[go: up one dir, main page]

0% found this document useful (0 votes)
493 views49 pages

Salesforce Project

Uploaded by

Aryan Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
493 views49 pages

Salesforce Project

Uploaded by

Aryan Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 49

DY PATIL POLYTECHNIC AMBI,PUNE

A PROJECT REPORT ON

“Tech Security Securing Technology”


Submitted By

Roll Number Name of Student Enrollment


Number

29 Pravin Katkade 2209960072

36 Mrunalini patil 2209960079

37 Aryan Jadhav 2209960080

47 Omkar Jamdar 2209960090

Guided By
Mrs.Bhakti Mukhedkar

\
DY PATIL POLYTECHNIC AMBI,PUNE

CERTIFICATE

This is to certify
Sr. No. Roll Number Name of Student Enrollment
Number

1 29 Pravin patil 2209960072

2 36 Mrunalini patil 2209960079

3 37 Aryan Jadhav 2209960080

4 47 Omkar Jamdar 2209960090

Final year Computer Science students have submitted their project report on “Tech
Security Securing Technology” during the session of 2024-25 as a part of project
work declared by DY PATIL POLYTECHNIC AMBI, PUNE for partial
fulfillment for the diploma in Computer Science in the Fifth semester.
The project work is the record of students, own work under my guidance and to my
satisfaction.

Guide HOD Principal


Prof.Bhakti Mukhedkar Prof.Himanshi Shelke Prof.Sandeep
Awachar
ACKNOWLEDGEMENT

I have great pleasure and a sense of satisfaction in presenting this project report on
“Tech Security Securing Technology” as part of the curriculum of Diploma in
Computer Science . I am very fortunate to be guided by people with vast and
resourceful experience in their respective field of work.
I express my sincere gratitude to my guide Prof.Bhakti Mukhedkar(Lecturer,
Computer Science Enginnering. Dept.) for her timely guidance, support and
suggestions. I am also thankful for her sincere help and for making me available all
the facilities of the department. Without her efforts and constant monitoring, the
project and documentation would not have been duly completed. Also, I express
my sincere thanks to Prof.Himanshi Shelke (HOD Information Technology
Department) , Besides, I take this opportunity to express my sincere gratitude to
the Principal ,
prof.Sandeep Awachar for providing a good environment and facilities to complete
the project. I would also like to thank all my colleagues who have directly or
indirectly guided and helped us in the of the completion project.
ABSTRACT

Tech Security Securing Technology

In an era where digital transformation drives innovation across industries,


the importance of robust technology security cannot be overstated. This
report delves into the multifaceted domain of tech security, exploring the
strategies and solutions vital for protecting data, systems, and networks
from an increasingly complex threat landscape. With cyber threats
evolving in sophistication—ranging from malware and ransomware to AI-
driven attacks and quantum computing risks—organizations must adopt
comprehensive security measures to safeguard their technological assets.

The report examines key areas such as network security, data protection,
endpoint security, and cloud security, while also addressing the critical role
of regulations and compliance in shaping security practices. Additionally,
it highlights the emerging trends that will define the future of tech security,
including quantum-safe cryptography, AI-driven defense mechanisms, and
the security challenges posed by 5G and IoT proliferation.

Ultimately, this report underscores the necessity for organizations to stay


ahead of the curve by implementing advanced security strategies, fostering
a culture of security awareness, and preparing for the future of
cybersecurity threats.
Content
Chapter Topic Page no.

1 Introduction 01
• Literature Survey
• Goals and Objective
• System analysis
2 Hardware and Software requirement 05
• Hardware Requirement
• Software Requirement
3 Scope of Project 06
• Existing system
• Future system
4 Methodology 07

5 Details of Design working and processes 08

6 Implementation and result 12

7 Conclusion 40

References
List of Figures

Figure Page No.


E-R Diagram 08
Activity Diagram 08
Class Diagram 09
DFD level 0,DFD level 1,DFD level 2 09-10
System Architecture Diagram 12
CHAPTER 1

❖ Problem Statement
“Develop a project for Tech Security Securing technology.”

• Introduction
In today's digital age, technology has become the backbone of every industry,
powering everything from small businesses to large enterprises. As
organizations increasingly rely on technology to drive their operations, the
importance of securing these systems has never been more critical. Tech
security, which encompasses the protection of data, networks, and systems, is
essential in mitigating the risks posed by cyber threats. This report aims to
provide a comprehensive overview of tech security, focusing on the strategies
and technologies that can be employed to protect organizational assets.

 Literature Survey

The field of tech security has been extensively researched, with numerous
studies highlighting the growing complexity and sophistication of cyber threats.
Early research focused primarily on basic cybersecurity measures such as
antivirus software and firewalls. However, as threats evolved, so too did the
approaches to security. Recent literature emphasizes the importance of a multi-
layered defense strategy, incorporating advanced technologies like artificial
intelligence (AI), machine learning (ML), and blockchain to enhance security.

Research has also highlighted the critical role of human factors in security, with
studies showing that a significant percentage of breaches result from human

1
error or social engineering attacks. Additionally, the literature underscores the
importance of regulatory compliance, with frameworks like the General Data
Protection Regulation (GDPR) and the California Consumer Privacy Act
(CCPA) shaping how organizations approach data security.

