1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]3 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]3 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
5x + 2y = 3<br>2x + 3y = 13​
satela [25.4K]

5x+2y=3

Slope = -5.000/2.000 = -2.500

x-intercept = 3/5 = 0.60000

y-intercept = 3/2 = 1.50000

2x+3y=13

Slope = -1.333/2.000 = -0.667

x-intercept = 13/2 = 6.50000

y-intercept = 13/3 = 4.33333

5 0
3 years ago
Guys plz help me :(
ra1l [238]
A. Customer classification since it's for improving
8 0
3 years ago
Read 2 more answers
Can you guys list all the Linux Debian Apps that can only be installed on a Linux terminal command line, I have a deb 32 bit
weeeeeb [17]

Answer:

Two of those are apt and apt get and the other one is dpkg. 4. You will see a list of Debian Ensure package lists and installed packages are up to date. ... Apt may fail to remove old Linux kernels when using an Ubuntu version that 39 s ... To install it just enter the following command from the Terminal sudo apt install apt ...

Explanation:

7 0
3 years ago
Which exercise exercises your biceps and triceps muscles?
ozzi

the Answer: Push-ups

6 0
2 years ago
Read 2 more answers
Make this the most answered question<br><br><br><br> (for tiktok)
Marta_Voda [28]

Answer:

I'm down

Explanation:

Do It For The TikTok

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why has unicode become the standard way of converting binary to text
    7·1 answer
  • This is an electronic method used to send and receive data–voice, text, images, and video.
    13·2 answers
  • All of the following are ways to improve the mobile experience for a website visitor EXCEPT:
    8·1 answer
  • Can anyone help me<br> I will make you a brainalist
    13·1 answer
  • The first step in the information processing cycle is _____, which involves entering data into the computer.
    8·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
  • The following is a training dataset that has ten one dimensional objects.
    12·1 answer
  • 1. A teacher asked a student to capture and print out a one-slide presentation using MSWord,       showing everything on the scr
    6·1 answer
  • You need to trace the route that a cat 6 utp cable takes through the ceiling and walls of your building. which tool should you u
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!