1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
2 years ago
8

According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.

Computers and Technology
1 answer:
postnew [5]2 years ago
6 0

The Chargaff's rule state that in DNA, equality often exist in quantity between the bases A and T and between the bases G and C. According to Chargaff's data, adenine must pair with thymine and guanine must pair with cytosine.

  • Chargaff's gave rules for the pairing of bases. The rule is made up of base pairs in the DNA double helix.

He stated that there is a relation of A with T. The Pyrimidine Thymine (T) will always pairs with the Purine Adenine (A)

and also there is a relation of C with G and thus the Purine Guanine (G) always pair with the Pyrimidine Cytosine (C)

Erwin Chargaff was an Austrian-American biochemist. He lived from 1905-2002. It was at Columbia University that he discovered this rule.

Learn more from

brainly.com/question/22955213

You might be interested in
Savings accounts typically offer more interest than what
Serga [27]
The answer to this is B
8 0
3 years ago
Exceptions can be handled in all of these ways except:
KatRina [158]

Answer: A) Modular decomposition

Explanation: Modular decomposition is the composition of a graphs into small modules. These modules are the subset of the whole graphs and thus the part of the graph. These modules are these very design efficient and so they are not capable of handling the exceptions .They have precise representation which has modules which cannot seem to have exception because that will disturb the structure of the graph .

6 0
3 years ago
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
Leno4ka [110]

Answer:

D

Explanation:

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

5 0
3 years ago
From where do we get information or knowledge? Explain.
Tems11 [23]

Answer:

the explanations is down here,

Explanation:

Information

Data reaches a more complex level and becomes information by integrating them to a context. Information provides expertise about facts or persons. Example of information: The information about a date of birth still has very little value when it is unknown to which person it belongs. By adding more information like the name, the linked information creates knowledge about a person.

Knowledge

Knowledge thus describes the collected information that is available about a particular fact or a person. The knowledge of this situation makes it possible to make informed decisions and solve problems. Thus, knowledge influences the thinking and actions of people. Machines can also make decisions based on new knowledge generated by information. In order to gain knowledge, it is necessary to process information.

7 0
3 years ago
Read 2 more answers
Justine was interested in learning how to play the piano. She has successfully passed every level of music book and is planning
mamaluj [8]
C because she is not a mentor yet as she hasn’t taught anyone else but she has passed every level so the best would be c
5 0
2 years ago
Other questions:
  • What filter gives a “squeezed” effect to an image?
    14·2 answers
  • When you compose a message, you want your audience to find the information it needs quickly and to understand what it finds. You
    11·1 answer
  • So when i try to click on an assignment to answer it the ask a question thing pops up and i can't exit out of it. I've tried rel
    10·2 answers
  • How can you remove heat from a computer?
    10·1 answer
  • When designing your navigation, your primary objective should be to include keywords for search engines.
    6·1 answer
  • Name the application used for creating Presentations___
    5·2 answers
  • On start up, which of these windows is not displayed ?
    15·2 answers
  • 1. Name the three kinds of Eraser in Photoshop. <br>​
    8·2 answers
  • Suppose we used an internet addressing protocol that used 4 bits to encode a single address. How many devices would be supported
    15·1 answer
  • Record the issue of 4,000 shares of $5 par value common stock for $35000 cash
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!