Sunday, January 26, 2020

The History Of Markup Languages Information Technology Essay

The History Of Markup Languages Information Technology Essay Document markup is a process of writing codes in a document to identify structure and format of a final appearance of a document. Markup was done by copy editor writing instruction on document that was followed by typesetter, before the computerization of printing industry. After computerization, text formatting languages were written. Copy editors markup was converted into the normal markup by a typesetter. When computers spread over the world, people began using word processing software to write documents. Each word processing program had its own feature and technique of markup. All electronic documents which store text use some form of markup. These markups can be visible, hidden or self-generated. Document markup divided into two categories specific markup and generic markup. Specific markup uses instructions which are specific to the certain software that produces document. Generic markup indentifies structure of a document. The beginning of generic markup was macros for typesetting language. Series of commands can be executed by software instruction which called macro. Furthermore, macro keeps track of chapter numbers in document and the change of macro can modify the feature of the chosen chapter. The first presentation about markup languages was made by William Tunnicliffe at Canadian Government Printing Office in 1967. Later in 1969 Raymond Lorie, Edward Mosher, and Charles Goldfarb created Generalized Markup Language (GML). GML was based on ideas of Tunnicliffe. In 1978 GML committee decide to make changes in markup and make it generic. They limited database searches to title by marking title as instead of and . It was a beginning of SGML which was based on both GML and Gencode. SGML was developed during the years and now it is used by major government agencies. HyperText Markup Language (HTML) is a markup language that creates web pages. Nowadays, all web pages are made by using HTML or another language which uses basic elements of HTML. Since 1990 when Tim Berners-Lee invented HTML, this markup language started to advance and now it is the most primary language in a world of web. HTML developed from HTML 1.0 to HTML 4.0 in 7 years. In 1994, first HTML 2.0 document was released First draft HTML 3.0 was released in 1995 In 1996, HTML 3.0 was developed to HTML 3.2 HTML 4.0 was released later in 1997. HTML 4.0 is the current version of HTML. -XML XML was created in 1996 by XML Working Group which was lead by Jon Bosak. The design goal of XML was: XML should be easily accessible over the internet Various applications must be supported by XML XML should be similar to SGML. SGML is another markup language which was created before SGML. More precise information about SGML will be given in the next section XML should be designed brief and official. It should be easy for beginners to create documents in XML XML, Extensible Markup Language, is a standard for document markup which is supported by World Wide Web Consortium (W3C). XML is markup language and a restricted form of Standardized General Markup Language (SGML) which provides a standard format for electronic documents. This format can be easily customized for web sites, vector graphics, object serialization and voice-mail systems. Programs which control data in XML documents can be written by users. So, the availability of libraries in different languages that can write and read XML, allows users to concentrate on the unique needs of their program. Moreover, XML documents can be modified using text editors and web browsers. Data of XML is included as strings of text in this type of documents. XML and HTML documents look similar. However; there are some important differences. First of all, XML is a matemarkup language. That means XML provides sets of elements and tags that can work for everybody in different areas of interest. For example, Chemists can use molecules, atoms and reactions by using appropriate elements. Musicians can use elements notes, lyrics and much more that concerns their job. XML is a language that can be adapted to meet different requirements. Basic unit of data of XML is called an element. XML identify how elements surrounded by tags, the specification of tags and the names which appropriate for elements. The documents which satisfy these requirements are successfully formed; Otherwise documents containing errors will be rejected by XML. Documents in XML are compared with specific scheme. If a document matches scheme then this document considered valid. Invalid documents are not equivalent to scheme, but it is not important for all documents to be valid. There are various XML schemes. Document type definition (DTD) is the mostly supported scheme which is the only scheme that supported by XML 1.0. DTD contains the entire legal markup and identifies places where these markups can be inserted in the document. -SGML Worldwide standard for the explanation of device-independent, system-independent ways if representing texts in electronic form called Standard Generalized Markup Language (SGML). SGML documents are not limited by size and can form an independent unit that transported either electronically or in printed form. SGML documents contain interconnected elements that hold data serving for specific purpose. Document Type Definition (DTD) characterizes documents structure according to the elements it contains and the order of these elements. DTD is linked with a SGML. Within the DTD each element in the document named in order to recognize the role of this element. The recognized elements can form the tags that identify the start and the end of elements, when they placed