Match the words below to the phrase that best describes them.

A. A sentence that supports your thesis
B. Search term
C. A bibliography
D. Lets you order a book from a different library
E. Information that is commonly known
F. A summary of your main point or argument
G. A stored Web address
H. An online encyclopedia


A. topic sentence
B. keyword
C. works cited
D. interlibrary loan program
E. general knowledge
F. thesis
G. bookmark
H. Wikipedia

Computer Science & Information Technology

You might also like to view...

____________________ is a balance of blocking those known keywords that are not allowed to be used as input within a Web application or Web URL, and identifying those keywords that are allowed to be used as input within a Web application or Web URL.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

A. zero-day B. rootkit C. brute force D. dictionary

Computer Science & Information Technology

Figure 2.1(b) shows the relationship of correlation to Euclidean distance for 100,000 randomly generated points that have been standardized to have a mean of 0 and a standard deviation of 1. What general observation can you make about the relationship between Euclidean distance and correlation when the vectors have been standardized to have a mean of 0 and a standard deviation of 1?

Here, we further explore the cosine and correlation measures.

Computer Science & Information Technology

The small box in the lower right corner of a selected cell (or range of cells) is called the _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology