michaeltreece1230 michaeltreece1230
  • 04-05-2018
  • Computers and Technology
contestada

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

Respuesta :

fuadsafeer1
fuadsafeer1 fuadsafeer1
  • 06-05-2018
I think it's called NFC
Answer Link

Otras preguntas

Write a function rule that gives a worker’s earnings e(n) for n hours when the worker’s hourly wage is $6.37 A.e(n) = 6.37 + n B.e(n) = 6.37 ÷ n C.e(n) = 6.37n
find BD???????????????
How long will it take Lola to travel from Paris to nice?
In the tragedy of macbeth, act iii, what is the most likely reason that macbeth sends along a third murderer to join the first two in killing banquo? a. macbeth
it rain yesterday after it be dry for many months
In how many ways can ten applicants line up for a job interview?
anybody know this i need help
From what point of view is Anthem told?
!!!HELP!!! Population growth during the Gilded Age was due in large part to A)unemployment among workers. B)an improved food supply. C)better health care. D)imm
which function is the inverse of f(x)=x^2-25