what is a point-in-time measurement of system performance?​

Answers

Answer 1

Answer:

Point-in-time analysis is essentially the measurement of manager performance from an arbitrarily selected endpoint (usually the most recent month, quarter or year-end) over trailing periods of time.

Explanation:

Answer 2

The point-in-time analysis is the measurement of manager performance from an arbitrarily selected endpoint over periods of time.

What is system performance?

System performance is the amount of useful work that is done by a system measured by the production speed of the products of a predefined quality.

Hence, point-in-time measurement of system performance is the measurement of manager performance from an arbitrarily selected endpoint over periods of time.

Learn more about system on:

https://brainly.com/question/847634

#SPJ9


Related Questions

Before you enter an intersection on a green light, make sure _____.

Answers

Answer:Make sure nobody doesn't go on a red light when you are going on your green light.

Explanation:

Before entering an intersection on a green light, ensure the path is clear and there are no lingering hazards. Adequate distance and timing judgment are critical, along with preparing to stop at a yellow light to navigate safely.

Before you enter an intersection on a green light, make sure the intersection is clear of traffic and it is safe to proceed. Even when the traffic light is green, there may be circumstances where vehicles or pedestrians are still in the intersection, which could lead to potential hazards. It is also essential to be aware of the 'no-win' zone described by traffic engineers, where a driver is too far to safely make it through the intersection before the light changes, yet too close to stop safely. This highlights the importance of judging the distance and timing accurately to make safe decisions when driving. Driving at a moderate speed, being prepared to stop when the light turns yellow, and giving yourself enough time to react are key to safely navigating intersections.

PLEASE HELP!!!!

the introduction of the 8-bit computer expanded the number of bytes available for encoding. This led to the development of
a: octets.
b: Apple and Xerox.
c: ASCII.
d: Unicode.

Answers

C - ASCII (It is an encoding standard for text)

Answer:

C. ASCII

Explanation:

ASCII is the abbreviation for American Standard Code for Information Interchange. It is a system of representing characters using 8-bits. The 8th bit is actually a parity bit used for parity check which is a form of error-checking. Since the parity check uses up one bit, only 7 bits are available for characters representation. Therefore, ASCII typically represents only 128 characters (calculated from 2 ^ 7 = 128). For example the ASCII code for the lower case letter b is 98 and that of upper case letter A is 65.

Hope this helps!

Which of the following is a good technique to use when driving in an urban environment
A. Passing
B. Drowsy driving
C. Cover braking
D. Drifting

Answers

Answer:

A. Passing

Explanation:

Passing is a good technique to use when driving in an urban environment .

The correct answer is C. Cover braking

Explanation:

Driving in cities has multiple challenges in comparison to driving in small settlements or highways between cities. One of the techniques that you should use when driving in an urban environment is cover braking that implies hovering your foot over the brake to use if it is required. This technique is recommended because due to high traffic, people or traffic lights in cities, you might need to stop your car suddenly and by using cover braking you can do it effectively and in this way avoid possible accidents. Thus, cover braking is a good technique to use when driving in an urban environment.

In web developing, what are the differences between front-end developer, back-end developer and full stuck developer?

Answers

When it comes to front end, back end and full stack developer, the difference is determined by :

front end (the visible parts of a website)

back end (the “under the hood” databases and infrastructure)

full stack (a hybrid of both)

And front end developers work on technologies that are used to build front end(which is what clients visiting that website see)of application like HTML,CSS, Javascript ( Node js, Angular are also now used ).

Similarly back end developers work on back end technologies like Node js.

Full stack developers work on both front end and back end developers and know  both end technologies as well.

For example :

MEAN Stack developer where

M stands for Mongoose ( Back end database technology )

E stands for Express ( Back end technology)

A stands for angular ( front end technology)

N stands for Node ( back end technology)

A set of connected ideas supported by examples is ?

Answers

Answer:

Argument

Explanation:

Argument - A set of connected ideas, supported by examples, made by a writer to prove or disprove a point.

Answer:

An argument is the set of connected ideas. Normally people argue when they have cross opinion in the discussion topic.

Explanation:

Even in interviews, the group discussion will be an important round because there the analysis skill, communication and pointers they the candidate speak is evaluated.

