Download presentation
Presentation is loading. Please wait.
Published byJoleen Conley Modified over 6 years ago
1
Rationale Data interchange is essential to carry out business transactions. However, organizations store data in disparate formats, which makes the process of data interchange complex and time-consuming. Extensible Markup Language (XML) is a standard, simple way of storing the data in a format that can be exchanged across multiple systems across an enterprise. Providing an insight into XML will benefit students as it is a standard technology to describe and define documents. The course is applicable to students who want to create well-formed XML documents. This course introduces students to the fundamentals of XML and enable them to effectively use XML as a markup language to develop Web applications. Students have learnt the structure of different types of dimensions and the importance of surrogate keys in Module I. In this session, students will learn to load the data into the dimension tables after the data has been transformed in the transformation phase. In addition, students will also learn to update data into these dimension tables. Students already know about different types of dimension tables. Therefore, you can start the session by recapitulating the concepts. Initiate the class by asking the following questions: 1. What are the different types of dimensions? 2. Define flat dimension. 3. What are conformed dimension? 4. Define large dimension. 5. Define small dimension. 6. What is the importance of surrogate key in a dimension table? Students will learn the loading and update strategies theoretically in this session. The demonstration to load and update the data in the dimension table will be covered in next session.
2
In this session, you will learn to:
Objectives In this session, you will learn to: Identify the need for XML as a standard data interchange format Identify the structure of XML documents Introduce the students to the course by asking them what they know about forensics. Next, ask the students what they know about system forensics and why is it required in organizations dependent on IT. This could be a brief discussion of about 5 minutes. Lead the discussion to the objectives of this chapter.
3
Getting Started with XML
Traditionally, preprinted formats were used to exchange information between businesses. Need for a more effective way of communicating and processing business data led to the emergence of Electronic Data Interchange (EDI). EDI refers to the process of exchanging documents in a standard format between two computer systems. EDI has the following limitations: Rigid transaction set Fixed business rules High costs Slow pace of standards evolution Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
4
Let us understand the usage of XML with the help of the diagram.
Introducing XML XML is a text-based markup language that enables storage of data in a structured format. XML is a cross-platform, hardware and software independent markup language that enables structured data transfer between heterogeneous systems. XML is used as a common data interchange format in a number of applications. Let us understand the usage of XML with the help of the diagram. Hold a two- three minute discussion on the different types of system-related crimes that the students have experienced or heard. At the end of the discussion, give additional examples of system-related crimes.
5
Introducing XML (Contd.)
Web Services . Mobile Application Windows Application XML Web Application While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide. SQL Server DB2 Oracle Access Data Sources
6
Introducing XML (Contd.)
Web Architecture Using XML In a traditional Web architecture, a client sends a request to the server in a pre-defined format and receives the response accordingly. The advantage of using XML in the Web architecture is that the structure of the request can be obtained from the server at run time. XML can encode non-relational data as well as relational data structure. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
7
Introducing XML (Contd.)
Web Architecture Using XML (Contd.) The following figure depicts the XML Web architecture. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
8
Introducing XML (Contd.)
Difference Between SGML, HTML, and XML Standard Generalized Markup Language (SGML) allows documents to describe their grammar by specifying the tag set used in the document and the structural relationship that these tags represent. Hypertext Markup Language (HTML) is used for data presentation. XML is used for data description and definition. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
9
Introducing XML (Contd.)
Difference Between SGML, HTML, and XML (Contd.) SGML HTML XML Extensibility Structure Validation Browser Dependency Cost/Benefit Yes Yes Yes Yes No Yes Yes No Yes While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide. Low High Low Poor Good Medium
10
Introducing XML (Contd.)
Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
11
Introducing XML (Contd.)
Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation In HTML, only the predefined tags can be used. In XML, you can create new tags based on the requirements of the application. Various languages such as MathML and WML have been derived from XML. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
12
Introducing XML (Contd.)
Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation XML produces files that are unambiguous, easy to generate, and easy to read. XML provides a structure to store data in textual format, which can then be used as a standard format or protocol for data interchange. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
13
Introducing XML (Contd.)
Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation The flexibility to create user-defined tags in XML enables creation of smart search engines. You can differentiate whether you want do to search based on a text or on a tag, which enables the browser to perform a focused search and return precise information that matches the search query. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
14
Introducing XML (Contd.)
Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation Document updates in HTML are slow as the entire document needs to be refreshed from the server. Document updates in XML are faster as only the changed content needs to be downloaded. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
15
Introducing XML (Contd.)
Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation In HTML, you need to create separate HTML pages to display the same information in different formats while XML concentrates on data and not on its presentation. HTML does not allow conditional formatting of a document while in XML conditional formatting is possible. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
16
Introducing XML (Contd.)
Advantages of XML Some of the advantages of XML are: Domain-specific vocabulary Data interchange Smart searches Granular updates User-selected view of data Message transformation In XML, a message can be stored in the form of a document, object data, or data from a database. XML design provides flexibility while storing data as it does not impose any restriction on the field size and the order in which the data is stored. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
17
Introducing XML (Contd.)
Future of XML The future uses of XML can be summarized as: XML will be widely used in e-commerce. XML will have a huge core market in the form of Business to Business (B2B). XML will be used for mobile devices due to its ability to easily convert into the appropriate format for any device. XML will be used to solve communication problems in EDI and Enterprise Application Integration (EAI) as it provides interoperability between disparate applications. While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.
18
Introducing W3C W3C is responsible for the development of Web specifications that describe communication protocols and technologies for the Web. Due to the flexibility for customization in XML, W3C has laid down these rules that need to be followed by all XML vendors: XML must be directly usable over the Internet. XML must support a wide variety of applications. XML must be compatible with SGML. XML should have absolute minimum number of optional features, ideally zero. XML documents must be human legible and clear. XML design must be formal and concise. XML documents must adhere to a set of constraints called full normalization. Elaborate on the role that system forensics plays in an organization, based on the discussion in the previous slide and the information given on this slide.
19
Identifying the Structure of XML Documents
An XML application is considered well designed if it is robust and scalable. To design a robust and scalable XML application, the following steps need to be performed: Create an information model. Identify the required components of the XML document. Create the XML document. Explain to the students that a system can be secured by sealing the system(s) that have been a part of the crime. This involves: Immediately sealing the system by removing the hard disk and other components of the system. Ensuring that no other routine activity is conducted, using any component of the system. Taking snapshots and back ups of all digital evidences such as documents, system files, and s. Tell the students that the ‘chain of evidence’ is most critical to a system forensic investigation. It helps in reconstructing a crime occurred from the beginning to the end.
20
Information modeling helps identify:
An information model is a description of the information used in an organization. Information modeling helps identify: Objects involved in an application Properties of the objects Relationships among objects XML provides the following additional capabilities to information modeling: Heterogeneity Extensibility Flexibility Each record can contain different data fields. Connect the information given on this slide to the initial discussion held on the different types of system-related crimes. New data types can be added whenever required. Data fields can vary in size and configuration between instances.
21
Information Modeling (Contd.)
Types of information models that can be created for an XML application are: Static model: Helps define all the objects in an application and the relationships among them. Dynamic model: Helps to determine the information flow of an application in the form of messages. Connect the information given on this slide to the initial discussion held on the different types of system-related crimes.
22
Components of an XML Document
The various components of an XML document used for representing data in a hierarchical order are: Processing Instruction (PI) Tags Elements Content Attributes Entities Comments Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
23
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Processing Instruction (PI) Provides information on how the XML file should be processed. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
24
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Tags Is a means of identifying data. Tags consist of start tag and end tag. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
25
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Root Element Contains all other elements in the document. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
26
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Comments Are statements used to explain the XML code. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
27
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Child Elements Are the basic units used to identify and describe data in XML. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
28
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Attributes Provide additional information about the elements for which they are declared. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
29
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Content Refers to the information represented by the elements of an XML document. An element can contain: Character or data content Element content Combination or mixed content Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
30
Components of an XML Document (Contd.)
<?xml version=“1.0” encoding=“UTF-8”?> <STOREDATA> <!--STOREDATA is the root element--> <STORE STOREID=“S101”> <PRODUCTNAME>Toys</PRODUCTNAME> <QUANTITY>100</QUANTITY> <DISPLAY>The price of this toy is < 200 </DISPLAY> </STORE> </STOREDATA> Entities Is a set of information that can be used by specifying a single name. Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
31
Identifying the Rules for Creating XML Documents
The rules that govern the creation of a well-formed XML document: Every start tag must have an end tag. Empty tags must be closed using a forward slash (/). All attribute values must be given in double quotation marks. Tags must have proper nesting. XML tags are case sensitive.
