The process of searching for a special pattern of symbols within a larger collection of information is called pattern ____.
a. combining
b. matching
c. discovery
d. sorting
b. matching
You might also like to view...
Which of the following is used to uniquely identify a computer on a network?
A. network ID B. ARP address C. IP address D. Serial number
What two technologies below are fully-implemented, 64-bit processors for use in servers and workstations?
A. Itanium B. Centrino C. Xeon D. Core i7
Why is it safe to ignore validation warnings about deprecated attributes that stem from widgets in a web page?
A. They represent a bug in the validator itself. B. Validation is unimportant. C. The layout of your page does not rely on them. D. It is not safe to ignore these warnings.
By clicking the File tab, you can share spreadsheets by using ____.
A. Backstage B. Macros C. Templates D. Comments