michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

In a P.7 class, 20% of the boys were absent for the Mock Examinations, of the remainder of the boys were present Find the fraction of the girls in the class.​
How are alleles for the same gene related? OA. They have the same genetic sequence but are found in different individuals. B. They have different genetic sequen
Which pattern below does not follow the same rule as the other three patterns? A $2$ , $4$ , $8$ , $16$ , $32$ 2, 4, 8, 16, 32, B $5$ , $10$ , $20$ , $40$ , $80
How has British rule affected India?
Help pleaseeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee PROBLEMS 1) Add the following: 30 mg, 2.5 kg and 7.0 g. Express the answer in g. 2) Expre
The volume of a pyramid whose base is a right triangle is 680 units. if the two legs of the right triangle measure 15 units and 16 units, find the height of the
What is semi-tractor and trailer can be use for?
All the real zeros of the given polynomial are integers. Find the zeros. P(x) = x³ + 4x2 - 19x + 14 X =
find the circumference of an object. use 3.14 or 22/7 for pi. round to the nearest hundredth if necessary. 9 cm​
What is the difference between data and information?