SlideShare uma empresa Scribd logo
1 de 5
Bluetooth Billie Tackas
Bluetooth Bluetooth is an open wireless technology which exchanges data over a short distance. It uses wavelength radio transmissions to send data. Bluetooth can be used anywhere by anyone, so long as they have the right forms of technology.  Bluetooth technology is mainly used through phones and laptops.
Bluetooth was initially used for connecting computers to monitors and printers.   As Bluetooth became more popular it then started to be used by phone company’s and would connect phones to hands-free head sets.
Bluetooth was very popular with sending songs via phones, and still is however now Bluetooth can be used for many other things.  In new cars Bluetooth is a very popular way of connecting your phone with the radio system, this means you can play music from your phone in your car, and it also means you can connect your phone to your cars hands-free system.
Bluetooth is also used for wireless games controllers. Nintendo and Sony use Bluetooth technology in their Wii and PlayStation controllers, so players have more freedom when playing.

Mais conteúdo relacionado

Destaque

Noodle tools for_students_notes(1)
Noodle tools for_students_notes(1)Noodle tools for_students_notes(1)
Noodle tools for_students_notes(1)spencere
 
Ray Cotton's Top Travel Destinations for 2016
Ray Cotton's Top Travel Destinations for 2016Ray Cotton's Top Travel Destinations for 2016
Ray Cotton's Top Travel Destinations for 2016Ray Cotton
 
11003677 pt8
11003677 pt811003677 pt8
11003677 pt8sinpaak
 
Roosevelts- American Leaders
Roosevelts- American LeadersRoosevelts- American Leaders
Roosevelts- American LeadersRay Cotton
 
Formulary (updated jul 11)
Formulary (updated jul 11)Formulary (updated jul 11)
Formulary (updated jul 11)95MDG
 

Destaque (6)

Noodle tools for_students_notes(1)
Noodle tools for_students_notes(1)Noodle tools for_students_notes(1)
Noodle tools for_students_notes(1)
 
Ray Cotton's Top Travel Destinations for 2016
Ray Cotton's Top Travel Destinations for 2016Ray Cotton's Top Travel Destinations for 2016
Ray Cotton's Top Travel Destinations for 2016
 
11003677 pt8
11003677 pt811003677 pt8
11003677 pt8
 
Tarea 8
Tarea 8Tarea 8
Tarea 8
 
Roosevelts- American Leaders
Roosevelts- American LeadersRoosevelts- American Leaders
Roosevelts- American Leaders
 
Formulary (updated jul 11)
Formulary (updated jul 11)Formulary (updated jul 11)
Formulary (updated jul 11)
 

Semelhante a Bluetooth

BEST BLUETOOTH SPEAKERS UNDER 2000rs.docx
BEST BLUETOOTH SPEAKERS UNDER 2000rs.docxBEST BLUETOOTH SPEAKERS UNDER 2000rs.docx
BEST BLUETOOTH SPEAKERS UNDER 2000rs.docxDigitalDiscount
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHManshi Raj
 
Bluetooth 1210129622411159-8
Bluetooth 1210129622411159-8Bluetooth 1210129622411159-8
Bluetooth 1210129622411159-8jitz1989
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technologypariluv
 
Wireless Bluetooth Headphones.pptx
Wireless Bluetooth Headphones.pptxWireless Bluetooth Headphones.pptx
Wireless Bluetooth Headphones.pptxPavithra517234
 
What Are The Advantages Of Bluetooth
What Are The Advantages Of BluetoothWhat Are The Advantages Of Bluetooth
What Are The Advantages Of BluetoothMiles Priar
 
How Do Bluetooth Speakers Work Connect Windows amp Mac
How Do Bluetooth Speakers Work Connect Windows amp MacHow Do Bluetooth Speakers Work Connect Windows amp Mac
How Do Bluetooth Speakers Work Connect Windows amp MacDarylMitchell9
 
How Does Bluetooth Transmitter and Receiver Works
How Does Bluetooth Transmitter and Receiver WorksHow Does Bluetooth Transmitter and Receiver Works
How Does Bluetooth Transmitter and Receiver WorksDarylMitchell9
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationankit680
 

Semelhante a Bluetooth (20)

Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
BEST BLUETOOTH SPEAKERS UNDER 2000rs.docx
BEST BLUETOOTH SPEAKERS UNDER 2000rs.docxBEST BLUETOOTH SPEAKERS UNDER 2000rs.docx
BEST BLUETOOTH SPEAKERS UNDER 2000rs.docx
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTH
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth 1210129622411159-8
Bluetooth 1210129622411159-8Bluetooth 1210129622411159-8
Bluetooth 1210129622411159-8
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology.ppt
Bluetooth technology.pptBluetooth technology.ppt
Bluetooth technology.ppt
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Wireless Bluetooth Headphones.pptx
Wireless Bluetooth Headphones.pptxWireless Bluetooth Headphones.pptx
Wireless Bluetooth Headphones.pptx
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Blue1
Blue1Blue1
Blue1
 
What Are The Advantages Of Bluetooth
What Are The Advantages Of BluetoothWhat Are The Advantages Of Bluetooth
What Are The Advantages Of Bluetooth
 
How Do Bluetooth Speakers Work Connect Windows amp Mac
How Do Bluetooth Speakers Work Connect Windows amp MacHow Do Bluetooth Speakers Work Connect Windows amp Mac
How Do Bluetooth Speakers Work Connect Windows amp Mac
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
How Does Bluetooth Transmitter and Receiver Works
How Does Bluetooth Transmitter and Receiver WorksHow Does Bluetooth Transmitter and Receiver Works
How Does Bluetooth Transmitter and Receiver Works
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 

Último

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Último (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Bluetooth

  • 2. Bluetooth Bluetooth is an open wireless technology which exchanges data over a short distance. It uses wavelength radio transmissions to send data. Bluetooth can be used anywhere by anyone, so long as they have the right forms of technology. Bluetooth technology is mainly used through phones and laptops.
  • 3. Bluetooth was initially used for connecting computers to monitors and printers. As Bluetooth became more popular it then started to be used by phone company’s and would connect phones to hands-free head sets.
  • 4. Bluetooth was very popular with sending songs via phones, and still is however now Bluetooth can be used for many other things. In new cars Bluetooth is a very popular way of connecting your phone with the radio system, this means you can play music from your phone in your car, and it also means you can connect your phone to your cars hands-free system.
  • 5. Bluetooth is also used for wireless games controllers. Nintendo and Sony use Bluetooth technology in their Wii and PlayStation controllers, so players have more freedom when playing.