Match the words below to their definition.

A. Checking the validity of information
B. Clicking a series of links until you reach a primary source
C. Putting someone else's idea in your own words
D. Generating a list of ideas about a subject very quickly
E. Using someone else's research as your own


A. vet
B. drilling down
C. paraphrase
D. brainstorm
E. plagiarism

Computer Science & Information Technology

You might also like to view...

The _________ element is used with an object element to provide additional information.

a. object b. source c. param d. iframe

Computer Science & Information Technology

Benchmarking, Web server log analysis, and Web analytic are great tools, but they should always be combined with Web site owner and management expertise when evaluating a Web site's performance.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To protect data so it cannot be easily read, what technology is used?

A) Authentication B) Encryption C) Authorization D) Firewalling

Computer Science & Information Technology

The unary scope resolution operator is used:

a. To access a global variable when a local variable of the same name is in scope. b. To access any variable in an outer block when a local variable of the same name is in scope. c. To access a global variable when it is out of scope. d. To access a local variable with the same name as a global variable.

Computer Science & Information Technology