1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
2 years ago
11

The short-range two-way communication technology behind contactless payments is called ____.

Computers and Technology
1 answer:
marshall27 [118]2 years ago
8 0

Answer:

Near-field communication (NFC)

Explanation:

It's a short-range wireless connectivity technology that lets NFC-enabled devices communicate with each other. NFC began in the payment-card industry and is evolving to include applications in numerous industries worldwide.

You might be interested in
What is hub.pls ans from pic. for computers​
schepotkina [342]

<h3>what is hub? </h3>

<h3>✅An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.</h3>
5 0
3 years ago
Read 2 more answers
When you begin creating a new powerpoint presentation, you need to select a ____.?
valina [46]
You would need to select a theme
5 0
3 years ago
Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
Anna71 [15]
Important tools used in the "Define" phase of the DMAIC process include a project charter, a description of customer requirements, process maps, and Voice of the Customer (VOC) data.
6 0
3 years ago
You are part of which sphere of Earth?
Elden [556K]
We are on the lithosphere
4 0
3 years ago
Read 2 more answers
Define text processor​
jenyasd209 [6]

Answer:

The manuplating of text, especially the transformation of text from one format to another.

6 0
3 years ago
Other questions:
  • The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
    11·1 answer
  • For a wire with a circular cross section and a diameter = 3.00mm calculate the following: (m means meter. mm means millimeter. c
    5·1 answer
  • _______For the C programming language, files containing the code you write are named with a file extension of .g. (T/F)
    8·1 answer
  • Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
    13·2 answers
  • When more open-ended questions are asked in a study group, discussions are more likely to
    14·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • Data bars are a form of ________.
    8·2 answers
  • Write down the different types of testing with their definition.
    11·1 answer
  • LaShawn would like to post photos in a social media app, but the program needs to be modified in order to display a greater vari
    12·2 answers
  • What is an Array? 20 POINTS!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!