Salesforce Project
Salesforce Project
A PROJECT REPORT ON
Guided By
Mrs.Bhakti Mukhedkar
\
DY PATIL POLYTECHNIC AMBI,PUNE
CERTIFICATE
This is to certify
Sr. No. Roll Number Name of Student Enrollment
Number
Final year Computer Science students have submitted their project report on “Tech
Security Securing Technology” during the session of 2024-25 as a part of project
work declared by DY PATIL POLYTECHNIC AMBI, PUNE for partial
fulfillment for the diploma in Computer Science in the Fifth semester.
The project work is the record of students, own work under my guidance and to my
satisfaction.
I have great pleasure and a sense of satisfaction in presenting this project report on
“Tech Security Securing Technology” as part of the curriculum of Diploma in
Computer Science . I am very fortunate to be guided by people with vast and
resourceful experience in their respective field of work.
I express my sincere gratitude to my guide Prof.Bhakti Mukhedkar(Lecturer,
Computer Science Enginnering. Dept.) for her timely guidance, support and
suggestions. I am also thankful for her sincere help and for making me available all
the facilities of the department. Without her efforts and constant monitoring, the
project and documentation would not have been duly completed. Also, I express
my sincere thanks to Prof.Himanshi Shelke (HOD Information Technology
Department) , Besides, I take this opportunity to express my sincere gratitude to
the Principal ,
prof.Sandeep Awachar for providing a good environment and facilities to complete
the project. I would also like to thank all my colleagues who have directly or
indirectly guided and helped us in the of the completion project.
ABSTRACT
The report examines key areas such as network security, data protection,
endpoint security, and cloud security, while also addressing the critical role
of regulations and compliance in shaping security practices. Additionally,
it highlights the emerging trends that will define the future of tech security,
including quantum-safe cryptography, AI-driven defense mechanisms, and
the security challenges posed by 5G and IoT proliferation.
1 Introduction 01
• Literature Survey
• Goals and Objective
• System analysis
2 Hardware and Software requirement 05
• Hardware Requirement
• Software Requirement
3 Scope of Project 06
• Existing system
• Future system
4 Methodology 07
7 Conclusion 40
References
List of Figures
❖ Problem Statement
“Develop a project for Tech Security Securing technology.”
• Introduction
In today's digital age, technology has become the backbone of every industry,
powering everything from small businesses to large enterprises. As
organizations increasingly rely on technology to drive their operations, the
importance of securing these systems has never been more critical. Tech
security, which encompasses the protection of data, networks, and systems, is
essential in mitigating the risks posed by cyber threats. This report aims to
provide a comprehensive overview of tech security, focusing on the strategies
and technologies that can be employed to protect organizational assets.
Literature Survey
The field of tech security has been extensively researched, with numerous
studies highlighting the growing complexity and sophistication of cyber threats.
Early research focused primarily on basic cybersecurity measures such as
antivirus software and firewalls. However, as threats evolved, so too did the
approaches to security. Recent literature emphasizes the importance of a multi-
layered defense strategy, incorporating advanced technologies like artificial
intelligence (AI), machine learning (ML), and blockchain to enhance security.
Research has also highlighted the critical role of human factors in security, with
studies showing that a significant percentage of breaches result from human
1
error or social engineering attacks. Additionally, the literature underscores the
importance of regulatory compliance, with frameworks like the General Data
Protection Regulation (GDPR) and the California Consumer Privacy Act
(CCPA) shaping how organizations approach data security.
The primary goal of this report is to provide a detailed analysis of tech security,
with a focus on the following objectives:
4. Identifying Best Practices: To identify and discuss the best practices that
organizations should adopt to enhance their security posture.
2
5. Forecasting Future Trends: To explore the future trends in tech security,
including quantum-safe cryptography, AI-driven security, and the impact of 5G
and IoT on security.
System Analysis
System Evaluation: The first step in system analysis is to evaluate the existing
systems, including hardware, software, and network infrastructure. This
involves assessing the current security protocols, access controls, and data
protection mechanisms.
3
Risk Assessment: The final step in system analysis is to conduct a risk
assessment, which involves evaluating the likelihood of different threats
materializing and the potential damage they could cause. This helps in
prioritizing security measures based on the level of risk associated with each
threat.
4
CHAPTER 2
Hardware requirements
2.2 GHZ CPU 8
GB RAM
Android Phone
Software Requirements
https://trailhead.salesforce.com/
https://login.salesforce.com/?locale=in
5
CHAPTER 3
In the realm of tech security, organizations rely on a diverse set of technologies and
processes to protect their digital assets from various cyber threats. The existing
systems in place often reflect a combination of traditional security measures and
modern approaches designed to address evolving challenges. Here's an analysis of the
typical components of an existing tech security system:
1. Network Security Infrastructure
Firewalls and IDS/IPS: Firewalls serve as the first line of defense, monitoring and controlling
incoming and outgoing network traffic based on established security rules. Intrusion Detection
Systems (IDS) and Intrusion Prevention Systems (IPS) work alongside firewalls to detect and
prevent unauthorized access or attacks on the network.
VPNs and Network Segmentation: Virtual Private Networks (VPNs) are used to secure remote
access to the organization's network, ensuring that data transmitted over the internet is encrypted.
Network segmentation further enhances security by dividing the network into smaller, isolated
segments, reducing the potential impact of a breach.
Challenges: Despite these measures, the network infrastructure often faces challenges like
outdated firewall configurations, insufficient monitoring of network traffic, and vulnerabilities from
unpatched software or hardware.
6
Challenges: Endpoints are frequently targeted by attackers due to their accessibility. Common
challenges include users failing to update software regularly, weak passwords, and the use of
personal devices for work without adequate security controls.
4.Application Security
Secure Coding Practices: Developers are encouraged to follow secure coding practices to
minimize vulnerabilities in software applications, such as those related to SQL injection, cross-site
scripting (XSS), and other common attack vectors.
Application Firewalls and Regular Updates: Web Application Firewalls (WAFs) protect
applications from attacks by filtering and monitoring HTTP traffic. Regular updates and patching of
applications are crucial to close security gaps.
Challenges: Application security is often compromised by insufficient testing, failure to apply
patches promptly, and the complexity of managing security across a diverse portfolio of applications
5. Cloud Security
Cloud Service Models (IaaS, PaaS, SaaS): Organizations use various cloud service models to
host infrastructure, platforms, and software. Cloud security involves protecting data and applications
hosted on these platforms through encryption, identity, and access management (IAM), and secure
API usage.
Shared Responsibility Model: In cloud environments, security responsibilities are shared between
the cloud service provider and the organization. The provider typically secures the infrastructure,
while the organization is responsible for securing data, user access, and application configurations.
Challenges: Common cloud security challenges include misconfigured cloud settings, insecure
APIs, and a lack of clear understanding of the shared responsibility model, which can lead to
security gaps.
7
6. Security Monitoring and Incident Response
Security Information and Event Management (SIEM): SIEM systems aggregate
and analyze security event data from across the organization’s infrastructure, helping
to detect potential threats and respond to incidents in real-time.
Incident Response Plans: Organizations typically have incident response plans in
place to quickly address and mitigate the impact of security breaches. These plans
include steps for detection, containment, eradication, recovery, and post-incident
analysis.
Challenges: The effectiveness of security monitoring and incident response is often
hindered by the overwhelming volume of data to analyze, the speed at which new
threats emerge, and a shortage of skilled security professionals.
8
2. Quantum-Resistant Cryptography
Quantum Computing Threats: As quantum computing becomes a reality,
it will have the power to break current encryption methods. Future systems
will need to incorporate quantum-resistant cryptographic algorithms to
protect sensitive data.
Development of New Encryption Standards: Organizations will begin
transitioning to new encryption standards that can withstand quantum
computing attacks, ensuring the long-term security of data, especially in
industries like finance, healthcare, and government.
9
Secure Multi-Cloud Environments: As organizations increasingly adopt
multi-cloud strategies, future security systems will focus on securing data and
applications across different cloud providers, ensuring consistent security
practices regardless of the cloud environment.
1
0
in building a culture of security awareness and ensure that human error is
minimized.
Behavioral Analytics: By analyzing user behavior, future systems will be
able to identify potential security risks posed by employees, such as unusual
login patterns or access to sensitive data outside of normal working hours.
This will allow for preemptive actions to mitigate insider threats.
