Create a social network application, Computer Engineering

A software development company wants to create a social network application where users can post brief audio messages giving their thoughts.

Each user of the application will have a password, a name (consisting of first name and last name), an e-mail address, a registration date, years registered, and a location (consisting of a city, state or province, and country). The e-mail address uniquely identifies a user. The years registered should be computed from the registration date.

Each user may fall into one of three categories, normal, moderator, or guest. A user may not fall into more than one of these categories at the same time. In addition to the above user attributes, a normal user will have a membership handle. The membership handle will be unique, but the user will still be identified by his or her e-mail address. A moderator will have a membership handle as well as a work schedule.

Users may follow other users. Each time one user follows another, one's role is as the follower, and the other's role is as the thinker. A thinker may have many followers, and a follower may follow many thinkers. For each follower/thinker relationship, the system should store a Boolean value indicating whether or not the thinker has blocked the follower.

Normal users may post thoughts. A normal user may post many thoughts, but each thought must belong to a single normal user. Each thought has an audio file name, a number, a title, and a popularity score. In addition, a user may specify one or more topics with each thought. A thought's popularity score is computed based on the average rating it receives from users (described below). Each thought can only be identified by its number and the ID of the normal user that posted the thought.

Users may rate other users' thoughts. A user may rate many thoughts, and each thought may be rated by many users. Each time a user rates a thought, the system should track the score given to it by the user. The score will have a range between 1 and 10. A user should not be allowed to rate the same thought twice.

Moderators may censor thoughts if they determine them to be inappropriate. A moderator can censor many thoughts, but each thought can be censored by only one moderator. Each time a moderator censors a thought, the system should store the date the thought was censored.

In certain cases, thoughts may be given special awards. A thought may receive several awards, and each award may be given to several thoughts. Each award has a unique id number, a title, a description, and an amount. Awards are managed by moderators. Each award must be managed by one moderator, and a moderator may manage at most one award.

Posted Date: 3/30/2013 5:20:07 AM | Location : United States







Related Discussions:- Create a social network application, Assignment Help, Ask Question on Create a social network application, Get Answer, Expert's Help, Create a social network application Discussions

Write discussion on Create a social network application
Your posts are moderated
Related Questions
Q. Fundamental types of flash memory? Code Storage Flash which is made by Intel, AMD, Atmel. It stores programming algorithms and it is largely found in cell phones. Data

Problem: (a) What do you understand by the principle of locality of reference and explain how this is exploited in cache design. (b) Consider a 32-bit microprocessor that h

WML & WML Script 1. How to call a WML Script from a WML Page? 2. Write a brief note on WML Script Operators and Expressions. 3. Write brief notes on WML Script Statements

How the works do flowing related technologies influence e-business? Work Flow related Technologies influence e-business: Microsoft CRM automates internal business process

Question: a) Describe what is meant by a "bus". There are two types of bus, dedicated and multiplexed. Give a brief description of both types of buses. b) Briefly explain f

Let's provide you a fundamental illustration by which you may be able to define the concept of instruction format.  Let us consider the instruction format of a MIPS computer. MI

Network Layer is used for (A)  Breaking up the data in frames for transmission (B)  Deal with Error correction (C)  Automatic Recovery of Procedure (D)  Physica

Q. How to Create a Rollover Image? A rollover image is an image whose display changes when pointer passes ('rolls') over it. You will use Dreamweaver's Insert Rollover Image co

Entropy - learning decision trees: Through putting together a decision of tree is all a matter of choosing that attribute to test at each node in the tree. Further we shall de

Access to External Identifiers: An external identifier is one which is referred in one module though defined in another. You can declare an identifier to be external by including i