1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
4 years ago
12

What is the function of the capsid? it allows a virus to live independently. it is composed of genetic material. it destroys the

contents of a host cell. it enables a virus to attach to hosts.
Computers and Technology
2 answers:
MArishka [77]4 years ago
8 0

The answer is D for e2020

Alexandra [31]4 years ago
6 0
<span>The capsid’s function is to enable a virus to attach to hosts. The capsid acts like a shell in order to protect the virus from various factors. Aside from protection, it also allows for the virus to attach to a host without being destroyed by enzymes in a body.</span>
You might be interested in
When passing a list of parameters to a stored procedure by name, you can omit optional parameters by:
amm1812

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

<h3>What is optional parameter?</h3>

It should be noted that optional parameter simply means a method that doesn't force pass arguments at calling time.

In this case, when passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

Learn more about parameter on:

brainly.com/question/13151723

#SPJ12

5 0
2 years ago
Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
faust18 [17]

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

5 0
3 years ago
Hi, I have several computer questions. These refer to the history of the internet. I would like to know if everything we look fo
MaRussiya [10]

<u>Hi dear user! </u>

<u>Hope my answer helps you and solve your queries. </u>

First of all,

ISP which is an acronym of Internet Service Provider, keeps the track of all the activities their users perform through their network.

For eg :-

You have a connection of Airtel, whatever you will access through your Airtel network will always be tracked by your ISP which is Airtel. If you delete your search/download history from your phone/laptop, still it can be seen by Airtel, you cannot delete from there end. Even if you access anything in incognito mode, then your browser does not stores your data but your ISP still can see what all you accessed in incognito mode.

Now coming to your next question,

If you delete your data from your phone or laptop, it is still somewhere saved in the hard drive of that device. The file is deleted from the device but it's hard drive still have that file, and anyone can access to that data by using a certain software but for that, the person will also need your hard drive. There are certain softwares like Disk Drill which is used to recover the hard drive's data.

Hope your queries are resolved !

7 0
4 years ago
A line of text that has an equal number of characters on either side of the horizontal center of the page is called____.
VLD [36.1K]
A) force justified.

If you open up Word (or probably any word processor) and hover over the alignment options in the ribbon (or format the paragraph), it tells you what each one is, and the option that ensures the characters are spread evenly between the margins is labeled "justified."
6 0
3 years ago
How to tell if screen or screen protector is cracked?
beks73 [17]
You will feel the screen protector crack
6 0
4 years ago
Read 2 more answers
Other questions:
  • USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational
    13·1 answer
  • If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    7·1 answer
  • Read each scenario, and then select the best wireless device for the worker’s needs. A trucker is constantly on the road. He fre
    8·2 answers
  • What is the part of the browser window that displays the content of the web page such as pictures and text called?
    10·1 answer
  • Given :an int variable k,an int array currentMembers that has been declared and initialized ,an int variable nMembers that conta
    12·1 answer
  • Caleb is a big fan of science fiction, so he loves picturing the ________ gland as the captain of his personal starship, pulling
    9·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates N-bit unit of data every k time
    7·1 answer
  • Which famous individuals was born on october 31st?
    7·1 answer
  • Explain the computer according to size​
    10·1 answer
  • Importance of computer​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!