SlideShare a Scribd company logo
1 of 41
Data interchange is essential to carry out business
transactions. However, organizations store data in disparate
formats, which makes the process of data interchange
complex and time-consuming.
Extensible Markup Language (XML) is a standard, simple
way of storing the data in a format that can be exchanged
across multiple systems across an enterprise. Providing an
insight into XML will benefit students as it is a standard
technology to describe and define documents.
The course is applicable to students who want to create
well-formed XML documents. This course introduces
students to the fundamentals of XML and enable them to
effectively use XML as a markup language to develop Web
applications.
Rationale
In this session, you will learn to:
Identify the need for XML as a standard data interchange
format
Identify the structure of XML documents
Objectives
Traditionally, preprinted formats were used to exchange
information between businesses.
Need for a more effective way of communicating and
processing business data led to the emergence of
Electronic Data Interchange (EDI).
EDI refers to the process of exchanging documents in a
standard format between two computer systems.
EDI has the following limitations:
Rigid transaction set
Fixed business rules
High costs
Slow pace of standards evolution
Getting Started with XML
XML is a text-based markup language that enables storage
of data in a structured format.
XML is a cross-platform, hardware and software
independent markup language that enables structured data
transfer between heterogeneous systems.
XML is used as a common data interchange format in a
number of applications.
Let us understand the usage of XML with the help of the
diagram.
Introducing XML
Introducing XML (Contd.)
Web Application
Web Services
.
XML
Windows Application
Mobile Application
SQL Server
DB2 Oracle
Access
Data Sources
Web Architecture Using XML
In a traditional Web architecture, a client sends a request to the
server in a pre-defined format and receives the response
accordingly.
The advantage of using XML in the Web architecture is that the
structure of the request can be obtained from the server at run
time.
XML can encode non-relational data as well as relational data
structure.
Introducing XML (Contd.)
Web Architecture Using XML (Contd.)
The following figure depicts the XML Web architecture.
Introducing XML (Contd.)
Difference Between SGML, HTML, and XML
Standard Generalized Markup Language (SGML) allows
documents to describe their grammar by specifying the tag set
used in the document and the structural relationship that these
tags represent.
Hypertext Markup Language (HTML) is used for data
presentation.
XML is used for data description and definition.
Introducing XML (Contd.)
Difference Between SGML, HTML, and XML (Contd.)
Introducing XML (Contd.)
SGML HTML XML
Extensibility
Structure
Validation
Browser
Dependency
Cost/Benefit
Low High Low
Poor Good Medium
Yes Yes Yes
Yes No Yes
Yes No Yes
Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
In HTML, only the predefined tags can
be used.
In XML, you can create new tags based
on the requirements of the application.
Various languages such as MathML and
WML have been derived from XML.
Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
XML produces files that are
unambiguous, easy to generate,
and easy to read.
XML provides a structure to
store data in textual format,
which can then be used as a
standard format or protocol for
data interchange.
Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
The flexibility to create user-defined
tags in XML enables creation of
smart search engines.
You can differentiate whether you
want do to search based on a text
or on a tag, which enables the
browser to perform a focused
search and return precise
information that matches the search
query.
Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
Document updates in HTML
are slow as the entire
document needs to be
refreshed from the server.
Document updates in XML are
faster as only the changed
content needs to be
downloaded.
Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
In HTML, you need to create
separate HTML pages to
display the same information
in different formats while XML
concentrates on data and not
on its presentation.
HTML does not allow
conditional formatting of a
document while in XML
conditional formatting is
possible.
Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
In XML, a message can be stored in
the form of a document, object data,
or data from a database.
XML design provides flexibility while
storing data as it does not impose
any restriction on the field size and
the order in which the data is stored.
Future of XML
The future uses of XML can be summarized as:
XML will be widely used in e-commerce.
XML will have a huge core market in the form of Business to
Business (B2B).
XML will be used for mobile devices due to its ability to easily
convert into the appropriate format for any device.
XML will be used to solve communication problems in EDI and
Enterprise Application Integration (EAI) as it provides
interoperability between disparate applications.
Introducing XML (Contd.)
W3C is responsible for the development of Web
specifications that describe communication protocols and
technologies for the Web.
Due to the flexibility for customization in XML, W3C has laid
down these rules that need to be followed by all XML
vendors:
XML must be directly usable over the Internet.
XML must support a wide variety of applications.
XML must be compatible with SGML.
XML should have absolute minimum number of optional
features, ideally zero.
XML documents must be human legible and clear.
XML design must be formal and concise.
XML documents must adhere to a set of constraints called full
normalization.
Introducing W3C
An XML application is considered well designed if it is robust
and scalable.
To design a robust and scalable XML application, the
following steps need to be performed:
1. Create an information model.
2. Identify the required components of the XML document.
3. Create the XML document.
Identifying the Structure of XML Documents
An information model is a description of the information
used in an organization.
Information modeling helps identify:
Objects involved in an application
Properties of the objects
Relationships among objects
XML provides the following additional capabilities to
information modeling:
Heterogeneity
Extensibility
Flexibility
Information Modeling
Each record can contain different data
fields.
New data types can be added
whenever required.Data fields can vary in size and
configuration between instances.
Types of information models that can be created for an XML
