Problem
A. Name two different network topologies and describe when each would be used most appropriately.
B. What are the differences between Web 2.0 and Web 3.0? How could one benefit from this difference? Provide a concrete example.
C. How has mobile computing changed major firms such as Apple, Google and Microsoft?
D. What are the various methods of safeguarding information in terms of tool selection and usage?
E. Consider a website-based eCommerce application. List the most common threats one faces when accepting credit card payments and describe several approaches for managing each.