All these leads to argument rather than a simple discussion. The people who keep proper pointers in front of the group normally wins instead of people who are shouting without a valid pointer or saying the same point again and again without any facts or proof.

What type of number can be written as a fraction, where p and q are
integers and q is not equal to zero?​

Answers

Answer:

Rational numbers

Explanation:

Contrary to irrational numbers like pi and √2, rational numbers can be written as a fraction. The set of rational numbers is denoted by the letter Q.

What would you call 2-1-1 for?
A.Help after a car crash
B.Help after a home breaking
C.A referral to counseling
D.Product safety information

Answers

2-1-1 is called for non-emergency help like counseling referrals, not for urgent situations like car crashes or home breakings, where 911 should be called.

You would call 2-1-1 for non-emergency help such as a referral to counseling or community services. It's a resource for finding support and assistance for various needs, including mental health resources, domestic violence shelter information, or crisis intervention, among other things. It's important to know that in case of immediate danger or emergencies, such as a car crash or home breaking, you should always call 911.

When there is a limited amount of a product, such as rare art or collectible
cars, this is known as
O
A. supply
O
B. elasticity
O
C. scarcity
O
D. demand

Answers

Answer:

scarcity

Explanation:

When there is a limited amount of a product, such as rare art or collectible cars, this is known as scarcity. The correct option is C.

What is scarcity?

When a resource is scarce, it means that there are less of it than there are wants. Scarcity can refer to any limited supply of a scarce resource or a commodity. Paucity of resources is another name for scarcity.

The state of being scarce, in short quantity, or fundamentally shortage is how scarcity is generally defined.

There are four main causes of scarcity, however there may be other factors involved. Potential reasons of scarcity include unequal resource distribution, one's own perspective on resources, a sharp rise in demand, and a sharp fall in supply.

Scarcity refers to the limited availability of a good, such as rare paintings or collectible cars.

Thus, the correct option is C.

For more details regarding scarcity, visit:

https://brainly.com/question/13186252

#SPJ2

what is the seven major components of IT infrastructure?​

Answers

Answer:

Explanation:

These are the seven major components of IT infrastructure

1. Operating system platforms

2. Networking & telecommunication

3. Computer Hardwares

4. Data storage and management

5. Internet network

6. Consulting and system integeration service

7. Enterprise softwares

These components are necessary in order to run a success business in the IT field.

The seven major components of IT infrastructure are:

Hardware platforms: This term includes almost all the devices and peripherals that belongs to a system. It includes networks (clients & server machine) and so on.

OS: Operating system acts as an “interface” between human and the computer machine. It includes OS installed in the client as well as server.

Software applications: These include all front-end and other supporting software in all the system in the network.

Enterprise Software Application: It includes largest enterprise software provider viz. SAP, Oracle, etc.

DBMS: This includes SQL Server, SYBASE etc.

Networking: Includes everything which uses TCP / IP

Internet Platform: It includes Web application development tools, web-services, etc

Consulting and System integration services: Depends on the firm’s legacy system

outlines are effective because

Answers

Outlines are effective because you can make a more effective communicator as well as they can prevent writers block.

discussion group may have a___________ who monitors the postings and enforces the sides rules​

Answers

Answer: censor

Explanation: discussion groups may have a censor who monitors the posting and enforces the site's rules.

[tex]\textit{\textbf{Spymore}}[/tex]​​​​​​

Identified limitations to the design of a product or system are the _________________.
Trade-offs
Efficiency
Criteria
Constraints

Answers

Answer:

Criteria

Explanation:

Identified limitations to the design of a product or system are the criteria.

A criteria is a subject or topic.

Identified limitations to the design of a product or system are the criteria.

What is product design?

The product design describes the process which involves imagining, creating, and iterating products and its dimensions. The successful product design is understanding the needs of end-user customer, the person for whom the product is being created.

Thus, Identified limitations to the design of a product or system are the criteria.

Learn more about product design.

https://brainly.com/question/26015791

#SPJ2

Which line spacing option works well for printing and editing a document?
a. single spacing
b. one and a half spacing
c. 1.15 spacing
d. double spacing
please can someone help me I need help quickly!!!