application are:
Static model: Helps define all the objects in an application and
the relationships among them.
Dynamic model: Helps to determine the information flow of an
application in the form of messages.
Information Modeling (Contd.)
The various components of an XML document used for
representing data in a hierarchical order are:
Processing Instruction (PI)
Tags
Elements
Content
Attributes
Entities
Comments
Components of an XML Document
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Processing Instruction (PI)
Provides information on how
the XML file should be
processed.
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Tags
Is a means of identifying
data. Tags consist of start
tag and end tag.
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Root Element
Contains all other elements
in the document.
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Comments
Are statements used to
explain the XML code.
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Child Elements
Are the basic units used to
identify and describe data in
XML.
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Attributes
Provide additional
information about the
elements for which they are
declared.
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Content
Refers to the information
represented by the elements
of an XML document. An
element can contain:
• Character or data content
• Element content
• Combination or mixed
content
<?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is &lt; 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Entities
Is a set of information that
can be used by specifying a
single name.
The rules that govern the creation of a well-formed XML
document:
Every start tag must have an end tag.
Empty tags must be closed using a forward slash (/).
All attribute values must be given in double quotation marks.
Tags must have proper nesting.
XML tags are case sensitive.
Identifying the Rules for Creating XML Documents
Problem Statement:
CyberShoppe, Inc. sells toys and books in the United States. It
has three branches in different parts of the country. Currently,
the three branches maintain data on their local computer
systems. The IT manager at CyberShoppe has identified that a
centralized data repository on the products sold through its
e-commerce site is required. The data from all branches must
be collated and housed in a centralized location. This data
must be made available to the Accounts and Sales sections at
the individual branches, regardless of the hardware and
software platforms being used at the branches.
In addition, the sales personnel require access to the data
using palmtops and cellular phones. The product details of
CyberShoppe consist of the product name, a brief description,
the price, and the available quantity on hand. A product ID
uniquely identifies each product.
Demo: Creating an XML Document
Consider the following statement:
<?xml version="1.0" encoding= "UTF-8"?>
Which component of an XML document does the preceding
statement represent?
a. Element
b. Content
c. Entity
d. Processing Instruction
Answer:
d. Processing Instruction
Practice Questions
Bob is the EDP head of an organization that manufactures
and sells hardware parts. The organization has presence in
all the major cities of the United States. At present, all
branch offices maintain their data locally. Bob wants to
centralize the repository of data in his organization. Data
from all the branch offices needs to be collated and stored
in a centralized location. Data pertaining to a branch should
be available only to that branch office. However, the head
office should be able to access all the data.
Practice Questions
In addition, Bob also wants that the sales personnel should
be able to access sales data from mobile devices, such as
palmtops and mobile phones. This sales information should
have a brief description of the product, the price, and the
available inventory. Using which of the following markup
languages can Bob achieve the preceding goals?
a. HTML
b. XML
c. SGML
d. EDI
Answer:
b. XML
Practice Questions (Contd.)
Which of the following statement is NOT true about
information modeling?
a. Information Modeling is used to understand the structure and
meaning of information that will be stored in XML documents.
b. Information Modeling helps you identify the objects involved in
an application, the properties of the objects, and the
relationships among them.
c. In an Information Model, each record can contain different data
fields.
d. An information model imposes restrictions on data.
Answer:
d. An information model imposes restrictions on data.
Practice Questions
Which one of the following statements is true about XML?
a. XML is a text-based markup language that provides predefined
tags to store data.
b. XML is a platform-neutral data interchange format.
c. XML requires VAN for data interchange.
d. XML allows you to specify data formatting instructions.
Answer:
b. XML is a platform-neutral data interchange format.
Practice Questions
Which one of the following is a disadvantage of traditional
EDI?
a. It provides fixed transaction sets.
b. It increases the communication lag time between an agency
and a customer.
c. It increases data entry errors.
d. It increases the time taken to process orders.
Answer:
a. It provides fixed transaction sets.
Practice Questions
In this session, you learned that:
EDI refers to the process of exchanging documents in a
standard format between two computer systems.
XML is a text-based markup language that enables you to store
data in a structured format by using meaningful tags.
Using XML in Web architecture enables loose coupling
between the server application and the client application.
XML has the following advantages:
Domain specific vocabulary‑
Data interchange
Smart searches
Granular updates
User selected view of data‑
Message transformation
Summary
In future, XML will be widely used in:
E-commerce
B2B services
Mobile services
EDI and EAI
XML was defined by W3C to ensure that structured data is
uniform and independent of vendors and applications.
In XML, an information model is used to understand the
structure and meaning of information that will be stored in XML
documents.
You can create static, dynamic, or a combination of both these
information models for an XML application.
A static information model helps you define all the objects in an
application and the relationships among them.
Summary (Contd.)
In a dynamic model, data flow diagrams and process diagrams
are used to determine the flow of information.
An XML document consists of:
Processing Instruction (PI)
Tags
Elements
Content
Attributes
Entities
Comments
Summary (Contd.)

