1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
3 years ago
9

Which statements about viruses are true? select the four statements that are true. select the four statements that are true. all

viral genomes contain both dna and rna. hiv contains two identical strands of dna. hiv contains reverse transcriptase. a retrovirus contains rna. the capsid enters the host cell if the virus is enveloped. all rna-containing viruses are retroviruses. enveloped viruses bud from the host cell?
Computers and Technology
1 answer:
navik [9.2K]3 years ago
4 0
<span>A) All viral genomes contain both DNA and RNA. FALSE. Viruses contain the smallest necessary amount of genetic information packaged in a capsule composed of proteins. Containing both DNA and RNA would be a redundancy that would unnecessarily increase the size of the virus and make it more difficult for the virus to penetrate a cell. B) A retrovirus contains RNA. TRUE. By definition a retrovirus contains single-stranded positive-sense RNA instead of DNA. C) HIV contains two identical strands of DNA. FALSE. HIV is a retrovirus and, therefore, contains RNA instead of DNA. D) HIV contains reverse transcriptase. TRUE. HIV is a retrovirus that contains an RNA genome. All retroviruses require reverse transcriptase to convert their genome from RNA to DNA once the virus has been entered the cell. E) The capsid enters the host cell if the virus is enveloped. TRUE. Viruses are to large to enter a cell by passive diffusion or active transport. The only remaining major form a transport into the cell is endocytosis, or being enveloped. F) All RNA-containing viruses are retroviruses. FALSE. By definition a retrovirus contains single-stranded positive-sense RNA. Viruses can contain RNA in other forms (ie double-stranded) and would, therefore, not be considered a retrovirus. G) Enveloped viruses bud from the host cell. TRUE. Viruses are to large to enter a cell by passive diffusion or active transport. The only remaining major form a transport into the cell is exocytosis. For a virus to exit the host cell and infect other cells, they must exit by exocytosis, or budding.</span>
You might be interested in
Assume that the array arr has been declared . Write a statement that assigns the next to last element of the array to the variab
iris [78.8K]

Answer:

x=arr[arr.length-2]; is the correct answer for the given question.  

Explanation:

In the above statement firstly we calculate the length of the given array.The arr.length function is used to calculate the array length.As mention in the question we have to assign the next to last element of the array to the variable x, so we used arr[arr.length-2] and finally, we assign them to the variable x.

so the final statement is x=arr[arr.length-2];

6 0
3 years ago
What do you ensure when you set up goals and objectives for your website design?
fredd [130]

Answer:

a

Explanation:

You know that if you searched brianly for the answer some one else has already answered the same question jut trynna help some one out to help save your points

7 0
3 years ago
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
Zepler [3.9K]
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
3 0
3 years ago
Read 2 more answers
Loa (speaker) thuộc nhóm thiết bị nào ?
dlinn [17]

Answer:

this say's "Which device group?" hope i helpped

8 0
3 years ago
Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
Levart [38]
While proceeding with an internet search I find google to be the best source considering its high accuracy. When asking your question keep it minimal yet descriptive. After having found a few sources cross reference them with each other and throw out any sources that may hold false information. After having narrowed them down look to see how recent they are because since their publication new information may have been brought to light. Look to see if they have links to where they got their information. All in all just be diligent.
5 0
3 years ago
Other questions:
  • &gt;
    6·1 answer
  • Webster defines risk as "the possibility of loss or injury". Therefore, driving a motor vehicle is a risk.
    12·1 answer
  • The process of executing a program is also called ________.
    8·1 answer
  • Which of the following should you NOT do when using CSS3 properties to create text columns for an article element? a. make the c
    12·2 answers
  • Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
    14·1 answer
  • Can anyone find any words in here?
    14·2 answers
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • The fundamental building block in every Hypertext Markup Language (HTML) document is the _____ tag, which marks a component in t
    15·2 answers
  • Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Samp
    14·2 answers
  • - A blacksmith is shoeing a miser's horse. The blacksmith charges ten dollars for his work. The miser refuses to pay. "Very well
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!