1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
4 years ago
15

Who were 4 major people that attended the constitutional convention

Computers and Technology
1 answer:
postnew [5]4 years ago
7 0
Alexander Hamilton, George Washington, James Madison, and Benjamin Franklin
You might be interested in
Design a circuit that has a 3-bit binary input B2, B1, B0 (where B2 is most significant bit and B0 is least significant bit) and
jenyasd209 [6]

Isn't this circuit just a wire, where Z=B0?

3 0
3 years ago
The file extension for an MS Excel spreadsheet is ______.<br><br> avi or xls
anygoal [31]
XLS would be it, avi contains like sounds and stuff
6 0
3 years ago
Read 2 more answers
Steps to copy and paste text/information from website to Ms-word using keyboard​
Greeley [361]

Answer: Highlight the text you want to copy. Use the shortcut key combination Ctrl + C on a PC or Command + C on a Mac to copy the text. Move the text cursor to where you want to paste the text. Press Ctrl + V on a PC or Command + V on a Mac to paste the text

Explanation:

just copy and past by highlighting the text you want and clicking ctrl and c at the same time then ctrl and v to put it on word

8 0
2 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
How do you get access To The advance server in Mobile legends
kiruha [24]

Answer: To enter the Advanced Server, please follow the below instructions: Tap into the Profile section and click Account Settings. Tap on the Switch Server button on the bottom right of the screen. This will allow the player to switch between the Original Server and Advanced Server.

Explanation: I play Mobile legends a lot so I know this

4 0
3 years ago
Other questions:
  • In a two-sided tag, a(n) ____ tag indicates the content's end.
    7·2 answers
  • A good reference point for determining the position of a line or curb in front of you is your __________ . A. Hood ornament B. L
    10·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • What is information associated with a document to help describe that document called?
    14·1 answer
  • How is the bootstrap program started?
    6·2 answers
  • 8. A sprite is a simple spider shaped thing with n legs coming out from a center point. The angle
    10·1 answer
  • Which letter shows the ball when it has the maximum kinetic energy
    15·1 answer
  • Which of the following are drivers of machine learning growth?
    15·1 answer
  • Which artificial intelligence term is used to describe extracting information from unstructured text.
    15·1 answer
  • DRAW A FLOWCHART THAT WILL ASK THE USER TO ENTER AND DISPLAY THEIR PERSONAL DETAILS SUCH AS NAME AND AGE.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!