What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

A. Bluesnarfing
B. Bluejacking
C. Bluecracking
D. Bluetalking


Answer: B

Computer Science & Information Technology

You might also like to view...

Instance methods that merely get and return the values of an object's instance variables are called ____ methods.

A. passive B. tester C. temp D. accessor

Computer Science & Information Technology

In the function round of Display 3.6, which of these explains what happens in the body of the function? We reproduce the one line from the function body here:

``` return static_cast(floor(number+0.5)); ``` a) This is overkill, it would be sufficient to use the floor function alone. b) Adding 0.5 to number pushes the range up so floor can produce the correct rounding. c) The static_cast is used because floor returns a double. If the double value were returned, there would be at least a warning of a double to int conversion in returning the value. d) This is wrong. The argument for the floor function should be number-0.5.

Computer Science & Information Technology

Which of the following statements is least likely to be true about a data warehouse?

A. It is constructed for quick searching and ad hoc queries. B. It was an original part of all ERP systems. C. It contains data that are normally extracted periodically from the operating databases. D. It may be deployed by organizations that have not implemented an ERP.

Computer Science & Information Technology

To ensure a unique XML namespace you should use:

a) their Social Security Number b) their address c) an appropriate Web URL d) their last name

Computer Science & Information Technology