SlideShare a Scribd company logo
1 of 16
eXtensible

Markup Language (XML)

By:
Sagar Kalra
Class:- Xth B
Roll No.:- 38
What is XML?
eXtensible Markup Language
 A markup language is used to provide
information about a document.
 Tags are added to the document to provide
the extra information.
 HTML tags tell a browser how to display the
document.
 XML tags give a reader some idea what
some of the data means.

Comparisons

XML
Extensible set of tags
 Content orientated
 Standard Data
infrastructure
 Allows multiple
output forms


HTML
Fixed set of tags
 Presentation oriented
 No data validation
capabilities
 Single presentation

Authoring XML
Elements






An XML element is made up of a start tag, an end
tag, and data in between.
Example:
<director> Matthew Dunn </director>
Example of another element with the same value:
<actor> Matthew Dunn </actor>
XML tags are case-sensitive:
<CITY> <City> <city>
XML can abbreviate empty elements, for example:
<married> </married> can be abbreviated to
<married/>
Attributes In XML
Document
An attribute is a name-value pair separated
by an equal sign (=).
 Example:
<City ZIP=“247667”> Roorkee </City>
 Attributes are used to attach additional,
secondary information to an element.

Guidelines For XML
Document
 Authoring
 All

guidelines:

elements must have an end tag.
 All elements must be cleanly nested
(overlapping elements are not allowed).
 All attribute values must be enclosed in
quotation marks.
 Each document must have a unique first
element, the root node.
Example of an XML
Document
<?xml version=“1.0”/>
<address>
<name>Alice Lee</name>
<email>alee@aol.com</email>
<phone>212-346-1234</phone>
<birthday>1985-03-22</birthday>
</address>
Societal Impacts Of IT

By:- Sagar Kalra
Class:- Xth B
Roll no.:- 39
Increasing Importance Of IT
 Huge

amount of technological
developments that are taking place in IT
are bringing about a revolution in the
way we work in our society.
 Computers are now being used in more
and more applications. It is preferred to
store information digitally as it is
accessible to users worldwide.
Unethical IT Practices
 Malware:-

Malicious softWARE is a
program that is designed with ill
intentions and does something
undesirable and unexpected in a
computer.
 Computer Virus:- It is a malware
program that is designed to spread from
one computer to another and interfere
with the computer operations.
Spreading of Computer Virus
 Through

Infected Pen Drive, CD, and
other storage media.
 Through Internet
 Through E-mail
 Through Computer Network.
Actions to prevent Computer
Virus
 Use

of Antivirus Program, which is a
software which is designed to prevent,
scan and remove the known computer
virus.
 Don't share Drive C: without a
password and without read-only
restrictions.
 Empty floppy drives of diskettes before
turning on computers, especially
laptops.
Actions to prevent Computer
Virus
 Back

up your important files and ensure
that they can be restored.
 Change the computer's boot sequence
to always start the PC from its hard
drive.
 Don’t open an e-mail attachment when
you are not expecting it.
Cyber Crime
 Any

crime committed using computers
and internet is termed as cyber crime.
 A hacker is a person who breaks into
computers either for profit or is being
motivated by the challenge.
 A cracker is a technical person who
breaks through the system’s security
with malicious intentions.
Data Backup
 Backup

is copying data files to disk or
some other storage device, to provide a
copy of the data ready to be restored if
the original copy is lost, damaged or
corrupted.
 Backup can be made by using :- Flash
USB Drive, CD-RW, DVD, External
Hard Disk and Online Backup.
Important Points
 E-Commerce

or Electric Commerce is
doing business online, i.e. via internet.
 Data Encryption is coding of
information into a symbolic form to
disguise and thereby secure it.
 Firewall is a software that examines all
messages entering or leaving a
computer and blocks those who do not
meet the specified security criterion

More Related Content

What's hot

Distributed systems
Distributed systemsDistributed systems
Distributed systemssree kanth
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
Information Technology
Information TechnologyInformation Technology
Information Technologyhari_2u1986
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoMark John Lado, MIT
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2University of Delhi
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Foundation Course: Information Technology_ UNIT -1
Foundation Course: Information Technology_ UNIT -1Foundation Course: Information Technology_ UNIT -1
Foundation Course: Information Technology_ UNIT -1University of Delhi
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information TechnologyRa'Fat Al-Msie'deen
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
 
Information Technology
Information TechnologyInformation Technology
Information Technologyshehzadbilal
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internetFrankie Jones
 

What's hot (20)

Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Notacd05
Notacd05Notacd05
Notacd05
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Foundation Course: Information Technology_ UNIT -1
Foundation Course: Information Technology_ UNIT -1Foundation Course: Information Technology_ UNIT -1
Foundation Course: Information Technology_ UNIT -1
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Notacd01
Notacd01Notacd01
Notacd01
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 

Similar to XML and Societal Impacts Of IT

Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossaryJTHSICT
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Laura Gálvez
 
Ncp computer appls web tech asish
Ncp computer appls  web tech asishNcp computer appls  web tech asish
Ncp computer appls web tech asishNCP
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologiesRajesh R Singh
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologiesRajeshRaushan8
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorialSayeedAsghar
 
