Feeds

What are chromosome abnormalities and how often do they occur?

A dip into the gene pool

Choosing a cloud hosting partner with confidence

Also in this week's column:

What are chromosome abnormalities and how often do they occur?

Asked by Lynn Davis of Casper, Wyoming

Each of our chromosomes has a specific and proper structure and colour. Together, they form a distinct pattern called the human karyotype. We have 46 chromosomes (23 from each parent). But biology being biology, there are variations in reproduction resulting in abnormalities in the karyotype of an individual. A very few are beneficial, most are harmless, a few are catastrophic.

A major chromosome abnormality (MCA) accounts for half of all spontaneous human abortions. A MCA occurs in about one in every 100 to 200 births. Recent medical diagnostic techniques can now detect many MCAs long before the child is born. They do this by analysing the patient's blood under a microscope. MCAs take one of five forms.

  1. In duplication, instead of the normal two, the individual has three copies of the chromosome in every cell of their body (trisomic). Most trisomics result in a spontaneous abortion - but not always. Trisomy-21 (Down's Syndrome) occurs 1.5 times in every 1,000 births. The individual has three copies of chromosome 21. Trisomy-18 (Edward's Syndrome) occurs three times in every 10,000 births. The individual has three copies of chromosome 18. Trisomy-13 (Patau's Syndrome) occurs two times in every 10,000 births. The individual has three copies of chromosome 13.
  2. In deletion, a piece of chromosome may go missing. The missing piece is usually from the end of the chromosome, but can be missing from the middle as well. The types of symptoms as well as their severity will vary depending upon the size and location of the deletion. Deletion syndromes occur at a frequency of about one in every 16,000 births. In Wolf-Hirschhorn Syndrome (occurring in one in every 50,000 births) the abnormality occurs on chromosome 4. In Cri-du-Chat Syndrome (occurring in one in every 50,000 births), the abnormality occurs on chromosome 5.
  3. In translocation, a whole or a piece of one chromosome becomes attached to another.
  4. In inversion, a portion of the chromosome breaks off, turns upside down, and reattaches.
  5. In rings, a portion of the chromosome breaks off and forms a circle, with or without loss of genetic information. For these last three forms, there is an alteration in the pattern of genetic information.

Stephen Juan, Ph.D. is an anthropologist at the University of Sydney. Email your Odd Body questions to s.juan@edfac.usyd.edu.au

Secure remote control for conventional and virtual desktops

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
Mine Bitcoins with PENCIL and PAPER
Forget Sudoku, crunch SHA-256 algos
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
'This BITE MARK is a SMOKING GUN': Boffins probe ancient assault
Tooth embedded in thigh bone may tell who pulled the trigger
DOLPHINS SMELL MAGNETS – did we hear that right, boffins?
Xavier's School for Gifted Magnetotaceans
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
Canberra drone team dances a samba in Outback Challenge
CSIRO's 'missing bushwalker' found and watered
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.