michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

WILL GIVE BRAINLIEST IF FAST!! GIVE GOOD REVIEWS FOR CORRECT ANSWERS!
Rewards and Punishment examples
True or False: Coastal Tribes such as the Makah, hunted sea mammals. * 1 point True False Which statement best describes how Native Americans provided food for
Which expression is equivalent to the area of square A, in square inches? 1/2(10)(24) 10(24) (10+24)^2 10^2+24^2
draw the net of cube and square pyramid​
A sample of a radioactive isotope had an initial mass of 110 mg in the year 1990 and decays exponentially over time. A measurement in the year 1993 found that t
Write the statements P, q, and r. Use symbols to write the logical form of each argument. Identify the form of each argument. Construct a truth table and state
Progression is... the training load expressed as resistance, speed or heart rate a gradual increase in one or more of the FITT variables to create an overload e
what is the lcf of 4 and 5
Internet communication is a revolution in the field of communication. Justify​