32
Demo: Creating an XML Document
Problem Statement: CyberShoppe, Inc. sells toys and books in the United States. It has three branches in different parts of the country. Currently, the three branches maintain data on their local computer systems. The IT manager at CyberShoppe has identified that a centralized data repository on the products sold through its e-commerce site is required. The data from all branches must be collated and housed in a centralized location. This data must be made available to the Accounts and Sales sections at the individual branches, regardless of the hardware and software platforms being used at the branches. In addition, the sales personnel require access to the data using palmtops and cellular phones. The product details of CyberShoppe consist of the product name, a brief description, the price, and the available quantity on hand. A product ID uniquely identifies each product.
33
Consider the following statement:
Practice Questions Consider the following statement: <?xml version="1.0" encoding= "UTF-8"?> Which component of an XML document does the preceding statement represent? Element Content Entity Processing Instruction Reiterate the concepts taught earlier by asking the given question. Answer: d. Processing Instruction
34
Practice Questions Bob is the EDP head of an organization that manufactures and sells hardware parts. The organization has presence in all the major cities of the United States. At present, all branch offices maintain their data locally. Bob wants to centralize the repository of data in his organization. Data from all the branch offices needs to be collated and stored in a centralized location. Data pertaining to a branch should be available only to that branch office. However, the head office should be able to access all the data. Reiterate the concepts taught earlier by asking the given question.
35
Practice Questions (Contd.)
In addition, Bob also wants that the sales personnel should be able to access sales data from mobile devices, such as palmtops and mobile phones. This sales information should have a brief description of the product, the price, and the available inventory. Using which of the following markup languages can Bob achieve the preceding goals? HTML XML SGML EDI Reiterate the concepts taught earlier by asking the given question. Answer: b. XML
36
Practice Questions Which of the following statement is NOT true about information modeling? a. Information Modeling is used to understand the structure and meaning of information that will be stored in XML documents. b. Information Modeling helps you identify the objects involved in an application, the properties of the objects, and the relationships among them. c. In an Information Model, each record can contain different data fields. d. An information model imposes restrictions on data. Reiterate the concepts taught earlier by asking the given question. Answer: d. An information model imposes restrictions on data.
37
Which one of the following statements is true about XML?
Practice Questions Which one of the following statements is true about XML? a. XML is a text-based markup language that provides predefined tags to store data. b. XML is a platform-neutral data interchange format. c. XML requires VAN for data interchange. d. XML allows you to specify data formatting instructions. Reiterate the concepts taught earlier by asking the given question. Answer: b. XML is a platform-neutral data interchange format.
38
Which one of the following is a disadvantage of traditional EDI?
Practice Questions Which one of the following is a disadvantage of traditional EDI? a. It provides fixed transaction sets. b. It increases the communication lag time between an agency and a customer. c. It increases data entry errors. d. It increases the time taken to process orders. Reiterate the concepts taught earlier by asking the given question. Answer: a. It provides fixed transaction sets.
39
In this session, you learned that:
Summary In this session, you learned that: EDI refers to the process of exchanging documents in a standard format between two computer systems. XML is a text-based markup language that enables you to store data in a structured format by using meaningful tags. Using XML in Web architecture enables loose coupling between the server application and the client application. XML has the following advantages: Domain‑specific vocabulary Data interchange Smart searches Granular updates User‑selected view of data Message transformation
40
Summary (Contd.) In future, XML will be widely used in:
E-commerce B2B services Mobile services EDI and EAI XML was defined by W3C to ensure that structured data is uniform and independent of vendors and applications. In XML, an information model is used to understand the structure and meaning of information that will be stored in XML documents. You can create static, dynamic, or a combination of both these information models for an XML application. A static information model helps you define all the objects in an application and the relationships among them.
41
Summary (Contd.) In a dynamic model, data flow diagrams and process diagrams are used to determine the flow of information. An XML document consists of: Processing Instruction (PI) Tags Elements Content Attributes Entities Comments
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.