6.What does transgenic mean?​

Answers

Answer 1

answer:

transgenic means that one or more DNA sequences from another species have been introduced by artificial means.

explanation:

transgenic plants can be made by introducing foreign DNA into a variety of different tissuestransgenic mice are one of the most common animal models used
Answer 2

relating to or denoting an organism that contains genetic material into which DNA from an unrelated organism has been artificially introduced. being or used to produce an organism or cell of one species into which one or more genes of another species have been incorporated a transgenic mouse transgenic crops and produced by or consisting of transgenic plants or animals.


Related Questions

What is edge computing?

Answers

Answer:

I basically means something like the cloud, where your data is uploaded to servers and is then processed and transferred back to you when you need it.

Explanation:

Hope this helps :)

A de-centrally-powered, fully accessible IT architecture that always enables mobile computer technology as well as internet technologies, is determined as Edge computing.

Processing is done through edge computing, instead of sent off to the server farm, either by the equipment rather than via a localized server computer system.

Examples of edge computing include:

Smart grid excellent analysis.Oilfield rigs security monitoring.Video streaming.Drone-enabled agricultural management.

Learn more about edge computing here:

https://brainly.com/question/22646214

what are different between system and application software?​

Answers

Answer:

System software is meant to manage the system resources. It serves as the platform to run application software. Application software helps perform a specific set of functions for which they have been designed. Application software is developed in a high-level language such as Java, C++, .

Explanation:

Hope it helps ^-^

#CarryOnLearning

Scenario: A robot is sitting in a chair with its arms facing down. Write an algorithm, using pseudocode, to make the robot:
1. stand up2. walk forward until it senses a wall3. turn around4. walk back to the chair5. sit down in its original starting positionFinally, output the total number of steps taken.Commands--------In addition to our standard pseudocode commands, you must also use the following robot control commands:sitstandstep (one step forward)raise arms (parallel to floor)lower arms (pointing to floor)sense (only if arms are raised)turn (90 degrees right)Immediately after issuing a sense command, you can check whether the robot is at the wall as follows:if at wallor alternativelyif not at wallAssumptions-----------You must assume the following facts:The robot's initial sitting position is directly facing the target wall.There are no obstacles between the robot and the wall.The wall is 1 or more exact steps from the chair.The wall is sensed when it is less than 1 step from the robot's arms.The length of the robot's arms are slightly less than the length of 1 step.Your solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps takenYour solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps taken

Answers

Solution :

[tex]\text{Algorithm to}[/tex] stand [tex]$\etxt{up:}$[/tex]

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

[tex]\text{Algorithm to}[/tex] walk [tex]$\text{until it senses}$[/tex] a wall:

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

step 3: [tex]$\text{wallSensed}$[/tex]=false

step 4: [tex]$\text{numberOfSteps}$[/tex] = 0

step 5: if([tex]$\text{wallSensed}$[/tex]==true) then

[tex]\text{lower arms}[/tex]

step

else

if(sense)

[tex]$\text{wallSensed}$[/tex]=true;

else

step

[tex]$\text{numberOfSteps}$[/tex]++;

step 6: display [tex]$\text{numberOfSteps}$[/tex] to reach the wall

[tex]\text{Algorithm to}[/tex] turn around:

Step [tex]1[/tex]: if([tex]$\text{wallSensed}$[/tex]==true) then

turn

[tex]\text{raise arms}[/tex]

turn

 

[tex]\text{Algorithm to}[/tex] walk back[tex]$\text{ to the chair}$[/tex]:

Step [tex]1[/tex]: [tex]$\text{turn around}$[/tex]

Step 2: for i=[tex]1[/tex] to [tex]$\text{numberOfSteps}$[/tex] do

step

[tex]\text{Algorithm to}[/tex] sit back down:

Step [tex]1[/tex]: sit

Step 2: Lower arms

list with ecamples five important applications areas of computer today​

Answers

Answer:

Banking

Education

Business

Engineering and Architectural designs

Health

Explanation:

Banking : Shifting from the manual method of having to input information into hard book ledgers. Data and payment information can now be stored on computers. This may be used to prevent information duplication, forecasting and efficient payment purposes.

Education : With the use of computers today, students can now take computer based tests which are not only easily accessible and curtails geographical issues, they are also faster.

Business : With computers, businesses can now manage and their store customer information, inventory management and sales tracking.

