Free Essay

Bio 108

In:

Submitted By zahr123
Words 1051
Pages 5
| Protists and Fungi | BIO 108-02 | | Zahraa Alaloosi | 3/21/2016 |

Page 43
3. The form of diatoms are most likely pennate. Around 90 % of the slide is pennate and a few only are centric.
Page 45
Brown Algae: NAME | BODY FORM | CHARACTERISTICS | PADINA GYMNOSPORA | Fan shaped plant body, | Light brown, Reproductive bodies forming wider and somewhat narrower alternating rows | DICTYOTA DICHOTOMA | Plant ribbon like, bushy, | Yellowish brown, the reproductive structures scattered. | ROSENVINGEA | Multicellular, Branched and tubular tufts, | Light brown, free floating, reproductive structures scattered, | SARGASSUM | Multicellular, It consists of a holdfast, a stipe, and a frond | Brown, free-floating, asexual, reproductive structures look like tiny fingers. |

Page 48
2. The color of the plasmodium is yellowish. It has branches that look like the veins. The source of the movement is unidirectional. It moves only forward in the direction of the food. When the conditions are bad the slim mod stop spreading, when the food is available and conditions are good it change to its yellowish branched shape again.
Page 50
Red Algae NAME | BODY FORM | CHARACTERISTICS | RHODYMENIA | flat-shaped blade, | Purple to pink, | AGARDHIELLA | Branched, tubular shape | Light pink | PORPHYRA | Flat, big leaflike, | purple, Produce sexually and asexually, | GRACILARIA | Plants sparingly bushy, | Purple, It is used as an additional source for agar production. |

Page 52:
Green Algae: NAME | BODY FORM | CHARACTERISTICS | SPIROGYRA | Multicellular, Filamentous, spiral arrangement of the chloroplasts, | Green, floating as scum on the surface, reproduces sexually | ULVA | Multicellular, thin flat green algae, | Green, Sea lettuce, edible green alga | CHARA | Multicellular, has a stem-like and leaf-like structures, | Green, Chara reproduces vegetatively and sexually |

Page 53:
Discussion:
1. The mechanism of feeding used by these organisms is phagocytosis. The outer membrane of the cell surround food particles and pinch it inside the cell where it gets digested. 2. They use pseudopodia to capture and ingest food. The pseudopodia will surround the food and ingest it into the cell using the phagocytosis mechanism. 3. Amoeboid use the pseudopodia, flagellated use flagella which is supported by microtubules, ciliated use the cilia which is short projections from the cell surface. 4. Dinoflagellates produce deadly toxic substances. Radiolarians have a skeleton of silicon dioxide. 5. Both are autotroph and both are primary producers. Dinoflagellates play an important role in the ocean- photosynthesis that provide food for all marine organisms. Diatoms produce carbohydrate and hydrogen. 6. Diatoms, cell wall made of silica. Dinoflagellates, cell wall made of cellulose plates with two perpendicular grooves, each containing flagellum. 7. Slime molds are phagocytic while fungi obtain food through observation. Other characteristics such as cellular ultra-structure, cell wall chemistry, and other molecular studies made scientists to consider these organisms as Protistan. 8. They all used commercially and as a food for humans. Ulva, sealettuce eaten by human. Red algae, Porphyra used as a seaweed wrappers for sushi. Brown algae, extracts of algin from the cell wall of the brown algae used economically as a thickening in paint, toothpaste, ice-cream, pudding and many other foods. 9. Red algae are the only algae don’t have flagella any stage in their life cycle. Brown algae can be distinguished by their brown appearance because of the pigment fucoxanthin. 10. Green algae share similarities with land plants, such as storage of the starch amylase and the presence of chlorophyll a & b. the Charophyte considered most closely to land plants. They have many similarities such as the method of cell wall fermentation during cell division, organization of protein that synthesis cellulose, and structure of sperm.
Page 57:
6. Hyphae don’t have visible spores while sporangia do have spores. These spores can be produced sexually or asexually. The spores compare with the hyphal cells genetically, the spores’ nuclei are diploid after sexual reproduction. The hyphae nuclei are haploid.

