1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
6

A user wants to quickly share pictures between mobile devices. The devices will be in close proximity so the necessity of a thir

d party service and/or another networking device is not required. Which of the following is the best option for this scenario?
Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
8 0

Answer:

NFC(Near Field Communication).

Explanation:

When user wants to share pictures quickly between the mobile devices which are in very close proximity we can use NFC(Near Field Communication).

Near Field Communication(NFC):-It is a group of communication protocols that lets two devices most of the times these are mobile phones to establish connection and the distance between them should be less around 4 centi meter.

You might be interested in
Which type of memory is used as the working storage space of the computer?
natta225 [31]
Internal memory is used as the working storage space of the computer
4 0
3 years ago
You are asked by your supervisor to export NPS configuaration from a server. Your supervisor contacts you and tells you it is mi
Vesna [10]

Answer:

You must import the NPS configurations, then manually cnfigure the SQL Server Logging on the target machine.

Explanation:

The SQL Server Logging settings are not in anyway exported. If the SQL Server Logging was designed on the root machine, the a manually configure of SQL Server Logging has to be done on the target machine after the NPS configurations must have been imported.

Although administrator rights is needed at least to import and export NPS settings and configurations, while that isn’t the issue in this case. NPS configurations are moved to a XML file that is non-encrypted by default. There is no wizard or tool whatsoever to export or import the configuration files.

3 0
3 years ago
What does tech mean in technology?
g100num [7]

Answer:

abbreviation for technical or technological

3 0
3 years ago
Read 2 more answers
As Robin uses her computer to write a report of her team’s investigation, she is struggling to keep the footnotes numbered in th
Fittoniya [83]
Okay, so I know that you haven't stated the questions nor the answer choices, but I have seen this question before. The answer is to use the word processing software to enter footnotes. 
8 0
3 years ago
Read 2 more answers
A document that summarizes your employment history and qualifications
Whitepunk [10]
Answer: A resume is a document that summarizes your education, skills, talents, employment history, and experiences in a clear and concise format for potential employers. The resume serves three distinct purposes that define its format, design, and presentation: To represent your relevant professional information in writing.





Explanation: google
4 0
3 years ago
Other questions:
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    5·1 answer
  • Cuthbert Industrials, Inc., prepares 3-year comparative financial statements. In Year 3, Cuthbert discovered an error in the pre
    12·1 answer
  • On average, someone with a Bachelor's degree is estimated to earn ____ times more than someone with a high school diploma.
    12·1 answer
  • Ayuda no encuentro la información de estas tres preguntas:
    10·1 answer
  • What do we call data that's broken down into bits and sent through a network?
    15·1 answer
  • AYYOOOO CAN YOU HELP A GIRL OUUTT???
    11·1 answer
  • What was designed as an area where computer vendors could store data that is shielded from user activities and operating system
    13·1 answer
  • To avoid legal issues and set clear guidelines and expectations for employees, employers should put which of the following in pl
    10·1 answer
  • Anyone who play online game drop your name​
    9·1 answer
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!