1
1
CHAPTER 4
METHODOLOGY
Methodology for Securing Technology: Tech Security Implementation
The methodology for enhancing and securing an organization's technology infrastructure involves a
structured approach that encompasses assessment, planning, implementation, monitoring, and
continuous improvement. This methodology ensures that security measures are comprehensive,
aligned with organizational objectives, and adaptive to the evolving threat landscape. Below is a
detailed outline of the methodology:
2. Strategy Development
Security Goals and Objectives:
- Define clear security objectives that align with the organization’s overall business goals. These
could include reducing the risk of data breaches, ensuring regulatory compliance, or protecting
intellectual property.
- Set measurable targets, such as reducing incident response times, achieving full encryption of
sensitive data, or increasing employee security awareness.
1
2
Designing a Security Framework:
- Develop a comprehensive security framework based on best practices, such as the NIST
Cybersecurity Framework, ISO/IEC 27001, or CIS Controls.
- Include elements like network security, endpoint security, application security, data protection,
cloud security, and incident response.
- Integrate advanced technologies such as AI-driven threat detection, zero trust architecture, and
quantum-resistant cryptography into the framework.
Resource Allocation:
- Allocate the necessary resources, including budget, personnel, and technology, to implement the
security strategy.
- Ensure that key stakeholders, including IT, legal, and executive teams, are involved in the
planning and decision-making process.
3. Implementation.
Technology Deployment:
- Deploy the selected security technologies and tools, ensuring they are configured according to
best practices.
- Implement encryption, multi-factor authentication (MFA), secure coding practices, and other
technical measures to protect data and applications.
- Integrate security solutions across the organization’s infrastructure, including on-premises,
cloud, and hybrid environments.
CHAPTER 5
1
3
DETAILS OF DESIGN WORKING AND PROCESS
ER-Diagram
Activity Diagram
1
4
Class Diagram
DFD
DFD Level 0
DFD Level 1
1
5
DFD Level 2
1
6
1
7
CHAPTER
6
; ogressDialog progressDialog;
email = (EditText)
name = (EditText)
findViewById(R.id.email);
findViewById(R.id.name);
password = (EditText) email = (EditText)
findViewById(R.id.password); login = findViewById(R.id.email);
(Button) findViewById(R.id.login); phone = (EditText)
register = (TextView) findViewById(R.id.phone); pass =
findViewById(R.id.register); emailError (EditText) findViewById(R.id.password);
= (TextInputLayout) repass = (EditText)
findViewById(R.id.emailError); findViewById(R.id.repassword); login
passError = (TextInputLayout) findViewByI = (TextView) findViewById(R.id.login);
register = (Button)
findViewById(R.id.register); nameError
= (TextInputLayout)
findViewById(R.id.nameError);
emailError = (TextInputLayout)
findViewById(R.id.emailError);
emailError.setError(getResources().getString(R.
st ring.error_invalid_email)); phoneError = (TextInputLayout)
findViewById(R.id.phoneError);
isEmailValid = false;
passError = (TextInputLayout)
} else { isEmailValid =
findViewById(R.id.passError); id =
true; (EditText) findViewById(R.id.id);
emailError.setErrorEnabled(false); college =
} (EditText)findViewById(R.id.collegename);
13
SetValidation(); userData.setUphone(phone.getText().toString());
} userData.setUid(id.getText().toString());
});
userData.setUcollege(college.getText().toString()
);
login.setOnClickListener(new
View.OnClickListener() {
userData.setImgurl("https://firebasestorage.googl
@Override public eapis.com/v0/b/guest-info-
appd9b79.appspot.com/o/profile_nav_logo.png?
void onClick(View v) {
alt= media&token=4ab4ce18-b46d-4ac6-
// redirect to LoginActivity a71ef629e5ec3d89");
Intent intent = new // Firebase Database Reference
Intent(getApplicationContext(),
database= FirebaseDatabase.getInstance();
LoginActivity.class);
myRef=database.getReference();
startActivity(intent);
// Validate Data
}
// Full name
});
if (TextUtils.isEmpty(userData.uname)) {
}
Toast.makeText(RegisterActivity.this,
"Please Enter Full Name ",
public void SetValidation() { Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
userData = new UserData(); return; }
progressDialog = new ProgressDialog(this); // Email
if (TextUtils.isEmpty(userData.uemail)) {
progressDialog.setMessage("REGISTERING Toast.makeText(RegisterActivity.this,
..."); "Please Enter Email ",
Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
progressDialog.show();
return; }
//Local Variable to store Password
// Email
String password =
pass.getText().toString().trim(); String if (TextUtils.isEmpty(userData.uid)) {
repassword = repass.getText().toString().trim();
Toast.makeText(RegisterActivity.this,
// Profile Data Store "Please Enter Id ",
userData.setUname(name.getText().toString()); Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
userData.setUemail(email.getText().toString());
return;
14
} "Please Enter Mobile Number ",
Toast.LENGTH_SHORT).show();
// College Name
progressDialog.dismiss();
if (TextUtils.isEmpty(userData.ucollege))
{ return;
Toast.makeText(RegisterActivity.this, }
"Please Enter College Name ",
if (userData.uphone.length() < 10) {
Toast.LENGTH_SHORT).show();
Toast.makeText(RegisterActivity.this,
"Mobile no. must be more 10 digit number! Enter
progressDialog.dismiss(); Valid number. ",
Toast.LENGTH_SHORT).show();
return; }
progressDialog.dismiss();
// password if
}
(TextUtils.isEmpty(password)) {
// Validation Done !!