within markup delimiters. SGML parses must authorize files that positioned into the repository. SGML system can be constructed from interrelated software components. Data repository is a central part of SGML system. Before the documents are dispatched from the repository another validation needed in order to guarantee that referenced data has not been neglected from the transmitted data set. SGML documents can be formatted according to features required by the author. There is a standard for defining: the structure of documents classes; characters for markup, and in the text of document; common text that will be written; special marking up techniques like tag minimization or identification of various versions of document; Attributes qualify some SGML markup tags. These attributes can help to identify specific tags, recall data that is externally stored and indicate the role of elements. Moreover attributes can control the way of presenting text to readers. SGML not only make easy to associate feature to text by short form of tags, but also named character references can be used to demand characters that are not included in character set of word processor. In order to modify SGML-coded document, it needed to be converted into form that word processors can understand. It is a complex process for generalized SGML document and there one application which is specifically designed for converting word -processed text into and out of SGML. This application is called HyperText Markup Language (HTML) that is used on the World Wide Web. -HTML and XHTML HyperText Markup Language (HTML) is the computer program that allows user to create own web page by formatting text and present it to the Internet public. First of all, hypertext and universality are the main qualities of HTML. Hypertext means that it possible to insert a link in a webpage that leads to another webpage. So, it is possible to access information on the internet from various places. Secondly, HTML is universal language, because these types of documents can be accessed from any computer such as Macintosh, UNIX and Microsoft. Special programs were designed in order to read HTML pages. These programs called browsers and the popular ones are Mozilla Firefox, Internet Explorer, Netscape operator and Opera. XML looks like HTML language; However , XML is a language that not only helps to create web pages, but also the program by which author can create his custom markup language to format documents. By using XML It is possible to use written data as custom information and used it further in the text. Nevertheless, XML is not as merciful as HTML. XML need careful coding, since XML is sensitive to upper and lowercase letters, quotations and tags. There is a huge number of HTML pages that can be read by any browser. So, World Wide Web Consortium (W3C) decided to write HTML in XML. This new invention that called XHTML had all features of HTML as well as XMLs power and flexibility. -TEX There are two different categories of text processors: WYSIWYG (what you see is what you get) system. User can see exactly what his document will look like while typing text. Markup system, Authors type text scattered with formatting commands, but they are unable to see appearance of their document while working on text. In order to see final result user must run the program. Since the final product can be seen by author, WYSIWYG systems have the obvious advantage; however, person can easily be distracted by the appearance of the document and will be unable to write the paper effectively. Because of these reasons, people who want academic paper prefer markup systems. TEX is an example of the markup system that was built in early eighteens, before WYSIWYG systems were widespread. Advantages of TEX TEX documents formed by the help of macros, that define format of each component. By the help of macros users dont have to write unnecessary formatting commands. For example, in order to write a footnote it is enough to write footnote command, instead of moving text to the bottom of page. Macros make TEX flexible. By changing definition of certain macro, the appearance of a document can be changed. TEX is easily adaptable, since new commands can be created. In order to print document which is written in TEX, user needs to give the output to a driver program which will convert descriptions into commands that understood by printers. Tex is doesnt rely on technology of printers; you just write a new driver when technology changes. TEX is freely available over the internet. TEX is an ideal program to create academic papers and even books. Disadvantages of TEX First of all, beginners have difficulty at getting used to TEX programming. It is easy to write primary macros, but writing complex macros is not a beginners work. Moreover, memory and design of TEX is limited, it doesnt grow dynamically and it uses only its own fonts. The most spread problem is interactivity of TEX. However, there is a solution to this problem. Many programs that give additional features to TEX are available. For example, Macintosh users can access the program named TEXtures that helps user to: Edit multiple texts at the same time with a multi-window editor; View the output of the program on the screen by the help of previewer; A printer driver; TEX proper. PC clone users can only edit one text at a time. User, should first of all edit a file, then run this document by the help of TEX, afterwards use previewer in order to see the output on the screen. If there are mistakes in the text user must write all of them down then edit file again. Nowadays, most common used systems are WYSIWYG programs that use a TEX engine. User can easily change appearance by few mouse clicks without having any knowledge about TEX.

