media player report (1)

Upload: arjun-kalra

Post on 05-Apr-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Media Player Report (1)

    1/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 1

    A Seminar Report on

    Media PlayerSubmitted in the partial fulfillment of degree of Bachelor of Technology in

    Computer Science and Engineering under Rajasthan Technical University,

    Kota (Raj.)

    Submitted to: Submitted By:

    Mr. Manoj K Nama Ankur Gupta (08ESKCS015)

    (Sr. Lect. CSE Dept.) Mohit Agarwaal (08ESKCS66)SKIT Jaipur Kamalkant Gaider(08ESKCS50)

    SWAMI KESHVANAND INSTITUTE OF

    TECHNOLOGY, MANAGEMENT &

    GRAMOTHAN, JAIPUR

  • 7/31/2019 Media Player Report (1)

    2/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 2

    CERTIFICATE

    This is to certify that the seminar entitled MEDIA PLAYER has

    been presented byANKUR GUPTA, MOHIT AGARWAL AND

    KAMALKANT GAIDER under my guidance during the academic

    year 2011-2012.

    Guide

    Mr. Manoj K Nama

    Head of the Department

    Prof. C.M Chaudhary

  • 7/31/2019 Media Player Report (1)

    3/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 3

    Acknowledgement

    I take this opportunity to express my sincere thanks and deep gratitude to all

    those people who extended their wholehearted co-operation and have helped

    me in completing this project successfully.

    First of all, I would like to thank Mr. Surana Academic Director (SKIT, JAIPUR)

    for creating opportunities to undertake me in the esteemed organization.

    Special thanks to Mr. Manoj kumar Nama, Project Manager for all the help

    and guidance extended to me by him in every stage during my training. His

    inspiring suggestions and timely guidance enabled me to perceive the various

    aspects of the project in a new light.

    I would also thank to my Mr. CM Chaudhary, HOD (COMPUTER SCIENCEDEPT.)

    & my internal project guide Mr. M.K.Nama who guided me a lot in completing

    this project. I would also like to thank my parents & project mate for guiding

    and encouraging me throughout the duration of the project.

    Last but not least, I convey my thanks to all members who directly or indirectly

    helped me in successfully completing my project work.

    ANKUR GUPTA(08ESKCS015)

    MOHIT AGARWAAL(08ESKCS066)

    KAMALKANT GAIDER(08ESKCS050)

    8th

    SEM, CSE

  • 7/31/2019 Media Player Report (1)

    4/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 4

    INDEX

    1.0 INTRODUCTION1.1 Purpose1.2 Scope1.3 Terminologies used1.4 Technologies to be used1.5 Product Feature2.0 OVERALL DESCRIPTION2.1 Products Perspective

    2.2 Software Interface

    2.3 Hardware Interface

    2.4 Communication Interface

    2.5 Product Function

    2.6 User characteristics

    2.7 Constraints

    2.8 Use case model description

    2.9 Class diagram

    2.10 Sequence diagram

    2.11 Functional diagram

    2.12 Schemas

  • 7/31/2019 Media Player Report (1)

    5/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 5

    2.13 Assumptions and Dependencies

    3.0 Specific Requirements

    3.1 Use Case Report

    3.2 Supplementary Requirements

    4.0 FAQs

    4.1 References

    1.0 INTRODUCTION:

  • 7/31/2019 Media Player Report (1)

    6/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 6

    The application shall allow the user to lawfully and freely distribute music over the internet.

    For each song the user should be charged a fee which is agreed between the client and the

    provider. Once the fee is paid the music is distributed to him/her. From here onwards the user

    can they distributed the music using their own personal hardware or software. The application

    should inform the user which devices are connected to the system at any one time. The

    system should allow the distribution of music to external devices as well as to other systems

    by providing networking capability. The application will finally incorporate advanced

    searching and sorting facilities, making it easier for the user to organize their music

    collection.

