1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
6

Computer programmers often use binary codes (strings of 1s and 0s) to write programs for computers. These codes are then changed

into patterns that the computer recognizes as words, pictures, sounds, and so forth. Which process does this most resemble in humans and other animals?
Computers and Technology
1 answer:
In-s [12.5K]3 years ago
7 0

Answer:

Resembles how DNA acts in human and animals.

Explanation:

You could compare the way DNA and coding works. Coding uses binary system at its base because there are 2 primary stable states in electronics, 1 for ON, 0 for OFF. This allows transistors to do functions such as data storage, calculations, showing pictures, etc.

DNA operates with four discrete elements, Adenine, Guanine, Cytosine, and Thymine, from these bases, they are organized into sequences of three nucleotides, known as codons. Codons are the unit in charge of giving our cells instructions for protein information.

You might be interested in
The shortest compressed format of the ipv6 address 2001:0db8:0000:1470:0000:0000:0000:0200 is
devlian [24]

The answer is : 2001:DB80:1470::200

A double colon ( :: ) can replace any single, contiguous string of one or more 16-bit segments (hextets) which is  consist of all 0s, and it can only be used once per IPv6 address. Therefore,any leading 0s (zeros) in any 16-bit section or hextet can be omitted.

3 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
2 years ago
What is meant by versatility in terms of features of computer?​
scoray [572]

Answer:

Versatility refers to the capability of a computer to perform different kinds of works with same accuracy and efficiency.

Explanation:

thank me later

3 0
3 years ago
Read 2 more answers
If you want to copy text formatting from one area of your document to another area, _____. a. select the formatting you would li
Travka [436]

Answer:

I believe it is ‘A’

Explanation:

The Format Painter feature copies only the formatting from one selected text to another. The content and text of the selection will not be copied using Format Painter.

6 0
3 years ago
Which emerging technologies will have more injury on our day to day country & How?​
qwelly [4]

Explanation:

Complete the sentence with the words below stop push direction slow down move shape speed up pull A force is a. or a.

4 0
2 years ago
Other questions:
  • 10. Which of these is not an HTTP verb? PUT AJAX GET DELETE
    12·1 answer
  • You have just been named Director of Data Administration of General Hardware Co. General Hardware maintains a large central IS o
    15·1 answer
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • An interpreter _______. converts the procedural language one statement at a time converts the source code into machine language
    12·1 answer
  • Which option in presentation software can you use to apply a “fly in” effect to the objects on a slide? A)flowchart B)shapes C)
    11·2 answers
  • Write a function so that the main program below can be replaced by the simpler code that calls function mph_and_minutes_to_miles
    7·1 answer
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • What is the first step that you have to perform before you can add a windows package to a wim file?
    9·1 answer
  • The __________ statement allows you to check for
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!