Professional Documents
Culture Documents
Netaji Subhas Institute of Technology, Bihta, Patna: Project-Ii Report ON Social Impression
Netaji Subhas Institute of Technology, Bihta, Patna: Project-Ii Report ON Social Impression
PROJECT-II REPORT
ON
SOCIAL IMPRESSION
SUBMITTED BY:
SHAAN RAASTI (151004)
SHABBIR HASSAN (151033)
VIII SEM
SESSION 2018-19
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING
BY
SHAAN RAASTI (151004)
SHABBIR HASSAN (151033)
SESSION 2018-19
CERTIFICATE
project is hereby approved for submission towards partial fulfillment for the
ACKNOWLEDGMENT
We are very much thankful to our HOD Mrs. SARITA CHAUDRY for providing us
support and guidance to accomplish this project work.
We are very grateful to our Project Guide Mr. GOPAL KRISHNA for being instrumental in
the completion of our project with his complete guidance.
We also thank all the faculties and all staff member of our college and technicians for their help
in making this project a successful one.
Finally, we take this opportunity to extend our deep appreciation to our family and friends, for all
that they meant to us during the crucial time of the completion of our project
APPROVAL SHEET
DATE: DATE:
TABLE OF CONTENTS
TITLE PAGE i
CERTIFICATE ii
ACKNOWLEDGEMENT iii
APPROVAL SHEET iv
TABLE OF CONTENTS v
LIST OF TABLES vi
1. DFD Notations 6
2. Usecase Notations 18
LIST OF FIGURES
1. Zero Level DFD 8
2. First Level DFD 15
3. Usecase Diagram 17
4. Class Diagram 21
5. Sequence Diagram 24
6. Activity Diagram 27
7. Statechart Diagram 30
8. E-R Diagram 34
ABSTRACT 1
Chapter 1: INTRODUCTION 2
1.1 About your proposed project
1.2 Proposed Project Objectives
References/Bibliography 61
ABSTRACT 1
1.2 Motivation
Every peoples wants to connect to there families should be very good and special such that it Is
make special to all over the world, talented wedding planners can show there work in by hosting
online. Unlike social networks, communities usually consist of people from all walks of life who
seem to have no relationship at all. In our current system people coming forward, participating in
the debates and fighting against the crimes in their vicinity. A social media proposal formalizes
your ideas to your client. It’s not a contract (though it can be if we want it to be). This stage often
comes after a consultation and/or research on what the client needs. The social network is
distributed across various computer networks. The social networks are inherently computer
networks, linking people, organization, and knowledge. Social networking services vary in
format and the number of features. They can incorporate a range of new information and
communication tools, operating on desktops and on laptops, on mobile devices such as tablet
computers .
Chapter 2: Background and Literature Review 3
In social networking websites like facebook[4] it can create users profile account and register
them self for matching partners. Social network sites (SNSs) such as My Space, Facebook, and
Youtube[3] have attracted millions of users, many of whom have integrated these sites into their
daily practices. There are hundreds of SNSs, with various technological affordances, supporting
a wide range of interests and practices. However, the impact of SNSs is increasingly pervasive,
with activities ranging from economic and marketing to social and educational. Among the wide
impacts of social network sites, they are, anecdotally, becoming increasingly important in
today’s businesses. Thus, the purpose of this study is to present a literature review of and
classification scheme for research works in business impacts of SNSs, with the aim of clarifying
the ways SNSs impact businesses. The review covers 28 journal articles published from 2000 to
2011 and a few months of 2012. The 28 articles classified SNS applications in businesses into
six distinct categories: the “marketing and advertising,” “knowledge management,” “social
capital,” “relationship management,” “e-commerce,” and “economic model.” The findings reveal
that “marketing and advertising”are the most frequently category has been considered in the
literature. This review provides a source for discovering business impacts of social network sites
and will help to simulate further interest in the area.
Chapter 3: Software and Hardware requirements 4
FIREBASE: Firebase gives you the tools to develop high-quality apps, grow your user base,
and earn more money. We cover the essentials so you can monetize your business and focus on
your users.
Firebase Authentication aims to make building secure authentication systems easy, while
improving the sign-in and onboarding experience for end users. It provides an end-to-end
identity solution, supporting email and password accounts, phone auth, and Google, Twitter,
Facebook, and GitHub login, and more.