 Goals and Objectives

The primary goal of this report is to provide a detailed analysis of tech security,
with a focus on the following objectives:

1. Understanding the Current Threat Landscape: To analyze the current and


emerging cyber threats that organizations face today.

2. Exploring Key Security Strategies: To examine the strategies and


technologies that can be employed to secure data, networks, and systems
effectively.

3. Assessing Regulatory Compliance: To understand the impact of global and


regional regulations on tech security practices.

4. Identifying Best Practices: To identify and discuss the best practices that
organizations should adopt to enhance their security posture.

2
5. Forecasting Future Trends: To explore the future trends in tech security,
including quantum-safe cryptography, AI-driven security, and the impact of 5G
and IoT on security.

 System Analysis

In order to secure an organization's technological infrastructure effectively, a


thorough system analysis is essential. This process involves evaluating the
current security measures in place, identifying vulnerabilities, and assessing the
potential impact of various threats.

System Evaluation: The first step in system analysis is to evaluate the existing
systems, including hardware, software, and network infrastructure. This
involves assessing the current security protocols, access controls, and data
protection mechanisms.

Vulnerability Assessment: The next step is to identify potential vulnerabilities


within the system. This may include outdated software, weak passwords, or
unpatched security flaws. Tools such as vulnerability scanners and penetration
testing are often used in this phase.

Threat Modeling: Once vulnerabilities are identified, threat modeling is


conducted to assess the potential impact of different types of attacks. This
involves simulating various attack scenarios to understand how the system
might respond and what the consequences could be.

3
Risk Assessment: The final step in system analysis is to conduct a risk
assessment, which involves evaluating the likelihood of different threats
materializing and the potential damage they could cause. This helps in
prioritizing security measures based on the level of risk associated with each
threat.

The insights gained from system analysis are crucial in developing a


comprehensive security strategy that addresses the specific needs of the
organization, ensuring that the technological infrastructure is well-protected
against current and future threats.

4
CHAPTER 2

HARDWARE AND SOFTWARE REQUIREMENT

Hardware requirements
2.2 GHZ CPU 8
GB RAM
Android Phone

Software Requirements
https://trailhead.salesforce.com/
https://login.salesforce.com/?locale=in

5
CHAPTER 3

SCOPE OF THE PROJECT


Existing System in Tech Security: Securing Technology

In the realm of tech security, organizations rely on a diverse set of technologies and
processes to protect their digital assets from various cyber threats. The existing
systems in place often reflect a combination of traditional security measures and
modern approaches designed to address evolving challenges. Here's an analysis of the
typical components of an existing tech security system:
1. Network Security Infrastructure
Firewalls and IDS/IPS: Firewalls serve as the first line of defense, monitoring and controlling
incoming and outgoing network traffic based on established security rules. Intrusion Detection
Systems (IDS) and Intrusion Prevention Systems (IPS) work alongside firewalls to detect and
prevent unauthorized access or attacks on the network.
VPNs and Network Segmentation: Virtual Private Networks (VPNs) are used to secure remote
access to the organization's network, ensuring that data transmitted over the internet is encrypted.
Network segmentation further enhances security by dividing the network into smaller, isolated
segments, reducing the potential impact of a breach.
Challenges: Despite these measures, the network infrastructure often faces challenges like
outdated firewall configurations, insufficient monitoring of network traffic, and vulnerabilities from
unpatched software or hardware.

2. Endpoint Security Systems


Antivirus and Anti-Malware Solutions: Endpoint devices such as computers, laptops, and
mobile devices are protected by antivirus and anti-malware software. These tools are designed to
detect and neutralize malicious software that could compromise device security.
Device Management: Mobile Device Management (MDM) solutions are employed to manage and
secure mobile devices within the organization, enforcing security policies, and ensuring that
sensitive data is encrypted and protected.

6
Challenges: Endpoints are frequently targeted by attackers due to their accessibility. Common
challenges include users failing to update software regularly, weak passwords, and the use of
personal devices for work without adequate security controls.

3. Data Protection and Management


Encryption: Data encryption is a key component of data protection, ensuring that sensitive
information remains secure both at rest (stored on servers or devices) and in transit (being
transmitted over networks).
Access Control and Data Loss Prevention (DLP): Access control mechanisms ensure that only
authorized personnel have access to sensitive data, while DLP systems monitor and prevent
unauthorized data transfers.
Challenges: Data management systems often struggle with issues like inconsistent encryption
practices, insufficient access controls, and the risk of insider threats, where authorized users may
misuse their access to data.

4.Application Security
Secure Coding Practices: Developers are encouraged to follow secure coding practices to
minimize vulnerabilities in software applications, such as those related to SQL injection, cross-site
scripting (XSS), and other common attack vectors.
Application Firewalls and Regular Updates: Web Application Firewalls (WAFs) protect
applications from attacks by filtering and monitoring HTTP traffic. Regular updates and patching of
applications are crucial to close security gaps.
Challenges: Application security is often compromised by insufficient testing, failure to apply
patches promptly, and the complexity of managing security across a diverse portfolio of applications

5. Cloud Security
Cloud Service Models (IaaS, PaaS, SaaS): Organizations use various cloud service models to
host infrastructure, platforms, and software. Cloud security involves protecting data and applications
hosted on these platforms through encryption, identity, and access management (IAM), and secure
API usage.
Shared Responsibility Model: In cloud environments, security responsibilities are shared between
the cloud service provider and the organization. The provider typically secures the infrastructure,
while the organization is responsible for securing data, user access, and application configurations.
Challenges: Common cloud security challenges include misconfigured cloud settings, insecure
APIs, and a lack of clear understanding of the shared responsibility model, which can lead to
security gaps.

