze the data.
THE COMPONENTS AND FEATURES OF AN ER DIAGRAM 37

ER Diagrams are composed of entities, relationships and attributes. They also depict cardinality,
which defines relationships in terms of numbers. Here’s a glossary:

Entity

A definable thing—such as a person, object, concept or event—that can have data stored about it.
Think of entities as nouns. Examples: a customer, student, car or product. Typically shown as a
rectangle.

Entity type: A group of definable things, such as students or athletes, whereas the entity would
be the specific student or athlete. Other examples: customers, cars or products.

Entity set: Same as an entity type, but defined at a particular point in time, such as students
enrolled in a class on the first day. Other examples: Customers who purchased last month, cars
currently registered in Florida. A related term is instance, in which the specific person or car
would be an instance of the entity set.

Entity categories: Entities are categorized as strong, weak or associative. A strong entity can
be defined solely by its own attributes, while a weak entity cannot. An associative entity
associates entities (or elements) within an entity set.

Entity keys: Refers to an attribute that uniquely defines an entity in an entity set. Entity keys can
be super, candidate or primary. Super key: A set of attributes (one or more) that together define
an entity in an entity set. Candidate key: A minimal super key, meaning it has the least possible
number of attributes to still be a super key. An entity set may have more than one candidate
key. Primary key: A candidate key chosen by the database designer to uniquely identify the
entity set. Foreign key: Identifies the relationship between entities.
Relationship 38

How entities act upon each other or are associated with each other. Think of relationships as
verbs. For example, the named student might register for a course. The two entities would be the
student and the course, and the relationship depicted is the act of enrolling, connecting the two
entities in that way. Relationships are typically shown as diamonds or labels directly on the
connecting lines.

Recursive relationship: The same entity participates more than once in the relationship.

Attribute

A property or characteristic of an entity. Often shown as an oval or circle.

Descriptive attribute: A property or characteristic of a relationship (versus of an entity.)

Attribute categories: Attributes are categorized as simple, composite, derived, as well as single-
value or multi-value.

Simple: Means the attribute value is atomic and can’t be further divided, such as a phone
number. Composite: Sub-attributes spring from an attribute. Derived: Attributed is calculated or
otherwise derived from another attribute, such as age from a birthdate.

Multi-value: More than one attribute value is denoted, such as multiple phone numbers for a
person.

Single-value: Just one attribute value. The types can be combined, such as: simple single-value
attributes or composite multi-value attributes.
Cardinality 39

Defines the numerical attributes of the relationship between two entities or entity sets. The three
main cardinal relationships are one-to-one, one-to-many, and many-many. A one-to-one
example would be one student associated with one mailing address. A one-to-many example
(or many-to-one, depending on the relationship direction): One student registers for multiple
courses, but all those courses have a single line back to that one student. Many-to-many
example: Students as a group are associated with multiple faculty members, and faculty
members in turn are associated with multiple students.

Cardinality views: Cardinality can be shown as look-across or same-side, depending on where


the symbols are shown.

Cardinality constraints: The minimum or maximum numbers that apply to a relationship.

MAPPING NATURAL LANGUAGE

ER components can be equated to parts of speech, as Peter Chen did. This shows how an ER
Diagram compares to a grammar diagram:

 Common noun: Entity type. Example: student.

 Proper noun: Entity. Example: Sally Smith.

 Verb: Relationship type. Example: Enrolls. (Such as in a course, which would be another
entity type.)

 Adjective: Attribute for entity. Example: sophomore.

 Adverb: Attribute for relationship. Example: digitally.[13]


Chapter 5: Proposed Methodology 40

• Module I:-
Users can login by providing their gmail and correct password for validation
• Module II:-
Users can do mall social activities such as like, posts ,photos, comments,like,follow, etc
Chapter6: Result Analysis 41
6.1 Screen Shots

Home page
42
The home page or home page is the shown in the above figure. the page contents are as follows:-

 Banner of Marriage solutions


 Introduction to Community ,aims and motives
 Need an account button that gives us to the signup page to join our community
 Login fields are provided for quick login to accounts by the users
 Developers provided their in the developers page, interested peoples can visit their by
click on the develop button in the navigation heading.
 Help button will help you if you have any problem then contact us by email, Mobile no,
etc

The community provide the interaction between the interest people that are searching for
wedding planner with her own their requirements like they are available in their town, locality,
services that they want.

