Create a social network application, Computer Engineering

Assignment Help:

A software development company wants to create a social network application where users can post brief audio messages giving their thoughts.

Each user of the application will have a password, a name (consisting of first name and last name), an e-mail address, a registration date, years registered, and a location (consisting of a city, state or province, and country). The e-mail address uniquely identifies a user. The years registered should be computed from the registration date.

Each user may fall into one of three categories, normal, moderator, or guest. A user may not fall into more than one of these categories at the same time. In addition to the above user attributes, a normal user will have a membership handle. The membership handle will be unique, but the user will still be identified by his or her e-mail address. A moderator will have a membership handle as well as a work schedule.

Users may follow other users. Each time one user follows another, one's role is as the follower, and the other's role is as the thinker. A thinker may have many followers, and a follower may follow many thinkers. For each follower/thinker relationship, the system should store a Boolean value indicating whether or not the thinker has blocked the follower.

Normal users may post thoughts. A normal user may post many thoughts, but each thought must belong to a single normal user. Each thought has an audio file name, a number, a title, and a popularity score. In addition, a user may specify one or more topics with each thought. A thought's popularity score is computed based on the average rating it receives from users (described below). Each thought can only be identified by its number and the ID of the normal user that posted the thought.

Users may rate other users' thoughts. A user may rate many thoughts, and each thought may be rated by many users. Each time a user rates a thought, the system should track the score given to it by the user. The score will have a range between 1 and 10. A user should not be allowed to rate the same thought twice.

Moderators may censor thoughts if they determine them to be inappropriate. A moderator can censor many thoughts, but each thought can be censored by only one moderator. Each time a moderator censors a thought, the system should store the date the thought was censored.

In certain cases, thoughts may be given special awards. A thought may receive several awards, and each award may be given to several thoughts. Each award has a unique id number, a title, a description, and an amount. Awards are managed by moderators. Each award must be managed by one moderator, and a moderator may manage at most one award.


Related Discussions:- Create a social network application

Define main memory and auxiliary memory, Define main memory and auxiliary m...

Define main memory and auxiliary memory? The memory unit that communicates directly with the cpu is known as main memory [RAM].Devices that give backup storage are known as aux

Convert statement into conjunctive normal form , Consider the following sta...

Consider the following statements about the types of fruit people like. If people like apples, then they do not like oranges. If people do not like apples, then they like orang

Which way do twin twist props on a boat rotate, Q. Which way do twin twist ...

Q. Which way do twin twist props on a boat rotate when propelling the boat forward? Answer:- In opposite direction however they are designed to propel the boat forward eve

How can i make text in a cell display in multiple lines, When entering word...

When entering word into the cell, press Alt-Enter to insert a line break. When you do so, Excel will automatically give text wrapping to the cell. To reformat existing cells s

Illustrate tcp - ip networking model, Q. Illustrate TCP - IP Networking Mod...

Q. Illustrate TCP - IP Networking Model? TCP/IP is an acronym for Transmission Control Protocol / Internet Protocol. It is a collection of applications, protocols and services.

Drawback of indirect addressing, Q. Drawback of indirect addressing? • ...

Q. Drawback of indirect addressing? • Drawback of this scheme is that it needs two memory references to fetch actual operand. First memory reference is to fetch the actual addr

How do you find out if a linked-list has an end, By 2 pointers you can find...

By 2 pointers you can find it. One of them goes 2 nodes each time. The second one goes at 1 node each time. If there is a cycle, the one that goes 2 nodes every time will eventuall

By which the information is stored in ROM, The information in ROM is stored...

The information in ROM is stored ? Ans. By the manufacturer throughout fabrication of the device.

Discuss the csma/cd and csma/ca protocols, Discuss the CSMA/CD and CSMA/CA ...

Discuss the CSMA/CD and CSMA/CA protocols. CSMA/CD: this is an access method used mainly with LANs configured in a bus topology. Along with CSMA/CD, any station (node) can se

Cn, What is the basic requirement for establishing VLANs?

What is the basic requirement for establishing VLANs?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd