xml and societal impacts of it

Post on 08-Jul-2015

75 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

eXXtensible MMarkup LLanguage (XML)

By:

Sagar KalraClass:- Xth B

Roll No.:- 38

What is XML?

eXtensible Markup Language A markup language is used to provide

information about a document. Tags are added to the document to provide

the extra information. HTML tags tell a browser how to display the

document. XML tags give a reader some idea what

some of the data means.

Comparisons

Extensible set of tags Content orientated Standard Data

infrastructure Allows multiple

output forms

Fixed set of tags Presentation oriented No data validation

capabilities Single presentation

XML HTML

Authoring XML Elements

An XML element is made up of a start tag, an end tag, and data in between.

Example: <director> Matthew Dunn </director> Example of another element with the same value: <actor> Matthew Dunn </actor> XML tags are case-sensitive: <CITY> <City> <city> XML can abbreviate empty elements, for example: <married> </married> can be abbreviated to <married/>

Attributes In XML Document An attribute is a name-value pair separated

by an equal sign (=). Example:

<City ZIP=“247667”> Roorkee </City> Attributes are used to attach additional,

secondary information to an element.

Guidelines For XML DocumentAuthoring guidelines:

All elements must have an end tag. All elements must be cleanly nested

(overlapping elements are not allowed). All attribute values must be enclosed in

quotation marks. Each document must have a unique first

element, the root node.

Example of an XML Document

<?xml version=“1.0”/>

<address>

<name>Alice Lee</name>

<email>alee@aol.com</email>

<phone>212-346-1234</phone>

<birthday>1985-03-22</birthday>

</address>

Societal Impacts Of IT

By:- Sagar KalraClass:- Xth BRoll no.:- 39

Increasing Importance Of ITHuge amount of technological

developments that are taking place in IT are bringing about a revolution in the way we work in our society.

Computers are now being used in more and more applications. It is preferred to store information digitally as it is accessible to users worldwide.

Unethical IT Practices

Malware:- Malicious softWARE is a program that is designed with ill intentions and does something undesirable and unexpected in a computer.

Computer Virus:- It is a malware program that is designed to spread from one computer to another and interfere with the computer operations.

Spreading of Computer VirusThrough Infected Pen Drive, CD, and

other storage media.Through InternetThrough E-mailThrough Computer Network.

Actions to prevent Computer VirusUse of Antivirus Program, which is a

software which is designed to prevent, scan and remove the known computer virus.

Don't share Drive C: without a password and without read-only restrictions.

Empty floppy drives of diskettes before turning on computers, especially laptops.

Actions to prevent Computer VirusBack up your important files and ensure

that they can be restored. Change the computer's boot sequence

to always start the PC from its hard drive.

Don’t open an e-mail attachment when you are not expecting it.

Cyber CrimeAny crime committed using computers

and internet is termed as cyber crime.A hacker is a person who breaks into

computers either for profit or is being motivated by the challenge.

A cracker is a technical person who breaks through the system’s security with malicious intentions.

Data BackupBackup is copying data files to disk or

some other storage device, to provide a copy of the data ready to be restored if the original copy is lost, damaged or corrupted.

Backup can be made by using :- Flash USB Drive, CD-RW, DVD, External Hard Disk and Online Backup.

Important PointsE-Commerce or Electric Commerce is

doing business online, i.e. via internet.Data Encryption is coding of

information into a symbolic form to disguise and thereby secure it.

Firewall is a software that examines all messages entering or leaving a computer and blocks those who do not meet the specified security criterion

top related