Feeds

What are chromosome abnormalities and how often do they occur?

A dip into the gene pool

Security for virtualized datacentres

Also in this week's column:

What are chromosome abnormalities and how often do they occur?

Asked by Lynn Davis of Casper, Wyoming

Each of our chromosomes has a specific and proper structure and colour. Together, they form a distinct pattern called the human karyotype. We have 46 chromosomes (23 from each parent). But biology being biology, there are variations in reproduction resulting in abnormalities in the karyotype of an individual. A very few are beneficial, most are harmless, a few are catastrophic.

A major chromosome abnormality (MCA) accounts for half of all spontaneous human abortions. A MCA occurs in about one in every 100 to 200 births. Recent medical diagnostic techniques can now detect many MCAs long before the child is born. They do this by analysing the patient's blood under a microscope. MCAs take one of five forms.

  1. In duplication, instead of the normal two, the individual has three copies of the chromosome in every cell of their body (trisomic). Most trisomics result in a spontaneous abortion - but not always. Trisomy-21 (Down's Syndrome) occurs 1.5 times in every 1,000 births. The individual has three copies of chromosome 21. Trisomy-18 (Edward's Syndrome) occurs three times in every 10,000 births. The individual has three copies of chromosome 18. Trisomy-13 (Patau's Syndrome) occurs two times in every 10,000 births. The individual has three copies of chromosome 13.
  2. In deletion, a piece of chromosome may go missing. The missing piece is usually from the end of the chromosome, but can be missing from the middle as well. The types of symptoms as well as their severity will vary depending upon the size and location of the deletion. Deletion syndromes occur at a frequency of about one in every 16,000 births. In Wolf-Hirschhorn Syndrome (occurring in one in every 50,000 births) the abnormality occurs on chromosome 4. In Cri-du-Chat Syndrome (occurring in one in every 50,000 births), the abnormality occurs on chromosome 5.
  3. In translocation, a whole or a piece of one chromosome becomes attached to another.
  4. In inversion, a portion of the chromosome breaks off, turns upside down, and reattaches.
  5. In rings, a portion of the chromosome breaks off and forms a circle, with or without loss of genetic information. For these last three forms, there is an alteration in the pattern of genetic information.

Stephen Juan, Ph.D. is an anthropologist at the University of Sydney. Email your Odd Body questions to s.juan@edfac.usyd.edu.au

Security for virtualized datacentres

More from The Register

next story
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Thought that last dinosaur was BIG? This one's bloody ENORMOUS
Weighed several adult elephants, contend boffins
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet
Probe prepares to make first landing on fast-moving rock
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.