michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

18) Which choice shows three lengths that cannot be the lengths of the three sides of a triangle? OA) 10 cm, 9 cm, 3 cm OB) 3 cm, 5 cm, 10 cm OC) 15 cm, 10 cm,
What type of representation of inheritance is shown in the figure?(16.5 Points)Punnett squareflow chartpedigreegraph
What is the area, in square centimeters, of the trapezoid shown below? 3 cm 9 cm 12 cm Please help
A magnified crocodile tongue is an example of multicellular organism true or false
HELP 15 POINTS Write a rule for the nth term of the sequence. Then find a20 - 51,48,45,42
assess the way in which a business would benefit from a low interest rate 6 mark
A student evaluated -4+x for x = -9 1/2and got an answer of 5 1/2? What might th student have done wrong.
For a quadratic equation where: 2++=0 a x 2 + b x + c = 0 Where: 2−4<0 b 2 − 4 a c < 0 How many solutions do you have? State whether the solutions are
d. What is the difference between suspicion and discernment?​
What is the equation in stope intercepe form of the line that passes through the points (-4.47) and (2.-16)​