I gotchu my bro!!
it would be D. " clicking Convert Text to Table"
Answer:
b) False.
Explanation:
Port explorers are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.
Answer:
it would be amhv i think i hope it answered u'er question
Explanation:
The answer is c that what a lot of people use☻