1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
14

What are the consequences of having unprotected Linux operating systems installed on embedded systems?

Computers and Technology
1 answer:
Gennadij [26K]3 years ago
6 0

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

You might be interested in
Which programming component provides a temporary, named storage location in computer memory that cannot change during program ex
Snezhnost [94]

The programming component that has the ability of providing temporary storage location on the computer in which it won’t change as it has been executed or has been running is the main memory. The main memory functions as having to store the program on the computer while the program in the computer has been executed or when it is running.

8 0
4 years ago
which cyber protection condition establishes a protection priority focus on critical and essential functions only
sergiy2304 [10]

INFOCON 1 is the cyber protection condition establishes a protection priority focus on critical and essential functions only.

INFOCON 1 describes the threat level system (defense system) that is used to defend against military attacks and is based fundamentally on the status of information systems i.e. on essential and critical functions of the system.

There are often five levels of INFOCON with INFOCON 1 being an acronym for "information operations condition 1" and is used in the United States of America and is carried out on attacks that were successful and could impact the missions of the Department of Defence and as such is only needed on occasions of extreme cyber risks.

In addition, INFOCON 1 describes the Computer Network Defense system at maximum alertness and any compromised systems in the network are completely isolated from the rest of the network to avoid further damage.

Learn more about cyber protection here: brainly.com/question/25157787?referrer=searchResults

 

3 0
3 years ago
In what year did the manager and team depicted in the blockbuster film "Moneyball
mariarad [96]
2006 is the answer and the boston red sox were the first team to win 5 chamships 
3 0
3 years ago
12. Realizar un algoritmo que genere un número aleatorio, el usuario debe adivinar cual es el número generado para esto tendrá 3
skelet666 [1.2K]

Answer:

Explanation:

El siguiente algoritmo esta escrito en Java y genera un numero aleatorio. Despues le pide al usario que intente adivinar el numero. Si el usario adivina correctamente entoces le dice que fue correcto y termina el programa. Si no adivina bien entonces dice Incorrecto y le pide otra adivinanza al usario hasta llegar a la tercera adivinanza y se termina el programa.

import java.util.Random;

import java.util.Scanner;

class Brainly{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       Random ran = new Random();

       int numero = ran.nextInt(20);

       for (int x = 0; x <= 2; x++) {

           System.out.println("Adivina el numero entre 0 y 20: ");

           int respuesta = in.nextInt();

           if (respuesta == numero) {

               System.out.println("Correcto");

               break;

           } else {

               System.out.println("Incorrecto");

           }

       }

   }

}

3 0
3 years ago
What should you include in a persuasive speech
Vlad [161]

Answer:

Come up with a controversial topic, one that make your listeners think

Research the topic thoroughly that you have chosen

Understand the perspective of your audience. Keep your goal in mind. You are trying to persuade the audience to do or believe something .

7 0
3 years ago
Other questions:
  • WILL MARK BRAINLYIST
    15·2 answers
  • Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to
    14·1 answer
  • Write a program that declares an array of size 1,230 and stores the first 1,230 prime numbers in this array. The program then us
    6·1 answer
  • Which one of the following is not the name of a 20th century school composition
    14·2 answers
  • Which word in brackets is most opposite to the word in capitals? PROSCRIBE (allow, stifle, promote, verify)​
    14·2 answers
  • Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
    5·2 answers
  • Call 334-399-4201 to annoyed my mom
    13·1 answer
  • Mark is looking for a position in the IT field that best matches his qualifications. He has an associate degree in the field and
    6·1 answer
  • Why is it necessary to have usernames and passwords if one is working on a network?​
    12·1 answer
  • What is the role of UPS in Computer security?<br>4 marks answer​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!