michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

You use 3 cans of soup to serve 5 people. If you want to serve 20 people, what should you do?
The minimum or maximum point is also called the _____. vertex, reflection, translation, or function
The volume of a container is 40 cm3. It has a length of 4 cm, a width of 2 cm. What is the height of the container?
Write three numbers greater than 20 that have 9 as a factor
y-3=3(x+1) What is the equation in standard form of a parallel line that passes through (0, -3)
andrew and his father are scuba at -38 feet and tackle box canyon is -83 feet. write an inequality to compare the depths
how many dots belong in the electron dot diagram of a boron atom
How many racial groups existed in Latin America during the 18th century
how did machiavellis work influence political power in the western world
60 divided by 53.4. how to get the answere