Toast.makeText(RegisterActivity.this,
"Please Enter Password", if (password.equals(repassword) &&
Toast.LENGTH_SHORT).show(); userData.uphone.length() == 10 ) {
progressDialog.dismiss(); firebaseAuth.createUserWithEmailAndPasswo
rd(userData.uemail,
return; }
// repassword if
(TextUtils.isEmpty(repassword)) {
Toast.makeText(RegisterActivity.this,
"Please Enter RePassword",
Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
return;
}
if (password.length() < 6) {
Toast.makeText(RegisterActivity.this,
"Password Must be more than 6 digit & less
than
1 digit", Toast.LENGTH_SHORT).show();
}
// Mobile Number if
(TextUtils.isEmpty(userData.uphone)) {
Toast.makeText(RegisterActivity.this,
15
password) .addOnCompleteListener(Registe }
rActivity.this, new
OnCompleteListener<AuthResult>() {
@Override ResetPasswordActivity.java
public void package com.example.userelearning; import
onComplete(Task<AuthResult> task) { androidx.annotation.NonNull; import
if (task.isSuccessful()) { androidx.appcompat.app.AppCompatActivity;
// Sign in success, update
UI with the signed-in user's information
import android.app.ProgressDialog;
//startActivity(new
Intent(getApplicationContext(), Login.class));
import
startActivity(new com.google.android.gms.tasks.OnCompleteListe
Intent(RegisterActivity.this, ner;
LoginActivity.class));
import com.google.android.gms.tasks.Task;
finish();
import com.google.firebase.auth.FirebaseAuth;
} else {
String msg =
public class ResetPasswordActivity extends
task.getException().toString();
AppCompatActivity {
EditText resetpass;
Toast.makeText(RegisterActivity.this, "Error:"
+ msg, Toast.LENGTH_SHORT).show(); Button btnreset;
progressDialog.dismiss(); FirebaseAuth mAuth;
} ProgressDialog progressDialog;
// ...
} @Override
}); protected void onCreate(Bundle
} savedInstanceState)
{ super.onCreate(savedInstanceState);
}
16
setContentView(R.layout.activity_reset_passwo "Email Sent to your mail Account..",
r d); Toast.LENGTH_SHORT).show();
progressDialog= new progressDialog.dismiss();
ProgressDialog(this); startActivity(new
progressDialog.setMessage("Loading"); Intent(ResetPasswordActivity.this,LoginActivity.