Firebase SDK for Cloud Storage with mobile connectivity in mind. It will automatically pause
and resume your transfers as the app loses and regains mobile connectivity, saving your users
time and bandwidth.[2]
RAM : 4 GB
A data flow diagram (DFD) maps out the flow of information for any process or
system. It uses defined symbols like rectangles, circles and arrows, plus short text
labels, to show data inputs, outputs, storage points and the routes between each
destination. Data flowcharts can range from simple, even hand-drawn process
overviews, to in-depth, multi-level DFDs that dig progressively deeper into how
the data is handled. They can be used to analyze an existing system or model a
new one. Like all the best diagrams and charts, a DFD can often visually “say”
things that would be hard to explain in words, and they work for both technical
and nontechnical audiences, from developer to CEO. That’s why DFDs remain so
popular after all these years. While they work well for data flow software and
systems, they are less applicable nowadays to visualizing interactive, real-time or
database-oriented software or systems. Data flow diagrams were popularized in
the late 1970s, arising from the book Structured Design, by computing pioneers
Ed Yourdon and Larry Constantine. They based it on the “data flow graph”
computation models by David Martin and Gerald Estrin. The structured design
concept took off in the software engineering field, and the DFD method took off
with it. It became more popular in business circles, as it was applied to business
analysis, than in academic circles
Object Oriented Analysis and Design (OOAD), put forth by Yourdon and
Peter Coad to analyze and design an application or system.
Three other experts contributing to this rise in DFD methodology were Tom
DeMarco, Chris Gane and Trish Sarson. They teamed up in different
combinations to be the main definers of the symbols and notations used for a data
flow diagram
2. Process: any process that changes the data, producing an output. It might perform
computations, or sort data based on logic, or direct the data flow based on
business rules.
3. Data store: files or repositories that hold information for later use, such as a
database table or a membership form. Each data store receives a simple label,
such as “Orders.”
4. Data flow: the route that data takes between the external entities, processes and
data stores. It portrays the interface between the other components and is shown
with arrows, typically labeled with a short data name, like “Billing details.”[11]
8
It provides a more detailed view of the Context Level Diagram Here, the main
functions carried out by the system are highlighted as we break into its sub-processes.
DFDs can be expressed as a series of levels. The outermost level (Level 0) is
concerned with how the system interacts with the outside world. Subsequent levels
examine the system in more detail, and use the same symbols and syntax as with Level
0. When producing a first-level DFD, the relationship of the system with its
environment must be preserved. In other words, the data flow in and out of the system
in the Level 1 DFD must be exactly the same as those data flows in Level 0. If you
discover new data flows crossing the system boundary when drawing the Level 1 DFD,
then the Level 0 DFD must be amended to reflect the changes in the Level 1 DFD. It is
important that the system relationship with its environment be preserved no matter how
many levels deep you model. In other words, you can’t have new data flows crossing
the system boundary in Level 1. The next section deals with such non-valid data flows.
The Level 1 DFD provides a high-level view of the system that identifies the major
processes and data stores. Identify or list each incoming and outgoing dataflow with a
corresponding process that receives or generates data. Make sure you refer to your data
it emutable for any missing internal data flows and to identify data stores. If your table
contains documents with the same source and destination, they might be data stores.
Some processes share data stores while some data stores are used by one process. It
may be possible to move the single process • data store inside the process itself.
Identify those processes that only address internal.[7]
5.2 UML diagrams. UML diagrams must include the following 17
5.2.1 Usecase Diagram
In the Unified Modeling Language (UML), a use case diagram can summarize the details of your
system's users (also known as actors) and their interactions with the system. To build one, you'll
use a set of specialized symbols and connectors. An effective use case diagram can help your
team discuss and represent:
A use case diagram doesn't go into a lot of detail—for example, don't expect it to model the order
in which steps are performed. Instead, a proper use case diagram depicts a high-level overview
of the relationship between use cases, actors, and systems. Experts recommend that use case
diagrams be used to supplement a more descriptive textual use case.
19
UML is the modeling toolkit that you can use to build your diagrams. Use cases are represented
with a labeled oval shape. Stick figures represent actors in the process, and the actor's
participation in the system is modeled with a line between the actor and use case.
To answer the question, "What is a use case diagram?" you need to first understand its building
blocks. Common components include:
Actors: The users that interact with a system. An actor can be a person, an organization,
or an outside system that interacts with your application or system. They must be external
objects that produce or consume data.
System: A specific sequence of actions and interactions between actors and the system.
A system may also be referred to as a scenario.
Goals: The end result of most use cases. A successful diagram should describe the
activities and variants used to reach the goa
20
The notation for a use case diagram is pretty straightforward and doesn't involve as many types
of symbols as other UML diagrams. Here are all the shapes you will be able to find in
Lucidchart:
Use cases: Horizontally shaped ovals that represent the different uses that a user might
have.
