michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

Why are there regional televison networks in españa
The play will be negative 12 degrees tonight, the weatherman predicts it will be 25 degrees warmer by noon tomorrow, what was the temperature be by noon tomorro
who led 300 people out of slavely under the (underground railroad) a. habbit tubman b. aprham licoln c.donald trump d.justin bieber
Graph both functions to find the solution(s) to the system. {f(x)=x+1 g(x)=x2−6x−7   Use the line tool to graph the line. Use the parabola tool to graph the
Lance loaded 89 boxes into his delivery truck in the morning . At 2 o clock that afternoon he had 36 boxes left on the truck . How many boxes had he delivered ?
What is 3 square roots of 2
Please help this is my last question
Suppose that danielle was an eyewitness to a store robbery. she gives the police a description of the criminal: "30-35 year-old male, brown hair, light eyes, ab
on january 1st jennifer puts 1000 in a savings account that earns 4% interest. the inflation rate for the year is 2% on december 31st will jennifer's purchasing
Find the product. Find your answer in exponential form 3^-3 • 3^-5