    1.1 PURPOSE:

    The purpose of the application is to deliver an easy-to-use music sharing and downloading

    application. It should be available for even the most novices of computer users and run on

    small computers. The application itself is a complete piece of software with few

    dependencies on other aspects of the environment. The application is a new piece of software

    which will be given a release number of 0.1. Future release numbers will follow the common

    number convention.

    1.2 SCOPE:

    The application should strengthen the weaknesses mentioned in the ethnographic studies. The

    application should be able to run on any system regardless of the operating system or

    hardware; within reason. The application will be installed on a home users desktop computer

    or laptop using an installation wizard The application is design for all types of usersregardless of their age or experience; however limitations and locks will be applied to users

    under the age of 16. The application must function effectively and maintain an efficient level

    of service with maximum uptime to download songs.

    1.3 TERMINOLOGIES USED:

  • 7/31/2019 Media Player Report (1)

    7/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 7

    SLA: SLA is a formal written agreement made between two parties. The service provider and the

    service recipient. It defines the term of engagement the fundamental rules that will govern the

    relationship.

    HTML: Hypertext Markup Language is a markup language used to design static web pages.

    EJB: Enterprise Java Beans.

    J2EE: Java 2 Enterprise Edition is a programming platformpart of the Java platformfor

    developing and running distributed multitier architecture Java applications, based largely on modular

    software components running on an application server.

    DB2: DB2 Database is the database management system that delivers a flexible and cost effective

    database platform to build robust on demand business applications.

    WAS: Web sphere application server is an application server that runs business applications and

    supports the J2EE and web services standards.

    WSAD : Web sphere studio application developer is a toolkit which is designed for the creation of

    more complex projects, providing fully dynamic web application utilizing EJBs. This consist of EJB

    tools, CMP, data mapping tools & a universal test client that is designed to aid testing of EJBs.

    HTTP: Hypertext Transfer Protocol is a transaction oriented client/server protocol between web

    browser & a Web Server.

    HTTPS: Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket layer).

    TCP/IP: Transmission Control Protocol/Internet Protocol, the suite of communication protocols used

    to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP.

    1.4 TECHNOLOGIES TO BE USED:

    J2EE: Application Architecture

    JSP:java server programming

  • 7/31/2019 Media Player Report (1)

    8/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 8

    1.5 PRODUCT FEATURE:

    The application shall allow the user to lawfully and freely distribute music over the internet.

    For each song the user should be charged a fee which is agreed between the client and the

    provider. Once the fee is paid the music is distributed to him/her. From here onwards the user

    can they distributed the music using their own personal hardware or software. The application

    should inform the user which devices are connected to the system at any one time. The

    system should allow the distribution of music to external devices as well as to other systems

    by providing networking capability.

    The application will finally incorporate advanced searching and sorting facilities, making it

    easier for the user to organize their music collection. The application is intended for users

    who use and distribute music electronically. One of the highest priorities is age verification;

    people under the age of 16 should not be allowed to purchase the songs online and adults may

    also chose to lock specific songs which contain offensive material. The application shallallow both novice users and more competent computer users to use the system effectively.

    For more frequent computer users, there will be options for advanced functions to allow them

    to generate their own playlists along with storing and loading multiple files. The system shall

    restrict remote users being able to download music on a clients system.

    2.0 OVERALL DESCRIPTION:

    2.1 PRODUCTS PERSPECTIVE:

  • 7/31/2019 Media Player Report (1)

    9/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 9

    Music System MAK is a software application aimed towards people who need software

    assistance for music media distribution. This innovative application hopes to compete against

    currently available software applications for music media distribution, such as Apple iTunes

    and Microsoft Windows Media Player.

    2.2 SOFTWARE INTERFACE:

    2.2.1 OPERATING SYSTEM :-

    The product will work with any version of Mac OS X, Windows XP, Windows Vista and

    Windows 7.

    2.2.2 LIBRARIES:-

    The product will support the audio compression formats and related codecs for MPEG-1,

    MPEG-2, MPEG-3, MPEG-4 and Windows Media Audio (WMA).

