IT430 Final 2010 by Adnan Awan
IT430 Final 2010 by Adnan Awan
IT430 Final 2010 by Adnan Awan
By Adnan Awan
► Child element
► Root element
► <?xml version="1.0"?>
► <XM
► Advertising
► Patents
► Infrastructure
► Capital
► Cyber banking
► Virtual banking
► Online banking
► All of above
► Browsers
► Buyers
► Shoppers
► Seller
IP addressing
It is the logical addressing scheme used to identify computer machines on
the internet. Each computer
has a unique IP address provided by IP protocol for a given session. It is
represented by four decimal
numbers separated by a period e.g, 140.57.220.200 (see Fig. 5 below).
Computers see this
information as a stream of 32 bits.
Hackers
Hackers or crackers are those individuals who write programs or manipulate
technologies to gain unauthorized access to computers and networks.
The advantage of using symmetric key is that since symmetric algorithms are
faster as compared to asymmetric,
Log files consist of data generated by site visits and include information
about each visitor’s location.
Page # 150
SAP is an example of ERP software. ERP is complex. It is not intended for public
consumption as proper integration of ERP with ecommerce applications is still a
major problem.