More Related Content

What's hot

Mule edifact module
Mule edifact moduleMule edifact module
Mule edifact moduleSon Nguyen
 
Example User Stories Specification for ReqView
Example User Stories Specification for ReqViewExample User Stories Specification for ReqView
Example User Stories Specification for ReqViewEccam
 
Flex And Java Integration
Flex And Java IntegrationFlex And Java Integration
Flex And Java Integrationravinxg
 
Moving from webservices to wcf services
Moving from webservices to wcf servicesMoving from webservices to wcf services
Moving from webservices to wcf servicesBinu Bhasuran
 
ESM_ServiceLayer_DevGuide_1.0.pdf
ESM_ServiceLayer_DevGuide_1.0.pdfESM_ServiceLayer_DevGuide_1.0.pdf
ESM_ServiceLayer_DevGuide_1.0.pdfProtect724v2
 
Flex And Java Integration
Flex And Java IntegrationFlex And Java Integration
Flex And Java Integrationrssharma
 
]project-open[ Extensible Architecture
]project-open[ Extensible Architecture ]project-open[ Extensible Architecture
]project-open[ Extensible Architecture Klaus Hofeditz
 
Flex 3 - Introduction
Flex 3 - IntroductionFlex 3 - Introduction
Flex 3 - Introductionrakhtar
 
Web Service Presentation
Web Service PresentationWeb Service Presentation
Web Service Presentationguest0df6b0
 
Flex And Ria
Flex And RiaFlex And Ria
Flex And Riaravinxg
 
Towards Requirements Management Issues in Excel
Towards Requirements Management Issues in ExcelTowards Requirements Management Issues in Excel
Towards Requirements Management Issues in ExcelEccam
 
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise Applications
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise ApplicationsSerious Sencha - Using Sencha ExtJS/Touch for Enterprise Applications
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise ApplicationsKlaus Hofeditz
 
Visual Studio 2010 IDE Enhancements - Alex Mackey, Readify
Visual Studio 2010 IDE Enhancements - Alex Mackey, ReadifyVisual Studio 2010 IDE Enhancements - Alex Mackey, Readify
Visual Studio 2010 IDE Enhancements - Alex Mackey, ReadifyREADIFY
 

What's hot (20)

