1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
4 years ago
7

Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?

Computers and Technology
2 answers:
Butoxors [25]4 years ago
7 0

Some privacy and security challenges while playing battleship on the internet simulator are that :

  • Sometimes another player could gather information that was answered by someone else  to their own benefit.
  • Privacy and security challenges on the internet include the vulnerability of hacking.

Further Explanation:

Hacking could happen through different devices, including a computer and video camera  to even a car.Even with a good protocol, Security Challenges  The Internet Simulator “broadcast” every message to every person in the group. Even with a good  protocol, there are some privacy and security challenges while playing battleship on the internet  simulator. Some of them are:

  • Broadcast mode allows all users to see all of the moves in plain text
  • You do not know exactly who the message came from
  • People can trace you who you are because you are sending a message over the internet

Learn more:

  • Privacy,security and ethical issues related to social networking

        brainly.com/question/12969761

Keywords: privacy, security, simulator, protocol, internet, battleship

sweet [91]4 years ago
3 0
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

You might be interested in
Hello can someone help with the output of this please?
Gelneren [198K]

Answer:

its a diamond shape

Explanation:

i did it on desmos please give brainliest please and good luck :)

8 0
2 years ago
The operation of an enable input on a multiplexer chip is.
Oxana [17]

Answer:

is used to activate the chip.

Explanation:

when enable is high the chip works (ACTIVE), when enable is low the chip does not work (MEMORY).

5 0
3 years ago
Cookies Are Us runs a series of 100 cookie stores across the Midwestern United States and central Canada. At the end of each day
ivanzaharov [21]

Answer:

As we can see that there are limited application requirements in this case, an ordinary broadband would be enough for the file transfer of daily information to the headquarter. If broadband is not available, dial up internet would do the job.

In my opinion Star Architecture could be another option to use in such situations. Start architecture has a dedicated circuit and it has the capability to route all messages from a central location in a network to client computers.

Explanation:

6 0
4 years ago
A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
Oksi-84 [34.3K]

Answer:

Follows are the code to the given question:

def steps_to_miles(user_steps):#defining a method steps_to_miles that takes a variable user_steps

   return user_steps/2000#use return to calculate the steps

user_steps = int(input())#defining a variable user_steps that holds value from the user-end

print('%0.2f' % steps_to_miles(user_steps))#defining print that calls the steps_to_miles method

Output:

5345

2.67

Explanation:

In this code a method "steps_to_miles" that takes "user_steps" in the parameter inside the method a return keyword is used that calculates the user steps and return its values.

Outside the method, a "user_steps" variable is declared that inputs the value from the user-end pass into the method and prints its value.

3 0
3 years ago
If you commit license fraud by using an altered or unlawful license:
Scorpion4ik [409]
<h2>Answer:</h2>

All of these

<h2>Explanation:</h2>

If someone is caught with a fake or altered or unlawful driving license, the law will come in action and the person can be sent to jail for it. He may be fined for an amount depending upon the state law. His driving privilege can also be suspended automatically in some states and the false license will be confiscated so that no one could be able to use it again in any circumstances.

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the curriculum of digital literacy
    6·1 answer
  • In the context of information systems, which of the following is a disadvantage of prototyping? a. A prototype is more difficult
    8·1 answer
  • What is the difference between player-centric game design and designer-centric game design? How does a player-centric game assis
    7·1 answer
  • Managers can use __ software to discuss financial performance with the help of slides and charts
    11·1 answer
  • What type of media is a hard disk​
    9·1 answer
  • Any websites online to make $50 daily?​
    11·1 answer
  • Describing Work Styles for Farmworkers and Laborers, Crop
    6·2 answers
  • 14 Copy a picture of a crane on the next page. Do not trace them. Make a freehand sketch. (2) 2 Look at the placed where the Mar
    11·1 answer
  • You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
    7·1 answer
  • Class ____________ allow you to create one version of a class, without having to replicate code to handle multiple data types.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!