When in break mode, you can use ____ to examine the value of variables.

A. DataTags
B. DataTips
C. DebugTags
D. DebugTips

Answer: B

Computer Science & Information Technology

You might also like to view...

Networks are generally used in a business environment

Indicate whether the statement is true or false

Computer Science & Information Technology

To bypass some ICMP-filtering devices on a network, an attacker might send which type of packets to scan the network for vulnerable services? (Choose all that apply.)

a. PING packets b. SYN packets c. ACK packets d. Echo Request packets

Computer Science & Information Technology