Mule edifact module
Mule edifact moduleMule edifact module
Mule edifact module
 
Webapplication ppt prepared by krishna ballabh gupta
Webapplication ppt prepared by krishna ballabh guptaWebapplication ppt prepared by krishna ballabh gupta
Webapplication ppt prepared by krishna ballabh gupta
 
Java unit 4_cs_notes
Java unit 4_cs_notesJava unit 4_cs_notes
Java unit 4_cs_notes
 
J2 ee tutorial ejb
J2 ee tutorial ejbJ2 ee tutorial ejb
J2 ee tutorial ejb
 
Example User Stories Specification for ReqView
Example User Stories Specification for ReqViewExample User Stories Specification for ReqView
Example User Stories Specification for ReqView
 
Flex And Java Integration
Flex And Java IntegrationFlex And Java Integration
Flex And Java Integration
 
Moving from webservices to wcf services
Moving from webservices to wcf servicesMoving from webservices to wcf services
Moving from webservices to wcf services
 
Chapter1
Chapter1Chapter1
Chapter1
 
ESM_ServiceLayer_DevGuide_1.0.pdf
ESM_ServiceLayer_DevGuide_1.0.pdfESM_ServiceLayer_DevGuide_1.0.pdf
ESM_ServiceLayer_DevGuide_1.0.pdf
 
Asp.netrole
Asp.netroleAsp.netrole
Asp.netrole
 
Flex And Java Integration
Flex And Java IntegrationFlex And Java Integration
Flex And Java Integration
 
Overview of web services
Overview of web servicesOverview of web services
Overview of web services
 
]project-open[ Extensible Architecture
]project-open[ Extensible Architecture ]project-open[ Extensible Architecture
]project-open[ Extensible Architecture
 
Java ee introduction
Java ee introductionJava ee introduction
Java ee introduction
 
Flex 3 - Introduction
Flex 3 - IntroductionFlex 3 - Introduction
Flex 3 - Introduction
 
Web Service Presentation
Web Service PresentationWeb Service Presentation
Web Service Presentation
 
Flex And Ria
Flex And RiaFlex And Ria
Flex And Ria
 
Towards Requirements Management Issues in Excel
Towards Requirements Management Issues in ExcelTowards Requirements Management Issues in Excel
Towards Requirements Management Issues in Excel
 
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise Applications
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise ApplicationsSerious Sencha - Using Sencha ExtJS/Touch for Enterprise Applications
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise Applications
 
Visual Studio 2010 IDE Enhancements - Alex Mackey, Readify
Visual Studio 2010 IDE Enhancements - Alex Mackey, ReadifyVisual Studio 2010 IDE Enhancements - Alex Mackey, Readify
Visual Studio 2010 IDE Enhancements - Alex Mackey, Readify
 

Similar to XML Unit 01

A Survey on Heterogeneous Data Exchange using Xml
A Survey on Heterogeneous Data Exchange using XmlA Survey on Heterogeneous Data Exchange using Xml
A Survey on Heterogeneous Data Exchange using XmlIRJET Journal
 
Web based application of Live Scoreboard using XML.
Web based application of Live Scoreboard using XML.Web based application of Live Scoreboard using XML.
Web based application of Live Scoreboard using XML.Uttam Kumar
 
XML - Extensive Markup Language
XML - Extensive Markup LanguageXML - Extensive Markup Language
XML - Extensive Markup Languagewahidullah mudaser
 
Fyp presentation 2 (SQL Converter)
Fyp presentation 2 (SQL Converter)Fyp presentation 2 (SQL Converter)
Fyp presentation 2 (SQL Converter)Muhammad Shafiq
 
ITEC 610 Assingement 1 Essay
ITEC 610 Assingement 1 EssayITEC 610 Assingement 1 Essay
ITEC 610 Assingement 1 EssaySheena Crouch
 
XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7Deniz Kılınç
 
IT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureIT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureMadhu Amarnath
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceijcsa
 
2008 Industry Standards for C2 CDM and Framework
2008 Industry Standards for C2 CDM and Framework2008 Industry Standards for C2 CDM and Framework
2008 Industry Standards for C2 CDM and FrameworkBob Marcus
 
