michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

A scalene triangle ______ has symmetry with respect to a line containing a median of the triangle. always sometimes never
what specifically does king Affonso say he still needs from the portuguese
which of the following is not true about the Zimmerman note? A. it was an attempt by Germany to form a secret Alliance with Mexico. B. it caused more Americans
At the beginning of the nineteenth century, what was the primary means for transporting goods? canals railroads roads rivers
How do I find the answer on a calculator
In life-threatening circumstances, the instinct to survive overcomes everything else. Which supporting detail from Night by Elie Wiesel reflects the above theme
A wave is incident on the surface of a mirror at an angle of 41° with the normal. What can you say about its angle of reflection? a.)It is less than the angle
If you were forming a company, which department would you create first, and why?
which best describes the difference between expectations for world war 1 and reality of the war
Which actions most likely cause the domains in a ferromagnetic material to align?