List and describe at least three ways Java applets enhance network security.
Based on the Greiner (2009) article, define an applet and distinguish one from a servlet.
Based on the Van Dam (2007) article, what are applets constructed of? How does this construction affect the efficiency of programming applets