Which of the following techniques involves sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones and laptops?
A. Bluejacking
B. Bluesmacking
C. Bluebugging
D. BluePrinting
Answer: A. Bluejacking
Computer Science & Information Technology
You might also like to view...
Write a function that inputs a picture, a color, and a number. The number is the width of a border that you are to draw on all four sides of the picture, with the given color. You can assume that the number will always be an integer less than 50.
What will be an ideal response?
Computer Science & Information Technology
All of the following are properties of Flash documents EXCEPT ____.
A. title B. description C. frame resolution D. Stage size
Computer Science & Information Technology