7
6. Security Monitoring and Incident Response
Security Information and Event Management (SIEM): SIEM systems aggregate
and analyze security event data from across the organization’s infrastructure, helping
to detect potential threats and respond to incidents in real-time.
Incident Response Plans: Organizations typically have incident response plans in
place to quickly address and mitigate the impact of security breaches. These plans
include steps for detection, containment, eradication, recovery, and post-incident
analysis.
Challenges: The effectiveness of security monitoring and incident response is often
hindered by the overwhelming volume of data to analyze, the speed at which new
threats emerge, and a shortage of skilled security professionals.

Future System in Tech Security: Securing Technology

As cyber threats become increasingly sophisticated and pervasive, the future


of tech security will require more advanced, adaptive, and proactive systems.
Emerging technologies, evolving regulatory environments, and the growing
interconnectivity of devices will shape the next generation of security
frameworks. Here's an exploration of the future system of tech security:

1. AI and Machine Learning-Driven Security


Predictive Threat Detection: Future security systems will heavily rely on
artificial intelligence (AI) and machine learning (ML) to predict and identify
threats before they can cause damage. These technologies will analyze vast
amounts of data in real time, learning from patterns and anomalies to detect
potential threats that traditional methods might miss.
Automated Incident Response: AI-driven systems will not only detect
threats but also automatically initiate responses to neutralize them. This
includes isolating affected systems, blocking malicious traffic, and even
repairing vulnerabilities without human intervention.
Adaptive Security Postures: Machine learning models will continuously
adapt to the evolving threat landscape, ensuring that security measures are
always up-to-date and effective against the latest forms of attack.

8
2. Quantum-Resistant Cryptography
Quantum Computing Threats: As quantum computing becomes a reality,
it will have the power to break current encryption methods. Future systems
will need to incorporate quantum-resistant cryptographic algorithms to
protect sensitive data.
Development of New Encryption Standards: Organizations will begin
transitioning to new encryption standards that can withstand quantum
computing attacks, ensuring the long-term security of data, especially in
industries like finance, healthcare, and government.

3. Zero Trust Architecture (ZTA)


Identity and Access Management: The Zero Trust model, which operates
on the principle of "never trust, always verify," will become the standard for
future systems. This approach requires continuous verification of user
identities and strict control over access to resources, even for internal users.
Micro-Segmentation: In a Zero Trust Architecture, networks will be
segmented into smaller, isolated zones, reducing the risk of lateral movement
by attackers. Even if a breach occurs, micro-segmentation will limit the
attack's spread and impact.
Continuous Monitoring and Analytics: Zero Trust systems will employ
continuous monitoring and analytics to verify the security posture of users,
devices, and applications in real-time, ensuring that only legitimate activities
are allowed.

4. Advanced Cloud Security Solutions


Cloud-Native Security Tools: As more organizations migrate to the cloud,
future security systems will be designed to be cloud-native, offering
advanced features like automated threat detection, secure configurations by
default, and seamless integration with cloud services.
Unified Security Management: Future cloud security will involve unified
management platforms that provide a single pane of glass for monitoring and
securing multi-cloud environments. These platforms will offer centralized
control over security policies, identity management, and compliance across
all cloud services.

9
Secure Multi-Cloud Environments: As organizations increasingly adopt
multi-cloud strategies, future security systems will focus on securing data and
applications across different cloud providers, ensuring consistent security
practices regardless of the cloud environment.

5.5G and IoT Security


Secure 5G Networks: The rollout of 5G networks will introduce new
security challenges and opportunities. Future systems will need to secure 5G
infrastructure against advanced threats, ensuring the integrity and privacy of
data transmitted over these networks.
IoT Device Management: The proliferation of Internet of Things (IoT)
devices will require advanced security measures to protect against
vulnerabilities in these often-insecure devices. Future systems will employ
AI-driven management platforms that can automatically detect, classify, and
secure IoT devices, ensuring they do not become entry points for attackers.
Edge Computing Security: As computing moves closer to the edge of the
network, future security systems will need to protect data and applications at
the edge, ensuring secure communication between devices and the cloud.

6. Regulatory Compliance and Privacy-First Approaches


Dynamic Compliance Management: Future systems will incorporate
dynamic compliance management tools that automatically adjust security
practices based on the latest regulations and industry standards. This will
reduce the burden of manual compliance checks and ensure that
organizations remain compliant in real-time.
Privacy-Enhancing Technologies: With increasing focus on data privacy,
future security systems will integrate privacy-enhancing technologies such as
differential privacy, homomorphic encryption, and secure multi-party
computation. These technologies will allow organizations to process and
analyze data without compromising individual privacy.

