michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

Write an algebraic equation to match each graph. (These graphs are not drawn to scale!) please help! i will make brainliest answer if correct!
Imagine that your class is planning for an educational tour.Make some point into a couple of paragraphs.You can include:what time you plan to leave,How many of
Can someone plz answer the question ASAP? Thank you. multiple choice answer yes or no
please help me with this math question
What's the valency of sulphur for SO2?​
Steve wants to take charge of his finances. To do so, he must track his income and expenditures. To accurately calculate his take-home pay, Steve must use his _
A cryptarithm is a math puzzle in which the digits in a simple equation are replaced with letters. Each digit is represented by only one letter, and each letter
Explanation please!!!
(I NEED HELP) The data below shows the scores of some students on a test: 23, 27, 21, 20, 25, 31, 22 Which box-and-whisker plot represents the data?
What is a Text Whap​