Actors: Stick figures that represent the people actually employing the use cases.
Associations: A line between actors and use cases. In complex diagrams, it is important
to know which actors are associated with which use cases.
System boundary boxes: A box that sets a system scope to use cases. All use cases
outside the box would be considered outside the scope of that system. For example,
Psycho Killer is outside the scope of occupations in the chainsaw example found
below.[8]
5.2.2 Class Diagram 21
The Unified Modeling Language (UML) can help you model systems in various ways. One of
the more popular types in UML is the class diagram. Popular among software engineers to
document software architecture, class diagrams are a type of structure diagram because they
describe what must be present in the system being modeled. No matter your level of familiarity
with UML or class diagrams, our UML software is designed to be simple and easy to use.
The class shape itself consists of a rectangle with three rows. The top row contains the name of
the class, the middle row contains the attributes of the class, and the bottom section expresses the
methods or operations that the class may use. Classes and subclasses are grouped together to
show the static relationship between each object.
The UML shape library in Lucidchart can help you create nearly any custom class diagram using
our UML diagram tool.
Class diagrams offer a number of benefits for any organization. Use UML class diagrams to:
Illustrate data models for information systems, no matter how simple or complex.
Visually express any specific needs of a system and disseminate that information
throughout the business.
Create detailed charts that highlight any specific code needed to be programmed and
implemented to the described structure.
Upper section: Contains the name of the class. This section is always required, whether
you are talking about the classifier or an object.
Middle section: Contains the attributes of the class. Use this section to describe the
qualities of the class. This is only required when describing a specific instance of a class.
Bottom section: Includes class operations (methods). Displayed in list format, each
operation takes up its own line. The operations describe how a class interacts with data.
All classes have different access levels depending on the access modifier (visibility).
Public (+)
Private (-)[9]
5.2.3 Interaction diagrams-Sequence and Collaboration Diagram 24
To understand what a sequence diagram is, it's important to know the role of the Unified
Modeling Language, better known as UML. UML is a modeling toolkit that guides the creation
and notation of many types of diagrams, including behavior diagrams, interaction diagrams, and
structure diagrams.
Note that there are two types of sequence diagrams: UML diagrams and code-based diagrams.
The latter is sourced from programming code and will not be covered in this guide. Lucidchart’s
UML diagramming software is equipped with all the shapes and features you will need to model
both.
1. Sequence diagrams can be useful references for businesses and other organizations.
Try drawing a sequence diagram to:
2. Represent the details of a UML use case.
3. Model the logic of a sophisticated procedure, function, or operation.
4. See how objects and components interact with each other to complete a process.
5. Plan and understand the detailed functionality of an existing or future scenario.
USE CASES FOR SEQUENCE DIAGRAMS 26
Usage scenario: A usage scenario is a diagram of how your system could potentially be
used. It's a great way to make sure that you have worked through the logic of every usage
scenario for the system.
Method logic: Just as you might use a UML sequence diagram to explore the logic of a
use case, you can use it to explore the logic of any function, procedure, or complex
process.
Service logic: If you consider a service to be a high-level method used by different
clients, a sequence diagram is an ideal way to map that out.
Sequence diagram Visio : Any sequence diagram that you create with Visio can also be
uploaded into Lucidchart supports .vsd and .vdx file import and is a great Microsoft
Visio alternative. Almost all of the images you see in the UML section of this[10]
5.2.4 Activity Diagram 27
The Unified Modeling Language includes several subsets of diagrams, including structure
diagrams, interaction diagrams, and behavior diagrams. Activity diagrams, along with use
case and state machine diagrams, are considered behavior diagrams because they describe what
must happen in the system being modeled.
Stakeholders have many issues to manage, so it's important to communicate with clarity and
brevity. Activity diagrams help people on the business and development sides of an organization
come together to understand the same process and behavior. You'll use a set of specialized
symbols—including those used for starting, ending, merging, or receiving steps in the flow—to
make an activity diagram, which we’ll cover in more depth within this activity diagram guide.
Activity diagrams present a number of benefits to users. Consider creating an activity diagram
to:
Before you begin making an activity diagram, you should first understand its makeup. Some of
the most common components of an activity diagram include:
Action: A step in the activity wherein the users or software perform a given task. In
Lucidchart, actions are symbolized with round-edged rectangles.
Decision node: A conditional branch in the flow that is represented by a diamond. It
includes a single input and two or more outputs.
Control flows: Another name for the connectors that show the flow between steps in the
diagram.
Start node: Symbolizes the beginning of the activity. The start node is represented by a
black circle.