7. Human-Centric Security Awareness


Advanced Security Training: Future systems will include sophisticated
training programs powered by AI and virtual reality (VR), offering
immersive, scenario-based learning experiences for employees. This will help

1
0
in building a culture of security awareness and ensure that human error is
minimized.
Behavioral Analytics: By analyzing user behavior, future systems will be
able to identify potential security risks posed by employees, such as unusual
login patterns or access to sensitive data outside of normal working hours.
This will allow for preemptive actions to mitigate insider threats.

1
1
CHAPTER 4

METHODOLOGY
Methodology for Securing Technology: Tech Security Implementation

The methodology for enhancing and securing an organization's technology infrastructure involves a
structured approach that encompasses assessment, planning, implementation, monitoring, and
continuous improvement. This methodology ensures that security measures are comprehensive,
aligned with organizational objectives, and adaptive to the evolving threat landscape. Below is a
detailed outline of the methodology:

1.Assessment and Analysis


Current State Assessment:
- Conduct a thorough audit of the existing technology infrastructure, including networks,
endpoints, data management systems, applications, and cloud environments.
- Identify existing security measures, their effectiveness, and any gaps or vulnerabilities.
- Use tools like vulnerability scanners, penetration testing, and threat modeling to assess potential
security risks.

Risk Assessment and Prioritization:


- Evaluate the potential impact of identified vulnerabilities on the organization’s operations,
reputation, and data integrity.
- Prioritize risks based on their likelihood and potential impact, focusing on high-risk areas that
require immediate attention.
- Develop a risk matrix to visualize and categorize the risks, aiding in decision-making.

Regulatory Compliance Review:


- Assess the organization’s compliance with relevant regulatory standards such as GDPR,
HIPAA, CCPA, or industry-specific requirements.
- Identify any gaps in compliance and outline necessary actions to address these gaps.

2. Strategy Development
Security Goals and Objectives:
- Define clear security objectives that align with the organization’s overall business goals. These
could include reducing the risk of data breaches, ensuring regulatory compliance, or protecting
intellectual property.
- Set measurable targets, such as reducing incident response times, achieving full encryption of
sensitive data, or increasing employee security awareness.

1
2
Designing a Security Framework:
- Develop a comprehensive security framework based on best practices, such as the NIST
Cybersecurity Framework, ISO/IEC 27001, or CIS Controls.
- Include elements like network security, endpoint security, application security, data protection,
cloud security, and incident response.
- Integrate advanced technologies such as AI-driven threat detection, zero trust architecture, and
quantum-resistant cryptography into the framework.

Resource Allocation:
- Allocate the necessary resources, including budget, personnel, and technology, to implement the
security strategy.
- Ensure that key stakeholders, including IT, legal, and executive teams, are involved in the
planning and decision-making process.

3. Implementation.
Technology Deployment:
- Deploy the selected security technologies and tools, ensuring they are configured according to
best practices.
- Implement encryption, multi-factor authentication (MFA), secure coding practices, and other
technical measures to protect data and applications.
- Integrate security solutions across the organization’s infrastructure, including on-premises,
cloud, and hybrid environments.

Policy and Procedure Development:


- Develop and enforce security policies and procedures, covering areas such as access control,
data handling, incident response, and employee behavior.
- Ensure that policies are documented, communicated, and easily accessible to all employees.
- Establish a process for regularly reviewing and updating policies to reflect changes in the threat
landscape or regulatory requirements.

CHAPTER 5

1
3
DETAILS OF DESIGN WORKING AND PROCESS

ER-Diagram

Activity Diagram

1
4
Class Diagram

DFD
DFD Level 0

DFD Level 1

1
5
DFD Level 2

System Architecture Diagram

1
6
1
7
CHAPTER
6

IMPLEMENTATION AND RESULT


essage to the user.

; ogressDialog progressDialog;

@Override protected void


@Override protected void onCreate(Bundle
onCreate(Bundle savedInstanceState) {
savedInstanceState)
super.onCreate(savedInstanceState);
{ super.onCreate(savedInstanceState);
setContentView(R.layout.activity_login);
setContentView(R.layout.activity_register);

email = (EditText)
name = (EditText)
findViewById(R.id.email);
findViewById(R.id.name);
password = (EditText) email = (EditText)
findViewById(R.id.password); login = findViewById(R.id.email);
(Button) findViewById(R.id.login); phone = (EditText)
register = (TextView) findViewById(R.id.phone); pass =
findViewById(R.id.register); emailError (EditText) findViewById(R.id.password);
= (TextInputLayout) repass = (EditText)
findViewById(R.id.emailError); findViewById(R.id.repassword); login
passError = (TextInputLayout) findViewByI = (TextView) findViewById(R.id.login);
register = (Button)
findViewById(R.id.register); nameError
= (TextInputLayout)
findViewById(R.id.nameError);
emailError = (TextInputLayout)
findViewById(R.id.emailError);
emailError.setError(getResources().getString(R.
st ring.error_invalid_email)); phoneError = (TextInputLayout)
findViewById(R.id.phoneError);
isEmailValid = false;
passError = (TextInputLayout)
} else { isEmailValid =
findViewById(R.id.passError); id =
true; (EditText) findViewById(R.id.id);
emailError.setErrorEnabled(false); college =
} (EditText)findViewById(R.id.collegename);

