2. What is XML?
eXtensible Markup Language
A markup language is used to provide
information about a document.
Tags are added to the document to provide
the extra information.
HTML tags tell a browser how to display the
document.
XML tags give a reader some idea what
some of the data means.
3. Comparisons
XML
Extensible set of tags
Content orientated
Standard Data
infrastructure
Allows multiple
output forms
HTML
Fixed set of tags
Presentation oriented
No data validation
capabilities
Single presentation
4. Authoring XML
Elements
An XML element is made up of a start tag, an end
tag, and data in between.
Example:
<director> Matthew Dunn </director>
Example of another element with the same value:
<actor> Matthew Dunn </actor>
XML tags are case-sensitive:
<CITY> <City> <city>
XML can abbreviate empty elements, for example:
<married> </married> can be abbreviated to
<married/>
5. Attributes In XML
Document
An attribute is a name-value pair separated
by an equal sign (=).
Example:
<City ZIP=“247667”> Roorkee </City>
Attributes are used to attach additional,
secondary information to an element.
6. Guidelines For XML
Document
Authoring
All
guidelines:
elements must have an end tag.
All elements must be cleanly nested
(overlapping elements are not allowed).
All attribute values must be enclosed in
quotation marks.
Each document must have a unique first
element, the root node.
7. Example of an XML
Document
<?xml version=“1.0”/>
<address>
<name>Alice Lee</name>
<email>alee@aol.com</email>
<phone>212-346-1234</phone>
<birthday>1985-03-22</birthday>
</address>
9. Increasing Importance Of IT
Huge
amount of technological
developments that are taking place in IT
are bringing about a revolution in the
way we work in our society.
Computers are now being used in more
and more applications. It is preferred to
store information digitally as it is
accessible to users worldwide.
10. Unethical IT Practices
Malware:-
Malicious softWARE is a
program that is designed with ill
intentions and does something
undesirable and unexpected in a
computer.
Computer Virus:- It is a malware
program that is designed to spread from
one computer to another and interfere
with the computer operations.
11. Spreading of Computer Virus
Through
Infected Pen Drive, CD, and
other storage media.
Through Internet
Through E-mail
Through Computer Network.
12. Actions to prevent Computer
Virus
Use
of Antivirus Program, which is a
software which is designed to prevent,
scan and remove the known computer
virus.
Don't share Drive C: without a
password and without read-only
restrictions.
Empty floppy drives of diskettes before
turning on computers, especially
laptops.
13. Actions to prevent Computer
Virus
Back
up your important files and ensure
that they can be restored.
Change the computer's boot sequence
to always start the PC from its hard
drive.
Don’t open an e-mail attachment when
you are not expecting it.
14. Cyber Crime
Any
crime committed using computers
and internet is termed as cyber crime.
A hacker is a person who breaks into
computers either for profit or is being
motivated by the challenge.
A cracker is a technical person who
breaks through the system’s security
with malicious intentions.
15. Data Backup
Backup
is copying data files to disk or
some other storage device, to provide a
copy of the data ready to be restored if
the original copy is lost, damaged or
corrupted.
Backup can be made by using :- Flash
USB Drive, CD-RW, DVD, External
Hard Disk and Online Backup.
16. Important Points
E-Commerce
or Electric Commerce is
doing business online, i.e. via internet.
Data Encryption is coding of
information into a symbolic form to
disguise and thereby secure it.
Firewall is a software that examines all
messages entering or leaving a
computer and blocks those who do not
meet the specified security criterion