Answers

Double spacing is the correct one to use
D. Double spacing is the correct one

Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a malicious file b) A link in an email that downloads a virus c) An executable file that replicates throughout the network d) A computer game that creates a backdoor into your computer

Answers

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

Answer:

d) A computer game that creates a backdoor into your computer

Explanation:

Trojan horse is a type of malware that is often disguised as legitimate software. They can be employed by cyber criminals and hackers to try to gain access to users' systems. In general, users are tricked by some form of social engineering to load and run Trojans on their systems. Once activated, Trojans allow criminals to spy on you, steal your confidential data and gain access to your system through the back door. An example of a Trojan horse is a computer game that creates a backdoor on your computer.

With a backdoor Trojan horse, malicious users remotely control the infected computer. With it, the author can do whatever he wants on the infected computer, such as sending, receiving, starting and deleting files, displaying data and restarting the computer. Backdoor Trojans are often used to assemble a set of computers and form a botnet or zombie network, which can be used for criminal purposes.

Navigational signs on the highway are often which colors?
A. White or black
B. Red or yellow
C. Orange or purple
D. Green or blue

Answers

Answer:D

Explanation:

what is <html>

A. the closing tag for an html document
B. the closing tag for a heading
C. the opening tag for the first heading
D. the opening tag for an html document​

Answers

Answer:

I believe the answer would be D.

Explanation:

The <html> element is the root element of an HTML page, it defines an HTML document. An opening <html> tag should appear first and a closing </html> tag should appear at the bottom of the document.  

Read more: https://html.com/document/#ixzz5tii0a1Lh

how does ict affect the philippines in different aspects of living

Answers

Answer:ict affectts the liv8ng of philippines but in a good way

Explanation:because it can help philippines richee in the knowledge oglf computer bur if you use it in the good way making programs are the example of it and also

Follow the 10 commandments of computer ethichs



When parking on hills or an unlevel surface, make sure your_____is
engaged when you leave the vehicle.


A. turn signal
B. accelerator
C. brake pedal
D. parking brake

Answers



When parking on hills or an unlevel surface, make sure your parking brake is
engaged when you leave the vehicle.

I would say break petal if parking brake is wrong....

hey i need help in this for 50 points you'll use a word processor to create a newsletter. Choose from one of the following topics for your newsletter: Science project Science report State report Country report Biography Your newsletter should meet these requirements: Fill one page. Include the following: two or three columns a title at least three graphics, but not more than six When you've finished creating your newsletter, remember to spell check and proofread

Answers

Answer:

Recommendation from I:

Explanation:

I recommend science report, I love science so it would benefit you. The science report title would be the Theory of Cell Evolution.

Column one:

Prokaryotic and Eukaryotic Cells

Prokaryotic cells are simple structured cells such as bacteria and algae. A prokaryotic consists of a thin bio-lipid layer, cytoplasm, scattered dna and little to almost no ribosomes. Prokaryotic cells create their own energy and reproduce with no assistance from splitting based organelles. Eukaryotic cells are more complex cells. Eukaryotic cells come from ancestor Eukaryotic and Prokaryotic cells. Eukaryotic cells are made of different organelles which serves their own purpose in the cell. The cell membrane, cytoplasm, nucleus, golgi apparatus, endoplasmic reticulum, mitochondria, ribosomes, vacuoles, and depending on the type of Eukaryotic, centrioles and chloroplasts.

How modern Eukaryotic Cells came to be

The Theory of Cell Evolution states that Eukaryotics have built from Prokaryotics. The first Eukaryotic cell was believed to be loose cytoplasm and cell membrane. This Eukaryotic cell had it's own Nucleus. This Eukaryotic consumed a Prokaryotic cell which produced it's own energy, which led to the creation of a dependant mitochondria organelle. This Eukaryotic cell later then consumed another Prokaryotic cell which produced it's own proteins. This Prokaryotic led to the creation of the Golgi Apparatus, an organelle. These Eukaryotic cells ended up reproducing therefore creating more present Eukaryotic cells, which consumed more Prokaryotic cell basis with each it's own purpose.

