1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
4 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]3 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]4 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
umka21 [38]
64 bit the likely hood of it failing is much less
4 0
3 years ago
What technology allows data to be stored in one place and be retrieved by many systems?
Mice21 [21]
ICloud is one of the many different tech options.
Hope I helped,
 Ms. Weasley
4 0
3 years ago
What technique involves graphical methods and nontechnical language that represent the system at various stages of development a
Mnenie [13.5K]

Answer:

The answer to this question this "modeling".

Explanation:

In this question, the answer is modeling because in system design we use System Analysis and Design(SAD). It is the most important subject in any software design like a mobile application, website, web pages, etc. In this subject, there is an important topic that is SDLC. The term SDLC stands for systems development life cycle or it is also known as the software development life cycle. It is a conceptual modeling used in project management that describes the stages involves the information for system development project. It maintenance the complete application. SDLC applied to technical and non-technical systems. In the SDLC many phases can be given as:

Requirement gathering and analysis:

In this phase, all the relevant information is collected from the customer to develop a product as their expectation.

Design:

In the design phase, the requirement gather by the software requirements specification (SRS) in a document that is used for software architecture.

Implementation or coding:

After completing the design phase we implement/coding in that section like User input validation, admin work, payment management, etc.

Testing:

In this section, we test all the things in software before hand over to the customer.

Deployment:

In this section after completing the testing successfully. it goes to the deployment section in this section production environment or User Acceptance testing is done depending on the customer expectation.

Maintenance:

In the maintenance section when the product is hand over customer and in future if any issue comes up and needs to be fixed or there is any Up-gradation is needed So it is done by the developers.

In computer science, any development is done on modules. So the answer to this question is modeling.

3 0
4 years ago
Human centered technology often recommends a0 to computer designers and manufacturers, telling them how to make systems and the
IceJOKER [234]

Human centered technology often recommends best practices to computer designers and manufacturers, ...............

Human-Computer Interaction is a study that particularly focuses more on the design of computer technology and the interaction between humans and computers. Since the 1980s when HCI surfaced, it has become a crucial tool in popularizing the idea that the interaction between a user and a computer should resemble a human-to-human, open-ended dialogue. When HCI is done well, a human-centered approach powers the creation of products that resonates more deeply with a certain audience. This will ultimately drive engagement and growth.

6 0
4 years ago
Read 2 more answers
Which of the following should get a Page Quality (PQ) rating of Low or Lowest?
Luda [366]

Answer:

A page that gets a Didn't Load flag

Pages with an obvious problem with functionality or errors in displaying content

Explanation:

The main reason why a page gets Page Quality rating Low/Lowest is if it can't be shown for one reason or another.

A page with mismatch between the location of the page and the rating location, does have a mismatch but some form of a page is shown.

A file type other than a webpage displays that specific file type in a page framework, so page is shown

Other two do not show a page, so they will get a PQ rating Low/Lowest

7 0
4 years ago
Other questions:
  • Format Painter cannot be used to copy only character attributes. True or False
    12·1 answer
  • A computer that no longer works after having minor repair works done to it may have been damaged by
    8·2 answers
  • List 5 different programming languages calls to print
    8·2 answers
  • A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed
    6·1 answer
  • When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
    7·2 answers
  • ________ uses the signals transmitted over the phone to access the database, retrieve account information and input data. Group
    11·1 answer
  • A debugging process where you, the programmer, pretend you are a computer and step through each statement while recording the va
    11·1 answer
  • Write a program that passes an unspecified number of integers from command line and displays their total.
    5·1 answer
  • For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement
    8·1 answer
  • Colorful bead bracelet in codehs
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!