michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

Historic documents first established the principle of the rule of law?
If something is logically proven true does that mean that it is true in reality
sixty is 5% of what number 1200 12 300 3
Anaerobic prokaryotes use to obtain energy. Archaea and eubacteria are prokaryotic in nature. One of the differentiating characteristics between them is that eu
Mrs. Jacobs purchased a 5 pound package of ground beef for $12.40. She decided to use 8 ounces each day for dinner recipes. What is the cost of the ground beef
What is the factorization of 400 using exponents
simplify the expression below. 10^3 × 10^−7 A. 10^4 B. 10^10 C. 10^−4 D. 10^−21
Phil has 3 times as many rocks as Peter. Together, they have 48 rocks. How many more rocks does Phil have than Peter?
The part of the limbic system that produces hormones is the
Jeremiah is factoring 0.64t^24 - 9 by using the rule, a^2 - b^2 = (a+B)(a-b). What will he use for the value of a? A.0.08t^12 B. 0.8t^12 C. 0.64 D. 0.8 I think