michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

why did money cause confusion under the Articles of Confederation/12182902/a2449c9b?utm_source=registration
A box contains 3 blue and 2 red pens while another box contains 2 blue and 5 red pens. a pen drawn at random from one of the boxes turns out to be blue. what is
A result of the media showing the United States the violence against peaceful protestors in Birmingham was
Atomic theory is A. subject to change if new information is discovered. B. a solution to the problem of differing isotopes. C. unchangeable. D. a descriptiv
A male bird shows bright feathers to attract a mate. What type of behavior is this? territorial behavior simulation courtship behavior learned behavior
This unbalanced equation describes a redox reaction. what is the total increase in oxidation number of the species being oxidized? fe2o3(s) + co(g) → fe(s) + co
Which products are greater than 2 5/6? A. 1/8 × 2 5/6 B. 2 5/6 × 2 5/6 C. 2 5/6 × 1 5/8 D. 5/6 × 2 5/6 E. 6/5 × 2 5/6
answer these two questions
Which system of inequalities is represented by the graph?
How are newtons laws used to describe the motion of plants?