1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
14

What are the consequences of having unprotected Linux operating systems installed on embedded systems?

Computers and Technology
1 answer:
Gennadij [26K]3 years ago
6 0

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

You might be interested in
Componets of computer
Temka [501]

The four components of computer are explained clearly.

<u>Explanation:</u>

  • Hardware is the electrical physical parts that a computer system needs to function. It organizes all the process  by a circuit board that operates within a PC or laptop; built with the "motherboard", "graphics card", "CPU (Central Processing Unit)", "ventilation fans", "webcam", "power supply", and so on. Without hardware, there is no means of running the necessary software that makes computers so valuable.
  • Software is a program that facilitates a computer to execute a particular task, as objected to the hardware. Computer software has to be "stored" into the computer's storage (such as a hard drive, memory, or RAM). Working computer systems segment software into three major classes: system software, programming software, and application software.
  • A user is a person who handles a computer or network service. Users of computer and software output regularly require the technical expertise needed to fully know how they operate.
  • Data is defined as bases or figures, or knowledge that's saved in or utilized by a computer. This data will be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be prepared by the CPU and are saved in files and folders on the hard disk.
3 0
3 years ago
What are your thoughts on copyright?<br><br> (Write 2 or more sentences)
victus00 [196]

Answer:

I look down on copyright. To take someone else's work and disguising it as your own seems like a form of theft.

5 0
3 years ago
Read 2 more answers
The first step in the information processing cycle is _____, which involves entering data into the computer.
Dmitry [639]

Answer:

INPUT

Explanation:

Information Processing Cycle is defined as the series of stages followed in processing information. Those stages include:

  • Input
  • Processing
  • Storage
  • Output

Input involve entering the data/information into the computer

Processing involve the computer performing some computation on the data

Storage involve saving the data and/or result to the any medium for future use.

Output involve displaying or presenting the results to the user.

4 0
3 years ago
Which are the top 10 Popular Cars and Video Games get max ammount of point that we can give​
Amiraneli [1.4K]
HAHA UWU XD pogers lol
4 0
2 years ago
Read 2 more answers
What is the output of the following C++ code?
SVETLANKA909090 [29]

Answer:

Your not including anything in your code.

Explanation:

According to your text all you have is #include. You didn't incldue any directives so you will get a error.

6 0
3 years ago
Other questions:
  • Charlie is taking his slide presentation to a meeting at a remote location. He saves his presentation as a package on a CD. Char
    15·2 answers
  • A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
    11·1 answer
  • In the United States, everyone is guaranteed work true or false
    13·1 answer
  • What do you mean by GIGO (Garbage-In-Garbage-Out) in computer system?​
    6·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    6·2 answers
  • Peripeteia is also referred to as __________.
    5·2 answers
  • What would a digitizing application create?
    13·2 answers
  • BRAINLEST AND 20 POINTS! Most GUls provide all of the following except
    6·2 answers
  • 1. Which one of the following is true about screening interviews?
    7·1 answer
  • Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!