Animal and Plant cells

Animal and plant cells are both Eukaryotic cells. An animal cell consists of all current organelles but no chloroplast or cell wall. Animal cells have centrioles which aid in their cell reproduction. Plant cells consist of all current organelles including chloroplasts, cell wall, and a vacuole which takes up 95% of the cell's structure, but no centriole to aid it's cell reproduction. This is because plant cells rely on their bio-protein and nutrient cell wall to aid in cell reproduction. There are different types of cells for their own based system though, such as muscle cells, brain cells, blood cells, lung cells, and etc.

Graphic Images:

Insert image of Prokaryotic cell

Insert image of early Eukaryotic cell

Insert image of plant cell

Insert image of animal cell.

Hope this helps :)

I will be doing the biography report.  

The Biography and Life of Henry Ford.

Column One: Who was Henry Ford?

Henry Ford was the founder of Ford Motor Company and also the mass producer of the automobile. Henry Ford was born in 1863. At the age of 16, he worked as a machinist apprentice. Later, Henry began to work the family farm while still working on creating steam engines. Henry had a big interest in steam engines, which would later contribute to him building his first working automobile.

Column Two: How did Henry Ford contribute to our society?

After marrying in 1888, Ford was hired to work for Edison Illuminating Company. His position was an engineer, and Ford began to accelerate his position in the company quickly. After a while, Ford created his first operating vehicle. This was called the "Quadricycle." Ford wanted to improve on his models, so he founded the Company Ford with others. Ford then began to develop methods of mass-producing automobiles to sell to the public. After success in business, he bought the whole company and owned it all by himself. Ford began to mass-produce automobiles. It is said that " The mass production techniques Henry Ford championed eventually allowed Ford Motor Company to turn out one Model T every 24 seconds." Ford passed away in 1945. He decided to give ownership to his son Edsel Ford before he died, but Edsel sadly died before Henry Ford. The Ford company's ownership was given to Ford's grandson, Henry Ford II.

Three Graphics:

Which of the selections below is NOT a benefit of imaging the computers on your network? Question 5 options: a) It saves the time of having to install the required computer applications. b) It saves the time of having to install the desired operating system. c) There are fewer licensing fees because the OS is only installed once. d) It helps to lessen the impact of spyware on the network.

Answers

Option D is the answer because having computer network on computers does not help to avoid spyware, there are other software that help us to avoid spyware for example Norton spyware which does not come with computer networks.

It helps in installing computer applications like OS updates are installed because of it so option A is actually is a benefit.

As the computer OS is updated by the networks so it actually helps you to install the desired OS, the best example is when people update windows 10 from windows 7, so Option B is also an actual benefit.

Yes, many software are licensed when you buy a OS so option C is also an actual benefit.

Select the correct answer. Rachel needs to make a presentation on ethics and etiquettes in college. She has about 30 minutes to deliver her complete presentation. How can Rachel ensure that the presentation is completed within the specified time frame of 30 minutes? A. use the slide timing feature to rehearse and set the time per slide B. use a lesser number of slides to reduce the total time taken for the presentation C. use the View Slideshow tab to set up the timing for the presentation D. use reduced content to complete the presentation on time E. use a simple slide layout to move through slides faster

Answers

Option A is the best option. If Rachel knows how  many slides she need, by this she will get a plan for time she need to give to per slide and she can come up with whole presentation done in 30 minutes.

Explaination :

Option B is not good option because here number of slides is the constraint when she knows how much time she will spend on per slide. Also, she should explain the topic by the time she has not by the number of slides.

Option C, again option C uses the number of slides as major constraint.

Option D, reducing the content can cause problems with quality of presentation as she would not be able to explain much.

Option E, she will have to spent time to edit the layouts because mostly layouts are not that friendly.

The purpose of hazard lights is to

A. notify emergency vehicles to stop and help you
B. warn other drivers to stay away from you
C. show other drivers that your vehicle is disabled
D. show other drivers where your vehicle is

Answers

It should be noted that the purpose of hazard lights is to D. show other drivers where your vehicle is.

What are hazard warning lights?

The Hazard warning lights  can be regarded as a pair of intermittent flashing indicator lights which function to notify the other driver about temporary obstruction.

They are been put in place to show other drivers where your vehicle is.

Learn more about  hazard lights at:

https://brainly.com/question/24623157

The first step to changing lanes is
A. honking so everyone knows
B. matching your speed
C. signaling your intent
D. telling your passengers

Answers

It’s obviously C.Signaling your intent by using your blinkers also known as the lights at the back of your car!
C. You have to signal that you are switching lanes by using your blinkers.

