michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

Can you think of at least 3 ways tephra can be harmful to humans or to the earth
What steps did the Cherokee take to try to resist removal, and what was the result?
33% As A Decimal And Fraction?
help asap 1. Do you think evolution is still taking place in the Galapagos finches? Why or why not? 2. Discuss whether or not human activities lead to speciati
A proportional relationship is represented by the equation 2x = 18y. IF y = kx, where k is the constant of proportionality, find the value of k.
Which of the following questions might someone who is going through a crisis ask himself? (8 points) Choose one answer. a. What will I decide? b. How can I a
A large truck parked on a hill has more ____ energy than a car parked next to it.
15% of 60 and what is a model for it
What was a shortcoming of the Agricultural Adjustment Act (AAA)? It curtailed the agricultural output and affected exports. It brought in mechanization, increas
15% of 60 and what is a model for it