GROUP | EXAMPLES | CHARACTERISTICS | ECOLOGICAL LIFE | ECONOMIC IMPORTANCE | EUGLENOZOANS | Trypanosoma levisi | -genus of Kinetoplastids- Most of them require more than one host to complete life cycle.-unicellular | -infection carried by insects to humans and animals | -Cause different types of diseases that infect humans and animals | ALVEOLATES | Paramecia | -The surface covered with thousands of cilia-unicellular- autotroph and heterotroph- not pathogen and doesn’t cause a diseases | - spread wide in freshwater, marine and ponds- feeds on bacteria | - clean tiny particles from pond’s water. | | Dinoflagellates | -autotroph- convert the energy stored in organic molecules to light-unicellular | -causes red tides(toxic for humans),-primary production | -Provide food for all marine organisms. | STRAMENOPILES | Diatoms | -autotroph- unicellular- strong cell wall | - diatoms found in the world's oceans contribute 45 percent of all primary production in the bottom of the food chain | - dead individuals fall to the ocean floor undecomposed, this remove the co2 from the air and pump it into the ocean’s floor | | Brown algae | -largest and most complex algae-multicellular- it includes seaweeds | -They play an important role in marine environments, both as food and for the habitats they form | - Important to the aquatic ecosystem.- Food source for aquatic life. | RHIZARIANS | foraminiferans | - unicellular- They are abundant as fossils for the last 540 million years. | - Some are abundant only in the deep ocean, others are found only on coral reefs, and still other species live only in brackish estuaries or intertidal salt marshes. | - researchers use their fossils to estimate changes in ocean temperature over time | | radiolarians | -Have delicate, symmetrical internal skeletons that are usually made of silica- unicellular | - live in marine environments. They can exist either as individuals or in colonies.- Radiolarians often form symbiotic relationships with algae and dinoflagellates. | -important sources of information on the geologic age and structure of many deposits. | AMOEBOZOANS | amoeba | -has the ability to alter its shape- unicellular with no cell wall- unicellular | - live in water also can be found in wet soil | -recycle nutrients-it feeds on bacteria, plant cells, and algae | | physarum | -unicellular-contains millions of nuclei-have cell wall that contains chitin | -found under cool, humid, and dark conditions on forest floors | - decompose dead bodies. | RHODOPHYTA | Red algae | -Have reddish color- multicellular; the largest are seaweeds- autotrophs | - help build coral reefs. | -some used as use as human food. | CHLOROPHYTA AND CHAROPHYTA | Green algae: spirogyra, ulva, chara | - named for their grass-green chloroplasts-consist of the Chlorophyte and Charophyte algae,- unicellular or multicellular | - Green algae are important symbionts with fungi, bacteria, animals and plants. | - Source of industrial products, biofuels and food. |

Similar Documents

Premium Essay

Bio 108

...Derrick Warren Biology 108 November 8, 2015 BIOL 108 Worksheet 2 1. Define a cell. 2. Identify (list) the two basic types of cells. 3. Would you find proteins inside cells or cells inside proteins? (choose one answer) 4. What two things make osmosis a special type of diffusion? 5. What is a selectively permeable membrane? (Also called a semi-permeable membrane.) 6. Explain what happens to a cell when placed in isotonic, hypotonic and hypertonic solutions. 7. Explain the basic organization (main components) of a plasma membrane. Include at least 4 distinct parts. 8. Identify (a) a similarity and (b) a difference between facilitated transport and active transport; do not state they both move substances across membranes. 9. What is an organelle?  Which organelle is a processing, packaging and shipping center for proteins and lipids? 10. Where would you find the nucleolus?  What happens there? 11. What is the role of the ribosome? 12. Which organelle digests macromolecules, worn out cell parts, debris and disease-causing microbes? 13. What structures are associated with cell movement? 14. What is the most significant difference in structure between rough and smooth ER?  What type of macromolecule do each produce? 15. Which organelle makes ATP? 16. What is the most important product of cellular respiration? 17. List the three major steps in cellular respiration. (3 pts) 18. How does the body use the oxygen that we breathe? In other words, what is oxygen's final...

