From da86668cfd243a0a00651989fa6562adb25e33a8 Mon Sep 17 00:00:00 2001
From: Owen Mansel-Chan <owen-mc@github.com>
Date: Fri, 17 Jan 2025 17:00:02 +0000
Subject: [PATCH] (Multiple languages) Use slightly clearer wording

---
 .../codeql-language-guides/analyzing-data-flow-in-csharp.rst    | 2 +-
 .../codeql/codeql-language-guides/analyzing-data-flow-in-go.rst | 2 +-
 .../codeql-language-guides/analyzing-data-flow-in-java.rst      | 2 +-
 3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst
index cffc6eab674a..7e60956a5a98 100644
--- a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst
+++ b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst
@@ -103,7 +103,7 @@ Unfortunately this will only give the expression in the argument, not the values
      and DataFlow::localFlow(DataFlow::exprNode(src), DataFlow::exprNode(call.getArgument(0)))
    select src
 
-Then we can make the source more specific, for example an access to a public parameter. This query finds instances where a public parameter is used to open a file:
+To restrict sources to only an access to a public parameter, rather than arbitrary expressions, we can modify this query as follows:
 
 .. code-block:: ql
 
diff --git a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst
index f2fc0d9ec78f..537a2308203f 100644
--- a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst
+++ b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst
@@ -117,7 +117,7 @@ Unfortunately, this only gives the expression in the argument, not the values wh
      DataFlow::localFlow(DataFlow::exprNode(src), DataFlow::exprNode(call.getArgument(0)))
    select src
 
-Then we can make the source more specific, for example an access to a parameter. This query finds where a public parameter is passed to ``os.Open(..)``:
+To restrict sources to only parameters, rather than arbitrary expressions, we can modify this query as follows:
 
 .. code-block:: ql
 
diff --git a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst
index effac8791921..bade378d3a07 100644
--- a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst
+++ b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst
@@ -122,7 +122,7 @@ Unfortunately, this only gives the expression in the argument, not the values wh
      DataFlow::localFlow(DataFlow::exprNode(src), DataFlow::exprNode(call.getArgument(0)))
    select src
 
-Then we can make the source more specific, for example an access to a public parameter. This query finds where a public parameter is passed to ``new FileReader(..)``:
+To restrict sources to only an access to a public parameter, rather than arbitrary expressions, we can modify this query as follows:
 
 .. code-block:: ql