// Check for a valid password. firebaseAuth = FirebaseAuth.getInstance();


register.setOnClickListener(new
if View.OnClickListener() {
(password.getText().toString().isEmpty()) {
@Override public void
onClick(View v) {

13
SetValidation(); userData.setUphone(phone.getText().toString());
} userData.setUid(id.getText().toString());
});
userData.setUcollege(college.getText().toString()
);
login.setOnClickListener(new
View.OnClickListener() {
userData.setImgurl("https://firebasestorage.googl
@Override public eapis.com/v0/b/guest-info-
appd9b79.appspot.com/o/profile_nav_logo.png?
void onClick(View v) {
alt= media&token=4ab4ce18-b46d-4ac6-
// redirect to LoginActivity a71ef629e5ec3d89");
Intent intent = new // Firebase Database Reference
Intent(getApplicationContext(),
database= FirebaseDatabase.getInstance();
LoginActivity.class);
myRef=database.getReference();
startActivity(intent);
// Validate Data
}
// Full name
});
if (TextUtils.isEmpty(userData.uname)) {
}
Toast.makeText(RegisterActivity.this,
"Please Enter Full Name ",
public void SetValidation() { Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
userData = new UserData(); return; }
progressDialog = new ProgressDialog(this); // Email
if (TextUtils.isEmpty(userData.uemail)) {
progressDialog.setMessage("REGISTERING Toast.makeText(RegisterActivity.this,
..."); "Please Enter Email ",
Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
progressDialog.show();
return; }
//Local Variable to store Password
// Email
String password =
pass.getText().toString().trim(); String if (TextUtils.isEmpty(userData.uid)) {
repassword = repass.getText().toString().trim();

Toast.makeText(RegisterActivity.this,
// Profile Data Store "Please Enter Id ",
userData.setUname(name.getText().toString()); Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
userData.setUemail(email.getText().toString());
return;

14
} "Please Enter Mobile Number ",
Toast.LENGTH_SHORT).show();
// College Name
progressDialog.dismiss();
if (TextUtils.isEmpty(userData.ucollege))
{ return;
Toast.makeText(RegisterActivity.this, }
"Please Enter College Name ",
if (userData.uphone.length() < 10) {
Toast.LENGTH_SHORT).show();
Toast.makeText(RegisterActivity.this,
"Mobile no. must be more 10 digit number! Enter
progressDialog.dismiss(); Valid number. ",
Toast.LENGTH_SHORT).show();
return; }
progressDialog.dismiss();
// password if
}
(TextUtils.isEmpty(password)) {
// Validation Done !!
Toast.makeText(RegisterActivity.this,
"Please Enter Password", if (password.equals(repassword) &&
Toast.LENGTH_SHORT).show(); userData.uphone.length() == 10 ) {

progressDialog.dismiss(); firebaseAuth.createUserWithEmailAndPasswo
rd(userData.uemail,
return; }
// repassword if
(TextUtils.isEmpty(repassword)) {
Toast.makeText(RegisterActivity.this,
"Please Enter RePassword",
Toast.LENGTH_SHORT).show();
progressDialog.dismiss();
return;
}
if (password.length() < 6) {

Toast.makeText(RegisterActivity.this,
"Password Must be more than 6 digit & less
than
1 digit", Toast.LENGTH_SHORT).show();
}
// Mobile Number if
(TextUtils.isEmpty(userData.uphone)) {
Toast.makeText(RegisterActivity.this,

15
password) .addOnCompleteListener(Registe }
rActivity.this, new
OnCompleteListener<AuthResult>() {
@Override ResetPasswordActivity.java
public void package com.example.userelearning; import
onComplete(Task<AuthResult> task) { androidx.annotation.NonNull; import
if (task.isSuccessful()) { androidx.appcompat.app.AppCompatActivity;
// Sign in success, update
UI with the signed-in user's information
import android.app.ProgressDialog;

myRef.child("Users").child(firebaseAuth.getCu import android.content.Intent;


rr import android.os.Bundle; import
entUser().getUid()).child("Profile").setValue(us
er Data); android.text.TextUtils; import

progressDialog.dismiss(); android.view.View; import


android.widget.Button; import
Toast.makeText(RegisterActivity.this, android.widget.EditText; import
"Registration Done",
Toast.LENGTH_SHORT).show(); android.widget.Toast;

//startActivity(new
Intent(getApplicationContext(), Login.class));
import
startActivity(new com.google.android.gms.tasks.OnCompleteListe
Intent(RegisterActivity.this, ner;
LoginActivity.class));
import com.google.android.gms.tasks.Task;
finish();
import com.google.firebase.auth.FirebaseAuth;
} else {
String msg =
public class ResetPasswordActivity extends
task.getException().toString();
AppCompatActivity {
EditText resetpass;
Toast.makeText(RegisterActivity.this, "Error:"
+ msg, Toast.LENGTH_SHORT).show(); Button btnreset;
progressDialog.dismiss(); FirebaseAuth mAuth;
} ProgressDialog progressDialog;
// ...
} @Override
}); protected void onCreate(Bundle
} savedInstanceState)
{ super.onCreate(savedInstanceState);
}