The wedding planner can create and join with our community by providing their relevant
information, This provide the peoples who want a good wedding needed for their family.

It connects the world peoples, societies to communicate with wedding planner to wedding
planners, wedding planner to clients vice-versa. we come to a new idea that helps every that
come to this community platform.
43

Profile page
44

The Profile information page is the shown in the above figure. The page contents are as
follows:-

 The user profile that is follow other users


 The user can create post by providing post title, description, pic.
 Users can see the post in the group where they follow
 Comments in the group posts
 Like the posts, like document, Images
 Peoples can see the groups activity that what topic are being done
 It is easy to communicate and see the activities done in the groups

It is a feature in many social networking services which allows users to create, post, comment
to and read from their own interest- and niche-specific forums, often within the realm of virtual
communities.

It is a feature in which allows users to create, post, comment to and read from their own
interest- and niche-specific forums, often within the realm of virtual communities. Groups,
which may allow for open or closed access, invitation and/or joining by other users outside the
group, are formed to provide mini-networks within the larger, more diverse social network
service. Much like electronic mailing lists, they are also owned and maintained by owners,
moderators, or managers, who can editing posts to discussion threads and regulate member
behavior within the group.

However, unlike traditional Internet forums and mailing lists, groups in social networking
services allow owners and moderators alike to share account credentials between groups without
having to log into every group.
45

Create Post page


46
In this way we are going to discuss that the current system people coming forward. The major
factor in having your own social networking site is the direct communication you have between
yourself and the customer.

In today’s trend, social networking is one of the best ways to use people in routine to
interconnected each other and build a network or social relationship as per their interest.

People are “communal” by nature as they can be engaged around their functions, disciplines,
information needs and professions, to name a few.

When we build relationships with people, whether it’s in a direct way (for instance, on a social
network such as LinkedIn) or indirectly (for instance, the readers of our blogs), communities are
built. Depending on the goals you want to serve and the target groups you want to engage, there
are different types of online communities.

The outcomes we strive for when engaging a community aim to fulfill several marketing and
business objectives.

Depending on these objectives, online communities will require more or less resources,
dedication and value.
47

Post page
48
The post details is the shown in the above figure page contents are as follows:-

There is currently a very big trend in personalizing, with having everything from writing their
own vows to providing their own music. Here are a few of the ways that you can use live.:

 The prelude is the forty five minutes or so before the bride arrives, when your guests will
start to enter and get themselves seated. Music played at this time should be fairly quiet
and unobtrusive, but give your selection some thought as it will set the mood for your
entire wedding day. The music can build up as the arrival of the bride approaches.
 The processional is the point at which the bridal party enters the ceremony venue. The
music played here should have a fairly slow pace so you don’t feel the need to run down
the aisle, but it should also be majestic and uplifting.
 Hymns or singing during the ceremony could be accompanied by your wedding band, or
you may choose to have professional singers perform a favourate song as part of the
ceremony itself.
 The registry signing can be a dull time for your guests depending on how and where you
do it, so having live music for them to listen to can be a real benefit. Choose something
they will recognise, but that fits the solemnity and formality of the occasion.
 The recessional is the part of the ceremony where the newly wedds leave the ceremony
together. Music played at this point should be light hearted and celebratory. It can have a
fast tempo to allow you to dance back down the aisle if you feel the need!

Wedding musicians can make your ceremony go with a swing

Live bands and musicians can be a pricey addition to your wedding, but if your budget allows,
live music can add a whole new dimension to your wedding day. Having flexible musicians that
will adapt to the various parts of your wedding day, or hiring a couple of bands, one for the
49
ceremony and one for the reception, will keep your guests entertained and provide a unique
soundtrack to your big day.
Popular wedding bands that you might hire to play during the ceremony include string quartets,
flutists, harpists, or a duo or trio of professional singers. Experienced wedding musicians will
have some good ideas about the type of tunes or songs to perform at the poignant moments
throughout the service, but they should also be willing to consider, and perhaps learn music that
is particularly meaningful to you.

