1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
14

What are the consequences of having unprotected Linux operating systems installed on embedded systems?

Computers and Technology
1 answer:
Gennadij [26K]3 years ago
6 0

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

You might be interested in
Which sentence describe internet safety precautions?
koban [17]

Which sentences describe Internet safety precautions? It is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet.

#hope it helps ^_^

mark me as brainliest please

5 0
2 years ago
A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
REY [17]

Answer:

The ledgers are secure, shared, and incorruptible is the correct answer.

6 0
3 years ago
Libby wrote an email to her friend. She pressed Shift and the number key 2 together to enter the email address. Which symbol did
exis [7]

When Libby wrote the email to her friend, she typed the '@' symbol. When pressing SHIFT and 2 together, it pastes this aforementioned symbol. However, there isn't any specific name for the symbol. As a matter as fact, there are several names that this symbol goes by.

The most famous name this symbol is called is the "at symbol" or the "at sign". In terms of a formal name, "commercial at" would be a good one.

Here's an example with the symbol:

[email protected]

This is essentially telling the email server where to send your email. From this, they'll know it's located at brainly.com! It's pretty neat.

4 0
3 years ago
Read 2 more answers
Choose the term to complete the sentence.
netineya [11]

Answer:

raster

Explanation:

-> A <u>raster</u> image consists of a grid of colored pixels.

To choose our answer we can look at the definition for each of the options:

[✘] wireframe - "a skeletal three-dimensional model in which only lines and vertices are represented"

[✘] vector - "denoting a type of graphical representation using straight lines to construct the outlines of objects"

[✔] raster - "a rectangular pattern of parallel scanning lines followed by the electron beam on a television screen or computer monitor'

[✘] rendering - "the processing of an outline image using color and shading to make it appear solid and three-dimensional"

<em>(All definitions are quoted from Oxford Languages)</em>

-> Based on these definitions, raster makes the most sense

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

4 0
2 years ago
Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
creativ13 [48]

Answer:

The answer is "Option c"

Explanation:

The W3C is the framework for the creation of software and the online standards through which sites and webpages work, and to turn into an authoritative source of information, she will work towards getting a reliable and credible source of knowledge from the "World Wide Web Consortium", and the wrong option can be described as follows:

  • In option a, It is wrong because this organization prepares and publishes all the electronic technologies.
  • In option b, It is wrong because it is the laboratory of physics, which is not useful in web development.
  • In option d, This technology is used in TCP/IP protocol, that's why it is incorrect.
3 0
3 years ago
Other questions:
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • What is the main storage location of a computer
    13·1 answer
  • Write a program with a method computeCommission which takes a double that is the salesAmount and returns the commissions for sal
    9·1 answer
  • A prime number is an integer greater than 1 that is evenly divisible by only 1 and itself. For example, the number 5 is prime be
    11·1 answer
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • Which of the following can spreadsheet programs help a person with? (choose all that apply.)
    9·1 answer
  • Questions Presscomion
    9·1 answer
  • Consider the following statement: String myMiddleInitial = “h”;
    15·1 answer
  • The first time that a particular visitor loads a web site page is called a(n) _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!