16
setContentView(R.layout.activity_reset_passwo "Email Sent to your mail Account..",
r d); Toast.LENGTH_SHORT).show();
progressDialog= new progressDialog.dismiss();
ProgressDialog(this); startActivity(new
progressDialog.setMessage("Loading"); Intent(ResetPasswordActivity.this,LoginActivity.
resetpass =(EditText) class));
findViewById(R.id.txtforgetemail); }
btnreset = (Button) else
findViewById(R.id.resetbtn);
{
mAuth = FirebaseAuth.getInstance();
String msg =
task.getException().getMessage();
btnreset.setOnClickListener(new
View.OnClickListener() { Toast.makeText(ResetPasswordActivity.this,
@Override public void "Error Occurred"+msg,
Toast.LENGTH_SHORT).show();
onClick(View view) {
progressDialog.dismiss();
String useremail =
}
resetpass.getText().toString().trim();
if (TextUtils.isEmpty(useremail)){ }
});
Toast.makeText(ResetPasswordActivity.this, }
"Enter Email !!",
Toast.LENGTH_SHORT).show(); }

} });

else { }
}
mAuth.sendPasswordResetEmail(useremail).ad
d
OnCompleteListener(new ITB.java
OnCompleteListener<Void>() { package com.example.userelearning;
@Override
public void import androidx.annotation.NonNull;
onComplete(@NonNull Task<Void> task) {
import

if (task.isSuccessful()){ androidx.appcompat.app.AppCompatActivity;
import androidx.cardview.widget.CardView;
progressDialog.show();

Toast.makeText(ResetPasswordActivity.this, import android.content.Intent; import


android.net.Uri; import

17
android.os.Bundle; import Spinner semester, serv;
android.view.View; import public String t1="IT",t2,t3;
android.widget.AdapterView; Button btn_viewSyllabus;
import StorageReference storageReference;
android.widget.ArrayAdapter; DatabaseReference databaseReference;
import android.widget.Button; ListView myPDFListView;
import android.widget.ListView; List<uploadPDF> uploadPDFList;
import android.widget.Spinner; CardView mycardview;
import android.widget.Toast;
@Override
import protected void onCreate(Bundle
com.google.firebase.database.DataSnapshot; savedInstanceState)
import { super.onCreate(savedInstanceState);
com.google.firebase.database.DatabaseError; setContentView(R.layout.activity_itb);
btn_viewSyllabus=(Button)findViewById(R.id.vi
import
ewSyllabus); mycardview =
com.google.firebase.database.DatabaseReferenc (CardView)findViewById(R.id.cardview);
e
;
myPDFListView =
import
(ListView)findViewById(R.id.myListView);
com.google.firebase.database.FirebaseDatabase
uploadPDFList = new ArrayList<>();
; import
com.google.firebase.database.ValueEventListen
e r; semester = (Spinner)
findViewById(R.id.sem_spineer1);
import
serv = (Spinner)
com.google.firebase.storage.FirebaseStorage;
findViewById(R.id.servicess);
import java.util.List;
import
com.google.firebase.storage.StorageReference; storageReference =
FirebaseStorage.getInstance().getReference();
databaseReference=
FirebaseDatabase.getInstance().getReference("M
import java.util.ArrayList;
SBTE");
myPDFListView.setOnItemClickListener(new
AdapterView.OnItemClickListener() {
public class ITB extends AppCompatActivity {
@Override
public void

18
onItemClick(AdapterView<?> parent, View public void
view, int position, long id) { onNothingSelected(AdapterView<?> parent) {

uploadPDF uploadPDF = }
uploadPDFList.get(position);
});
ArrayAdapter<CharSequence> adapters =
String link = uploadPDF.getUrl(); ArrayAdapter.createFromResource(this,R.array.s
ervices, android.R.layout.simple_spinner_item);
Intent intent = new
Intent(Intent.ACTION_VIEW);
adapters.setDropDownViewResource(android.R.l
intent.setData(Uri.parse(link));
ayout.simple_spinner_dropdown_item);
startActivity(intent);
serv.setAdapter(adapters);
serv.setOnItemSelectedListener(new
} AdapterView.OnItemSelectedListener() {
}); @Override
public void
ArrayAdapter<CharSequence> adapter2 = onItemSelected(AdapterView<?> parent, View
ArrayAdapter.createFromResource(this,R.array view, int position, long id) {
.s ems, android.R.layout.simple_spinner_item); t3 =
parent.getItemAtPosition(position).toString();
adapter2.setDropDownViewResource(android.
R. layout.simple_spinner_dropdown_item);
Toast.makeText(getApplicationContext(), "text :
semester.setAdapter(adapter2); "+t3, Toast.LENGTH_SHORT).show();
semester.setOnItemSelectedListener(new
}
AdapterView.OnItemSelectedListener() {
@Override
@Override
public void
public void onNothingSelected(AdapterView<?> parent) {
onItemSelected(AdapterView<?> parent, View
view, int position, long id) { }
});
t2 = }
parent.getItemAtPosition(position).toString();

