Problem
1. What response header field is most often required?
2. What important capability is lacking in a markup language?
3. What problem is addressed by using a public-key approach to encryption?
4. Is it practically possible to compute the private key associated with a given public key?
5. What is the difference between a virus and a worm?
6. What appears to motivate a hacker to create and disseminate a virus?