Catalog-based Conversion from Relational Database into XML Schema (XSD)
Catalog-based Conversion from Relational Database into XML Schema (XSD)Catalog-based Conversion from Relational Database into XML Schema (XSD)
Catalog-based Conversion from Relational Database into XML Schema (XSD)CSCJournals
 

Similar to XML Unit 01 (20)

Unit 3 WEB TECHNOLOGIES
Unit 3 WEB TECHNOLOGIES Unit 3 WEB TECHNOLOGIES
Unit 3 WEB TECHNOLOGIES
 
UNIT-1 Web services
UNIT-1 Web servicesUNIT-1 Web services
UNIT-1 Web services
 
A Survey on Heterogeneous Data Exchange using Xml
A Survey on Heterogeneous Data Exchange using XmlA Survey on Heterogeneous Data Exchange using Xml
A Survey on Heterogeneous Data Exchange using Xml
 
Basic concepts of xml
Basic concepts of xmlBasic concepts of xml
Basic concepts of xml
 
XML Introduction
XML IntroductionXML Introduction
XML Introduction
 
Web based application of Live Scoreboard using XML.
Web based application of Live Scoreboard using XML.Web based application of Live Scoreboard using XML.
Web based application of Live Scoreboard using XML.
 
Xml
XmlXml
Xml
 
XML1.pptx
XML1.pptxXML1.pptx
XML1.pptx
 
XML - Extensive Markup Language
XML - Extensive Markup LanguageXML - Extensive Markup Language
XML - Extensive Markup Language
 
01 Xml Begin
01 Xml Begin01 Xml Begin
01 Xml Begin
 
Fyp presentation 2 (SQL Converter)
Fyp presentation 2 (SQL Converter)Fyp presentation 2 (SQL Converter)
Fyp presentation 2 (SQL Converter)
 
ITEC 610 Assingement 1 Essay
ITEC 610 Assingement 1 EssayITEC 610 Assingement 1 Essay
ITEC 610 Assingement 1 Essay
 
XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7
 
IT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureIT6801-Service Oriented Architecture
IT6801-Service Oriented Architecture
 
Full xml
Full xmlFull xml
Full xml
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerce
 
2008 Industry Standards for C2 CDM and Framework
2008 Industry Standards for C2 CDM and Framework2008 Industry Standards for C2 CDM and Framework
2008 Industry Standards for C2 CDM and Framework
 
Differences between HTML and XML.pdf
Differences between HTML and XML.pdfDifferences between HTML and XML.pdf
Differences between HTML and XML.pdf
 
Catalog-based Conversion from Relational Database into XML Schema (XSD)
Catalog-based Conversion from Relational Database into XML Schema (XSD)Catalog-based Conversion from Relational Database into XML Schema (XSD)
Catalog-based Conversion from Relational Database into XML Schema (XSD)
 
5010
50105010
5010
 

More from Prashanth Shivakumar

More from Prashanth Shivakumar (10)

WPF (Windows Presentation Foundation Unit 01)
WPF (Windows Presentation Foundation Unit 01)WPF (Windows Presentation Foundation Unit 01)
WPF (Windows Presentation Foundation Unit 01)
 
VB.Net GUI Unit_01
VB.Net GUI Unit_01VB.Net GUI Unit_01
VB.Net GUI Unit_01
 
UML Unit 01
UML Unit 01UML Unit 01
UML Unit 01
 
Web Component Development with Servlet and JSP Technologies Unit 01
Web Component Development with Servlet and JSP Technologies Unit 01Web Component Development with Servlet and JSP Technologies Unit 01
Web Component Development with Servlet and JSP Technologies Unit 01
 
RDBMS_Unit 01
RDBMS_Unit 01RDBMS_Unit 01
RDBMS_Unit 01
 
J2ME Unit_01
J2ME Unit_01J2ME Unit_01
J2ME Unit_01
 
Data Structures and Algorithms Unit 01
Data Structures and Algorithms Unit 01Data Structures and Algorithms Unit 01
Data Structures and Algorithms Unit 01
 
C++ Unit_01
C++ Unit_01C++ Unit_01
C++ Unit_01
 
Advanced excel unit 01
Advanced excel unit 01Advanced excel unit 01
Advanced excel unit 01
 
C programming unit 01
C programming unit 01C programming unit 01
C programming unit 01
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