Saturday, January 18, 2020

Dubai Islamic Bank Essay

The document â€Å"Information Security Policy Framework† focuses on strategy and roles for implementation security policy in â€Å"Dubai Islamic Bank†. Information Security has become and important aspect for the financial institution especially for a bank to protest critical information resources. The importance of this fact needs to be clearly highlighted so that adequate measure can be implemented to ensure that acceptable level of security is in place at the systems and networking level. The policy also addresses the password security guidelines for effective management of passwords associated with user and administrative profiles, network devices and other specialized peripheral devices associated with the infrastructure. Responsibility of the Employees The information security policy should be completely read and its importance should be understood. In case of any queries, write letter to concerned department head. Keep corporate information confidential; don’t share this information with people outside DIB. Maintain confidential of your password. Only you are accountable with all the activities associated with your profile. Be observant look for suspicious activities in your area and report it to your manager for corrective actions. It is the responsibility of every individual to comply with this policy. Non compliance may result in disciplinary action. Components of security policy: The major components of security policy are: ? Risk analysis – identification of critical assets ? Risk management – protection of identified assets. The objective is to make sure that employee’s of the bank should know their roles and responsibilities in protection of information assets and to emphasize the importance of having secured communication. Risk analysis – critical business applications As all functions of DIB are automated, downtime of any system has a direct implication to efficiency and working. Some systems are mission critical as they impact directly to customers. Mission critical application are mentioned as follows, in order of priority. ? Core banking application ? Electronic messaging Risk management Risk management is the process of identifying potential threats. Protection of information resources Information resources including customer information or other critical system parameters should be protected from accidental or intentional modification or disclosure. This includes loss of information physically and logically. Information should be classified with the level of risk associated with it by the business owners. Once the information is classified, appropriate controls should be implemented to protect the information. Internet Security Internet access would be granted to users for business purpose only. Paper information security Confidential information such as account statements, reports, ledgers or customer related information, security policy, corporate policy and procedure etc should be retained in a secure and locked cabinet. Information such as software license or maintenance agreements or information that is highly confidential should be kept securely in safe or fire proof cabinet with combination lock enabled. Never leave your desk unattended for long hours. While dispatching memos / letters internally, It should be marked as â€Å"Confidential† with recipient name and address and should be sealed in an envelop. Information security administration Information technology division reserves the right to assign or revoke user permissions based on approved request and conduct entitlement review. Security officer should be assigned to conduct this task in segregation. The security officer not is involved in performing any transactions that conflict with the security administration function. Security officer is required to review security audit logs, exception handling reports and document any unusual or suspicious activity. Compliance Dubai Islamic branches and corporate office divisions are required to ensure compliance as per the rules and guidelines mentioned in security policy. Divisional heads should have a formal documented process to conduct self-assessment on semi annual basis. These results should be communicated to risk management ream for mitigation activities. Audit and implementation division should reference the security policy while conducting internal audit of branch / divisions. System and operations division should ensure compliance for all the functional unit areas of Dubai Islamic bank. Conduct self-assessment and periodic checks that regulatory and central bank requirements are being adhered to. A process should in place to make sure that whenever a new project is launched, concerned division will ensure and verify that security controls are implemented at the initial phase of the project. Human resource division includes security awareness program as an integral part of training IT quality assurance and compliance manager will ensure compliance of this policy for all systems and technology related platform. Self-assessments and review will be conducted to validate that relevant processes are in place. This unit are will also circulate letters to create awareness among users to follow the security policy and abide by the rules and regulations as defined. In case of any incident or malicious or fraudulent activity, inform your respective manager and divisional head IT for further investigation. Social Engineering Social engineering is the human action of breaking the security. Users should be careful while talking within and outside the organization. Information security can be violated very easily or may fail, if an employee gives away confidential information whether intentional or unintentional. Employees should be careful while talking on telephone and answering questions with unknown recipient or replying back an unknown email message. If a user is not sure whether to answer such a question, he/she should consult the line manager. Information sharing Confidentiality of information should be maintained. This includes information such as PIN codes, TPINS, passwords, customer’s financial statements, bank’s budgetary statements, cash positions are all treated as confidential information and should not be shared among employees. Avoid reading confidential documentation in a public area. The classification for confidential and public / shared information should be classified by information owners. Information that is required to be shared can be circulated in the form of letter or policy document or can be uploaded on internet. Access rights should be implemented so that unauthorized people does not go through the information that is meant for some specific people. Employees can share information only if they have valid business reason. Installation of software applications Application / software installed on corporate systems should be licensed. Unlicensed software should not be installed on any system. all software installations would be carried out by the IT support staff by ensuring first that the said software fulfills the obligations of software licensing. For third party software installations, the IT support staff would accompany such individuals with prior scheduling and reviewing all hardware requirements and post implementation impacts. Users would be restricted from downloading and installing software, freeware and shareware or evaluation copy of software on corporate laptops / workstations. This increase the chance of installing virus or Trojan thus compromising critical corporate resources. Only standard corporate software on approved list should be installed and accessed. In case there is a requirement to install application other than approved software then deviation should be filed and approved by divisional head IT and subsequent approvals from group head IT. Users are not allowed to download and install flashy screen saves and desktop backgrounds, only windows default settings should be used. User of external media Domain recipients are not allowed to connect personal laptop or workstation on the DIB network. Only corporate equipment should be connected on corporate network. Any such attempt would be taken up as an attempt to sabotage the network. Use of removable media such as floppy disk, CDs, DVDs, flash drives via USB port or any other external media on DIB domain is strictly prohibited. In case if there is any business requirement the same may be forwarded to the information technology division or for scanning and uploading of document in a shred folder with restricted access rights. Use of modems of any sort on the corporate workstations/ laptops and dialing out via internet over corporate network is strictly prohibited. Should there be business requirements to do so; the said workstation would NOT be allowed to connect to the corporate network.

