1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
3 years ago
12

In critical thinking, an argument is:

Computers and Technology
2 answers:
djverab [1.8K]3 years ago
6 0
C... it’s c ok.......................
Elena-2011 [213]3 years ago
3 0
An attempt to persuade because you want as many people on your side as you can get
You might be interested in
(1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a
denpristay [2]

Answer:Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space. (Submit for 1 point) Ex: If the input is: yellow Daisy 6 the output after the prompts is: You entered: yellow Daisy 6 Note: User input is not part of the program output. (2) Output two passwords using a combination of the user input. Format the passwords as shown below. (Submit for 2 points, so 3 points total). Ex: If the input is: yellow Daisy 6 the output after the prompts is: You entered: yellow Daisy 6 First password: yellow_Daisy Second password: 6yellow6 (3) Output the length of each password (the number of characters in the strings). (Submit for 2 points, so 5 points total). Ex: If the input is: yellow Daisy 6 the output after the prompts is: You entered: yellow Daisy 6 First password: yellow_Daisy Second password: 6yellow6 Number of characters in yellow_Daisy: 12 Number of characters in 6yellow6: 8

I have tried several different ways of doing this, but I keep getting an error on line 6

Explanation:

7 0
3 years ago
A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
elena-s [515]

Answer:

Client To Site.

Explanation:

The Client-to-Site is a virtual private network which used to provide the connection of the device like a laptop to the organization network. In the Client To Site a single computer is connected to the remotely network, for all the purpose and the intent of the network.

The single laptop is connected with a remote machine in the firewall. The  "IPSec" protocol is used in the Client To Site connection.

3 0
3 years ago
When methods have ____, other programs and methods may use the methods to get access to the private data.
Nostrana [21]

When methods have public access, other programs and methods may use the methods to get access to the private data.

<h3>What do you mean by public access?</h3>

The Definition of the term public access is known to be a kind of a television channel where anybody can be able to broadcast a program

An example is the city council meeting can be able to broadcast on public access.

Hence, When methods have public access, other programs and methods may use the methods to get access to the private data.

See full question below

When methods have ____, other programs and methods may use the methods to get access to the private data.

a. private access

b. public access

c. complete access

d. all access

Learn more about public access from

brainly.com/question/2736088

#SPJ1

5 0
2 years ago
A user complains that his computer automatically reboots after a short period of time. Which of the following computer component
Oduvanchick [21]

Answer:

The answer is "option a".

Explanation:

To resolve the automatic reboot problem we must change the CPU cooling fan because if we don't change a computer fan so, it will be heated and damage other components. This cooling fan used inside the CPU. It expels warm air from inside and moves air across the particular component. and other options are not correct that can be described as:

  • In option b, power supply is used to turn on the computer. It is not used to solve the reboot problem.
  • In option c,  Motherboard is to serve as the base upon which a computer's components are built.  
  • In option d, It is primarily used to store the data.  

6 0
3 years ago
2-Write test programs in java to determine the scope of a variable declared in a for statement. Specifically, the code must dete
ankoles [38]

Answer:

See Explaination

Explanation:

public class testscope

{

//start of main function

public static void main(String[] args)

{

//varible declration

int i;

int x;

//loop for 10 times

for(i=0; i<10; i++)

{

//initialize value of x to 10

x = 10;

}

//the scope of variable x is visible outside of for loop

System.out.println("The value of x is: "+x);

}

}

See attachment for sample output

nb:

You can clearly see in the output of Java program the value of x is not printed and program return errors. It means the variable x declared inside for loop does not has scope outside the for loop.

7 0
3 years ago
Other questions:
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _____.
    10·1 answer
  • Optimally, the __________ guides investment decisions and decisions on how ISs will be developed, acquired, and/or implemented.
    6·1 answer
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • Is Missouri a free state or a slave state​
    13·2 answers
  • Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the _
    14·1 answer
  • If each integer occupies one 64-bit memory cell and is stored using sign/magnitude notation, what are the largest (in terms of a
    12·1 answer
  • a ____ is a window inside the word window that can remain open and visible while you work in a document.
    14·1 answer
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
  • Write a recursive decent algorithm for a java while statement, a Javas if statement , an logical/mathematical expression based o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!