xml and societal impacts of it
TRANSCRIPT
![Page 1: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/1.jpg)
eXXtensible MMarkup LLanguage (XML)
By:
Sagar KalraClass:- Xth B
Roll No.:- 38
![Page 2: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/2.jpg)
What is XML?
eXtensible Markup Language A markup language is used to provide
information about a document. Tags are added to the document to provide
the extra information. HTML tags tell a browser how to display the
document. XML tags give a reader some idea what
some of the data means.
![Page 3: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/3.jpg)
Comparisons
Extensible set of tags Content orientated Standard Data
infrastructure Allows multiple
output forms
Fixed set of tags Presentation oriented No data validation
capabilities Single presentation
XML HTML
![Page 4: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/4.jpg)
Authoring XML Elements
An XML element is made up of a start tag, an end tag, and data in between.
Example: <director> Matthew Dunn </director> Example of another element with the same value: <actor> Matthew Dunn </actor> XML tags are case-sensitive: <CITY> <City> <city> XML can abbreviate empty elements, for example: <married> </married> can be abbreviated to <married/>
![Page 5: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/5.jpg)
Attributes In XML Document An attribute is a name-value pair separated
by an equal sign (=). Example:
<City ZIP=“247667”> Roorkee </City> Attributes are used to attach additional,
secondary information to an element.
![Page 6: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/6.jpg)
Guidelines For XML DocumentAuthoring guidelines:
All elements must have an end tag. All elements must be cleanly nested
(overlapping elements are not allowed). All attribute values must be enclosed in
quotation marks. Each document must have a unique first
element, the root node.
![Page 7: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/7.jpg)
Example of an XML Document
<?xml version=“1.0”/>
<address>
<name>Alice Lee</name>
<email>[email protected]</email>
<phone>212-346-1234</phone>
<birthday>1985-03-22</birthday>
</address>
![Page 8: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/8.jpg)
Societal Impacts Of IT
By:- Sagar KalraClass:- Xth BRoll no.:- 39
![Page 9: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/9.jpg)
Increasing Importance Of ITHuge amount of technological
developments that are taking place in IT are bringing about a revolution in the way we work in our society.
Computers are now being used in more and more applications. It is preferred to store information digitally as it is accessible to users worldwide.
![Page 10: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/10.jpg)
Unethical IT Practices
Malware:- Malicious softWARE is a program that is designed with ill intentions and does something undesirable and unexpected in a computer.
Computer Virus:- It is a malware program that is designed to spread from one computer to another and interfere with the computer operations.
![Page 11: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/11.jpg)
Spreading of Computer VirusThrough Infected Pen Drive, CD, and
other storage media.Through InternetThrough E-mailThrough Computer Network.
![Page 12: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/12.jpg)
Actions to prevent Computer VirusUse of Antivirus Program, which is a
software which is designed to prevent, scan and remove the known computer virus.
Don't share Drive C: without a password and without read-only restrictions.
Empty floppy drives of diskettes before turning on computers, especially laptops.
![Page 13: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/13.jpg)
Actions to prevent Computer VirusBack up your important files and ensure
that they can be restored. Change the computer's boot sequence
to always start the PC from its hard drive.
Don’t open an e-mail attachment when you are not expecting it.
![Page 14: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/14.jpg)
Cyber CrimeAny crime committed using computers
and internet is termed as cyber crime.A hacker is a person who breaks into
computers either for profit or is being motivated by the challenge.
A cracker is a technical person who breaks through the system’s security with malicious intentions.
![Page 15: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/15.jpg)
Data BackupBackup is copying data files to disk or
some other storage device, to provide a copy of the data ready to be restored if the original copy is lost, damaged or corrupted.
Backup can be made by using :- Flash USB Drive, CD-RW, DVD, External Hard Disk and Online Backup.
![Page 16: XML and Societal Impacts Of IT](https://reader034.vdocuments.site/reader034/viewer/2022052508/559c949e1a28ab95128b46bf/html5/thumbnails/16.jpg)
Important PointsE-Commerce or Electric Commerce is
doing business online, i.e. via internet.Data Encryption is coding of
information into a symbolic form to disguise and thereby secure it.
Firewall is a software that examines all messages entering or leaving a computer and blocks those who do not meet the specified security criterion