Live music ideas for your reception


Having wedding bands playing during the welcome drinks and dinner at your wedding reception
is becoming very popular. If they have enough breaks, some bands will even stay to start the
dancing after dinner and accompany you through your fist dance as a married couple.

Popular music choices for the reception include jazz, classical music, swing music, and even
songs from musicals and shows. If you have a live band for the dancing, you might consider
playing a few classical waltzes and foxtrots early on to keep the older generation of guests
happy; you can always hire a DJ to play more modern music for the younger guests later in the
evening.

Questions to ask wedding bands


Here are a few questions to put to wedding bands or singers before you make a definite booking:

 Have they played at the venue before? If not check with the venue that the type of band
you have chosen is suitable and acceptable.
 Are they happy to play or even learn music that you request? If so how long in advance
do you need to provide your choices?
 How long will they need to set up and are they happy to arrive an hour before they are
due to perform?
 Do they have a maximum performance time, and how often do they need to take breaks?
 What is their fee and are there likely to be any extras? If they need to play for longer than
agreed what will the cost be.
50

Friend search page


51
The Search page is the shown in the above figure. the page contents are as follows:-

 In business, relationships are everything. And every relationships starts with a


conversation.T his has been true since the drawn of commerce. but today, people and
businesses are increasingly connecting through a powerful new medium; messaging

 People's use of mobile messaging apps has been on a meteoric rise. By the end of 2018,
78% of the world's smartphone users will message every month.1 And the growth is only
expected to continue: By 2021, it's predicted that the global user base for mobile
messaging apps will have risen by a further 23%.2

To shine a light on the new opportunities that messaging is unlocking, Facebook's own research,
commissioned studies, focus groups and interviews, and also reviewed third-party research in
search of the most actionable insights.

We found that people's expectations for communicating with each other are fundamentally
transforming the way they expect to communicate with businesses. And while the apps people
use and the frequency with which they message businesses may vary by region, messaging's
global momentum is undeniable. Crucially, messaging is creating momentous opportunities for
businesses of all types and sizes.

People are messaging more – and are doing so more visually.

People crave human connections. And with messaging making connections easier than ever, it is
perhaps no surprise that messaging has become an integral part of billions of people's daily lives
around the world. If you've ever messaged someone to ask if it's a good time to give them a call,
you've already experienced this shift.

Within this landscape, Messenger and WhatsApp are the most widely used messaging apps
worldwide in terms of monthly active users.
52

What we are seeing on (and beyond) these platforms is that people, globally, are messaging more
and more – and their language of choice is an increasingly universal, visually immersive one.
Case in point: Across eight markets surveyed globally, 56% of people have sent a message
consisting ,Whether people are sending "good morning" GIFs to loved ones, spontaneously
sharing Instagram Stories or using AR to visualize a potential purchase, many people who
message may tell you that the camera is the new keyboard.

People who use visuals more frequently in their messaging are 1.59 times more likely than those
who don't to say they have "great conversations" –the kind that are genuine, free-flowing and
entertaining.5 Here's a snapshot of some of the creative connections taking place across our
platforms around the world:

While convenience and reliability are both important elements of a positive experience, response
time may be the key that unlocks meaningful connections. Among people surveyed across four
markets who message businesses, the majority expect a faster response than if they had used a
more traditional mode of communication.22 This is the case for 70% of the people we spoke to in
Brazil, 66% in India, 54% in the UK and 61% in the US.

This may be why so many believe in business messaging and its future: More than one in two
people surveyed across 15 markets consider business messaging the "modern way to
communicate.

But perhaps most powerfully, nearly 40% of people surveyed globally consider messaging to be
a communication method that is "offered by many businesses."30 As this number will only
continue to rise, make sure that you meet your consumers where they are – in their messaging
apps.
53
54
The profile page is the shown in the above figure.the page contents are as follows:-

Adjust Your Personal Profile Settings for Professional Exposure

It can be tricky to blend your personal life with your business in a public setting like Facebook. It’s
important to take precautions so you don’t share something overly personal, like a night out with
friends or a family member’s private wedding.

