1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
2 years ago
10

Create a journal entry. Imagine that you are an ecologist.Choose one plant or animal in nature and write two relationships of th

at organism in it’s environment ?
Biology
1 answer:
damaskus [11]2 years ago
4 0
No offense, but you’re asking somebody to write basically an entire essay. Try to think of what YOU would do. Every journal is written differently.
You might be interested in
Brown mice disappear from the mouse population for two generations and then reappear in the third generation. Give two possible
gizmo_the_mogwai [7]

Answer:

The trait is inherited in the homozygous recessive pattern

Possible mating is between two heterozygous individuals

Explanation:

One possible explanation for this is that the trait for this brown mice has to inherited in the homozygous recessive condition. It is possible for this trait to skip two generations and then reappear if it has to be inherited in the homozygous recessive condition.

Another explanation to complement the first is that for this trait to reappear, there was mating between two heterozygous individuals (with one allele being domiant and the other being recessive). It is possible that all matings within the two skipped generations was between an heterozygous and a homozygous dominant or between two homozygous dominant individuals which will not produce the brown mice..

5 0
3 years ago
Passwords, tokens, and fingerprint scans are all examples of ________. identification authentication authorization credentials
julia-pushkina [17]
The answer to the fill in the blank is option B) Authentication


Passwords, tokens, and fingerprint scans are all examples of Authentication.

We use passwords, tokens and even fingerprints since they can be unique identifications and are usually seen as more secure.

In the above options, fingerprints are seen as the most secure form of authentication since everyone has unique fingerprints.

One of the earliest forms of authentication were time cards used as early as the 1950s and even unique keys and stamps used by early civilizations.


5 0
3 years ago
how is it possible for a child to end up with a diiferent genotype or phenotype than either of their parents?
Naddik [55]
Tall parents can have a short child, short parents can have a tall child , and two parents of the same height may have a child in between? 
5 0
3 years ago
Read 2 more answers
9) How long was the Northeastern, United States blanketed by the ice sheet?
I am Lyosha [343]

Answer:

between c. 95,000 and c. 20,000 years

Explanation:

3 0
3 years ago
Adenine methylase is an enzyme used during mismatch repair (MMR). It helps determine which strand needs to be repaired by discri
I am Lyosha [343]

Answer:

The correct answer would be - MMR would be hindered because both strands would be unmethylated and both would appear as new DNA strands and it would not be able to determine which strand has the error .

Explanation:

In gene expression or DNA replication, the enzyme responsible for the synthesis of DNA from nucleoside triphosphate causes errors sometimes such as mismatch base pair that result in a change in genetic makeup.

For MMR, the DNA template and the strand formed required easily to be differentiated. As the newly synthesized strand is unmethylated and the DNA template strand is methylated results in DNA remain hemimethylated for a very short period.

After MMR, DNA adenine methylase enzyme that transfers a methyl group to the adenine of the sequence 5'-GATC-3' daughter strand formed.

Mutated DAM or DNA adenine methylase will not be able to transfer methyl group which leaves both template and daughter strands unmethylated and mismatch repair would be hindered as it will not be able to identify.

4 0
2 years ago
Other questions:
  • You can make a cell extract that is able to perform glycolysis in vitro (in a test tube) if glucose is added. Arsenate is a pote
    15·1 answer
  • Select the point of differentiation between the sporozoites and merozoites
    6·2 answers
  • The best way to determine if an athlete is consuming adequate kilocalories is to
    10·1 answer
  • Which two bases are always found in The same amount in DNA ?
    5·1 answer
  • Coal, a fossil fuel made from the remains of swamp plants, has been found in Antarctica. Which of the following is the most reas
    14·1 answer
  • Which enzyme(s) require(s) the addition of HCl for optimum activity?
    12·1 answer
  • Match each excerpt with its text structure.
    12·1 answer
  • Why do i suck at biology
    5·1 answer
  • What is photosynthesis ​
    14·2 answers
  • Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ________ storage, using gene
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!