Friday, January 10, 2020

House Overwhelmingly Approves K to 12 Bill on Third and Final Reading Essay

A bill that will ensure the continuity of K to 12 and its corresponding funding by the state has been approved overwhelmingly by the House of Representatives by a vote of 190 in favor and eight against. The Enhanced Basic Education Act of 2012, or House Bill 6643, was approved on third reading yesterday. It will then be reconciled with the Senate version for amendments and improvements until it becomes a law. Education Secretary Br. Armin Luistro FSC said that DepEd is thankful for the support of the lawmakers in spearheading legislation that will open more opportunities to the Filipino youth by way of an education system that is relevant to the learners, the community, and industries. â€Å"We are getting closer to our goal of putting in place a basic education system that responds directly to what our learners need and to what the employment and entrepreneurship sectors require, even as it gives enough preparation for students who are geared for higher education,† added Luistro. K to 12 starts with Univeral Kindergarten which mandates all public elementary schools to offer kindergarten class and accept 5-year old learners beginning 2011. It is followed by six years of Elementary, four years of Junior High School, and two years of Senior High School where students will pursue their preferred career track depending on their skills and inclination. K to 12 does not preclude students from pursuing a college degree and gives them better preparation for the rigors of higher learning. Luistro has expressed his appreciation to the K to 12 proponents in the House of Representatives, especially Rep. Rosenda Ann Ocampo, Committee on Basic Education and Culture Presiding Officer, Speaker Feliciano Belmonte, and the late Salvador Escudero III. The K to 12 bill in the Senate is being championed by Senator Edgardo Angara. A most recent survey conducted by the Social Weather Station revealed that majority of the respondents approved of K to 12 and are confident that it will bring the much-needed reform in the country’s educational system.

Thursday, January 2, 2020

Conflict Between The People, Requiring Body And The...

