The document body in an XML document is made up of elements that contain data to be stored in the document. Elements are the basic building blocks of XML files. List three important points to remember about XML elements.

What will be an ideal response?


1) Element names are case sensitive, which means that, for example, itemnumber, itemNumber, and ItemNumber are unique elements.
2) Element names must begin with a letter or the underscore character ( _ ) and may not contain blank spaces. Thus, you cannot name an element Item Number, but you can name it Item_Number.
3) Element names cannot begin with the string xml because that group of characters is reserved for special XML commands.
4) The name in an element's closing tag must exactly match the name in the opening tag.
5) Element names can be used more than once, so the element names can mean different things at different points in the hierarchy of an XML document.

Answers may vary. Students can select any three.

Computer Science & Information Technology

You might also like to view...

Reference-type variables (called references) store ________ in memory.

a. the value of an object b. a copy of an object c. the location of an object d. the size of an object

Computer Science & Information Technology

Why is an explicit transaction end statement needed in SQL but not an explicit begin statement?

What will be an ideal response?

Computer Science & Information Technology

The process of managing a database is called database ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

A. The vulnerability scanner is performing an authenticated scan. B. The vulnerability scanner is performing local file integrity checks. C. The vulnerability scanner is performing in network sniffer mode. D. The vulnerability scanner is performing banner grabbing.

Computer Science & Information Technology