XML Unit 01

  • 1. Data interchange is essential to carry out business transactions. However, organizations store data in disparate formats, which makes the process of data interchange complex and time-consuming. Extensible Markup Language (XML) is a standard, simple way of storing the data in a format that can be exchanged across multiple systems across an enterprise. Providing an insight into XML will benefit students as it is a standard technology to describe and define documents. The course is applicable to students who want to create well-formed XML documents. This course introduces students to the fundamentals of XML and enable them to effectively use XML as a markup language to develop Web applications. Rationale
  • 2. In this session, you will learn to: Identify the need for XML as a standard data interchange format Identify the structure of XML documents Objectives
  • 3. Traditionally, preprinted formats were used to exchange information between businesses. Need for a more effective way of communicating and processing business data led to the emergence of Electronic Data Interchange (EDI). EDI refers to the process of exchanging documents in a standard format between two computer systems. EDI has the following limitations: Rigid transaction set Fixed business rules High costs Slow pace of standards evolution Getting Started with XML
  • 4. XML is a text-based markup language that enables storage of data in a structured format. XML is a cross-platform, hardware and software independent markup language that enables structured data transfer between heterogeneous systems. XML is used as a common data interchange format in a number of applications. Let us understand the usage of XML with the help of the diagram. Introducing XML
  • 5. Introducing XML (Contd.) Web Application Web Services . XML Windows Application Mobile Application SQL Server DB2 Oracle Access Data Sources
  • 6. Web Architecture Using XML In a traditional Web architecture, a client sends a request to the server in a pre-defined format and receives the response accordingly. The advantage of using XML in the Web architecture is that the structure of the request can be obtained from the server at run time. XML can encode non-relational data as well as relational data structure. Introducing XML (Contd.)
  • 7. Web Architecture Using XML (Contd.) The following figure depicts the XML Web architecture. Introducing XML (Contd.)
  • 8. Difference Between SGML, HTML, and XML Standard Generalized Markup Language (SGML) allows documents to describe their grammar by specifying the tag set used in the document and the structural relationship that these tags represent. Hypertext Markup Language (HTML) is used for data presentation. XML is used for data description and definition. Introducing XML (Contd.)
  • 9. Difference Between SGML, HTML, and XML (Contd.) Introducing XML (Contd.) SGML HTML XML Extensibility Structure Validation Browser Dependency Cost/Benefit Low High Low Poor Good Medium Yes Yes Yes Yes No Yes Yes No Yes
  • 10. Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Introducing XML (Contd.)
  • 11. Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Introducing XML (Contd.) In HTML, only the predefined tags can be used. In XML, you can create new tags based on the requirements of the application. Various languages such as MathML and WML have been derived from XML.
  • 12. Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Introducing XML (Contd.) XML produces files that are unambiguous, easy to generate, and easy to read. XML provides a structure to store data in textual format, which can then be used as a standard format or protocol for data interchange.
  • 13. Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Introducing XML (Contd.) The flexibility to create user-defined tags in XML enables creation of smart search engines. You can differentiate whether you want do to search based on a text or on a tag, which enables the browser to perform a focused search and return precise information that matches the search query.
  • 14. Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Introducing XML (Contd.) Document updates in HTML are slow as the entire document needs to be refreshed from the server. Document updates in XML are faster as only the changed content needs to be downloaded.
  • 15. Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Introducing XML (Contd.) In HTML, you need to create separate HTML pages to display the same information in different formats while XML concentrates on data and not on its presentation. HTML does not allow conditional formatting of a document while in XML conditional formatting is possible.
  • 16. Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Introducing XML (Contd.) In XML, a message can be stored in the form of a document, object data, or data from a database. XML design provides flexibility while storing data as it does not impose any restriction on the field size and the order in which the data is stored.
  • 17. Future of XML The future uses of XML can be summarized as: XML will be widely used in e-commerce. XML will have a huge core market in the form of Business to Business (B2B). XML will be used for mobile devices due to its ability to easily convert into the appropriate format for any device. XML will be used to solve communication problems in EDI and Enterprise Application Integration (EAI) as it provides interoperability between disparate applications. Introducing XML (Contd.)
  • 18. W3C is responsible for the development of Web specifications that describe communication protocols and technologies for the Web. Due to the flexibility for customization in XML, W3C has laid down these rules that need to be followed by all XML vendors: XML must be directly usable over the Internet. XML must support a wide variety of applications. XML must be compatible with SGML. XML should have absolute minimum number of optional features, ideally zero. XML documents must be human legible and clear. XML design must be formal and concise. XML documents must adhere to a set of constraints called full normalization. Introducing W3C
  • 19. An XML application is considered well designed if it is robust and scalable. To design a robust and scalable XML application, the following steps need to be performed: 1. Create an information model. 2. Identify the required components of the XML document. 3. Create the XML document. Identifying the Structure of XML Documents
  • 20. An information model is a description of the information used in an organization. Information modeling helps identify: Objects involved in an application Properties of the objects Relationships among objects XML provides the following additional capabilities to information modeling: Heterogeneity Extensibility Flexibility Information Modeling Each record can contain different data fields. New data types can be added whenever required.Data fields can vary in size and configuration between instances.
  • 21. Types of information models that can be created for an XML application are: Static model: Helps define all the objects in an application and the relationships among them. Dynamic model: Helps to determine the information flow of an application in the form of messages. Information Modeling (Contd.)
  • 22. The various components of an XML document used for representing data in a hierarchical order are: Processing Instruction (PI) Tags Elements Content Attributes Entities Comments Components of an XML Document
  • 23. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Processing Instruction (PI) Provides information on how the XML file should be processed.
  • 24. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Tags Is a means of identifying data. Tags consist of start tag and end tag.
  • 25. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Root Element Contains all other elements in the document.
  • 26. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Comments Are statements used to explain the XML code.
  • 27. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Child Elements Are the basic units used to identify and describe data in XML.
  • 28. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Attributes Provide additional information about the elements for which they are declared.
  • 29. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Content Refers to the information represented by the elements of an XML document. An element can contain: • Character or data content • Element content • Combination or mixed content
  • 30. <?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is &lt; 200 </DISPLAY> </STORE> </STOREDATA> Components of an XML Document (Contd.) Entities Is a set of information that can be used by specifying a single name.
  • 31. The rules that govern the creation of a well-formed XML document: Every start tag must have an end tag. Empty tags must be closed using a forward slash (/). All attribute values must be given in double quotation marks. Tags must have proper nesting. XML tags are case sensitive. Identifying the Rules for Creating XML Documents
  • 32. Problem Statement: CyberShoppe, Inc. sells toys and books in the United States. It has three branches in different parts of the country. Currently, the three branches maintain data on their local computer systems. The IT manager at CyberShoppe has identified that a centralized data repository on the products sold through its e-commerce site is required. The data from all branches must be collated and housed in a centralized location. This data must be made available to the Accounts and Sales sections at the individual branches, regardless of the hardware and software platforms being used at the branches. In addition, the sales personnel require access to the data using palmtops and cellular phones. The product details of CyberShoppe consist of the product name, a brief description, the price, and the available quantity on hand. A product ID uniquely identifies each product. Demo: Creating an XML Document
  • 33. Consider the following statement: <?xml version="1.0" encoding= "UTF-8"?> Which component of an XML document does the preceding statement represent? a. Element b. Content c. Entity d. Processing Instruction Answer: d. Processing Instruction Practice Questions
  • 34. Bob is the EDP head of an organization that manufactures and sells hardware parts. The organization has presence in all the major cities of the United States. At present, all branch offices maintain their data locally. Bob wants to centralize the repository of data in his organization. Data from all the branch offices needs to be collated and stored in a centralized location. Data pertaining to a branch should be available only to that branch office. However, the head office should be able to access all the data. Practice Questions
  • 35. In addition, Bob also wants that the sales personnel should be able to access sales data from mobile devices, such as palmtops and mobile phones. This sales information should have a brief description of the product, the price, and the available inventory. Using which of the following markup languages can Bob achieve the preceding goals? a. HTML b. XML c. SGML d. EDI Answer: b. XML Practice Questions (Contd.)
  • 36. Which of the following statement is NOT true about information modeling? a. Information Modeling is used to understand the structure and meaning of information that will be stored in XML documents. b. Information Modeling helps you identify the objects involved in an application, the properties of the objects, and the relationships among them. c. In an Information Model, each record can contain different data fields. d. An information model imposes restrictions on data. Answer: d. An information model imposes restrictions on data. Practice Questions
  • 37. Which one of the following statements is true about XML? a. XML is a text-based markup language that provides predefined tags to store data. b. XML is a platform-neutral data interchange format. c. XML requires VAN for data interchange. d. XML allows you to specify data formatting instructions. Answer: b. XML is a platform-neutral data interchange format. Practice Questions
  • 38. Which one of the following is a disadvantage of traditional EDI? a. It provides fixed transaction sets. b. It increases the communication lag time between an agency and a customer. c. It increases data entry errors. d. It increases the time taken to process orders. Answer: a. It provides fixed transaction sets. Practice Questions
  • 39. In this session, you learned that: EDI refers to the process of exchanging documents in a standard format between two computer systems. XML is a text-based markup language that enables you to store data in a structured format by using meaningful tags. Using XML in Web architecture enables loose coupling between the server application and the client application. XML has the following advantages: Domain specific vocabulary‑ Data interchange Smart searches Granular updates User selected view of data‑ Message transformation Summary
  • 40. In future, XML will be widely used in: E-commerce B2B services Mobile services EDI and EAI XML was defined by W3C to ensure that structured data is uniform and independent of vendors and applications. In XML, an information model is used to understand the structure and meaning of information that will be stored in XML documents. You can create static, dynamic, or a combination of both these information models for an XML application. A static information model helps you define all the objects in an application and the relationships among them. Summary (Contd.)
  • 41. In a dynamic model, data flow diagrams and process diagrams are used to determine the flow of information. An XML document consists of: Processing Instruction (PI) Tags Elements Content Attributes Entities Comments Summary (Contd.)

