michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

Which of the following is one way that a few firms can gain some control over their market? secretly cooperate with one another bribe government officials to ha
PLEASE HELP I GIVE THANKS1. __________ is the "set up" where the setting and characters are introduced. (Points : 5) Plot External conflict
How did Stalin and Mussolini maintain their power?
who is Socrates? why was he put on trial? what was the outcome?
22x-14y=65 linear or non linear?
Ethos assures your reader or audience that you have?
is 1/2x=21 42 i need to be sure
What tradition did the Bantu people bring with them throughout their migrations? farming hunting and gathering trading craftsmanship
Which describes the Eastern Woodland Indians? A. depended on buffalo B. lived in wigwams and longhouses C. found ways to farm the desert D. built tall, car
lia is helping her grandmother make holiday bags each bag has 5 color pencils and2/5 oh pencils in each bag are red .what fraction of the pencils in 5 bags is r