End node: Represents the final step in the activity. The end node is represented by an
outlined black circle.[11]
5.2.5 State Chart Diagram 30
A state machine is any device that stores the status of an object at a given time and can change
status or cause other actions based on the input it receives. States refer to the different
combinations of information that an object can hold, not how the object behaves. In order to
understand the different states of an object, you might want to visualize all of the possible states
and show how an object gets to each state, and you can do so with a UML state diagram.
Each state diagram typically begins with a dark circle that indicates the initial state and ends with
a bordered circle that denotes the final state. However, despite having clear start and end points,
state diagrams are not necessarily the best tool for capturing an overall progression of events.
Rather, they illustrate specific kinds of behavior—in particular, shifts from one state to another.
State diagrams mainly depict states and transitions. States are represented with rectangles with
rounded corners that are labeled with the name of the state. Transitions are marked with arrows
that flow from one state to another, showing how the states change. Below, you can see both
these elements at work in a basic diagram for student life. Our UML diagram tool can help you
design any custom state machine diagram.
You can include many different shapes in a state diagram, particularly if you choose to combine
it with another diagram. This list summarizes the most common shapes you may encounter.
Composite state
A state that has substates nested into it. See the university state diagram example below.
“Enrollment” is the composite state in this example because it encompasses various substates in
the enrollment process.
Choice pseudostate 32
A diamond symbol that indicates a dynamic condition with branched potential results.
Event
An instance that triggers a transition, labeled above the applicable transition arrow. In this case,
“classes end” is the event that triggers the end of the “Being taught” state and the beginning of
the “Final exams” state.
Exit point
The point at which an object escapes the composite state or state machine, denoted by a circle
with an X through it. The exit point is typically used if the process is not completed but has to be
escaped for some error or other issue.
First state
A marker for the first state in the process, shown by a dark circle with a transition arrow.
Guard
A Boolean condition that allows or stops a transition, written above the transition arrow.
State
A rectangle with rounded corners that indicates the current nature of an object.
Substate 33
A state contained within a composite state's region.found below, “Open for enrollment” is a
substate in the larger “Enrollment” composite state.
Terminator
Transition
An arrow running from one state to another that indicates a changing state.
Transitional behavior
A behavior that results when a state transitions, written above the transition arrow.
Trigger
A type of message that actively moves an object from state to state, written above the transition
arrow. In this example, “Issue with reservation” is the trigger that would send the person to the
airport travel agency instead of the next step in the process.[12]
5.3 Control Flow diagrams 34
5.3.1 E-R Diagrams
Fig.10 ER Diagram
WHAT IS AN ER DIAGRAM? 35
An Entity Relationship (ER) Diagram is a type of flowchart that illustrates how “entities” such as
people, objects or concepts relate to each other within a system. ER Diagrams are most often
used to design or debug relational databases in the fields of software engineering, business
information systems, education and research. Also known as ERDs or ER Models, they use a
defined set of symbols such as rectangles, diamonds, ovals and connecting lines to depict the
interconnectedness of entities, relationships and their attributes. They mirror grammatical
structure, with entities as nouns and relationships as verbs.
ER diagrams are related to data structure diagrams (DSDs), which focus on the relationships of
elements within entities instead of relationships between entities themselves. ER diagrams also
are often used in conjunction with data flow diagrams (DFDs), which map out the flow of
information for processes or systems.
HISTORY OF ER MODELS
Peter Chen (a.k.a. Peter Pin-Shan Chen), currently a faculty member at Carnegie-Mellon
University in Pittsburgh, is credited with developing ER modeling for database design in the
1970s. While serving as an assistant professor at MIT’s Sloan School of Management, he
published a seminal paper in 1976 titled “The Entity-Relationship Model: Toward a Unified
View of Data.”
In a broader sense, the depiction of the interconnectedness of things dates back to least ancient
Greece, with the works of Aristotle, Socrates and Plato. It’s seen more recently in the 19th
and 20th Century works of philosopher-logicians like Charles Sanders Peirce and Gottlob
Frege.[13]
USES OF ENTITY RELATIONSHIP DIAGRAMS 36
Database design: ER diagrams are used to model and design relational databases, in
terms of logic and business rules (in a logical data model) and in terms of the specific
technology to be implemented (in a physical data model.) In software engineering, an ER
diagram is often an initial step in determining requirements for an information systems
project. It’s also later used to model a particular database or databases. A relational
database has an equivalent relational table and can potentially be expressed that way as
needed.
Business information systems: The diagrams are used to design or analyze relational
databases used in business processes. Any business process that uses fielded data
involving entities, actions and interplay can potentially benefit from a relational database.
