1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
8

Which best describes a difference between transcription and DNA replication

Computers and Technology
2 answers:
ruslelena [56]3 years ago
6 0
DNA replication is just making a copy of someone or somethings DNA
ycow [4]3 years ago
3 0

Answer:

<u>transcription uses uracil. </u>

<u></u>

Explanation:

You might be interested in
Ang Kabihasnang ito ay umusbong sa rehiyon ng Timog Mexico
Westkost [7]

Answer:

nahh I'm still in disbelieve

8 0
3 years ago
PLEASE HELP WILLL GIVE BRAINLIESTTTTT!
maria [59]

so a description of a mask tool that is used like painters tape to section off a spot so you do not chage that area

hope this helps

-scav

8 0
3 years ago
Read 2 more answers
Which business application uses electronic tags and labels to identify objects wirelessly over short distances?
Varvara68 [4.7K]

Answer:

Option A (Radio Frequency Identification)

Explanation:

Option A (Radio Frequency Identification)

Radio Frequency Identification:

This technology uses radio waves to transfer data between a reader and movable items. The benefit of this technology is we do not require physical contact with items and scanner.

Components of RFID:

  • tags (computer chip)
  • Reader
  • Communication System
  • RFID software

There are two RFID standards:

  • Electronic Product Code (EPC) standard
  • International Standard Organization (ISO)
4 0
3 years ago
A __________ is a repository of data gathered from operational data and other sources that is designed to serve a particular com
VMariaS [17]
Data Mart is a smaller amount of data that is collected from a data warehouse.
8 0
3 years ago
The instruction format of a computer is given by one indirect bit, opcode bits, register address bits, immediate operand bits an
oksian1 [2.3K]

Answer:

Following are the answer to this question:

Explanation:

A)

The memory size is 1 Giga Bytes which is equal to 2^{30}

\texttt{Number of address bits    \ \ \ \ \ \ \ \ \ \ \ \ \ \            Number of addresses}\\\\ \ \ \ \ 30  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \                                 2^{30}= 1073741824

B) \texttt{I \ \ \ Opcode  \ \ \ Register address \ \ \  Immediate operand \ \ \    Memory address}\\\\\\\textt{1 \ bit  \  \ \ \ \ \ 128  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \    2 \ bits   \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \   24 \ bits  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \  \ \ \ \ \ \ \ \ \           30 \ bits}\\\\\\            = 2^7 \\\\ = 7 \ bits

calculating the register Bits:

= 64-(1+7+24+30)\\\\=64 -62\ \  bits\\\\= 2\ \ bits\\

C)

Immediate value size while merging the additional benefit with the address field:

= 2^{24} + 2^{30}\\\\= 2^{54}\\\\\texttt{Range before combining(-,+) 24 bits   \ \ \ \ \ \       Range after combining( -,+)54bits}\\\\                         \textt{-2^{12} from + (2^{12}-1)   \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \                                    -2^{27} from + (2^{27}- 1)}

= \frac{24}{2} = 12\\\\= \frac{54}{2} = 27

The range is accomplished by dividing the bits by 2 into the two sides of the o and the number is one short to 0.

8 0
3 years ago
Other questions:
  • Which Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrato
    10·1 answer
  • If needed, you can pull over on the shoulder of the freeway to take a break if you are tired. true or false (drivers ed) need as
    11·1 answer
  • What does a shutter speed of one mean?
    14·2 answers
  • Page Up and Page Down keys fall under the ? keys category.
    14·2 answers
  • 12. What separated Grand turismo from other racing games was its focus on ______.
    13·1 answer
  • What format can be applied to text in Excel?
    7·1 answer
  • Hello :) new day <br> which one would u pick?<br> 1. chips 2. Gacha life 3. chocolate?<br><br> hehe
    15·2 answers
  • 2.9.8 stop light codehs
    10·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
  • write a recursive function that accepts an integer argument, n. the function should display n lines of asterisks on the screen,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!