1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]3 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]3 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
Do all light bulbs server a practical purpose?
Greeley [361]

Answer:

A light bulb produces light from electricity

6 0
3 years ago
your computer is running exceptionally slow. not only does it take the operating system a long time to start, but programs also
aliina [53]

You would want to check for any programs running in the background, as well as run a virus scan.

8 0
2 years ago
Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the f
Andru [333]

user_str1 = str ( input ("Please enter a phrase: "))

user_str2 = str ( input("Please enter a second phrase: "))

def strcmp (word):

user_in1 = int (len(user_str1))

user_in2 = int (len(user_str2))

if user_in1 > user_in2:

return "Your first phrase is longer"

elif user_in1 < user_in2:

return "Your second phrase is longer"

else:

return "Your phrases are of equal length"

3 0
3 years ago
Write multiple if statements: If carYear is before 1967, print "Probably has few safety features." (without quotes). If after 19
Liono4ka [1.6K]

Answer:

public class Main

{

public static void main(String[] args) {

    int carYear = 1995;

   

    if(carYear < 1967)

        System.out.println("Probably has few safety features.");

    if(carYear > 1971)

        System.out.println("Probably has head rests.");

    if(carYear > 1992)

        System.out.println("Probably has anti-lock brakes.");

    if(carYear > 2002)

        System.out.println("Probably has tire-pressure monitor.");

   

}

}

Explanation:

The code is in Java.

Initialize the carYear

Use if statements to handle year before 1967, after 1971, after 1992 and after 2002.

Print the required message for each if statement

5 0
3 years ago
Which rules should be remembered when creating formulas using nested functions? Check all that apply.
White raven [17]

Answer:

Use an equal sign at the beginning of the formula (A)

Use open and close parenthesis for each set of nested functions (B)

Functions should be in CAPS

Separate functions with commas

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • What was the han dynasty and the roman empire known for?
    5·1 answer
  • Which of the following is a characteristic of the internet today? distributed network central hub lack of protocols absence of c
    5·1 answer
  • How people have contributed to the advancement of science
    7·1 answer
  • i see tabs named mowed and Ramsey i tried shredding them and deleting them and ending all the processes but they start duplicati
    13·1 answer
  • What is the difference between simple and complex waveforms?
    10·1 answer
  • House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers.
    11·1 answer
  • Late at night, some traffic signals change patterns and become _____.
    9·2 answers
  • CAD workstations
    11·1 answer
  • In a linked chain implementation of a queue, the performance of the enqueue operation
    14·1 answer
  • By convention only, either the first usable address or the last usable address in a network is assigned to the router (gateway)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!