Information communication technology.pptx
Information communication technology.pptxInformation communication technology.pptx
Information communication technology.pptxarbsthatyoulove
 
Essential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptxEssential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptxHODCSE74
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
Unit 2 Foc
Unit 2 FocUnit 2 Foc
Unit 2 FocJAYA
 

Similar to XML and Societal Impacts Of IT (20)

Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossary
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
Beekman5 std ppt_10
Beekman5 std ppt_10Beekman5 std ppt_10
Beekman5 std ppt_10
 
Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)
 
Ncp computer appls web tech asish
Ncp computer appls  web tech asishNcp computer appls  web tech asish
Ncp computer appls web tech asish
 
system Security
system Security system Security
system Security
 
Work with Computer
Work with ComputerWork with Computer
Work with Computer
 
Mke15
Mke15Mke15
Mke15
 
IGCSE ICT Theory
IGCSE ICT Theory IGCSE ICT Theory
IGCSE ICT Theory
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologies
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologies
 
8023.ppt
8023.ppt8023.ppt
8023.ppt
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
Ch02
Ch02Ch02
Ch02
 
Information communication technology.pptx
Information communication technology.pptxInformation communication technology.pptx
Information communication technology.pptx
 
Essential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptxEssential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptx
 
Bryanpulido
BryanpulidoBryanpulido
Bryanpulido
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Unit 2 Foc
Unit 2 FocUnit 2 Foc
Unit 2 Foc
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

XML and Societal Impacts Of IT

  • 1. eXtensible Markup Language (XML) By: Sagar Kalra Class:- Xth B Roll No.:- 38
  • 2. What is XML? eXtensible Markup Language  A markup language is used to provide information about a document.  Tags are added to the document to provide the extra information.  HTML tags tell a browser how to display the document.  XML tags give a reader some idea what some of the data means. 
  • 3. Comparisons XML Extensible set of tags  Content orientated  Standard Data infrastructure  Allows multiple output forms  HTML Fixed set of tags  Presentation oriented  No data validation capabilities  Single presentation 
  • 4. Authoring XML Elements      An XML element is made up of a start tag, an end tag, and data in between. Example: <director> Matthew Dunn </director> Example of another element with the same value: <actor> Matthew Dunn </actor> XML tags are case-sensitive: <CITY> <City> <city> XML can abbreviate empty elements, for example: <married> </married> can be abbreviated to <married/>
  • 5. Attributes In XML Document An attribute is a name-value pair separated by an equal sign (=).  Example: <City ZIP=“247667”> Roorkee </City>  Attributes are used to attach additional, secondary information to an element. 
  • 6. Guidelines For XML Document  Authoring  All guidelines: elements must have an end tag.  All elements must be cleanly nested (overlapping elements are not allowed).  All attribute values must be enclosed in quotation marks.  Each document must have a unique first element, the root node.
  • 7. Example of an XML Document <?xml version=“1.0”/> <address> <name>Alice Lee</name> <email>alee@aol.com</email> <phone>212-346-1234</phone> <birthday>1985-03-22</birthday> </address>
  • 8. Societal Impacts Of IT By:- Sagar Kalra Class:- Xth B Roll no.:- 39
  • 9. Increasing Importance Of IT  Huge amount of technological developments that are taking place in IT are bringing about a revolution in the way we work in our society.  Computers are now being used in more and more applications. It is preferred to store information digitally as it is accessible to users worldwide.
  • 10. Unethical IT Practices  Malware:- Malicious softWARE is a program that is designed with ill intentions and does something undesirable and unexpected in a computer.  Computer Virus:- It is a malware program that is designed to spread from one computer to another and interfere with the computer operations.
  • 11. Spreading of Computer Virus  Through Infected Pen Drive, CD, and other storage media.  Through Internet  Through E-mail  Through Computer Network.
  • 12. Actions to prevent Computer Virus  Use of Antivirus Program, which is a software which is designed to prevent, scan and remove the known computer virus.  Don't share Drive C: without a password and without read-only restrictions.  Empty floppy drives of diskettes before turning on computers, especially laptops.
  • 13. Actions to prevent Computer Virus  Back up your important files and ensure that they can be restored.  Change the computer's boot sequence to always start the PC from its hard drive.  Don’t open an e-mail attachment when you are not expecting it.
  • 14. Cyber Crime  Any crime committed using computers and internet is termed as cyber crime.  A hacker is a person who breaks into computers either for profit or is being motivated by the challenge.  A cracker is a technical person who breaks through the system’s security with malicious intentions.
  • 15. Data Backup  Backup is copying data files to disk or some other storage device, to provide a copy of the data ready to be restored if the original copy is lost, damaged or corrupted.  Backup can be made by using :- Flash USB Drive, CD-RW, DVD, External Hard Disk and Online Backup.
  • 16. Important Points  E-Commerce or Electric Commerce is doing business online, i.e. via internet.  Data Encryption is coding of information into a symbolic form to disguise and thereby secure it.  Firewall is a software that examines all messages entering or leaving a computer and blocks those who do not meet the specified security criterion