Computer Networks Bluetooth
Q Unauthorised access of information from a wireless device through a bluetooth connection is called _________
  • A A. Bluemaking
  • B B. Bluesnarfing
  • C C. Bluestring
  • D D. Bluescoping
Leave a Comment