The acronym LAH stands for
A. Long Application Highway
B. Limited Application Highway
C. Long Access Highway
D. Limited Access Highway

Answers

Answer:

D limited access highway

The acronym LAH is known to stands for D. Limited Access Highway

The acronym LAH

The abbreviation LAH means Limited Access Highway. A limited-access highway is a special road where cars can go really fast. People can only get on or off the highway at specific points.

These roads have no driveways that directly connect to businesses or homes, so the traffic can flow smoothly and the chances of accidents at intersections are reduced. Some examples of roads that you can only access from specific points are freeways and expressways.

Hence option d is correct.

Read more about acronym here:

https://brainly.com/question/20664471

#SPJ6

SQL>
Question
You need to start your database so you can rename
some of the data files associated with the database You
must ensure that other users cannot connect and start
transactions. Specify the command to start the database
in the appropriate mode.
Type your answer and select Done.
Done​

Answers

All you need to do is to lock the Database on which you want to work and after working on it you unlock it by using key words defined by the tool you are using.

As far as my experience is concerned 99.9% of the times we lock the TABLE on which we want to make changes or execute some queries.

Different tools have different syntax to do this for example for MYSQL we use:

 

LOCK TABLES table_name [READ | WRITE]

to lock the table and when we are done working on it we unlock it by executing :

Unlock Tables

Because of the density of vehicle in urban areas, you should ____.

A. Install sensors on all sides of your vehicle
B.keep an eye on your blind spots and watch for motorcycle
C . Ignore your blind spots and any motorcycles
D. Tailgate to maximize space efficiency

Answers

Answer:

B. keep an eye on your blind spots and watch for motorcycle

Explanation:

Because of the density of vehicle in urban areas, you should keep an eye on your blind spots and watch for motorcycles.

Answer:

The correct answer to the following question will be Option B.

Explanation:

Blind spots are the parts of the vehicles that can not be seen in front or across the rear or side mirrors. By carefully adjusting the rear and side mirror or adding a larger field of view, blind spots can be eliminated.Because of the density of the vehicles in the urban areas, the blind spots cannot be ignored they should be considered to avoid the clashes on the road.All the vehicles can't install the sensors on all sides of the vehicle. Also, tailgating is not possible because of the density of vehicles.  

Which document would most likely be written in an informal style?

Answers

Answer:

An advertisement for sportswear

Explanation:

An advertisement for sportswear would most likely be written in an informal style.

which statement is true for a career as a graphic designer?

Answers

Answer:

The answer is B.

Explanation:

As a graphic designer you are responsible for almost anything you do! :)

Hope this helps

Answer:

The answer is choice B. You are responsible for the overall design of advertisements, logos, and websites.

History timeline: who developed what elements first Windows OS and Apple OS?

Answers

Answer:

i think bill gates

Explanation:

Windows was originally just a Graphical user extension to Microsoft existing product MS-DOS. Most operating system under the windows brand had been based on the MS-DOS architecture (apart from NT). Windows XP had been the first home consumer operating system to be shipped to customers that had been based on the NT version of windows. To this day, windows is still based upon the NT architecture.

Apple’s operating systems are built upon NeXTSTEP that was created by Steve Jobs during his absence from Apple. Upon Steve Job’s return to Apple, NeXTSTEP had been bought by apple and the NeXTSTEP operating system laid the foundations for all of Apple’s operating systems (macOS, iOS, watchOS and tvOS).

Create a horizontal line across middle of the entire form. To code this the ____ values are the same.

Answers

To make a horizontal line in mathematics you require some sort of constant function. Where no matter the input x the output y will always equal to a certain number n.

For eg. consider n = 2. Hence the graph of line has an equation of y = n making it always intercept in (x, n). As x increases the y is the same therefore the horizontal infinite line emerges.

So to plot or code this kind of program you need to have the same values of y therefore y is a constant function.

Hope this helps.

r3t40

Answer:

The answer is "Y".

Explanation:

In programming language and mathematics both use coordinates to represent horizontal line and both terms description as follows:

In visual programming, To represent an object graphically we use coordinates. The "y" axis is used to represent a horizontal line and it creates a line from the entire form. In mathematics, To make a horizontal line in the entire form the constant function is used.

