________ is a short-range wireless technology used to connect peripheral devices

Fill in the blank(s) with correct word


Bluetooth

Computer Science & Information Technology

You might also like to view...

The first expression appearing in the header of a for loop is the ____________, which usually assigns a starting value to a counter variable.

a. update expression b. test expression c. Boolean expression d. initialization expression

Computer Science & Information Technology

Twitter boasts of ________ million users, whereas Tumblr has 150 million users

Fill in the blank(s) with correct word

Computer Science & Information Technology

Symmetric encryption is also called public key cryptography.

a. true b. false

Computer Science & Information Technology

Access control is intended to guard the ____ of information by making it accessible only to authorized users.

A. confidentiality B. availability C. integrity D. non-repudiation

Computer Science & Information Technology