To check and adjust your profile settings, go to your home page and click the drop-down arrow
on the top left-hand side of the navigation bar.

At the top of the Settings page, you’ll see the general settings area where you can change how your
name appears on your profile, add a primary email address, a mobile phone number, and even
update your password.

Many women enter their maiden name as their middle name on a profile so high school friends can
find them. While it makes sense for personal use, you may not want business contacts to have that
bit of personal information about you. Now’s the time to remove that from your profile.

Next, focus on security settings.

As you move into the public arena with your Facebook profile, you’ll want to control who can see
your posts, who can send you friend requests, and how people can look you up. Use the Privacy
Settings and Tools section to make any necessary changes.

For example, you’ll likely want everyone to see your future posts, so set that to public. If you’re
thinking about allowing people to contact you through your profile for business purposes, consider
changing the settings so you can receive friend requests from everyone.

The timeline and tagging settings area is where you protect yourself from having too much of
your personal life shared on a profile you’re gearing toward business.
55
photos.That’s the fun, after all. But your friends and family aren’t always going to be in a business
state of mind when they’re out with you having fun or sharing an experience with you.

To make sure you can control what shows up on your timeline, enable the features that will let
you review any timeline posts or tags before they show up on your timeline.

The timeline and tagging settings area is where you protect yourself from having too much of
your personal life shared on a profile you’re gearing toward business.

For personal use, you’ll definitely want to let your friends post to your timeline and tag you in
photos. That’s the fun of Facebook, after all. But your friends and family aren’t always going to be
in a business state of mind when they’re out with you having fun or sharing an experience with you.

To make sure you can control what shows up on your timeline, enable the features that will let
you review any timeline posts or tags before they show up on your timeline.

Put a Professional Spin on Your Profile Picture and Cover Image

Your profile picture isn’t just something your Facebook friends see. It’s always public and is also
seen in any groups you manage or join, so choose a photo you’d be happy to share with customers
and prospects.

To change your profile picture, hover over the current photo and click on Update Profile
Picture. From here, you can upload an image file from your computer, take a new photo, or
select a photo you’ve uploaded to Facebook in the past.

Currently, profile pictures must be at least 180 pixels wide and are cropped square.

While your personal profile photo is used in places like Facebook groups, your cover photo stays on
your personal profile page and is seen only by people who visit your personal timeline.
56

Depending on the type of business you have, you can use the cover photo to convey something
about your business.

Update Your Profile With Professional Details

If you’re using your profile to generate brand awareness and leads for your business, people will be
viewing your personal timeline so it’s a good idea to fill out all the boxed details completely. Think
carefully about what you’ll include.

To get started, click on the Edit Profile button found near the bottom-right corner of your cover
photo.

A window will pop up with a bio field and a featured photos section.

You’ll have 101 characters to create a bio that shows at the top of the Intro section of your profile,
directly under your profile picture.

Link to Your Own Content Off

Are you blogging for your business? While your friends and family may not be your ideal
customers, they may still want to read about things happening within your industry or share
something if it’s helpful to their own friends. Be careful, though, not to link too often.

Utilize Groups

A lot of business happens inside groups, and they’re an asset when it comes to creating brand
awareness and promoting your business. You can join someone else’s group or create your own.

Either way, groups make it easy to help, support, and encourage others every day, while offering a
solution to their problems with your products and service
57

Fig. search results


58
Invite People to Like Your Page

The easiest way to increase followers is by inviting people to like your page. Once you start
creating a for your store, Facebook will occasionally send you notifications asking you to invite
people to like your page. I found that typically if I ran engagement ads, I’d get a higher number
of people that I could invite to like the page. However, even though I manually invited people, I
eventually got temporarily blocked by Facebook. So you need to pace the number of people you
invite at a time. Also, if you do get temporarily blocked, Facebook might still send notifications
telling you to invite people. But you still won’t be able to invite anyone. Wait a day or two
before trying to invite more people. You can also invite friends and family to like your page.
However, keep in mind that it’s better to have a small, targeted audience than to have a big,
broad one, as it could limit the effectiveness of your future ads.