    2.2.3 INTEGRATED COMMERCIAL COMPONENTS:-

    The system will interact with web application programming interfaces (API) of third party

    services, such as YouTube, Facebook, MySpace and iTunes.

    2.3 HARDWARE INTERFACE:

    2.3.1 GAMING CONSOLES:-

  • 7/31/2019 Media Player Report (1)

    10/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 10

    The product will enable interaction with gaming consoles, such as PlayStation 3 and Xbox

    360 via wireless network connection and USB cable connection in order to support music

    distribution between these devices.

    2.3.2 MOBILE DEVICES:-

    The external hardware interface will support mobile devices, such as smart phones and digital

    music players, via a Universal Serial Bus (USB) cable or Bluetooth connection in order to

    allow the exchange of music files and synchronization of playlists.

    2.3.3 EXTERNAL STORAGES

    The product will support transparent connections with external hard drives in order to support

    automatic archiving capability.

    2.3.4 AUDIO INPUT & OUTPUT

    The product will work with audio recording devices such as microphones. External audio

    equipment such as Hi-Fi speakers will also be supported.

    2.4 COMMUNICATION INTERFACE:

    It uses HTTP/HTTPS protocol on client side. Firewall security is required for security the server. TCP/IP protocol is the basic need for the client side.

    2.5 PRODUCT FUNCTION:

  • 7/31/2019 Media Player Report (1)

    11/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 11

    2.5.1 FUNCTIONAL REQUIREMENTS (OR PRIMARY FUNCTIONS)

    The system shall have an Internet connection. This will enable the downloading of songs

    from a digital media store. In addition, users shall be able to use a web browser in locating

    songs to download. The system shall allow a media server configuration. This will allow

    music in the library to be shared with compatible remote devices. Therefore, both the system

    and devices shall use a common networking protocol. In this user could access music located

    on their media player through a games console. As a result of this, the system shall restrict

    access to the shared network to those who have authorized access. The system shall

    communicate with distribution devices via a connection. This could be a wired connection or

    optionally a wireless connection.

    2.5.2 NONFUNCTIONAL REQUIREMENTS (OR SECONDARY

    FUNCTIONS):

    2.5.2.1 Performance Requirements

    The application must have a minimum processor speed so that there are some restrictions on

    what type of computer can use it. However this will be as small as possible to enable a broad

    range of clients to use the application. From Jonathons ethnographic study we can see that

    speed was a common issue while distributing music. The system must also aim to use

    minimum hard disk space yet keep the quality of the media as high as possible.

    2.5.2.2 Safety Requirements

    All songs downloaded will be checked before downloaded by the system to make sure the

    music has no viruses in order to keep the users computer safe from being attacked. The next

    requirement is that a compressed version of the songs which are downloaded get saved to a

    back-up area so that if something goes wrong with the software like it crashes the song files

    are still safe.

    2.5.2.3 Security Requirements

  • 7/31/2019 Media Player Report (1)

    12/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 12

    Information of users such as IP addresses will be kept private so that third parties cannot gain

    access to this personal information in order to keep within the Data Protection Act. The next

    requirement is that the system should prevent the user downloading material which would be

    deemed offensive such as blasphemy and obscene material and also the system will check

    certain age restrictions on songs to make sure that material isnt seen by minors. The final

    limitation is that the method of which people share their music should have limitations so that

    Copyright of songs is not broken.

    2.5.2.4 Software Quality Attributes

    These are a variety of constraints that might affect the user or system. The system should beable to by-pass security systems which are on the computer which deny our system

    connection. This is to enable that reliability is always at a high level; some ethnographic

    studies showed that users could not connected to the internet due to firewalls. The next

    requirement is that the application should enable music files to be converted to different,

    valid, formats and that all common music formats should be supported; any which arent are

    provided with plug-ins to enable them. This is to ensure interoperability between the files and

    system, the decision for this was that in numerous ethnographic studies the downloaded

    music couldnt be played using their chosen device.

    Another interoperability requirement is that the system should allow any storage device to

    connect to the system and enable the distribution of music. The reason for this is that researchshows people used ITunes but they could only distribute the music on to their IPods which

    was found to be a problem. A usability requirement is that there should be a help guide within

    the new system so that the time that new users can soon understand the system; however the

    system will be simple and therefore self-explanatory.

    There will be hotkeys throughout the system so that users can speed up their performance

    once they have mastered how to use the program. The system should remember the last song

    played on the system so that users can manipulate the program easily and efficiently.

    The system will have a predictive search where the user starts typing in the name of a song

    and the system brings up a variety of options which begin with the same parts as the search.

    The reason for this is that if the user sees there search in the drop down box it saves themtyping it out which may cause typing errors.

    2.6 USER CHARACTERSTICS:

    The application is intended for users who use and distribute music electronically. One of the

    highest priorities is age verification; people under the age of 16 should not be allowed to

    purchase the songs online and adults may also chose to lock specific songs which contain

  • 7/31/2019 Media Player Report (1)

    13/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 13

    offensive material. The application shall allow both novice users and more competent

    computer users to use the system effectively. For more frequent computer users, there will be

    options for advanced functions to allow them to generate their own playlists along with

    storing and loading multiple files. The system shall restrict remote users being able to

    download music on a clients system.

    The target clients for our software are ordinary computer users who distribute music media. It

    is assumed that the target group does not have to be familiar with the use of any software of

    similar functionality, but to have a basic computer and Internet skills that will enable them to

    use this software.

    2.6.1 NOT-REGISTERED USERS CLASS

    Able to use all of the functionality of the Music Player ComponentAble to use limited functionality of Music Search Component searching for music

    in other users shared music libraries

    Not able to use any of the functionality of the Music Organiser ComponentNot able to use any of the functionality of the Music Sharer Component

    2.6.2 REGISTERED USERS CLASS

    Able to use all of the functionality of the Music Player Component Able to use all of the functionality of the Music Search Component Able to use all of the functionality of the Music Organiser Component Able to use all of the functionality of the Music Sharer Component

    2.7 CONSTRAINTS:

    GUI is only in English. Login and password is used for identification

  • 7/31/2019 Media Player Report (1)

    14/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 14

    Trail version of the system will be valid up to 30 days To avail full functionality of system license should purchased All devices must be tamper evident. System should be update regularly. Crash reports of the system must be sent to the developer team. All devices must undergo a full re-installation and product upgrade.

    .

    2.8 USE CASE MODEL DESCRIPTION:

    A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram. Its

    purpose is to present a graphical overview of the functionality provided by system in terms of factors,

    their goals (represented as use cases), and dependencies between those use cases

    User

    Actions

    2.9 CLASS DIAGRAM:

    The class diagram is the main building block in object oriented modeling. It is used both for general

    conceptual modeling of the systematic of the application, and for detailed modeling translating the

    models into programming code. The classes in a class diagram represent both the main objects and or

    interactions in the application and the objects to be programmed.

    login

    playlist

    Play

    AUDIO VIDEO

    Customization

    Update

  • 7/31/2019 Media Player Report (1)

    15/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 15

  • 7/31/2019 Media Player Report (1)

    16/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 16

    SEQUENCE DIAGRAM:

    A sequence diagram shows, as parallel vertical lines (lifelines), different processes or objects that live

    simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in

    which they occur.

  • 7/31/2019 Media Player Report (1)

    17/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 17

    2.11 Functional Diagram:

  • 7/31/2019 Media Player Report (1)

    18/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 18

    Candidate

    Candidate Id Contact Details

    Experience

    Party Details

    Vote

    Casted

    Upload

    Correct

    Details

    General Public

    Admin

    Field Officer

    Gets Data

    And

    validates it

    Validates

    The Data

    Gets Data

    From Form

    Area Name

    Name

    Voter Id

    Contact

    Domicile

    Address

    Area Id

    Id

    Name

    Phone No.Age

    Reg. form

    Name

    Email Id.

    Email id

    Name

    Phone No.

    Age

    Id

    Verification

    Verification

    Row

    State

    City Area

    General Details

    General Details

    Address

    Election Commission

  • 7/31/2019 Media Player Report (1)

    19/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 19

    2.11 ASSUMPTIONS AND DEPENDENCIES:

    The voting is done through the country on a single day. All the candidates have their respective data on portals of their parties which can be

    kinked with the main electronic voting sites.

    Role of every user predefined and no other extensions can be done without the permissionof election commissioner and administrator both.

    User ID and password are provided with Voter-Id which can further be modified.

    Important: During the making of this project it has been assumed that the city is not been divided

    into different wards. In fact the whole city can be treated as a ward and all the candidates of

    particular city compete under one ward only. The voters also cast their votes under one ward only.

    3.0 SPECIFIC REQUIREMENTS:

    3.1 USE-CASE REPORTS:

    A) ADMINISTRATOR

    Responsible for providing all the information of candidates who have applied for the polling and voter

    registration.

    I) PROFILE OF CANDIDATES

  • 7/31/2019 Media Player Report (1)

    20/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 20

    All the candidates have to submit their information to the administrator so that it can be displayed on

    the site.

    II) PROVIDING THE LIST OF CANDIDATES

    He will provide the list of all the candidates at the local as well as national level.

    DESCRIPTION

    Administrator inserts the candidates profile data in the database only after verification. After then

    only the profile is displayed on the portal.

    PRECONDITIONS

    Data is verified by the Administrator. Administrator is logged in already.

    NORMAL FLOW OF EVENTS:

    Administrator clicks on to the link of view profiles on his home page. Data is already provided by the candidate and the administrator verifies it. Query is submitted and data is saved on database.

    B) FIELD OFFICERS

    All the responsibility of maintaining the connection and availability of the system is taken by this

    person. He is also responsible for voter registration done on the day of polling.

    I) MANAGING CONNECTIVITY AND AVAILABILITY OF THE SYSTEMAll the connectivity and system availability is maintained while polling process continues.

    II) ON-SPOT VOTER REGISTRATIONVoters who were not able to register themselves beforehand, the field officers do their registration

    thereby itself on the day of polling.

    DESCRIPTION

    All newly registered voters are given a unique id by the Administrator which is useful for them while

    voting because they are registered in database with this id.

  • 7/31/2019 Media Player Report (1)

    21/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 21

    PRECONDITIONS

    All the formalities are done such as Voter Id-card. Voters are verified.

    NORMAL FLOW OF EVENT

    Data verified by election commission. Data sent to Administrator. Voters information is verified by the administrator and stored in database and given a unique

    id for login.

    C) CANDIDATES

    The candidates who are competing for elections in their respective constituencies are provided with a

    registration form. After filling the form and getting it verified by the Administrator, the candidates are

    eligible for voting.

    I) PROVIDE PROFILE INFORMATIONThe candidate provides the information regarding his/her qualification, profession, party which he

    wants to join, etc by filling the registration form.

    NAME OF CASE USED:- PROVIDE PROFILE INFORMATION

    DESCRIPTION

    All the candidates wishing to contest elections have to provide their detailed information on the form

    upload on the site. This information is then verified by the Administrator, only after which the

    candidate can fight elections. The candidate is also given a unique id by the Administrator which can

    be used by them for updating profile information.

    PRECONDITIONS

    All the formalities are done such as age verification, medical checkup, etc. Candidates are verified.

  • 7/31/2019 Media Player Report (1)

    22/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 22

    NORMAL FLOW OF EVENT

    Profile details provided by the candidate. Data sent to Administrator. Candidates information is verified by the administrator and only after successful verification

    , they are given a unique Id for login.

    D) VOTERS

    The candidates who are competing for elections in their respective constituencies are provided with a

    registration form. After filling the form and getting it verified by the Administrator, the candidates are

    eligible for voting.

    I) PROVIDE PROFILE INFORMATIONThe candidate provides the information regarding his/her qualification, profession, party which he

    wants to join, etc by filling the registration form.

    II) CAST THEIR VOTESThe voters practice their right to vote by logging into their account. After login the candidate list is

    displayed and the voter can chose which candidate to vote.

    III) GETTING INFORMATION ABOUT PARTY MANIFESTOS AND CANDIDATEPROFILES:

    Party manifestos are already stored in database and the voter is displayed this on his homepage. He

    can also view the profiles of all the candidates who are contesting for elections.

    DESCRIPTION

    All the voters wishing to cast their vote have to provide their detailed information on the formuploaded on the site. This information is then verified by the Administrator, only after which the voter

    can vote. The voter is also given a unique id by the Administrator which can be used by them for

    login and viewing party manifestos and candidate profiles.

    PRECONDITIONS

    All the formalities are done such as age verification, medical checkup, etc. Voters are verified.

    NORMAL FLOW OF EVENT

  • 7/31/2019 Media Player Report (1)

    23/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 23

    Information details provided by the voters. Data sent to Administrator. Voters information is verified by the administrator and only after successful verification,

    they are given a unique Id for login.

    3.2 SUPPLEMENTARY REQUIREMENTS

    POWER BACKUP

    Whenever the polling is taking place the system should not face any breakdown in the supply of

    power otherwise data could be lost or connection could be broken.

    PROPER MAINTENANCE

    While in operation if any error occurs when there must be a technical person to solve it, he can be any

    one of polling agents.

    NETWORK AVAILABILITY AND BANDWIDTH ISSUE

    High speed network connection is required so that the data can travel swiftly.

    SERVER SHOULD BE HIGHLY RESPONSIVE

    When polling happens in any country on a single day then it would give a lot of stress on to the

    server, the server should be configured in a manner so that it can bear that stress.

    FAQS: YOU REALLY NEED TO KNOW THIS

    1.WHY SHOULD YOU VOTE?

    India is the largest democracy in the world. The right to vote and more importantly the exercise of

    franchise by the eligible citizens is at the heart of every democracy. We, the people, through this

    exercise of our right to vote have the ultimate power to shape the destiny of country by electing our

  • 7/31/2019 Media Player Report (1)

    24/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 24

    representatives who run the Government and take decisions for the growth, development and benefit

    of all the citizens.

    2 .WHO CAN VOTE?

    All citizens of India who are 18 years of age as on 1st January of the year for which the electoral roll is

    prepared are entitled to be registered as a voter in the constituency where he or she ordinarily resides.

    Only persons who are of unsound mind and have been declared so by a competent court or

    disqualified due to Corrupt Practices or offences relating to elections are not entitled to be registered

    in the electoral rolls.

    3 .WHAT IS THE DISCLOSURE BY CANDIDATES?

    3.1 Recently the Election Commission of India has made it mandatory consequent upon a Judgment

    of Humble supreme court that all candidates must file an affidavit along with their nomination form

    with details such as:-

    i. his/her criminal antecedents,ii. his/her assets and liabilities and those of his/her spouse and dependents, andiii. his/her educational background.This has been done with a view that every citizen has a right to know about the candidates contesting

    an election and make an informed choice.

    3.2 The Election Commission has directed all Returning Officers to display the copies of nomination

    papers and accompanying affidavits received during any day on his notice board immediately on

    receipt and make copies of these for distribution to the press and any members of public who want

    this information, free of cost. Any citizen of the country can obtain copies of the nomination form and

    the affidavit filed by any candidate from the Returning Officer and it shall not be refused. As a voter

    you have every right to seek this information and get it.

    3.3 Above measures help the electors make an informed choice about the candidate they are going to

    vote for.

  • 7/31/2019 Media Player Report (1)

    25/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK

    MAK/SKIT Page 25

    4.0 REFERENCES

    1. www.videolan.org

    2. www.wikipedia.com

    3. www.google.com

  • 7/31/2019 Media Player Report (1)

    26/26

    MEDIA PLAYER SKIT

    Project_ report 25-02-2012

    MAK