1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
11

What are the vitamins used for DNA Synthesis and Repair?​

Computers and Technology
1 answer:
raketka [301]3 years ago
5 0

Answer:

Vitamins C & E

Vitamin D

Vitamin B3

You might be interested in
True or false. Every word has only one correct spelling and pronunciation.
iren2701 [21]
<span>Every word has only one correct spelling and pronunciation.
This is a false statement.
</span>
6 0
3 years ago
How can you put a logo on html without breaching the copyright, design and patents act
Andrei [34K]
You create your own logo
5 0
3 years ago
Even closed systems are never perfectly closed. <br>true false​
Oxana [17]

Answer:

True

Explanation:

You can learn through many different textbooks that a closed system is always closed.

3 0
3 years ago
______was developed as an interim management protocol with OSI as the ultimate network management protocol.
RSB [31]

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

4 0
3 years ago
Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
skelet666 [1.2K]

Here's my code for that, consider it under the WTFPL (http://www.wtfpl.net/). Here is a pastebin of the code, as to avoid text formatting. (Link: https://pastebin.com/S3BDGxqm Raw: https://pastebin.com/raw/S3BDGxqm)

package javaapplication6;

import java.util.Scanner;

public class JavaApplication6 {

   

   public static void main(String[] args) {

       

       Scanner myScanner = new Scanner(System.in);

       

       boolean a;

       int s;

       System.out.println("Enter an int");

       s = myScanner.nextInt();

       a = hasEight(s);

       System.out.println(a);

       

   }

   private static boolean hasEight(int s)

   {

       String str = String.valueOf(s);

       return str.contains("8");

   }

   

}

7 0
3 years ago
Other questions:
  • Instructions:Select the correct answer.
    13·1 answer
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • Suppose that you created an robot that was so advanced it could act independently in very complex situations. It made its own de
    9·1 answer
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • The common programming structure that implements "conditional statements" is called an____ statement.
    8·1 answer
  • How neural networks impact our life??
    7·1 answer
  • Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the peop
    5·1 answer
  • There are many ways you can improve the performance of a website from an SEO perspective. When it comes to link building, which
    15·1 answer
  • What is a word processor write any five important features of word processor?
    15·1 answer
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!