1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]3 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]3 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
kondaur [170]

in c++

...

for(auto& el:hourlyTemp){

std::cout<<el<<", ";

}

...

This is called Range-based loop or for each loop

5 0
4 years ago
How to unlock your iphone when you forgot the password?.
Lena [83]

Answer:

go to customer service

Explanation:

5 0
2 years ago
Brainliest forrrrrrr frrrrrew right herrreeee
nikdorinn [45]

Answer:

Hi!

Explanation:

Thank You So Much For The Points.

5 0
3 years ago
Higher resolution images mean they can be enlarged better, <br> True or false
ella [17]

Answer:

False

Explanation:

High resolution just mean It looks better

6 0
3 years ago
Read 2 more answers
8. SQL, Oracle Report, and Visual Basic are all examples under the
sleet_krkn [62]

SQL, Oracle Report, and Visual Basic are all examples under the generation.

<h3>Fourth generation languages</h3>

Fourth-generation programming language (4GL) are computer programming language based on the advancement on third-generation programming languages (3GL).

4GLs may include support for <em>database management, report generation, mathematical optimization, GUI development, web development.</em>

SQL, Oracle Report, and Visual Basic are all examples under the generation.

Find out more on Fourth generation languages at: brainly.com/question/9325849

3 0
3 years ago
Other questions:
  • Automotive engine cylinder heads can be made of what?
    7·1 answer
  • Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f
    13·1 answer
  • Which of the following factors wouldn't change an account's optimization score?
    7·1 answer
  • What does the machine do and how do the operators react to their work?
    13·1 answer
  • Please answer this a due tomorrow!!!
    5·1 answer
  • Grbn kmjnhbgvfcdxswikmjnthbrvgt
    5·2 answers
  • Fortnite anyone? i just started tdy so dont be judgiee lol
    6·2 answers
  • You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?
    10·1 answer
  • Discuss five processes for analyzing a qualitative study
    11·2 answers
  • . In this project, how many times will the [Drive] block be repeated?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!