michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

The weather has been so ______lately that I'm not sure whether to wear shorts or a down jacket.
You stand at base camp and look up at the summit of the mountain you are about to climb. The angle of elevation to the top is 15°. You are 5 miles from the poin
The sale of government owned business to private investors in known as options 1.capitalization 2.divestiture 3.privatization 4.acquisition
Sociologists recognize two basic types of stratification. a. true b. false
Breakfast-skippers commonly struggle more with ______________ than do breakfast eaters. a. muscle exhaustion b. body fatness c. iron deficiency d. hypertens
evidence supporting a claim and counterclaim in an argument can be based on an appeal to emotion. this type of appeal is calleda. ethosb. logosc. pathosd. evide
What is a teleprompter?
what does drowsiness affect when you drive
who was responsible for the start of the cold war
The samurai in Feudal Japan were similar to what social class in Feudal Europe? King Knights Lords Merchants