INTRODUCTION TO COMPUTERS
COMPUTER PERFORMANCE AND RELIABILITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
expensive aonnection kits, possibility of hacked devices
|
|
connectivity needs line of sight, signal absorbed by atmosphere, towers expensive to build
|
|
home use-low volume, high quality sometimes required for photos
|
|
video conferencing, video showing seaside weather to potential tourists
|
Detailed explanation-1: -Integrating encryption and security protocols with IoT devices can be difficult with a large fleet of devices. The cost in time, effort and money to do it on all devices might be prohibitive, so some businesses might use inadequate platforms because they’re cheap or forego it altogether.
Detailed explanation-2: -ATMs: Researchers found many ATMs are on the same network as other IoT devices, such as security cameras. Hackers can use those devices to gain access to ATMs. Printers: When focusing on securing your computer, router, phone and other connected devices, don’t forget that your printer is another vulnerability.
Detailed explanation-3: -Disadvantages of Embedded Systems Limited flexibility: Because embedded systems are made for a specialised purpose, they are less adaptable than general-purpose computers and may have trouble meeting evolving or new needs.