1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]3 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]3 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
In Python write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs
stealth61 [152]

Answer:

l = []

while True:

 no = int(input())

 if no>0:

   l.append(no)

 else:

   break

print(1)

If this helped consider marking this answer as brainliest. Have a good day.

3 0
1 year ago
Learning in a digital environment is also called [blank] learning.
Dafna1 [17]

Answer:

The blank is online learning

4 0
2 years ago
Read 2 more answers
This site isn't letting me add my ans and wut should I do?
kodGreya [7K]
You can probably refresh or log out or something.
4 0
2 years ago
. Network navigation devices, such as routers, help datatravel in bundles that are referred toas………..
nataly862011 [7]

Answer: packets

Explanation:

Network navigation devices, such as routers, help data travel in bundles that are referred to as packets. As, networks that transfer the data in small packets are known as packet switching network and that packets carry the data using the internet and the protocol and each of the packet contain some information and data to navigate.

3 0
3 years ago
Cloud computing service providers manage different computing resources based on the services they offer. Which resources do IaaS
eimsori [14]

Answer:

1. C.operating system

2. A.applications

Explanation:

1. The Iaas is the infrastructure as a service, and storage, server, and network are the infrastructures. However, the Operating System is the platform, and hence it is the correct option for the first blank. We need to understand the exact meaning of the IaaS, PaaS and the SaaS as well as MaaS, to better understand cloud computing.

2. In the second case, we have been asked about the option that is not being covered by the PaaS, and Paas stands for the platform as a service. And the interface, storage, and virtualization is the platform whereas the Applications is an example of software. And it is being managed by SaaS, Hence, the correct option is A. Applications.

7 0
3 years ago
Other questions:
  • Identify the correct software or hardware applications in the passage below
    10·1 answer
  • Discuss why mtv initially had a difficulty securing enough ads
    10·1 answer
  • What is the term used for a set of programs that acts as an interface between the applications that are running on a computer an
    13·1 answer
  • Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t
    10·2 answers
  • The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;
    10·2 answers
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • ________models software in terms similar to those that people use to describe real- world objects.
    6·1 answer
  • Blockquote
    11·1 answer
  • You ping a host on the internet to check for connectivity. Your ping times out, and you get no response. What is most likely the
    8·1 answer
  • Im trying to do an animation only using simplegui in python and my objective is make the ball enters frame, be confused and jump
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!