Toast.makeText(getApplicationContext(), public void btnViewSyllabus(View view) {


"text : "+t2, Toast.LENGTH_SHORT).show(); viewAllFiles();
}
}
@Override

19
private void viewAllFiles() });
{ uploadPDFList.clear();
databaseReference= }
FirebaseDatabase.getInstance().getReference(" }
M
SBTE").child(t1).child(t2).child(t3);
ComputerB.java
databaseReference.addValueEventListene package com.example.userelearning; import
r(new ValueEventListener()
androidx.annotation.NonNull; import
{ @Override
androidx.appcompat.app.AppCompatActivity;
public void onDataChange(@NonNull
DataSnapshot dataSnapshot) { import androidx.cardview.widget.CardView;
import android.content.Intent; import
android.net.Uri; import android.os.Bundle;
for (DataSnapshot ps :
dataSnapshot.getChildren()){ import android.view.View; import
android.widget.AdapterView; import
uploadPDF uploadPDF = android.widget.ArrayAdapter; import
ps.getValue(uploadPDF.class); android.widget.Button; import
uploadPDFList.add(uploadPDF); android.widget.ListView; import
android.widget.Spinner; import
} android.widget.Toast;
String [] uploads = new
String[uploadPDFList.size()]; import
com.google.firebase.database.DataSnapshot;
for (int i=0;i<uploads.length;i++){
uploads[i]=uploadPDFList.get(i).getName(); import

} com.google.firebase.database.DatabaseError;
import
ArrayAdapter<String> adapter = new com.google.firebase.database.DatabaseReference
ArrayAdapter<String>(getApplicationContext() ;
,a ndroid.R.layout.simple_list_item_1,uploads);
import
myPDFListView.setAdapter(adapter); com.google.firebase.database.FirebaseDatabase;
} import
com.google.firebase.database.ValueEventListene
@Override r;

public void onCancelled(@NonNull import


DatabaseError databaseError) { com.google.firebase.storage.FirebaseStorage;

} import

20
com.google.firebase.storage.StorageReference; findViewById(R.id.servicess);
storageReference =
FirebaseStorage.getInstance().getReference();
import java.util.ArrayList;
databaseReference=
import java.util.List;
FirebaseDatabase.getInstance().getReference("M
SBTE");
public class ComputerB extends
AppCompatActivity {
myPDFListView.setOnItemClickListener(new
AdapterView.OnItemClickListener() {
Spinner semester, serv; public @Override
String t1="Computer",t2,t3; public void
onItemClick(AdapterView<?> parent, View view,
Button btn_viewSyllabus; int position, long id) {
StorageReference storageReference;
DatabaseReference databaseReference; uploadPDF uploadPDF =
ListView myPDFListView; uploadPDFList.get(position);
List<uploadPDF> uploadPDFList;
CardView mycardview; String link = uploadPDF.getUrl();
Intent intent = new
Intent(Intent.ACTION_VIEW);
@Override
intent.setData(Uri.parse(link));
protected void onCreate(Bundle
savedInstanceState) startActivity(intent);
{ super.onCreate(savedInstanceState); }
});
setContentView(R.layout.activity_computer_b);
btn_viewSyllabus=(Button)findViewById(R.id.
vi ewSyllabus); ArrayAdapter<CharSequence> adapter2 =
ArrayAdapter.createFromResource(this,R.array.s
mycardview =
ems, android.R.layout.simple_spinner_item);
(CardView)findViewById(R.id.cardview);

adapter2.setDropDownViewResource(android.R.
myPDFListView = layout.simple_spinner_dropdown_item);
(ListView)findViewById(R.id.myListView);
semester.setAdapter(adapter2);
uploadPDFList = new ArrayList<>(); semester.setOnItemSelectedListener(new
AdapterView.OnItemSelectedListener() {

semester = (Spinner) @Override


findViewById(R.id.sem_spineer1); public void
serv = (Spinner) onItemSelected(AdapterView<?> parent, View
view, int position, long id) {

21
t2 = public void btnViewSyllabus(View view) {
parent.getItemAtPosition(position).toString();
viewAllFiles();
}
Toast.makeText(getApplicationContext(),
"text : private void viewAllFiles()
"+t2, Toast.LENGTH_SHORT).show();
{ uploadPDFList.clear();
}
databaseReference=
@Override
FirebaseDatabase.getInstance().getReference("M
public void SBTE").child(t1).child(t2).child(t3);
onNothingSelected(AdapterView<?> parent) {
} databaseReference.addValueEventListener(new
ValueEventListener() {
});
@Override
ArrayAdapter<CharSequence> adapters =

ArrayAdapter.createFromResource(this,R.array
public void onDataChange(@NonNull
.s ervices,
DataSnapshot dataSnapshot) {
android.R.layout.simple_spinner_item);
adapters.setDropDownViewResource(android.
R.l ayout.simple_spinner_dropdown_item);
serv.setAdapter(adapters); for (DataSnapshot ps :
serv.setOnItemSelectedListener(new dataSnapshot.getChildren()){
AdapterView.OnItemSelectedListener() {
@Override uploadPDF uploadPDF =
public void ps.getValue(uploadPDF.class);
onItemSelected(AdapterView<?> parent, View uploadPDFList.add(uploadPDF);
view, int position, long id) {
}
t3 =
parent.getItemAtPosition(position).toString(); String [] uploads = new
String[uploadPDFList.size()];

