1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]3 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]3 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
Int [] val = { 3, 10, 44 };
irina1246 [14]

Answer:

5) 3 0 0

Explanation:

Given data

int [] val = { 3, 10, 44 };

The total number of parameters of given array are 3, so total length of array is also 3.

The indexing of array starts with '0', Therefore the indexes of array with length zero are: {0,1,2}

The value of array at index 0 is = 3

similarly

value at index 1 = 10

value at index 2 = 44

Here, Int i = 1 is storing the value '1' in integer variable i.

In addition to that, any value of index 'i' of an array is selected using array[i].

Therefore,

val[i] = i-1 is copying the value (i-1 = 1-1 = 0) to the index '1'  of the array because i = 1.

So value at index 1 would be = val[1] = 0

The term i++ is incrementing the value of i, it makes i =2

val[i] = i-1 is copying the value (i-1 = 1-1 = 0) to the index '2' of the array because i = 2 now.

So value at index 2 would be = val[2] = 0

Hence, the output would be {3 0 0}. So 5th option is correct.

4 0
3 years ago
(Game Design) Creating and manipulating data structures is one of the primary functions of a development environment.
Galina-37 [17]

true i believe im not for sure

7 0
3 years ago
Read 2 more answers
Your mother is sure that you were driving too fast because she knows
Klio2033 [76]

I think the corret answer would be C

5 0
3 years ago
Read 2 more answers
OO<br>(A) 3 and 5<br>(B) 4 and 8<br>(C) 2 and 0<br>(D) 6 and 9<br>2. There are twelve books on a shelf and four children in a ro
dlinn [17]

Explanation:

2.there will be 8 books left on the shelf if each child takes one

8 0
3 years ago
(Giving brainliest to best answer, don't make an answer if you don't know or its jumble)
dolphi86 [110]

Answer:

B

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What information is required for a complete citation of a website source?
    8·2 answers
  • At the moment i am tackling the cs50x projects and i need a little bit of help with problem set 1, the 'greedy algorithm'. I am
    5·1 answer
  • In short and brave what is technology?
    9·2 answers
  • Compressing a file is also called
    9·2 answers
  • as the reader, you can figure out the writer's ____ based on his or her word choice and sentence structure a. purpose b. audienc
    11·1 answer
  • Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commissio
    5·1 answer
  • If Laura wanted to solve a problem using recursion where the last statement executed is the call to the same method, what type o
    8·1 answer
  • What is the output?
    7·1 answer
  • READ CAREFULLY! There is a difference between moving and copying files.a. Create a directory named . For example, mine would be
    7·1 answer
  • Consider the steps for debugging. First, you should
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!