Which of the following techniques involves sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones and laptops?

A. Bluejacking
B. Bluesmacking
C. Bluebugging
D. BluePrinting


Answer: A. Bluejacking

Computer Science & Information Technology

You might also like to view...

Where visitor enters information. Includes fields, checkboxes, drop-down menus, and radio buttons.

a. Form tag b. Form elements c. Fieldset element d. Legend element

Computer Science & Information Technology

A(n) ____ is useful for seeing a program's overall structure as well as providing a guide for making changes.

A. decision table B. UML diagram C. hierarchy chart D. flowchart

Computer Science & Information Technology

Match the grammar or spelling error with the Office 2013 identification or button to click:

I. you write "there" instead of "their" II. you write "recieve" instead of "receive" III. you leave out a necessary comma IV. you want it to not stop on your name in the future V. you want to bypass all occurrences of "daycare" A. Ignore All B. red wavy underline C. green underline D. blue underline E. Add to Dictionary

Computer Science & Information Technology

A local application is installed on a computer's hard disk.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology