michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

what will happen if we drink to much water and how will it effect our bodies
A large area of flat land that has been lifted up above sea level is a(an)?
When two fractions are between 0 ½, how do you know which fraction is greater? Explain
7,3,5,6 using each number only once equal 75 using parentheses
Which of these BEST describes the situation in Cuba following the Revolution of 1959?
Confined aquifers are found _____. above the water table below a permeable layer in the unsaturated zone between two layers of impermeable soil
Which three quantities can be used to calculate acceleration? a. velocity, position and mass b. time, distance and position c. initial velocity, time and for
why do venture capitalist supply money and other support to entrepreneurs?
Most States have some form of ____, which are levied on the earnings of individuals and corporations.
Is 3/6 greater than 0/6