1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
2 years ago
15

man who is colorblind marries a woman who has normal color vision and is not a carrier of color blindness. If this couple has a

son, what are the chances he will be colorblind? Could they have a colorblind daughter? HTML EditorKeyboard Shortcuts
Computers and Technology
1 answer:
kirill115 [55]2 years ago
4 0

Answer:

Each of their sons has around a 0% chance for being color blind.

they will have normal girls but they will be carriers

Explanation:

Since the man is colour blind and he donates the X- Chromosome that is the carrier to the woman, they will give birth to a daughter who is a carrier but not color blind. If the man donates the Y chromosome, then they will give birth to a normal male child who is not color blind neither is he a carrier

You might be interested in
Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
nika2105 [10]

Answer:

<u>Output</u>

Enter first number:  

1

Enter second number:  

2

Enter third number:  

3

Enter fourth number:  

4

Average: 2.5

Explanation:

Below is the java program to calculate the average of four numbers:-

import java.util.Scanner;

public class Average {

public static void main(String[] args){

 int a,b,c,d;

 double average=0.0;

 Scanner s=new Scanner(System.in);

 System.out.println("Enter first number: ");

 a=s.nextInt();

 System.out.println("Enter second number: ");

 b=s.nextInt();

 System.out.println("Enter third number: ");

 c=s.nextInt();

 System.out.println("Enter fourth number: ");

 d=s.nextInt();

 average=(a+b+c+d)/4.0;

 System.out.println("Average: "+average);

}

}

6 0
3 years ago
Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
JulijaS [17]

Answer:

clip art

Explanation:

i hope this helps you

7 0
2 years ago
We will pass you 2 inputsan list of numbersa number, N, to look forYour job is to loop through the list and find the number spec
Montano1993 [528]

Answer:

The Python code is given below

Explanation:

# Get our input from the command line

import sys

N = int(sys.argv[2])

# Convert the list of strings into integers

numbers= []

for i in sys.argv[1].split(","):

   if(i.isdigit()):

       numbers.append(int(i))

# numbers now contains the list of integers

f = False

#Use for loop upto len(numbers)

for i in range(0,len(numbers)):

   #Use "if" loop to check

   if numbers[i] == N:

       #Assign "True" to "f"

       f = True

       #Display "i"

       print(i)

       break

#Check "if" loop by assigning "false" to "f"

if f==False:

   #Print "-1"

   print("-1")

4 0
3 years ago
Write bubblesort algorithm using random programming language
maks197457 [2]

Answer:

   n := length(A)

   repeat

       swapped := false

       for i := 1 to n-1 inclusive do

          <em> /* if this pair is out of order */</em>

           if A[i-1] > A[i] then

<em>                /* swap them and remember something changed */</em>

               swap(A[i-1], A[i])

               swapped := true

           end if ⇒

       end for

   until not swapped

end procedure

\\

Explanation:

This is pseudocode

3 0
2 years ago
Read 2 more answers
A data structure used to bind an authenticated individual to a public key is the definition of ________.
patriot [66]

Answer:

Digital Certificate is the correct answer of this question.

Explanation:

Digital certificates are always for encryption and identification for transmitting public keys.The concept of digital certificate is a data structure used for linking an authenticated person to a public key. It is used to cryptographically attach public key rights to the organization that controls it.

<u>For example</u>:- Verisign, Entrust, etc.

  • An appendix to an electronic document that is used for authentication purposes.
  • A digital certificate's most frequent use is to confirm that an user sending a message is who he or she appears to be, and provide the recipient with the means to encode a response.

4 0
2 years ago
Other questions:
  • It is a function that ends the connection to the database.
    9·2 answers
  • Is a fundamental building block of a relational database because this object stores all of the data
    15·1 answer
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • Proper numeric keyboarding technique includes:
    15·1 answer
  • The labels button is found under the
    7·2 answers
  • In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storag
    12·1 answer
  • Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the
    15·1 answer
  • A new president has been elected. She promises to lower taxes drastically. What is most LIKELY to happen as a result of this dec
    8·1 answer
  • PLEASE PLEASE PLEASE PLEASE help me Im completly lost will give brainliest and 50 points
    8·2 answers
  • Your worksheet contains a price in cell A5 and many formulas refer to that price how would you refer to that price in the formul
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!