resetpass =(EditText) class));
findViewById(R.id.txtforgetemail); }
btnreset = (Button) else
findViewById(R.id.resetbtn);
{
mAuth = FirebaseAuth.getInstance();
String msg =
task.getException().getMessage();
btnreset.setOnClickListener(new
View.OnClickListener() { Toast.makeText(ResetPasswordActivity.this,
@Override public void "Error Occurred"+msg,
Toast.LENGTH_SHORT).show();
onClick(View view) {
progressDialog.dismiss();
String useremail =
}
resetpass.getText().toString().trim();
if (TextUtils.isEmpty(useremail)){ }
});
Toast.makeText(ResetPasswordActivity.this, }
"Enter Email !!",
Toast.LENGTH_SHORT).show(); }
} });
else { }
}
mAuth.sendPasswordResetEmail(useremail).ad
d
OnCompleteListener(new ITB.java
OnCompleteListener<Void>() { package com.example.userelearning;
@Override
public void import androidx.annotation.NonNull;
onComplete(@NonNull Task<Void> task) {
import
if (task.isSuccessful()){ androidx.appcompat.app.AppCompatActivity;
import androidx.cardview.widget.CardView;
progressDialog.show();
17
android.os.Bundle; import Spinner semester, serv;
android.view.View; import public String t1="IT",t2,t3;
android.widget.AdapterView; Button btn_viewSyllabus;
import StorageReference storageReference;
android.widget.ArrayAdapter; DatabaseReference databaseReference;
import android.widget.Button; ListView myPDFListView;
import android.widget.ListView; List<uploadPDF> uploadPDFList;
import android.widget.Spinner; CardView mycardview;
import android.widget.Toast;
@Override
import protected void onCreate(Bundle
com.google.firebase.database.DataSnapshot; savedInstanceState)
import { super.onCreate(savedInstanceState);
com.google.firebase.database.DatabaseError; setContentView(R.layout.activity_itb);
btn_viewSyllabus=(Button)findViewById(R.id.vi
import
ewSyllabus); mycardview =
com.google.firebase.database.DatabaseReferenc (CardView)findViewById(R.id.cardview);
e
;
myPDFListView =
import
(ListView)findViewById(R.id.myListView);
com.google.firebase.database.FirebaseDatabase
uploadPDFList = new ArrayList<>();
; import
com.google.firebase.database.ValueEventListen
e r; semester = (Spinner)
findViewById(R.id.sem_spineer1);
import
serv = (Spinner)
com.google.firebase.storage.FirebaseStorage;
findViewById(R.id.servicess);
import java.util.List;
import
com.google.firebase.storage.StorageReference; storageReference =
FirebaseStorage.getInstance().getReference();
databaseReference=
FirebaseDatabase.getInstance().getReference("M
import java.util.ArrayList;
SBTE");
myPDFListView.setOnItemClickListener(new
AdapterView.OnItemClickListener() {
public class ITB extends AppCompatActivity {
@Override
public void
18
onItemClick(AdapterView<?> parent, View public void
view, int position, long id) { onNothingSelected(AdapterView<?> parent) {
uploadPDF uploadPDF = }
uploadPDFList.get(position);
});
ArrayAdapter<CharSequence> adapters =
String link = uploadPDF.getUrl(); ArrayAdapter.createFromResource(this,R.array.s
ervices, android.R.layout.simple_spinner_item);
Intent intent = new
Intent(Intent.ACTION_VIEW);
adapters.setDropDownViewResource(android.R.l
intent.setData(Uri.parse(link));
ayout.simple_spinner_dropdown_item);
startActivity(intent);
serv.setAdapter(adapters);
serv.setOnItemSelectedListener(new
} AdapterView.OnItemSelectedListener() {
}); @Override
public void
ArrayAdapter<CharSequence> adapter2 = onItemSelected(AdapterView<?> parent, View
ArrayAdapter.createFromResource(this,R.array view, int position, long id) {
.s ems, android.R.layout.simple_spinner_item); t3 =
parent.getItemAtPosition(position).toString();
adapter2.setDropDownViewResource(android.
R. layout.simple_spinner_dropdown_item);
Toast.makeText(getApplicationContext(), "text :
semester.setAdapter(adapter2); "+t3, Toast.LENGTH_SHORT).show();
semester.setOnItemSelectedListener(new
}
AdapterView.OnItemSelectedListener() {
@Override
@Override
public void
public void onNothingSelected(AdapterView<?> parent) {
onItemSelected(AdapterView<?> parent, View