Other Questions
Where in the cell does translation occur? the cytoplasm the promoter the nucleus the DNA if a + b = -6 and x + y + z = -2, what is 8a - 7x - 7z - 7y + 8b CAM plants lose their _____ during the day and open them at night.a) thylakoidsb)chloroplastsc)vascular bundlesd)stomata if f(x)=3 x and g(x)= 1/x , what is the domain of (g o f)(x)? HELP IF YOU KNOW FRENCH QUICKDescribe what you are wearing. Include at least three articles of clothing and their colors. Remember to place your adjective (color) after the noun (clothing article) and also remember the rules of adjective agreement.Examples:Je porte une chemise verte. (Feminine and singular)Je porte des bottes vertes. (Feminine and plural) A cylinder is fitted with a piston, beneath which is a spring, as in the drawing. The cylinder is open to the air at the top. Friction is absent. The spring constant of the spring is 3600 N/m. The piston has a negligible mass and a radius of 0.028 m. (a) When the air beneath the piston is completely pumped out, how much does the atmospheric pressure cause the spring to compress? (b) How much work does the atmospheric pressure do in compressing the spring? Chris wanted to transform the graph of the parent function Y= cot (x) by horizontally compressing it so that it has a period of 2/ units, horizontally Terslating it /4 units to the right, and vertically translating it 1 unit up. To do so, he graphed the function y= cot (2x-/4)+1 as shown. What did he do wrong? if 12.5%of x is 6 ,find the value of x From the communities of interest and the CPMT, the executive leadership of the organization should begin building the team responsible for all subsequent IR planning and development activities. This team, the ____________________ team should consist of individuals from all relevant constituent groups that will be affected by the actions of the frontline response teams. Red light from three separate sources passes through a diffraction grating with 6.60105 slits/m. The wavelengths of the three lines are 6.56 107m (hydrogen), 6.50 107m (neon), and 6.97 107m (argon). Part A Calculate the angle for the first-order diffraction line of first source (hydrogen). Express your answer using three significant figures. In The Federalist Papers, James Madison argued that Select one:A. the large size of the United States was a source of political stability B. to be a republic, a country must be geographically smallC. church and state must be linked in order to encourage republican virtued. D. it was essential that slavery be abolished for liberty to flourish Solve the system of equations and choose the correct ordered pair.2x - 6y = 85x - 4y = 31 What is the range of the function f(x)=-(x+3)^2+7 HELPPP ASAPPPThe data to represent average test scores for a class of 16 students includes an outlier value of 91. If the outlier is included, then the mean is 80. Which statement is always true about the new data when the outlier is removed? The median would decrease. The median would increase. The mean would decrease. The mean would increase. Larry is paid 8.5% of all sales plus 4.25% of all sales over $6800. Find Larry's gross pay from total sales of $12,300? 7 is what percent of 8 Iraq War Blog: What information mainly does the following passage convey?"There is no ideal way to prevent such things from happening. If the boy leaves alone in his car, theyll abduct him. If he leaves with a driverrelated or notno one can prevent an abduction. We heard of many situations. Every story has different details that leads one to believe that there is no way to prevent it. There are even people who were abducted right in the middle of their personal bodyguards, so I know its not from a lack of caution.a) Abductions can be stopped by taking the proper precautions.b) Violence is worse in Iraq than in neighboring countries.c) There is a sense of helplessness in dealing with the surrounding violence.d) Having bodyguards is essential in post-occupation Iraq.Incorrect. Having personal bodyguards does not seem to stop abductions, either. A 300 g bird is flying along at 6.0 m/s and sees a 10 g insect heading straight towards it with a speed of 30 m/s. The bird opens its mouth wide and swallows the insect. a. What is the birds speed immediately after swallowing the insect? b. What is the impulse on the bird? c. If the impact lasts 0.015 s, what is the force between the bird and the insect? NEEED HPP!!!Kelly bought a new car for $20,000. The car depreciates at a rate of 10% per year.What is the decay factor for the value of the car?Write an equation to model the cars value.Use your equation to determine the value of the car six years after Kelly purchased it. _was a key technique used to explain the structure of DNA