The process of searching for a special pattern of symbols within a larger collection of information is called pattern ____.

a. combining
b. matching
c. discovery
d. sorting


b. matching

Computer Science & Information Technology

You might also like to view...

Which of the following is used to uniquely identify a computer on a network?

A. network ID B. ARP address C. IP address D. Serial number

Computer Science & Information Technology

What two technologies below are fully-implemented, 64-bit processors for use in servers and workstations?

A. Itanium B. Centrino C. Xeon D. Core i7

Computer Science & Information Technology

Why is it safe to ignore validation warnings about deprecated attributes that stem from widgets in a web page?

A. They represent a bug in the validator itself. B. Validation is unimportant. C. The layout of your page does not rely on them. D. It is not safe to ignore these warnings.

Computer Science & Information Technology

By clicking the File tab, you can share spreadsheets by using ____.

A. Backstage B. Macros C. Templates D. Comments

Computer Science & Information Technology