1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
3 years ago
5

I need help ASAP Please! :)

Computers and Technology
1 answer:
amid [387]3 years ago
3 0
Your parents,your school,google,your social media accounts
You might be interested in
Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
Sergio039 [100]

Answer:

DNA analysis

Explanation:

DNA is unique for all individuals. DNA analysis is the process of analysing the DNA characteristics of an individual.

DNA profiling is used in forensics to identify the suspects involved in criminal activities.

1. In the process, DNA of the suspects is matched with the DNA found in the site of the crime.

2. If a match is found, it indicates that the genetic relationship exists between the suspect and the criminal or the crim.

3. The order from the court is needed to obtain the DNA of the suspects. The sample can be in the form of blood or saliva.

4. The sample obtained should have adequate cells which contain the DNA.

Issues  

The DNA obtained from the crime site is not pure or proper enough to be ideal for the DNA profiling.

Degraded sample

1. The sample obtained from the site of the crime is not always adequate to obtain the actual DNA.

2. The sample can be contaminated due to the environmental factors.

3. The sample obtained is too less and hence, should be examined accurately in order not to waste the sample.

DNA mixture

4. The sample obtained from the site of the crime is found to contain DNA from more than one individual.

 

Profiling types

DNA profiling can be carried out by using any of the techniques mentioned below.

1. RFLP analysis (  Restriction fragment length polymorphism )

This uses the Southern blot technique. The blot process needs a large amount of the sample. Also, this works well only when the sample is not degraded.

2. Polymerase chain reaction (PCR) analysis

3. STR analysis ( short tandem repeats )

4. AFLP ( amplified fragment length polymorphism )

This is an automated and low-cost process. It is easy to set up and operate which makes this process common in low income countries.

All the methods mentioned above have their own advantages and drawbacks.

5 0
3 years ago
When changing lanes on an expressway signal your intentions and?
valkas [14]
Check your mirrors and blind spots
4 0
4 years ago
What would be a situation in which you could use an excel chart to present your data
Pavlova-9 [17]
Having to compare results on experiments or lab tests to each other.
5 0
4 years ago
Read 2 more answers
What’s ur guys rank of all 3D Mario games (all of these are great games btw)? These are my opinions I’d rly enjoy hearing yours.
Blizzard [7]

Answer:

super mario galaxy best of all time

Explanation:

3 0
3 years ago
While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config
Sophie [7]

Answer:

The baseline review

Explanation:

Solution:

The baseline review: this can be defined as the gap analysis or the beginning environmental review (IER). it is an assess study to get information about an organisation's present activities and associated environmental impacts,  impacts and legal requirements.

This review issues an overview of the quality and weaknesses of an organisation’s environmental execution and opportunities for improvement.

6 0
3 years ago
Other questions:
  • Create a stack with three integers and then use .toarray to copy it to an array.
    10·1 answer
  • What should you do when an error message pops up on the screen?
    9·1 answer
  • a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then identifying a
    8·1 answer
  • Can folders have mixed apps?
    6·1 answer
  • _____ creates a border or space that separates information.
    14·1 answer
  • When you click the Decrease Font Size button, Excel assigns the next highest font size in the Font Size gallery.
    8·1 answer
  • Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
    11·1 answer
  • Suppose the following groups are defined to shorten a system’s access control lists: – Group1: Alice, Bob, Cynthia, David, Eve –
    12·1 answer
  • What are different ways that celebrities try to connect with fans using the Internet and social media?
    5·1 answer
  • Explain why this product was created?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!