michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

The diagram below illustrates the law of reflection. Which is the angle of reflection? A B C D
The advertising committee for a politician is going door to door and asking people to put a big, ugly election sign on their lawn. If the people refuse, they as
What Structure formed by the crossing over of the optic nerves
_______ laws ensure that workers are paid if they are injured on the job. A) Minimum Wage B) Child Labor C) Union Membership D) Workers' Compensation
Which of the following examples contains foreshadowing? A. Grandma placed a photo of the family at the bench on the mantle. B. The family ate the fresh loaf of
Which of the following is the best paraphrasing of the Heisenberg uncertainty principle? (a) Only if you know the exact position of a particle can you know the
which is the correct course of action to take when you first experience had potential conflict with a coworker? A. tell the person in your uncertain terms that
Write the equation that is the translation of y=|x| right 7 units and down 9 units.
If George the giraffe is 18 feet tall how many inches tall is he
Read the excerpt from Harriet Tubman a life of toil and triumph why was the reward offered for Tubman’s capture