It can streamline processes, uncover information more easily and improve results.
Research: Since so much research focuses on structured data, ER diagrams can play a
key role in setting up useful databases to analyze the data.
THE COMPONENTS AND FEATURES OF AN ER DIAGRAM 37
ER Diagrams are composed of entities, relationships and attributes. They also depict cardinality,
which defines relationships in terms of numbers. Here’s a glossary:
Entity
A definable thing—such as a person, object, concept or event—that can have data stored about it.
Think of entities as nouns. Examples: a customer, student, car or product. Typically shown as a
rectangle.
Entity type: A group of definable things, such as students or athletes, whereas the entity would
be the specific student or athlete. Other examples: customers, cars or products.
Entity set: Same as an entity type, but defined at a particular point in time, such as students
enrolled in a class on the first day. Other examples: Customers who purchased last month, cars
currently registered in Florida. A related term is instance, in which the specific person or car
would be an instance of the entity set.
Entity categories: Entities are categorized as strong, weak or associative. A strong entity can
be defined solely by its own attributes, while a weak entity cannot. An associative entity
associates entities (or elements) within an entity set.
Entity keys: Refers to an attribute that uniquely defines an entity in an entity set. Entity keys can
be super, candidate or primary. Super key: A set of attributes (one or more) that together define
an entity in an entity set. Candidate key: A minimal super key, meaning it has the least possible
number of attributes to still be a super key. An entity set may have more than one candidate
key. Primary key: A candidate key chosen by the database designer to uniquely identify the
entity set. Foreign key: Identifies the relationship between entities.
Relationship 38
How entities act upon each other or are associated with each other. Think of relationships as
verbs. For example, the named student might register for a course. The two entities would be the
student and the course, and the relationship depicted is the act of enrolling, connecting the two
entities in that way. Relationships are typically shown as diamonds or labels directly on the
connecting lines.
Recursive relationship: The same entity participates more than once in the relationship.
Attribute
Attribute categories: Attributes are categorized as simple, composite, derived, as well as single-
value or multi-value.
Simple: Means the attribute value is atomic and can’t be further divided, such as a phone
number. Composite: Sub-attributes spring from an attribute. Derived: Attributed is calculated or
otherwise derived from another attribute, such as age from a birthdate.
Multi-value: More than one attribute value is denoted, such as multiple phone numbers for a
person.
Single-value: Just one attribute value. The types can be combined, such as: simple single-value
attributes or composite multi-value attributes.
Cardinality 39
Defines the numerical attributes of the relationship between two entities or entity sets. The three
main cardinal relationships are one-to-one, one-to-many, and many-many. A one-to-one
example would be one student associated with one mailing address. A one-to-many example
(or many-to-one, depending on the relationship direction): One student registers for multiple
courses, but all those courses have a single line back to that one student. Many-to-many
example: Students as a group are associated with multiple faculty members, and faculty
members in turn are associated with multiple students.
ER components can be equated to parts of speech, as Peter Chen did. This shows how an ER
Diagram compares to a grammar diagram:
Verb: Relationship type. Example: Enrolls. (Such as in a course, which would be another
entity type.)
• Module I:-
Users can login by providing their gmail and correct password for validation
• Module II:-
Users can do mall social activities such as like, posts ,photos, comments,like,follow, etc
Chapter6: Result Analysis 41
6.1 Screen Shots
Home page
42
The home page or home page is the shown in the above figure. the page contents are as follows:-
The community provide the interaction between the interest people that are searching for
wedding planner with her own their requirements like they are available in their town, locality,
services that they want.
The wedding planner can create and join with our community by providing their relevant
information, This provide the peoples who want a good wedding needed for their family.
It connects the world peoples, societies to communicate with wedding planner to wedding
planners, wedding planner to clients vice-versa. we come to a new idea that helps every that
come to this community platform.
43
Profile page
44
The Profile information page is the shown in the above figure. The page contents are as
follows:-
It is a feature in many social networking services which allows users to create, post, comment
to and read from their own interest- and niche-specific forums, often within the realm of virtual
communities.
It is a feature in which allows users to create, post, comment to and read from their own
interest- and niche-specific forums, often within the realm of virtual communities. Groups,
which may allow for open or closed access, invitation and/or joining by other users outside the
group, are formed to provide mini-networks within the larger, more diverse social network
service. Much like electronic mailing lists, they are also owned and maintained by owners,
moderators, or managers, who can editing posts to discussion threads and regulate member
behavior within the group.