Editor's Notes

  1. Students have learnt the structure of different types of dimensions and the importance of surrogate keys in Module I. In this session, students will learn to load the data into the dimension tables after the data has been transformed in the transformation phase. In addition, students will also learn to update data into these dimension tables. Students already know about different types of dimension tables. Therefore, you can start the session by recapitulating the concepts. Initiate the class by asking the following questions: 1. What are the different types of dimensions? 2. Define flat dimension. 3. What are conformed dimension? 4. Define large dimension. 5. Define small dimension. 6. What is the importance of surrogate key in a dimension table? Students will learn the loading and update strategies theoretically in this session. The demonstration to load and update the data in the dimension table will be covered in next session.
  2. Introduce the students to the course by asking them what they know about forensics. Next, ask the students what they know about system forensics and why is it required in organizations dependent on IT. This could be a brief discussion of about 5 minutes. Lead the discussion to the objectives of this chapter.
  3. Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  4. Hold a two- three minute discussion on the different types of system-related crimes that the students have experienced or heard. At the end of the discussion, give additional examples of system-related crimes.
  5. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  6. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  7. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  8. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  9. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  10. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  11. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  12. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  13. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  14. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  15. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  16. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  17. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
  18. Elaborate on the role that system forensics plays in an organization, based on the discussion in the previous slide and the information given on this slide.
  19. Explain to the students that a system can be secured by sealing the system(s) that have been a part of the crime. This involves: Immediately sealing the system by removing the hard disk and other components of the system. Ensuring that no other routine activity is conducted, using any component of the system. Taking snapshots and back ups of all digital evidences such as documents, system files, and e-mails. Tell the students that the ‘chain of evidence’ is most critical to a system forensic investigation. It helps in reconstructing a crime occurred from the beginning to the end.
  20. Connect the information given on this slide to the initial discussion held on the different types of system-related crimes.
  21. Connect the information given on this slide to the initial discussion held on the different types of system-related crimes.
  22. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  23. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  24. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  25. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  26. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  27. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  28. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  29. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  30. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
  31. Reiterate the concepts taught earlier by asking the given question.
  32. Reiterate the concepts taught earlier by asking the given question.
  33. Reiterate the concepts taught earlier by asking the given question.
  34. Reiterate the concepts taught earlier by asking the given question.
  35. Reiterate the concepts taught earlier by asking the given question.
  36. Reiterate the concepts taught earlier by asking the given question.