Engineering and Architectural designs : With computers, thesw fields can now boast of computer aided designs which allows experts produce both 2 and 3 - dimensional prototype of equipments, buildings, building plans or other engineering structures.

Health : Adequate health record, patient appointment, digitally monitored pulse rate are some of the uses of computers in medicine.

How can a DevOps team take advantage of Artificial Intelligence (AI)?

Answers

Answer:

AI/ML can help DevOps teams focus on creativity and innovation by eliminating inefficiencies across the operational life cycle, enabling teams to manage the amount, speed and variability of data. This, in turn, can result in automated enhancement and an increase in DevOps team's efficiency.

Explanation:

Precipitation patterns in gulf Mexico

Answers

Is there a diagram for what your asking ?

What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?

Answers

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

what are the process of boots up a computer?​

Answers

Answer:

a boat causes a computer start cutting cs and max contain built in instructions in a rom or flash memory chip that are automatically excited on started up these instructions search for the operating system load it and pass control to it

write a program to display your name, age and address in c programming​

Answers

Answer:

The program in C is as follows:

#include <stdio.h>

int main(){

   char name[] = "Mr. Royal";

   int age = 20;

   char address[] = "Lagos, Nigeria";

   printf("Your name is %s.\n", name);

   printf("You are %d years old\n", age);

   printf("Your address is %s.", address);

   return 0;

}

Explanation:

This initializes the name

  char name[] = "Mr. Royal";

This initializes the age

   int age = 20;

This initializes the address

   char address[] = "Lagos, Nigeria";

This prints the name

   printf("Your name is %s.\n", name);

This prints the age

  printf("You are %d years old\n", age);

This prints the address

  printf("Your address is %s.", address);

Change the necessary details to yours

Select statements about Multiprocessors that are FALSE. a. Asymmetric multiprocessors are a popular form of tightly coupled architecture b. Symmetric multiprocessors are a popular form of tightly coupled architecture c. Tightly coupled multiprocessors share a single centralized memory, which requires an operating system to synchronize processes carefully to ensure protection d. Loosely coupled multiprocessors have a physically distributed memory and are also known as distributed systems

Answers

Answer:

The statement about Multiprocessors that is FALSE is:

a. Asymmetric multiprocessors are a popular form of tightly coupled architecture

Explanation:

Symmetric multiprocessors house two or more identical processors sharing a single main memory.  The multiprocessors are tightly coupled, and all of them can access all the connected devices without any preferential treatment of one over the others.  This is unlike asymmetric multiprocessors that do not share a single main memory.   Instead, they have distributed memories.

What tasks do date entry macros commonly perform?

Answers

Answer:

set a default date

Explanation:

Date entry macros are used to seta  default date.

Date macros can be used to  create custom date formats.

The network performance is said to be biased when _________.

a) It performs well on train set but poorly on dev set
b) it performs poorly on train set
c) Both the options
d) None of the options

Answers

Answer:

the answer for the question is B

The network performance is said to be biased when it performs poorly on train set.

What is network performance?

A measurement regarding service or the state of quality of network received by the consumer is known as network performance. Operators can control the upper limit of a network performance.

When network operators or service providers put a cap and lower the speed of a network on a train set, it is said to be a biased network performance.

Hence, option B holds true regarding network performance.

Learn more about network performance here:

https://brainly.com/question/12968359

#SPJ2

Identify congruent triangles. Justify why these triangles are congruent?

1. Hanger
2. Watermelon
3. Triangle Ruler
4. Pizza
5. Triangle Roof house​

Answers

4 because it’s a triangular ruler

g Write a function named find_min that takes two numbers as arguments and returns the minimum of the two. (Behavior is not specified for which to return, if they are even -- we won't test that case.) For example: Given 2 and 4, the function returns 2 as the minimum.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

void find_min(int x,int y)//defining a method find_min that takes two parameters

{

   if(x<y)//use if to check x less than y

   {

       cout<<x;//print value x

   }

   else//else block

   {

       cout<<y;//print value y

   }

}

int main()//main method

{

   int x,y;//defining integer variable

   cout<<"Enter first number: ";//print message

   cin>>x;//input value

   cout<<"Enter second number: ";//print message

   cin>>y;//input value

   find_min(x,y);//calling method

   return 0;

}

Output:

Enter first number: 4  

Enter second number: 2  

2

Explanation:

In this code, a method "find_min" that takes two integer variable "x,y" in its parameters and use if block to check its value and print is value.

