Which of the following techniques involves sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones and laptops?
A. Bluejacking
B. Bluesmacking
C. Bluebugging
D. BluePrinting
Answer: A. Bluejacking
You might also like to view...
Where visitor enters information. Includes fields, checkboxes, drop-down menus, and radio buttons.
a. Form tag b. Form elements c. Fieldset element d. Legend element
A(n) ____ is useful for seeing a program's overall structure as well as providing a guide for making changes.
A. decision table B. UML diagram C. hierarchy chart D. flowchart
Match the grammar or spelling error with the Office 2013 identification or button to click:
I. you write "there" instead of "their" II. you write "recieve" instead of "receive" III. you leave out a necessary comma IV. you want it to not stop on your name in the future V. you want to bypass all occurrences of "daycare" A. Ignore All B. red wavy underline C. green underline D. blue underline E. Add to Dictionary
A local application is installed on a computer's hard disk.
Answer the following statement true (T) or false (F)