michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

The formula C = 20x + 5 models the cost of New York Yankees T-shirts, where C is the cost and x is the number of shirts sold. Choose ALL TRUE statements in the
conversation between Hitler and gandhi
other name for blood
Terri's teacher gives her the equation 3(5)^x=127-2x, and tells her that she will not know how to solve it algebraically. Explain how Terri could use a graph to
The plans for a shed call for a rectangular floor with a perimeter of 204 ft. The length is two times the width. Find the length and width.
How do u write 6 more the 7 times a number is 41 in algebraic equation??
FACTORIZE. 9x2y-24xy2-16y3 solve it
Two 1 litre jugs are each filled with a mixture of olive oil and vinegar. The first jug has 3 times as much as oil as vinegar and the second jug has 4 times as
Which word is an interjection commonly used in advertising?
Buck drove 220 miles in 5 hours. What was his average rate of speed?