Toast.makeText(getApplicationContext(),
"text : for (int i=0;i<uploads.length;i++){
"+t3, Toast.LENGTH_SHORT).show();
}
@Override uploads[i]=uploadPDFList.get(i).getName();
public void }
onNothingSelected(AdapterView<?> parent) {
ArrayAdapter<String> adapter = new
ArrayAdapter<String>(getApplicationContext(),a
} ndroid.R.layout.simple_list_item_1,uploads);
}); myPDFListView.setAdapter(adapter);

} }

22
@Override ;
public void onCancelled(@NonNull import
DatabaseError databaseError) { com.google.firebase.database.FirebaseDatabase;
} import
}); com.google.firebase.database.ValueEventListene
r;
}
import
}
com.google.firebase.storage.FirebaseStorage;
import
ETXB.java com.google.firebase.storage.StorageReference;
package com.example.userelearning;
import androidx.annotation.NonNull; import import java.util.ArrayList;
androidx.appcompat.app.AppCompatActivit
import java.util.List;
y; import
androidx.cardview.widget.CardView;
public class ETXB extends AppCompatActivity {

import android.content.Intent;
Spinner semester, serv;
import android.net.Uri; import
public String t1="E&TC",t2,t3;
android.os.Bundle; import
Button btn_viewSyllabus;
android.view.View; import
StorageReference storageReference;
android.widget.AdapterView;
DatabaseReference databaseReference;
import
ListView myPDFListView;
android.widget.ArrayAdapter;
List<uploadPDF> uploadPDFList;
import android.widget.Button;
CardView mycardview;
import android.widget.ListView;
import android.widget.Spinner;
@Override protected void
import android.widget.Toast;
onCreate(Bundle savedInstanceState)
{ super.onCreate(savedInstanceState);
import
setContentView(R.layout.activity_etxb);
com.google.firebase.database.DataSnapshot;
import
btn_viewSyllabus=(Button)findViewById(R.id.vi
com.google.firebase.database.DatabaseError; ewSyllabus);
import mycardview =
(CardView)findViewById(R.id.cardview);
com.google.firebase.database.DatabaseReferenc
e

23
myPDFListView =
(ListView)findViewById(R.id.myListView); adapter2.setDropDownViewResource(android.R.
uploadPDFList = new ArrayList<>(); layout.simple_spinner_dropdown_item);
semester.setAdapter(adapter2);
semester.setOnItemSelectedListener(new
semester = (Spinner)
AdapterView.OnItemSelectedListener() {
findViewById(R.id.sem_spineer1);
serv = (Spinner) @Override
findViewById(R.id.servicess);
public void
onItemSelected(AdapterView<?> parent, View
storageReference = view, int position, long id) {
FirebaseStorage.getInstance().getReference();
t2 =
databaseReference= parent.getItemAtPosition(position).toString();
FirebaseDatabase.getInstance().getReference("
M Toast.makeText(getApplicationContext(), "text :
SBTE"); "+t2, Toast.LENGTH_SHORT).show();
}
myPDFListView.setOnItemClickListener(new
@Override
AdapterView.OnItemClickListener() {
public void
@Override
onNothingSelected(AdapterView<?> parent) {
public void
onItemClick(AdapterView<?> parent, View
view, int position, long id) {

uploadPDF uploadPDF =
uploadPDFList.get(position);

String link = uploadPDF.getUrl();


Intent intent = new
Intent(Intent.ACTION_VIEW);
intent.setData(Uri.parse(link));
startActivity(intent);

}
});

ArrayAdapter<CharSequence> adapter2 =
ArrayAdapter.createFromResource(this,R.array
.s ems, android.R.layout.simple_spinner_item);

24
25
41

40
41
42
43
44
45
46
47
CHAPTER 8

CONCLUSION AND FUTURE SCOPE

Conclusion
In the conclusion, during this study and research getting the observation online
study are technical skill. But it is not effective as compare to the offline study.
Online learning is better the unique situation like COVID -19 recently running
around the world. The student and teachers perception for online study is not
good in skill and practical knowledge. We could not deny that technique of
learning will be change quicker. However, that we felt that traditional teaching
and learning are better, but technology change it. Teacher should always
formulate themselves for the changing ways of teaching. They desire to be
creative and find the effective technique in teaching their students. Online
learning is harmful effect for student success. It has various aids over the
traditional performances of learning. A lot of the students are fascinated because
of it flexible, even though they need pay for the cost to use the internet.

Future Scope
The following section describes the work that will be implemented with future
releases of the software.

• In upcoming version of application, we can do everything from app, just


like conducting video lectures, chatting with teachers, etc.
• This application will be act as a platform, which will be connecting teacher
and users in real time.
• Making the app supports multiple platforms (cross platform app).

47
References

1. https://ieeexplore.ieee.org/abstract/document/6291241 2.
https://ieeexplore.ieee.org/document/5227902
3. https://ieeexplore.ieee.org/abstract/document/7429229
4. https://ieeexplore.ieee.org/document/9238176
5. Android by Dixit,Prasanna Kumar
6. Android Programming for Beginner by Hortan John

**********

48

You might also like