Question

In: Biology

What is % bisexual flower? Collect five bisexual flowers from your neighbourhood and with the help of your teacher find out their common and scientific names

What is % bisexual flower? Collect five bisexual flowers from your neighbourhood and with the help of your teacher find out their common and scientific names

 

Solutions

Expert Solution

Flowers in which male and female sex organs (stamens and carpels) are borne on the same flowers are called bisexual flowers. You can observe following bisexual flowers in your kitchen and colony gardens :

(i)Brassica (sarson) – Brassica campestris

(ii)Onion – Allium cepa

(iii)Garden Pea (Edible pea) – Pisum sativum

(iv)Petunia – Petunia hybrida

(v)China rose (shoe flower) – Hibiscus rosa- sinensis.


 

 

Related Solutions

Give five examples of qualitative data that you could collect from your coworkers. What would this...
Give five examples of qualitative data that you could collect from your coworkers. What would this information tell you about them and why would it be useful.
To find out if wealthier people are happier we collect data from 50 people about their...
To find out if wealthier people are happier we collect data from 50 people about their income and their overall happiness on a scale from 1 to 10. The correlation coefficient comes out to be -0.25. Given that r=0.025 which means this is a weak negative correlation. In terms of strength, we can conclude that the correlation between income and happiness is moderate. In terms of direction, there is a negative correlation between happiness and income.  If we increase the number...
1. Find out what a race condition is, and explain in your own words what goes...
1. Find out what a race condition is, and explain in your own words what goes wrong.
Select your favorite crop plant or model plant and find out what methods are available for...
Select your favorite crop plant or model plant and find out what methods are available for its transformation, and in what year those methods were first published. How is the DNA introduced – by Agrobacterium, gene gun or other method? How are the transformed cells and plants selected, and how are transgenic plants regenerated?
How does mental health affect those living in your community? What data can you collect from...
How does mental health affect those living in your community? What data can you collect from a medical record when caring for those with mental health issues?
Give a brief conclusion obtained in your research project. What did you prove/find out?
Give a brief conclusion obtained in your research project. What did you prove/find out?
1. In your opinion what makes an effective instructor/teacher/trainer? Cite some examples from  "Effective Teaching Methods", Borich,...
1. In your opinion what makes an effective instructor/teacher/trainer? Cite some examples from  "Effective Teaching Methods", Borich, Gary 2. Then draw upon your own experiences as a student and cite examples you have experienced that were either excellent, or not so good
Figure out how to test what happens when the light rays come from underwater. Compare your...
Figure out how to test what happens when the light rays come from underwater. Compare your ideas about why things look different under water to how light rays appear to “bend.”.
Identify the top five global health issues from your personal experiences. What socio-economic factors are driving...
Identify the top five global health issues from your personal experiences. What socio-economic factors are driving each of these issues?
IN YOUR OWN WORDS PLEASE! Don't plagiarize please What specific concepts from below do you find...
IN YOUR OWN WORDS PLEASE! Don't plagiarize please What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Encapsulation Denial of service / distributed Integrity checking For protecting authentication data
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT