1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
3 years ago
8

According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.

Computers and Technology
1 answer:
postnew [5]3 years ago
6 0

The Chargaff's rule state that in DNA, equality often exist in quantity between the bases A and T and between the bases G and C. According to Chargaff's data, adenine must pair with thymine and guanine must pair with cytosine.

  • Chargaff's gave rules for the pairing of bases. The rule is made up of base pairs in the DNA double helix.

He stated that there is a relation of A with T. The Pyrimidine Thymine (T) will always pairs with the Purine Adenine (A)

and also there is a relation of C with G and thus the Purine Guanine (G) always pair with the Pyrimidine Cytosine (C)

Erwin Chargaff was an Austrian-American biochemist. He lived from 1905-2002. It was at Columbia University that he discovered this rule.

Learn more from

brainly.com/question/22955213

You might be interested in
Please respond not with answer but with comment.
aksik [14]

Answer:.I used to play it but now I don’t;—;

Explanation:

4 0
3 years ago
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
A hard drive cannot be partitioned until the device <br> is set.
PilotLPTM [1.2K]
Yeah that true I asked my grandpa
3 0
3 years ago
The central processing unit​ (cpu) works in conjunction with​ ________ to perform processing.
Mama L [17]
The central processing unit​ (CPU<span>) </span>works in conjunction<span> with​ </span><span>______ to perform processing</span>
4 0
3 years ago
Ladders are a fundamental piece of equipment on construction sites and employers are expected to ensure that workers follow safe
Ede4ka [16]
That statement is true.

Ladders commonly used to do a couple of construction activities in a higher region of a building or area.
If this equipment is not used properly, it could potentially caused  fatal accidents for the people on the site
6 0
3 years ago
Other questions:
  • What is the difference between pulse code modulation and delta modulation? Provide examples.
    11·1 answer
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • The essence of strategy is ____, so competitive advantage is often gained when an organization tries a strategy that no one has
    15·1 answer
  • Add is a function that accepts two int parameters and returns their sum.
    8·1 answer
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • Charlie is taking his slide presentation to a meeting at a remote location. He saves his presentation as a package on a CD. Char
    15·2 answers
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • What can you find the under the privacy policy section of a shopping website?
    12·1 answer
  • Five uses of the operating system​
    10·2 answers
  • ____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, t
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!