In the main method, we declared two integer variable "x,y" that takes value from user-end, and pass the value into the method that prints its calculated value.

Given the following code segment, how can you best describe its behavior? i ← 1 FOR EACH x IN list { REMOVE(list, i) random ← RANDOM(1, LENGTH(list)) INSERT(list, random, x) i ← i + 1 }Required to answer. Single choice.
a. This code replaces everything in the list with random numbers.
b. This code shuffles the order of the numbers in the list by removing them and inserting them back in a random place.
c. This code removes all of the numbers in the list and inserts random numbers in random places in the list.
d. This code errors by trying to access an element at an index greater than the length of the list.

Answers

Based on the code segment, we can deduce: B. This code shuffles the order of the numbers in the list by removing them and inserting them back in a random place.

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

Based on the given code segment, we can deduce that this code shuffles the order of the numbers in the list by removing each of them and then inserting them back in a random place.

Read more on computer codes here: brainly.com/question/25619349

Blank Are input instructions you give to a computer

Answers

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

Array unsortedArr contains an unsorted list of integers.
Array sortedArr contains a sorted list of integers.

Which of the following operations are NOT more efficient for sortedArr than unsortedArr? Assume the most efficient algorithms are used.

I. Searching for a given element
II. Finding the minimum
III. Inserting an element

a. Ill only
b. Il only
c. I only
d. I and II
e. I and III

Answers

Answer:

a. Ill only

Explanation:

This is because, for option III, in inserting an element, one only need the array key for the position in which to insert the element and this is irrespective of whether the array is sorted or not.

Whereas, options I and II are easier done in a sorted array than in an unsorted array.

Software that enables the organization to centralize data is called A. Data Repository B. Data Base Management System C. Data Warehouse D. Data Mart E. Data File

Answers

Answer:

B. Data Base Management System

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Hence, a software that enables the organization to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data, is called a Data Base Management System (DBMS).

To delete a persistent cookie, you Group of answer choices Use the Clear method of the HttpCookieCollection class Use the Remove method of the HttpCookieCollection class Set the Expires property of the cookie to a time in the past Set the Expires property of the cookie to -1

Answers

Answer:

Explanation:  

To delete a persistent cookie, you a. use the Clear method of the HttpCookieCollection class b. use the Remove method of the HttpCookieCollection class c. set the Expires property of the cookie to a time in the past d. set the …

c. set the Expires property of the cookie to a time in the past

What protects your computer so that it doesn’t get a computer virus?

Internet Browser

Antivirus Software

Keyboard Protector

My Teacher

Answers

Answer:

Antivirus Software

Explanation:

I believe Antivirus Software.

Sorry if I am wrong.

Answer:

Antivirus Software

Explanation:

Antivirus scans the incoming files or code that has been passed through your network traffic. Companies who build these softwares maintain a database of viruses that are already known. That database teaches the antivirus to remove, flag or quarantine any viruses in your computer.

Which avenue may utilize video streaming, audio narration, print designs and animation?

The (blank) may utilize video streaming, audio narration, print designs and animation.

Answers

Answer:

Explanation:

Multimedia medium may utilize video streaming, audio narration, print designs and animation as they are all part of it.

Answer:

Explanation:

ans is multimedia as it contains all of 'em

What is a word processing program? Give examples of word processing programs.

Answers

Answer:

A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.

What is a
a program​

Answers

Answer:

-a collection of related measures or activities aimed at achieving a specific long-term goal.

-a set of pre-programmed software instructions for controlling the operation of a computer or other machine

-provide (a computer or other machine) with pre-programmed instructions for completing a task automatically

-Organize according to a schedule or plan.

Explanation:

Answer:

A program is an set of instructions given by a computer to perform particular task

What blockchain implementation resulted from bitcoin’s rejection of a recommendation to enhance its scripting language support? Ethereum Hyperledger Fabric Multichain IOTA

Answers

Ethereum is the correct answer.

A major university develops an assessment that is meant to provide data on whether potential students will be successful at the university level. If there is a relationship between the results of the assessment and student success, that will best indicate that the assessment has:___.

Answers

Answer:

Predictive validity.

Explanation:

A correlation can be defined as a numerical measure of the relationship existing between two variables (x and y).

In Mathematics and Statistics, a group of data can either be negatively correlated, positively correlated or not correlated at all.

1. For a negative correlation: a set of values in a data increases, when the other set begins to decrease. Here, the correlation coefficient is less than zero (0).

