1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
9

What is required to become a good critical thinker? Use a process when dealing with a big issue. Practice the right skills over

the long-term. Evaluate issues based on logic and reason. Act unemotionally throughout the day.
Computers and Technology
1 answer:
Damm [24]3 years ago
6 0

Answer:

Evaluate issues based on logic and reason

Explanation:

Critical Thinking is the ability to think scientifically & logically, analysing based on both formers - rather than rule of thumb.

Critical thinker engages clearly in conceptual, rational thinking. So, an important desirable characteristic of a critical thinker is 'evaluating issues based on logic and reason'.

You might be interested in
A computer that delivers requested web pages to your computer or mobile device is a(n) _____.
yaroslaw [1]

Answer:

Web Server

A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web. A web server can, in general, contain one or more websites. A web server processes incoming network requests over HTTP and several other related protocols.

6 0
3 years ago
Which kind of device does a computer need in order to provide information to a person or something else?
Keith_Richards [23]
<span>Which kind of device does a computer need in order to provide information to a person or something else?
The answer is
B. output device
</span>
3 0
3 years ago
In Python, what is returned when evaluating [n for n in range(10) if n % 2]?​
Firlakuza [10]
First we need to understand what "n for n in range(10)" means. Basically, we are iterating through all the values n that are in the range of 10 (meaning 0, 1, 2, 3, ..., 9).

Next we are evaluating if n%2. The percentage sign is used to represent modulus which is the remainder of when two numbers are divided. In this case, we are dividing n by 2, and the remainder is our result. When dividing by 2, the only possible remainders are 0 or 1, which when used in an if statement represent the boolean vlaues false and true, respectively. We are doing this calculation for each n from 0 to 9, and if the result is true, we output n to an array.

The numbers that will result in true (a remainder of 1) are the odds numbers. For example, 4/2 = 2 with nothing left over while 5/2 = 2 with 1 left over.

So the following is returned:

[1, 3, 5, 7, 9]
8 0
3 years ago
How do i give brainliest? if what you say works i'll give de brain
ololo11 [35]

two people have to answer the question and at the bottom of the question you'll see a crown and you just click on that to give them brainliest

6 0
3 years ago
Read 2 more answers
You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?
grin007 [14]

Windows 8 Firewall rules that can be defined include;

Inbound Rules

Outbound Rules

Connection - specific Rules

Inbound Rules – Type of rules that help protect your PC from other computers from making unsolicited connections to it.

Outbound Rules – They help protect your PC by preventing it from making unsolicited connections to other computers.

Connection – specific rules – These rules help a computer admin to create and apply custom rules based on a particular connection.


5 0
3 years ago
Other questions:
  • Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).
    5·1 answer
  • When mysql automatically converts one data type to another, itâs known as a/an ______________________ conversion?
    15·1 answer
  • Write a program to read data from a file named problem 2. ext. This file has three exams data (floating point data) in three col
    11·1 answer
  • A previously saved labels report can be accessed from the
    9·1 answer
  • In addition to the decimal number system, the number systems used most often in PLC operationand programming are ________.
    9·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • Computer technology has changed our lives write of a least five ways to show how this is so​
    15·1 answer
  • Is this even possible
    9·2 answers
  • Wow that funny a heck
    7·1 answer
  • A local pizza shop is selling a large pizza for $9.99. Given the number of pizzas to order as input, output the subtotal for the
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!