Create a social network application, Computer Engineering

Assignment Help:

A software development company wants to create a social network application where users can post brief audio messages giving their thoughts.

Each user of the application will have a password, a name (consisting of first name and last name), an e-mail address, a registration date, years registered, and a location (consisting of a city, state or province, and country). The e-mail address uniquely identifies a user. The years registered should be computed from the registration date.

Each user may fall into one of three categories, normal, moderator, or guest. A user may not fall into more than one of these categories at the same time. In addition to the above user attributes, a normal user will have a membership handle. The membership handle will be unique, but the user will still be identified by his or her e-mail address. A moderator will have a membership handle as well as a work schedule.

Users may follow other users. Each time one user follows another, one's role is as the follower, and the other's role is as the thinker. A thinker may have many followers, and a follower may follow many thinkers. For each follower/thinker relationship, the system should store a Boolean value indicating whether or not the thinker has blocked the follower.

Normal users may post thoughts. A normal user may post many thoughts, but each thought must belong to a single normal user. Each thought has an audio file name, a number, a title, and a popularity score. In addition, a user may specify one or more topics with each thought. A thought's popularity score is computed based on the average rating it receives from users (described below). Each thought can only be identified by its number and the ID of the normal user that posted the thought.

Users may rate other users' thoughts. A user may rate many thoughts, and each thought may be rated by many users. Each time a user rates a thought, the system should track the score given to it by the user. The score will have a range between 1 and 10. A user should not be allowed to rate the same thought twice.

Moderators may censor thoughts if they determine them to be inappropriate. A moderator can censor many thoughts, but each thought can be censored by only one moderator. Each time a moderator censors a thought, the system should store the date the thought was censored.

In certain cases, thoughts may be given special awards. A thought may receive several awards, and each award may be given to several thoughts. Each award has a unique id number, a title, a description, and an amount. Awards are managed by moderators. Each award must be managed by one moderator, and a moderator may manage at most one award.


Related Discussions:- Create a social network application

Adder substractor, how can we bimpliment half substractor using nand gate

how can we bimpliment half substractor using nand gate

What is clear operation, Clear operation The clear operation compares w...

Clear operation The clear operation compares words present in A and B and produces an all 0's result if two numbers are equal. This operation is achieved by the exclusive-OR mi

Explain the term- scan insertion, Explain the term- Scan Insertion Sca...

Explain the term- Scan Insertion Scan Insertion is completed by a tool and results in all (or most) of your design's flip-flops to be changed by special "Scan Flip-flops". Sca

Name some of synthesizable and non-synthesizable constructs, Can you list o...

Can you list out some of synthesizable and non-synthesizable constructs? not synthesizable->>>> initial ignored for synthesis. delays  ignored for synthesis. ev

Explain transmission gate-based d-latch, The Transmission-Gate input is lin...

The Transmission-Gate input is linked to the D_LATCH data input (D), the control input to the Transmission-Gate is linked to the D_LATCH enable input (EN) and the Transmission-Gate

Implication connective - modus ponens rule, Implication connective - Modus ...

Implication connective - Modus ponens rule: We notice that this is a trivial example, so it highlights how we use truth tables: as the first line is the only one when both abo

How does cpu know that an interrupt has taken place, How does CPU know that...

How does CPU know that an interrupt has taken place? There needs to be a line or a register or status word in CPU which can be increased on occurrence of interrupt situation.

How do you create special files like named pipes, How do you create special...

How do you create special files like named pipes and device files? The system call method forms special files in the following sequence. Kernel assigns new inode,

What is a microform, What is a microform? This is the collective term f...

What is a microform? This is the collective term for all micro images kepted on a wide range of microfilm media, like roll film, fiche, aperture cards, strip or jackets.

An example subroutine call, Create your own Subprogram that does *not* use ...

Create your own Subprogram that does *not* use any input parameters. You decide the theme. You should give the pseudocode and an example Subroutine call. Be sure to give an overvie

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd