1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
4 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]4 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]4 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
Which of the following qualifies as a teamwork skill? A. Free associating B. Multitasking C. Listening D. Problem solving
NeX [460]

There are certain skills that are required to be a good team member or team leader. A main characteristic of the required skills would be those that can be used in interacting with other people, since that is a main feature when working in teams.

From the given options, only one skill would be most suitable to be used when dealing with other people, which is (C) listening.  

4 0
4 years ago
30 points!!! Which type of a network is the Internet?
Eva8 [605]

Answer:

Wide Area Network or Public WAN

Explanation:

8 0
4 years ago
Read 2 more answers
Pierre received an urgent email appearing to come from his boss asking him to respond quickly to the email with the company cred
Wewaii [24]

Answer:

This is a Phishing email

Explanation:

Pierre has received a phishing email from a certain scammer. These kinds of emails are an attempt from the scammer to fool the receivers like in this case Pierre and get the personal and financial information that they can use to steal the money from their account. It's hence, a fraudulent attempt to steal the money from the account of a certain person like here it is Pierre.

4 0
3 years ago
What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
Sati [7]

Question with options:

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

-private

-web server

-public web

-web client

Answer:

Web server digital certificate such as SSL(Secure Sockets Layer) Certificate

Explanation:

Digital certificates are certificates issued by trusted authorities (called Certificate Authority such as Encrypt Certificate Authority) and allow users determine the originality of a resource. With these certificates, users can confirm who the issuer of the certificate is and to whom the certificates are issued. They give users more confidence when using the web.

To determine the authenticity of a web server to a client, a web server digital certificate such as SSL certificate is used.

8 0
3 years ago
Circle class
NISA [10]

Answer:

What was the actual the question? I am confused.

Explanation:

4 0
3 years ago
Other questions:
  • A company wants to build a webpage that displays KPIs that can be derived from values in datasets stored in Einstein Analytics.
    6·1 answer
  • Can you give me a long list of old kid's cartoons
    8·1 answer
  • Which headphone is better for music
    7·1 answer
  • Write a function called median, that takes as parameter a full, sorted array of doubles and returns the median of the list. For
    15·1 answer
  • What is looping in QBASIC​
    9·1 answer
  • Which are SD card types? Choose two answers.<br> Macro-SD<br> Max-SD<br> MicroSD<br> MiniSD
    5·2 answers
  • Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order func
    9·1 answer
  • On what basis can you categorize the generations of computers?
    11·1 answer
  • Which should be your first choice for the most efficient and successful job search method?
    10·1 answer
  • An unauthorized user is a network _______ issue.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!