CHAPTER VII POTENTIAL SOLUTIONS TO THE LAND ACQUISITION CONUNDRUM The above study on land acquisition points to three broad areas of conflict between the people, requiring body and the government. They are: (1) Evaluation of the purpose and necessity of acquisition; (2) Enumeration of the population that will be disadvantaged because of the acquisition; and (3) Assessment of the quality of land, calculation of compensation payable thereof and the manner in which people are to be compensated. An alternative paradigm could involve division of the acquisition process into three mutually exclusive but logically integrated stages. (a) Pre-acquisition stage or the preparatory stage (b) Acquisition stage or the executive stage, and (c) Post-acquisition stage or ameliorative stage. As discussed herein above, the three broad areas of conflict between the people, requiring body and the Government are evaluation of the purpose and necessity of acquisition, enumeration of the population and assessment of compensation payable these can be dealt with in the preparatory stage. The legal process of acquisition and transfer of land can be accomplished in the executive stage, while the socio-economic problems and psychological trauma of forced displacement or loss livelihood can be dealt with in the ameliorative stage. The advantages of dividing the process into three distinct stages are: firstly, it will allow for effective transfer of work to specialists, now that it isShow MoreRelatedToms of Maine Case Study666 Words   |  3 Pagesorganization such as; the customers, the suppliers, the stakeholders, community and the government. This will create the moral foundation where the operations of the company will be based on. Also, Tom and Kate Chappell believe it is crucial not to compromise your beliefs in order to turn a profit. The Chappell’s expressed strong personal values of respect for both people and nature. Through conflicts between the companies’ new talent and the Chappell’s, Tom enrolled at Harvard Divinity School whereRead MoreThe Quality Of The American Government1394 Words   |  6 PagesBailey Kelso Professor Garvin POLS 101 9 August 2015 The Quality of the American Government Ever since the government was put in place in America, two fundamental questions have emerged distinctly: how should the government rule its followers? Moreover, what should the government do? America gained independence in 1776 after Richard Henry Lee moved a motion in the Continental Congress requiring Britain to grant the country its independence. The motion was approved on July, 2nd the same year. ThomasRead MoreThe Ancient Roman Empire1518 Words   |  6 Pagesof sizeable portions of the world that ran from the Mediterranean Sea to areas surrounding continental Europe and the Middle East. It was the largest spanning empire the world had ever seen and succeeded in cultural control on the lands and of the people, lasting centuries. The Roman republic lasted from 507 to 31 BCE, the Republic unlike other major historic civilisations, was not run on the idea of democracy. The word Republic comes from the Latin word, res publica. This translates into publicRead MoreEquality Between Men And Women1263 Words   |  6 Pagespriorities to ensure equality between men and women in all sections of national life.† referring to the proposal for a Commission, report says, â€Å"we have given Consideration to this type at the State and National levels. We also believe it was imperative for such commission to have certain recommendatory powers as well as statutory autonomous status if they are to be effective in their functions.† The NCW’s structure is a top down institution with Central Government at its nodal point. The powerRead MoreThe Argument Against Ban On Tobacco Related Advertising850 Words   |  4 Pagesyouth targeted advertising campaigns are wrong and the tobacco industry’s own released documents indicate that the 14-24 year old demographic is targeted as â€Å"tomorrow’s cigarette business†, these campaigns need to stop to reduce the number of young people getting addicted to cigarettes. Fifth, policies aimed at reducing tobacco use are forecast to increase employment despite the tobacco industry itself contracting due to the fact that the money spent on tobacco products does not leave the economy ifRead MoreVisa Regulations : A Balancing Act Essay1339 Words   |  6 Pagesstrategic campaigns â€Å"Tourism for Tomorrow† and â€Å"Policies for growth†, the â€Å"Freedom to Travel† campaign takes a major part in the communication and negation betw een the World Travel Tourism Council (WTTC), the World Tourism Organization (UNWTO) and other tourism stakeholders, predominantly the governmental level. â€Å"Ensuring the right of people to travel safe, securely and efficiently across international borders† (WTTC, 2014, p. 10) is the mission statement of this campaign that aims to support theRead MoreEssay about The Ethical Roles of the Government in Medical Practice1579 Words   |  7 PagesThe ethical roles of the government as it pertains to the rights of medical practice are a slippery slope. One may argue â€Å"How can the government make decisions based solely upon the best interest of itself†. With this being focused mostly in regards to it’s stances on abortion and the rights of doctors to make ethical and moral decisions on whether or not they want to practice abortions in their clinic. While bearing in mind ethical values relating to medical practices, the role of conscience isRead MoreU.s. China R elations With China1217 Words   |  5 Pagesterritories between Japan and Taiwan. Additionally, in 2013 it implemented air identification zone (ADZ) over the East China Sea, which also covers Japan and Republic of Korea territory. Per China’s ADZ, â€Å"all aircraft entering the zone must notify Chinese authorities and are subject to emergency military measures if they do not identify themselves or obey orders from Beijing† (American Greatness, 2013). Manu believed the announcement of the ADIZ increased the possibility of tension between both JapanRead MoreEssay Brave New World by Aldous Huxley847 Words   |  4 PagesAfraid New World Aldous Huxley’s â€Å"Brave New World† highlights the theme of society and individualism. Huxley uses the future world and its inhabitants to represents conflict of how the replacement of stability in place of individualism produces adverse side effects. Each society has individuals ranging from various jobs and occupations and diverse personalities and thoughts. Every member contributes to society in his or her own way. However, when people’s individuality is repressed, the whole conceptRead MoreThe Founding Of The Constitution Act1373 Words   |  6 PagesConstitution Act, 1982 is inarguably a highly significant event in Canada’s political history, and has impacted the political and legal landscape in numerous ways. The Charter of Rights and Freedoms regulates interaction and communication between the government and individuals, granting them with much needed protection of their rights and freedoms. Needless to say, these rights and freedoms are a crit ical part of the democratic political system and it is believed by many that the Charter is one of