Which of the following techniques involves sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones and laptops?

A. Bluejacking
B. Bluesmacking
C. Bluebugging
D. BluePrinting

Answer: A. Bluejacking

Computer Science & Information Technology

You might also like to view...

Write a function that inputs a picture, a color, and a number. The number is the width of a border that you are to draw on all four sides of the picture, with the given color. You can assume that the number will always be an integer less than 50.

What will be an ideal response?

Computer Science & Information Technology

All of the following are properties of Flash documents EXCEPT ____.

A. title B. description C. frame resolution D. Stage size

Computer Science & Information Technology