However, unlike traditional Internet forums and mailing lists, groups in social networking
services allow owners and moderators alike to share account credentials between groups without
having to log into every group.
45
In today’s trend, social networking is one of the best ways to use people in routine to
interconnected each other and build a network or social relationship as per their interest.
People are “communal” by nature as they can be engaged around their functions, disciplines,
information needs and professions, to name a few.
When we build relationships with people, whether it’s in a direct way (for instance, on a social
network such as LinkedIn) or indirectly (for instance, the readers of our blogs), communities are
built. Depending on the goals you want to serve and the target groups you want to engage, there
are different types of online communities.
The outcomes we strive for when engaging a community aim to fulfill several marketing and
business objectives.
Depending on these objectives, online communities will require more or less resources,
dedication and value.
47
Post page
48
The post details is the shown in the above figure page contents are as follows:-
There is currently a very big trend in personalizing, with having everything from writing their
own vows to providing their own music. Here are a few of the ways that you can use live.:
The prelude is the forty five minutes or so before the bride arrives, when your guests will
start to enter and get themselves seated. Music played at this time should be fairly quiet
and unobtrusive, but give your selection some thought as it will set the mood for your
entire wedding day. The music can build up as the arrival of the bride approaches.
The processional is the point at which the bridal party enters the ceremony venue. The
music played here should have a fairly slow pace so you don’t feel the need to run down
the aisle, but it should also be majestic and uplifting.
Hymns or singing during the ceremony could be accompanied by your wedding band, or
you may choose to have professional singers perform a favourate song as part of the
ceremony itself.
The registry signing can be a dull time for your guests depending on how and where you
do it, so having live music for them to listen to can be a real benefit. Choose something
they will recognise, but that fits the solemnity and formality of the occasion.
The recessional is the part of the ceremony where the newly wedds leave the ceremony
together. Music played at this point should be light hearted and celebratory. It can have a
fast tempo to allow you to dance back down the aisle if you feel the need!
Live bands and musicians can be a pricey addition to your wedding, but if your budget allows,
live music can add a whole new dimension to your wedding day. Having flexible musicians that
will adapt to the various parts of your wedding day, or hiring a couple of bands, one for the
49
ceremony and one for the reception, will keep your guests entertained and provide a unique
soundtrack to your big day.
Popular wedding bands that you might hire to play during the ceremony include string quartets,
flutists, harpists, or a duo or trio of professional singers. Experienced wedding musicians will
have some good ideas about the type of tunes or songs to perform at the poignant moments
throughout the service, but they should also be willing to consider, and perhaps learn music that
is particularly meaningful to you.
Popular music choices for the reception include jazz, classical music, swing music, and even
songs from musicals and shows. If you have a live band for the dancing, you might consider
playing a few classical waltzes and foxtrots early on to keep the older generation of guests
happy; you can always hire a DJ to play more modern music for the younger guests later in the
evening.
Have they played at the venue before? If not check with the venue that the type of band
you have chosen is suitable and acceptable.
Are they happy to play or even learn music that you request? If so how long in advance
do you need to provide your choices?
How long will they need to set up and are they happy to arrive an hour before they are
due to perform?
Do they have a maximum performance time, and how often do they need to take breaks?
What is their fee and are there likely to be any extras? If they need to play for longer than
agreed what will the cost be.
50
People's use of mobile messaging apps has been on a meteoric rise. By the end of 2018,
78% of the world's smartphone users will message every month.1 And the growth is only
expected to continue: By 2021, it's predicted that the global user base for mobile
messaging apps will have risen by a further 23%.2
To shine a light on the new opportunities that messaging is unlocking, Facebook's own research,
commissioned studies, focus groups and interviews, and also reviewed third-party research in
search of the most actionable insights.
We found that people's expectations for communicating with each other are fundamentally
transforming the way they expect to communicate with businesses. And while the apps people
use and the frequency with which they message businesses may vary by region, messaging's
global momentum is undeniable. Crucially, messaging is creating momentous opportunities for
businesses of all types and sizes.
People crave human connections. And with messaging making connections easier than ever, it is
perhaps no surprise that messaging has become an integral part of billions of people's daily lives
around the world. If you've ever messaged someone to ask if it's a good time to give them a call,
you've already experienced this shift.
Within this landscape, Messenger and WhatsApp are the most widely used messaging apps
worldwide in terms of monthly active users.
52
What we are seeing on (and beyond) these platforms is that people, globally, are messaging more
and more – and their language of choice is an increasingly universal, visually immersive one.