2. For a positive correlation: a set of values in a data increases, when the other set also increases. Here, the correlation coefficient is greater than zero (0).

3. For no or zero correlation: a set of values in a data has no effect on the other set. Here, the correlation coefficient is equal to zero (0).

A predictive validity can be defined as a measure of the extent to which a test score on a scale is able to predict scores based on certain criteria. Thus, it's a measure of the degree to which a certain criteria can predict future behavior or performance.

One of the most common area in which predictive validity is used is in university or college admissions such as in how scores on an assessment or test are related to performance based on a standard or criterion.

In this scenario, there exists a statistical relationship between the results of the assessment conducted and number of students who were successful. Thus, this will best indicate that the assessment has predictive validity.

binary calculation of 1110÷101​

Answers

10.90 not sure tho. POWKSKS
10.99009900990099





Would be the answer

Amy’s new summer job at the pool will put $9 per hour. Which term describes this type of hourly income?
A. Salary
B. Take-home pay
C. Wage
D. All of the above

Answers

Answer:

d

Explanation:

Question # 18
Dropdown
A(n)
is the tool that will help you the most when developing the content you will use in your presentation.

Answers

Your answer is outline.

An outline is the tool that will help you the most when developing the content you will use in your presentation.

What is presentation?

A presentation is a method of communicating information from a speaker to an audience.

Presentations are usually demonstrations, introductions, lectures, or speeches intended to inform, persuade, inspire, motivate, build goodwill, or introduce a new idea/product.

An outline is a list of the main topics and subtopics that you intend to cover in your presentation in a hierarchical order.

It can assist you in ensuring that your ideas flow logically and that no important points are overlooked.

A storyboard, on the other hand, is a visual representation of your presentation that shows the order of your slides, the images or videos you intend to use, and the text that will go with them.

Thus, the answer is outline.

For more details regarding presentation, visit:

https://brainly.com/question/938745

#SPJ7

what is gradient descent in neural networks?​

Answers

Answer:

radient Descent is a process that occurs in the backpropagation phase where the goal is to continuously resample the gradient of the model's parameter in the opposite direction

What most defines a community in the digital age?

Answers

The information age of people texting talking on a cellular device and browising the internet
Other Questions
need he,p pls and thank u Mis companeros de clase y yo _____(escribir) informes sobre el Morro, un castillo enPuerto Rico.A.escribisteisB.escribieronC.escribisteD.escribimos help plz ill give brainly 2. What is the mode of this data set?14, 79, 77, 11, 14, 78, 77, 65, 31, 56, 16561411 and 5614 and 77 In the early 1800s, the concept of manifest Destiny led to which situation?A . creation of a national bankB .abolition of slaveryC .support for immigration D . focus on westward expansion Capital budgeting is the process of analyzing: Group of answer choices Cash outflows only. Investments with certain outcomes only. Short-term investments. Operating revenues. Long-term investments. Find the value of X. If necessary write in radical form Suppose the cost of electricity is $0.30 for each kilowatt-hour. Carlos's house runs on 11.4 kilowatt-hours a day. Find the cost of electricity for Carlos's house in one day. A play runs for five evenings. The table shows the number of tickets sold and the amount of money collected each evening.What is the cost per ticket? Alans gift basket contains three oranges for every five apples. If the basket has nine oranges, how many apples does it have? Can someone please help PLEASEEEE HELLPPPPPPPPP PLEASE HELP! I WILL GIVE BRAINLIEST!?! Why is lessons learned at home more effective PLS HELP FAST WILL GIVE YOU 5 STARSWhich statement accurately describes the Black Death that struck Europe in the fourteenth century?The effects of the plague stopped all advancements in science and medicine for the next two centuries.Skills such as making shoes and blowing glass were lost for many years.The plague left Europe with fewer workers, so those who survived could demand higher wages and more freedom.Peasants and nobles alike lost their faith and stopped attending church because of the devastation. 400plus2000minus45000000 what 3 words or 3 phrases that would help you remember the steps to Covalent and Ionic bonding? 8 +5+9+3 how can I solve this When an acetic acid solution is titrated with sodium hydroxide, the slope of the titration curve (pH versus volume of NaOH added) increases when sodium hydroxide is first added. This change shows that ________ A tutor invited 3 students to a study group. Those 3 students each invited 3 students to the study group. Then those additional students each invited 3 students to the study group. How many total students are invited to the study group?