1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
3 years ago
15

Order the steps to take when drawing electron dot diagrams.

Computers and Technology
2 answers:
fomenos3 years ago
7 0

Answer:

i just got to this question but the answers are

Explanation:

4

3

1

2

ludmilkaskok [199]3 years ago
3 0

Answer:

4

3

1

2

Explanation:

You might be interested in
Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by alte
prisoha [69]

Answer:

Option(b) i.e "utility virus" is the correct answer to the given question

Explanation:

The utility virus sometimes affected the operating system .It created the new files in the computer that makes the computer system slow .The utility virus making the spreading of malware in the computer system

The main objective of utility virus damaging the software program that impacts a pc or infects also it negatively by changing the way the machine operates without the user knowledge or the permission.

  • File conversion is used for converting the file extension it does not impact on computer damaging that's why this option is incorrect .
  • Hotspot is used to giving the access of internet it does not impact on computer damaging that's why this option is incorrect .
  • File compression utility  and  ZIP is used to reducing the file size it does not impact on computer damaging that's why this option is incorrect.

Therefore utility virus is the correct answer .

3 0
3 years ago
Read 2 more answers
What is the answer to 4.9 Code Practice: Question 2
bixtya [17]

Answer:

sum = 0

for i in range(20, 100, 10):

sum = sum + i

Print(sum)

Explanation:

7 0
3 years ago
Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
Sergio039 [100]

Answer:

DNA analysis

Explanation:

DNA is unique for all individuals. DNA analysis is the process of analysing the DNA characteristics of an individual.

DNA profiling is used in forensics to identify the suspects involved in criminal activities.

1. In the process, DNA of the suspects is matched with the DNA found in the site of the crime.

2. If a match is found, it indicates that the genetic relationship exists between the suspect and the criminal or the crim.

3. The order from the court is needed to obtain the DNA of the suspects. The sample can be in the form of blood or saliva.

4. The sample obtained should have adequate cells which contain the DNA.

Issues  

The DNA obtained from the crime site is not pure or proper enough to be ideal for the DNA profiling.

Degraded sample

1. The sample obtained from the site of the crime is not always adequate to obtain the actual DNA.

2. The sample can be contaminated due to the environmental factors.

3. The sample obtained is too less and hence, should be examined accurately in order not to waste the sample.

DNA mixture

4. The sample obtained from the site of the crime is found to contain DNA from more than one individual.

 

Profiling types

DNA profiling can be carried out by using any of the techniques mentioned below.

1. RFLP analysis (  Restriction fragment length polymorphism )

This uses the Southern blot technique. The blot process needs a large amount of the sample. Also, this works well only when the sample is not degraded.

2. Polymerase chain reaction (PCR) analysis

3. STR analysis ( short tandem repeats )

4. AFLP ( amplified fragment length polymorphism )

This is an automated and low-cost process. It is easy to set up and operate which makes this process common in low income countries.

All the methods mentioned above have their own advantages and drawbacks.

5 0
3 years ago
____ occurs when data is entered into the computer.
tangare [24]
I would personally say input.
5 0
4 years ago
Keisha wants to change the font color on the 1st and 3rd bullet items on slide 6 of her allied health presentation. what is the
Mice21 [21]
Is to tie them up together with a
7 0
4 years ago
Other questions:
  • Which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution?
    10·2 answers
  • An algorithmic function that takes an input message of arbitrary length and returns an output of fixed-length is called a(n) ___
    10·1 answer
  • Riley is using access to collect data for a science project. he is creating a report and wants to apply predefined color and fon
    6·1 answer
  • If a cheetah covers 155 meters in 5 seconds, at what speed is the cheetah running?
    14·2 answers
  • What do you need for digital photography?
    14·1 answer
  • Which statement below is not true of EFS
    7·2 answers
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • 2. BIOS is contained in ROM and not in RAM. Can you guess why?​
    15·1 answer
  • You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
    15·1 answer
  • Write any two rules for writing algorithm​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!