Case in point: Across eight markets surveyed globally, 56% of people have sent a message
consisting ,Whether people are sending "good morning" GIFs to loved ones, spontaneously
sharing Instagram Stories or using AR to visualize a potential purchase, many people who
message may tell you that the camera is the new keyboard.
People who use visuals more frequently in their messaging are 1.59 times more likely than those
who don't to say they have "great conversations" –the kind that are genuine, free-flowing and
entertaining.5 Here's a snapshot of some of the creative connections taking place across our
platforms around the world:
While convenience and reliability are both important elements of a positive experience, response
time may be the key that unlocks meaningful connections. Among people surveyed across four
markets who message businesses, the majority expect a faster response than if they had used a
more traditional mode of communication.22 This is the case for 70% of the people we spoke to in
Brazil, 66% in India, 54% in the UK and 61% in the US.
This may be why so many believe in business messaging and its future: More than one in two
people surveyed across 15 markets consider business messaging the "modern way to
communicate.
But perhaps most powerfully, nearly 40% of people surveyed globally consider messaging to be
a communication method that is "offered by many businesses."30 As this number will only
continue to rise, make sure that you meet your consumers where they are – in their messaging
apps.
53
54
The profile page is the shown in the above figure.the page contents are as follows:-
It can be tricky to blend your personal life with your business in a public setting like Facebook. It’s
important to take precautions so you don’t share something overly personal, like a night out with
friends or a family member’s private wedding.
To check and adjust your profile settings, go to your home page and click the drop-down arrow
on the top left-hand side of the navigation bar.
At the top of the Settings page, you’ll see the general settings area where you can change how your
name appears on your profile, add a primary email address, a mobile phone number, and even
update your password.
Many women enter their maiden name as their middle name on a profile so high school friends can
find them. While it makes sense for personal use, you may not want business contacts to have that
bit of personal information about you. Now’s the time to remove that from your profile.
As you move into the public arena with your Facebook profile, you’ll want to control who can see
your posts, who can send you friend requests, and how people can look you up. Use the Privacy
Settings and Tools section to make any necessary changes.
For example, you’ll likely want everyone to see your future posts, so set that to public. If you’re
thinking about allowing people to contact you through your profile for business purposes, consider
changing the settings so you can receive friend requests from everyone.
The timeline and tagging settings area is where you protect yourself from having too much of
your personal life shared on a profile you’re gearing toward business.
55
photos.That’s the fun, after all. But your friends and family aren’t always going to be in a business
state of mind when they’re out with you having fun or sharing an experience with you.
To make sure you can control what shows up on your timeline, enable the features that will let
you review any timeline posts or tags before they show up on your timeline.
The timeline and tagging settings area is where you protect yourself from having too much of
your personal life shared on a profile you’re gearing toward business.
For personal use, you’ll definitely want to let your friends post to your timeline and tag you in
photos. That’s the fun of Facebook, after all. But your friends and family aren’t always going to be
in a business state of mind when they’re out with you having fun or sharing an experience with you.
To make sure you can control what shows up on your timeline, enable the features that will let
you review any timeline posts or tags before they show up on your timeline.
Your profile picture isn’t just something your Facebook friends see. It’s always public and is also
seen in any groups you manage or join, so choose a photo you’d be happy to share with customers
and prospects.
To change your profile picture, hover over the current photo and click on Update Profile
Picture. From here, you can upload an image file from your computer, take a new photo, or
select a photo you’ve uploaded to Facebook in the past.
Currently, profile pictures must be at least 180 pixels wide and are cropped square.
While your personal profile photo is used in places like Facebook groups, your cover photo stays on
your personal profile page and is seen only by people who visit your personal timeline.
56
Depending on the type of business you have, you can use the cover photo to convey something
about your business.
If you’re using your profile to generate brand awareness and leads for your business, people will be
viewing your personal timeline so it’s a good idea to fill out all the boxed details completely. Think
carefully about what you’ll include.
To get started, click on the Edit Profile button found near the bottom-right corner of your cover
photo.
A window will pop up with a bio field and a featured photos section.
You’ll have 101 characters to create a bio that shows at the top of the Intro section of your profile,
directly under your profile picture.
Are you blogging for your business? While your friends and family may not be your ideal
customers, they may still want to read about things happening within your industry or share
something if it’s helpful to their own friends. Be careful, though, not to link too often.
Utilize Groups
A lot of business happens inside groups, and they’re an asset when it comes to creating brand
awareness and promoting your business. You can join someone else’s group or create your own.