view, int position, long id) { }
});
t2 = }
parent.getItemAtPosition(position).toString();
19
private void viewAllFiles() });
{ uploadPDFList.clear();
databaseReference= }
FirebaseDatabase.getInstance().getReference(" }
M
SBTE").child(t1).child(t2).child(t3);
ComputerB.java
databaseReference.addValueEventListene package com.example.userelearning; import
r(new ValueEventListener()
androidx.annotation.NonNull; import
{ @Override
androidx.appcompat.app.AppCompatActivity;
public void onDataChange(@NonNull
DataSnapshot dataSnapshot) { import androidx.cardview.widget.CardView;
import android.content.Intent; import
android.net.Uri; import android.os.Bundle;
for (DataSnapshot ps :
dataSnapshot.getChildren()){ import android.view.View; import
android.widget.AdapterView; import
uploadPDF uploadPDF = android.widget.ArrayAdapter; import
ps.getValue(uploadPDF.class); android.widget.Button; import
uploadPDFList.add(uploadPDF); android.widget.ListView; import
android.widget.Spinner; import
} android.widget.Toast;
String [] uploads = new
String[uploadPDFList.size()]; import
com.google.firebase.database.DataSnapshot;
for (int i=0;i<uploads.length;i++){
uploads[i]=uploadPDFList.get(i).getName(); import
} com.google.firebase.database.DatabaseError;
import
ArrayAdapter<String> adapter = new com.google.firebase.database.DatabaseReference
ArrayAdapter<String>(getApplicationContext() ;
,a ndroid.R.layout.simple_list_item_1,uploads);
import
myPDFListView.setAdapter(adapter); com.google.firebase.database.FirebaseDatabase;
} import
com.google.firebase.database.ValueEventListene
@Override r;
} import
20
com.google.firebase.storage.StorageReference; findViewById(R.id.servicess);
storageReference =
FirebaseStorage.getInstance().getReference();
import java.util.ArrayList;
databaseReference=
import java.util.List;
FirebaseDatabase.getInstance().getReference("M
SBTE");
public class ComputerB extends
AppCompatActivity {
myPDFListView.setOnItemClickListener(new
AdapterView.OnItemClickListener() {
Spinner semester, serv; public @Override
String t1="Computer",t2,t3; public void
onItemClick(AdapterView<?> parent, View view,
Button btn_viewSyllabus; int position, long id) {
StorageReference storageReference;
DatabaseReference databaseReference; uploadPDF uploadPDF =
ListView myPDFListView; uploadPDFList.get(position);
List<uploadPDF> uploadPDFList;
CardView mycardview; String link = uploadPDF.getUrl();
Intent intent = new
Intent(Intent.ACTION_VIEW);
@Override
intent.setData(Uri.parse(link));
protected void onCreate(Bundle
savedInstanceState) startActivity(intent);
{ super.onCreate(savedInstanceState); }
});
setContentView(R.layout.activity_computer_b);
btn_viewSyllabus=(Button)findViewById(R.id.
vi ewSyllabus); ArrayAdapter<CharSequence> adapter2 =
ArrayAdapter.createFromResource(this,R.array.s
mycardview =
ems, android.R.layout.simple_spinner_item);
(CardView)findViewById(R.id.cardview);
adapter2.setDropDownViewResource(android.R.
myPDFListView = layout.simple_spinner_dropdown_item);
(ListView)findViewById(R.id.myListView);
semester.setAdapter(adapter2);
uploadPDFList = new ArrayList<>(); semester.setOnItemSelectedListener(new
AdapterView.OnItemSelectedListener() {
21
t2 = public void btnViewSyllabus(View view) {
parent.getItemAtPosition(position).toString();
viewAllFiles();
}
Toast.makeText(getApplicationContext(),
"text : private void viewAllFiles()
"+t2, Toast.LENGTH_SHORT).show();
{ uploadPDFList.clear();
}
databaseReference=
@Override
FirebaseDatabase.getInstance().getReference("M
public void SBTE").child(t1).child(t2).child(t3);
onNothingSelected(AdapterView<?> parent) {
} databaseReference.addValueEventListener(new
ValueEventListener() {
});
@Override
ArrayAdapter<CharSequence> adapters =
ArrayAdapter.createFromResource(this,R.array
public void onDataChange(@NonNull
.s ervices,
DataSnapshot dataSnapshot) {
android.R.layout.simple_spinner_item);
adapters.setDropDownViewResource(android.
R.l ayout.simple_spinner_dropdown_item);
serv.setAdapter(adapters); for (DataSnapshot ps :
serv.setOnItemSelectedListener(new dataSnapshot.getChildren()){
AdapterView.OnItemSelectedListener() {
@Override uploadPDF uploadPDF =
public void ps.getValue(uploadPDF.class);
onItemSelected(AdapterView<?> parent, View uploadPDFList.add(uploadPDF);
view, int position, long id) {
}
t3 =
parent.getItemAtPosition(position).toString(); String [] uploads = new
String[uploadPDFList.size()];
Toast.makeText(getApplicationContext(),
"text : for (int i=0;i<uploads.length;i++){
"+t3, Toast.LENGTH_SHORT).show();
}
@Override uploads[i]=uploadPDFList.get(i).getName();
public void }
onNothingSelected(AdapterView<?> parent) {
ArrayAdapter<String> adapter = new
ArrayAdapter<String>(getApplicationContext(),a
} ndroid.R.layout.simple_list_item_1,uploads);
}); myPDFListView.setAdapter(adapter);
} }
22
@Override ;
public void onCancelled(@NonNull import
DatabaseError databaseError) { com.google.firebase.database.FirebaseDatabase;
} import
}); com.google.firebase.database.ValueEventListene
r;
}
import
}
com.google.firebase.storage.FirebaseStorage;
import
ETXB.java com.google.firebase.storage.StorageReference;
package com.example.userelearning;
import androidx.annotation.NonNull; import import java.util.ArrayList;
androidx.appcompat.app.AppCompatActivit
import java.util.List;
y; import
androidx.cardview.widget.CardView;
public class ETXB extends AppCompatActivity {
import android.content.Intent;
Spinner semester, serv;
import android.net.Uri; import
public String t1="E&TC",t2,t3;
android.os.Bundle; import
Button btn_viewSyllabus;
android.view.View; import
StorageReference storageReference;
android.widget.AdapterView;
DatabaseReference databaseReference;
import
ListView myPDFListView;
android.widget.ArrayAdapter;
List<uploadPDF> uploadPDFList;
import android.widget.Button;
CardView mycardview;
import android.widget.ListView;
import android.widget.Spinner;
@Override protected void
import android.widget.Toast;
onCreate(Bundle savedInstanceState)
{ super.onCreate(savedInstanceState);
import
setContentView(R.layout.activity_etxb);
com.google.firebase.database.DataSnapshot;
import
btn_viewSyllabus=(Button)findViewById(R.id.vi
com.google.firebase.database.DatabaseError; ewSyllabus);
import mycardview =
(CardView)findViewById(R.id.cardview);
com.google.firebase.database.DatabaseReferenc
e
23
myPDFListView =
(ListView)findViewById(R.id.myListView); adapter2.setDropDownViewResource(android.R.
uploadPDFList = new ArrayList<>(); layout.simple_spinner_dropdown_item);
semester.setAdapter(adapter2);
semester.setOnItemSelectedListener(new
semester = (Spinner)
AdapterView.OnItemSelectedListener() {
findViewById(R.id.sem_spineer1);
serv = (Spinner) @Override
findViewById(R.id.servicess);
public void
onItemSelected(AdapterView<?> parent, View
storageReference = view, int position, long id) {
FirebaseStorage.getInstance().getReference();
t2 =
databaseReference= parent.getItemAtPosition(position).toString();
FirebaseDatabase.getInstance().getReference("
M Toast.makeText(getApplicationContext(), "text :
SBTE"); "+t2, Toast.LENGTH_SHORT).show();
}
myPDFListView.setOnItemClickListener(new
@Override
AdapterView.OnItemClickListener() {
public void
@Override
onNothingSelected(AdapterView<?> parent) {
public void
onItemClick(AdapterView<?> parent, View
view, int position, long id) {
uploadPDF uploadPDF =
uploadPDFList.get(position);
}
});
ArrayAdapter<CharSequence> adapter2 =
ArrayAdapter.createFromResource(this,R.array
.s ems, android.R.layout.simple_spinner_item);
24
25
41
40
41
42
43
44
45
46
47
CHAPTER 8
Conclusion
In the conclusion, during this study and research getting the observation online
study are technical skill. But it is not effective as compare to the offline study.
Online learning is better the unique situation like COVID -19 recently running
around the world. The student and teachers perception for online study is not
good in skill and practical knowledge. We could not deny that technique of
learning will be change quicker. However, that we felt that traditional teaching
and learning are better, but technology change it. Teacher should always
formulate themselves for the changing ways of teaching. They desire to be
creative and find the effective technique in teaching their students. Online
learning is harmful effect for student success. It has various aids over the
traditional performances of learning. A lot of the students are fascinated because
of it flexible, even though they need pay for the cost to use the internet.
Future Scope
The following section describes the work that will be implemented with future
releases of the software.
47
References
1. https://ieeexplore.ieee.org/abstract/document/6291241 2.
https://ieeexplore.ieee.org/document/5227902
3. https://ieeexplore.ieee.org/abstract/document/7429229
4. https://ieeexplore.ieee.org/document/9238176
5. Android by Dixit,Prasanna Kumar
6. Android Programming for Beginner by Hortan John
**********
48