Date post: | 08-Jul-2015 |
Category: |
Technology |
Upload: | sagar-kalra |
View: | 73 times |
Download: | 0 times |
eXXtensible MMarkup LLanguage (XML)
By:
Sagar KalraClass:- Xth B
Roll No.:- 38
What is XML?
eXtensible Markup Language A markup language is used to provide
information about a document. Tags are added to the document to provide
the extra information. HTML tags tell a browser how to display the
document. XML tags give a reader some idea what
some of the data means.
Comparisons
Extensible set of tags Content orientated Standard Data
infrastructure Allows multiple
output forms
Fixed set of tags Presentation oriented No data validation
capabilities Single presentation
XML HTML
Authoring XML Elements
An XML element is made up of a start tag, an end tag, and data in between.
Example: <director> Matthew Dunn </director> Example of another element with the same value: <actor> Matthew Dunn </actor> XML tags are case-sensitive: <CITY> <City> <city> XML can abbreviate empty elements, for example: <married> </married> can be abbreviated to <married/>
Attributes In XML Document An attribute is a name-value pair separated
by an equal sign (=). Example:
<City ZIP=“247667”> Roorkee </City> Attributes are used to attach additional,
secondary information to an element.
Guidelines For XML DocumentAuthoring guidelines:
All elements must have an end tag. All elements must be cleanly nested
(overlapping elements are not allowed). All attribute values must be enclosed in
quotation marks. Each document must have a unique first
element, the root node.
Example of an XML Document
<?xml version=“1.0”/>
<address>
<name>Alice Lee</name>
<email>[email protected]</email>
<phone>212-346-1234</phone>
<birthday>1985-03-22</birthday>
</address>
Societal Impacts Of IT
By:- Sagar KalraClass:- Xth BRoll no.:- 39
Increasing Importance Of ITHuge amount of technological
developments that are taking place in IT are bringing about a revolution in the way we work in our society.
Computers are now being used in more and more applications. It is preferred to store information digitally as it is accessible to users worldwide.
Unethical IT Practices
Malware:- Malicious softWARE is a program that is designed with ill intentions and does something undesirable and unexpected in a computer.
Computer Virus:- It is a malware program that is designed to spread from one computer to another and interfere with the computer operations.
Spreading of Computer VirusThrough Infected Pen Drive, CD, and
other storage media.Through InternetThrough E-mailThrough Computer Network.
Actions to prevent Computer VirusUse of Antivirus Program, which is a
software which is designed to prevent, scan and remove the known computer virus.
Don't share Drive C: without a password and without read-only restrictions.
Empty floppy drives of diskettes before turning on computers, especially laptops.
Actions to prevent Computer VirusBack up your important files and ensure
that they can be restored. Change the computer's boot sequence
to always start the PC from its hard drive.
Don’t open an e-mail attachment when you are not expecting it.
Cyber CrimeAny crime committed using computers
and internet is termed as cyber crime.A hacker is a person who breaks into
computers either for profit or is being motivated by the challenge.
A cracker is a technical person who breaks through the system’s security with malicious intentions.
Data BackupBackup is copying data files to disk or
some other storage device, to provide a copy of the data ready to be restored if the original copy is lost, damaged or corrupted.
Backup can be made by using :- Flash USB Drive, CD-RW, DVD, External Hard Disk and Online Backup.
Important PointsE-Commerce or Electric Commerce is
doing business online, i.e. via internet.Data Encryption is coding of
information into a symbolic form to disguise and thereby secure it.
Firewall is a software that examines all messages entering or leaving a computer and blocks those who do not meet the specified security criterion