Create Viral Content

On my most popular store’s Facebook page, we’d share memes, funny videos, and relatable
quotes. People would tag their friends in the post, which usually helped increase social media
engagement but also helped increase social reach, another online retailer who creates viral-type
content. They regularly create funny content using their products. In this post, they promote their
shorts with a silly video about the problems that pants give people. Since the scenarios are pretty
dramatized, it results in funny content which helps boost social shares. About 250 liked the video
and 98 people shared it. If you don’t have the artistic chops to create your own viral content, you
can always share viral niche content with your audience. But be sure to always give credit to the
creator.

Partner with an Influencer

The best influencers I’ve ever partnered with weren’t really influencers at all. In fact, most of
them were niche fan pages. You know, those pages for a niche that just share cool products or
cool articles about a niche. They’re all over Facebook. They usually amass really big audiences.
And they’re usually cheaper than an influencer. That strategy works well if you’re on a super
6.2 Analysis of Data 59

In Existing System people does not have the ability to tag social
discipline violators. Fellow citizens can’t take the measures to rate,
control and monitor the social responsibility of a given individual.
Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care.
The responsible persons are ignoring because of corruption. The higher
authorities not taking any action towards indiscipline. No one is feeling
responsibility to argue .With this in our country the law and order is going
out of control.
In this current system if a person wants to give complaint, he has to go to
the concerned office and raise a complaint. In India many rural people
don’t know the rules and regulations of Govt. Hence they are blackmailed
by the corrupt world.
As the crimes are increased, it is becoming very difficult for a common
man to survive. Here as the people don’t know the actual duties of the
officers and they don’t even have the sources to reach their voice to the
higher authorities, they are becoming helpless.
Chapter7: Conclusion & Future Work 60

To improve the design of social networking in all over the world by Changing requirement and
come to our application interact it useful to all type caste, religions, etc. to know friends and
keep contact with friends that came from different countries. We can also share our ideas so
quickly so that all the things could develop so fast because people could tell us their ideas and we
could improve it immediately.

We could also learn new things on social media by watching or reading the things that people
shared onto the social media. People could also sell things on social media freely which could
reduce the expenditure of advertisements.

Social media changed our life so much. Our life became more convenient because social media
is a very useful tool for us in 21st century, it could help us to improve our life. However, we
have to aware of how we use them. If we could use the social media smartly, having social media
will become a good change for us.
References/Bibliography 61

[1]Google,Androidstudio:2019[online],Available:https://developer.android.com/st
udio
[2]Google,Firebase:2019[online],Available: https://www.firebase.google.com
[3]Youtube:2019 [online],Available: https://www.youtube.com/
[4]Facebook.com:2019[online],Available: https://www.facebook.com/
[5]NavinReddy,Teluscolearning:2019[online],Available:
https://www.youtube.com/watch?v=6fGp_Ko-bIQ&list=PLsyeobzWxl7p-
lZvWabkVJdM_UVURhUh4
[6]Lucidchart:DataFlowDiagram:2019[online],Available:https://www.lucidchart.
com/pages/data-flow-diagram/
[7]Differences of levels of dfd:2019[online],Available:
https://www.quora.com/What-are-the-difference-between-level-0-level-1-and-
level-2-Data-flow-diagrams
[8]Lucidchart:UsecaseDiagram:2019[online],Available:https://www.lucidchart.co
m/pages/uml-use-case-diagram
[9]Lucidchart:classDiagram:2019[online],Available:https://www.lucidchart.com/
pages/uml-class-diagram
[10]Lucidchart:sequenceDiagram:2019[online],Available:https://www.lucidchart.
com/pages/uml-sequence-diagram
[11]Lucidchart:ActivityDiagram:2019[online],Available:https://www.lucidchart.c
om/pages/uml-activity-diagram
[12]Lucidchart:statechartDiagram:2019[online],Available:https://www.lucidchart
.com/pages/uml-state-machine-diagram
[13]Lucidchart:ERDiagram:2019[online],Available:https://www.lucidchart.com/p
ages/er-diagrams

You might also like