Either way, groups make it easy to help, support, and encourage others every day, while offering a
solution to their problems with your products and service
57
The easiest way to increase followers is by inviting people to like your page. Once you start
creating a for your store, Facebook will occasionally send you notifications asking you to invite
people to like your page. I found that typically if I ran engagement ads, I’d get a higher number
of people that I could invite to like the page. However, even though I manually invited people, I
eventually got temporarily blocked by Facebook. So you need to pace the number of people you
invite at a time. Also, if you do get temporarily blocked, Facebook might still send notifications
telling you to invite people. But you still won’t be able to invite anyone. Wait a day or two
before trying to invite more people. You can also invite friends and family to like your page.
However, keep in mind that it’s better to have a small, targeted audience than to have a big,
broad one, as it could limit the effectiveness of your future ads.
On my most popular store’s Facebook page, we’d share memes, funny videos, and relatable
quotes. People would tag their friends in the post, which usually helped increase social media
engagement but also helped increase social reach, another online retailer who creates viral-type
content. They regularly create funny content using their products. In this post, they promote their
shorts with a silly video about the problems that pants give people. Since the scenarios are pretty
dramatized, it results in funny content which helps boost social shares. About 250 liked the video
and 98 people shared it. If you don’t have the artistic chops to create your own viral content, you
can always share viral niche content with your audience. But be sure to always give credit to the
creator.
The best influencers I’ve ever partnered with weren’t really influencers at all. In fact, most of
them were niche fan pages. You know, those pages for a niche that just share cool products or
cool articles about a niche. They’re all over Facebook. They usually amass really big audiences.
And they’re usually cheaper than an influencer. That strategy works well if you’re on a super
6.2 Analysis of Data 59
In Existing System people does not have the ability to tag social
discipline violators. Fellow citizens can’t take the measures to rate,
control and monitor the social responsibility of a given individual.
Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care.
The responsible persons are ignoring because of corruption. The higher
authorities not taking any action towards indiscipline. No one is feeling
responsibility to argue .With this in our country the law and order is going
out of control.
In this current system if a person wants to give complaint, he has to go to
the concerned office and raise a complaint. In India many rural people
don’t know the rules and regulations of Govt. Hence they are blackmailed
by the corrupt world.
As the crimes are increased, it is becoming very difficult for a common
man to survive. Here as the people don’t know the actual duties of the
officers and they don’t even have the sources to reach their voice to the
higher authorities, they are becoming helpless.
Chapter7: Conclusion & Future Work 60
To improve the design of social networking in all over the world by Changing requirement and
come to our application interact it useful to all type caste, religions, etc. to know friends and
keep contact with friends that came from different countries. We can also share our ideas so
quickly so that all the things could develop so fast because people could tell us their ideas and we
could improve it immediately.
We could also learn new things on social media by watching or reading the things that people
shared onto the social media. People could also sell things on social media freely which could
reduce the expenditure of advertisements.
Social media changed our life so much. Our life became more convenient because social media
is a very useful tool for us in 21st century, it could help us to improve our life. However, we
have to aware of how we use them. If we could use the social media smartly, having social media
will become a good change for us.
References/Bibliography 61
[1]Google,Androidstudio:2019[online],Available:https://developer.android.com/st
udio
[2]Google,Firebase:2019[online],Available: https://www.firebase.google.com
[3]Youtube:2019 [online],Available: https://www.youtube.com/
[4]Facebook.com:2019[online],Available: https://www.facebook.com/
[5]NavinReddy,Teluscolearning:2019[online],Available:
https://www.youtube.com/watch?v=6fGp_Ko-bIQ&list=PLsyeobzWxl7p-
lZvWabkVJdM_UVURhUh4
[6]Lucidchart:DataFlowDiagram:2019[online],Available:https://www.lucidchart.
com/pages/data-flow-diagram/
[7]Differences of levels of dfd:2019[online],Available:
https://www.quora.com/What-are-the-difference-between-level-0-level-1-and-
level-2-Data-flow-diagrams
[8]Lucidchart:UsecaseDiagram:2019[online],Available:https://www.lucidchart.co
m/pages/uml-use-case-diagram
[9]Lucidchart:classDiagram:2019[online],Available:https://www.lucidchart.com/
pages/uml-class-diagram
[10]Lucidchart:sequenceDiagram:2019[online],Available:https://www.lucidchart.
com/pages/uml-sequence-diagram
[11]Lucidchart:ActivityDiagram:2019[online],Available:https://www.lucidchart.c
om/pages/uml-activity-diagram
[12]Lucidchart:statechartDiagram:2019[online],Available:https://www.lucidchart
.com/pages/uml-state-machine-diagram
[13]Lucidchart:ERDiagram:2019[online],Available:https://www.lucidchart.com/p
ages/er-diagrams