michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

Which event marks the beginning of the "rising action" in "The Most Dangerous Game"?
Cone-bearing trees (like pines, spruce and fir) grow best in areas where winters are long and cold. Large mammals like moose, elk and bear also live and thrive
what was America’s most effective weapon in the Cold War
SHE MEANT LIGHT NOT LIFE :)
2. Which word best completes this sentence? ¿Es _____ la tarea de la clase de inglés? A. parece B. complicado C. complicada D. sirve
Mandy is thinking of a prime number that is greater than 41 and less than 47. What is many number
When it's 12 noon in Dallas, what time is it in New York City
Which of the following is not a goal of the Seafood Watch program? a. to promote sustainable fishing b. to identify unsustainable sources of fish c. to increase
Please help: Choose the word that is the antecedent to the underlined pronoun. Rick, bring _your_ basketball to the game on friday. a- Rick b- basketball c-
Approximately what percentage of violent crime in the United States is committed by teens under the age of 18? A. 50 percent B. 25 percent C. 33 percent D.