michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

A motorcycle with an initial value of $14,000 is decreasing in value at a rate of 3% each year. At this rate, approximately what will the value of the motorcycl
The meaning of "apace" as it is used in the opening paragraph of the passage found in the article of "the cost of children" by Ruth Mace
What were some of Genghis Khan’s accomplishments as a ruler?
Structures that have different functions in different species but develop from the same embryonic tissues are called _______________ structures.
What is the factorization of the polynomial graphed below? Assume it has no constant factor. A. (x+5)(x+5) B. (x-5)(x-5) C. x-5 D. x+5
What does the lack of punctuation in William Carlos Williams's "Landscape with the Fall of Icarus" do to the pacing of the poem
Please explain your answer
What acid and base are neutralized to give potassium nitrate salt?
Help me plz Answer ???
ANSWER IF UR SURE 11 Points ANSWER 6 & 7