Words: 686 - Pages: 3

Free Essay

Bio 108 Lab

...Animal Diversity Stephen Oppon BIO 108 Animal Diversity I November 6, 2013 Page !1 ! Phylum Porifera ! ! ! ! ! ! ! ! ! ! ! Page 132 Given that all sponges are filter feeders, why does it follow that all sponges are aquatic? Filter feeding is the filtering of nutrients and plankton suspended in water therefore for sponges to feed effectively they must be aquatic ! ! Would mobility improve the ability of sponges to capture food? Explain. Motility would improve the ability of the sponge to capture food because as a non motile creature it can not seek out food. Sponges can only capture for that is streaming towards them and this is a very ineffective means of feeding ! Animal Diversity Page !2 ! ! ! ! ! Phylum Cnidaria ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! Animal Diversity Page !3 ! Phylum Platyhelminthes Comparison of 3 different species of planarians Brown Sketch White Black ! ! ! ! ! ! ! ! ! ! S-like pattern Not really sensitive to light S-like pattern Extremely sensitive to light, it tries to stay in the paper shade as much as possible S-like patter They are almost insensitive to light Movement Sensitivity to light Page 137 What can you conclude about the sensory capabilities of the planarians The planarians sensitivity to light are highly dependent on their pigmentation, since the darker ones has less response to light than the lighter ones Why is bilateral symmetry more adaptive than radial symmetry for a motile animal. Bilateral symmetry aids int he...

Words: 434 - Pages: 2

Free Essay

Nvidia780I

...User Guide EVGA nForce 780i SLI Motherboard 780i 3-Way SLI Motherboard EVGA ii nForce 780i SLI Motherboard Table of Contents Before You Begin… ..................................................................................................... ix Parts NOT in the Kit .................................................................................................ix Intentions of the Kit ...................................................................................................x EVGA nForce 780i Motherboard..................................................................................1 Motherboard Specifications...................................................................................... 1 Unpacking and Parts Descriptions...............................................................................4 Unpacking ................................................................................................................ 4 Equipment ................................................................................................................ 4 EVGA nForce 780i SLI Motherboard ....................................................................... 5 Hardware Installation ....................................................................................................9 Safety Instructions.................................................................................................... 9 Preparing the Motherboard .........

Words: 12933 - Pages: 52

Free Essay

E Manual

...E5755 Eee PC User Manual Windows® 7 Edition Eee PC 1001P/1005P/R101/ R105 Series 15G06Q256000 Table of Contents Table of Contents....................................................................................................................... ii About This User’s Manual.......................................................................................................iv Notes for This Manual..............................................................................................................iv Safety Precautions.....................................................................................................................v Transportation Precautions....................................................................................vi Charging Your Batteries..........................................................................................vii Airplane Precautions................................................................................................vii Chapter 1: Knowing the Parts Top Side.....................................................................................................................................1-2 Bottom Side..............................................................................................................................1-5 Front Side..................................................................................................................................1-6 Right...

Words: 7992 - Pages: 32

Free Essay

Dell 1435c

...Dell™ PowerEdge™ SC1435 Systems Hardware Owner’s Manual w w w. d e l l . c o m | s u p p o r t . d e l l . c o m Downloaded from www.Manualslib.com manuals search engine Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge, PowerVault, PowerApp, Dell OpenManage, and Dell XPS are trademarks of Dell Inc.; Microsoft, Windows, MS-DOS, and Windows Server are registered trademarks of Microsoft Corporation; AMD and AMD PowerNow! are trademarks of Advanced Micro Devices, Inc.; EMC is a registered trademark of EMC Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model SVUA August 2006 P/N HJ362 Rev. A00 Downloaded from www.Manualslib...

Words: 32860 - Pages: 132

Premium Essay

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...

Words: 448 - Pages: 2

Free Essay

Knowledge Assemsment Text Book

...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...

Words: 746 - Pages: 3

Free Essay

Bitlocker

...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...

Words: 1463 - Pages: 6

Free Essay

Bios

...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...

Words: 356 - Pages: 2

Free Essay

Motherboard

...Motherboard Answer the following questions 5 April 2015 Tanweer Haroon DeJong May The major components of the motherboard are as follows: memory and their slots which is the computer’s memory (RAM) and is one of the most important parts of the system board. The number of chips depends on the type of computer and its capacity. Expansion cards are a typical component of non-integrated system boards a graphic card is a perfect example, but this can be integrated into the motherboard. CPU and slots is the central processing unit and it’s a highly prolific part of the computer and is located on the right of a motherboard and can be identified as a result of the heat sink or cooling fan directly on it. BIOS chip directs the CPU with respect to how it relates with other parts of the computer. Its basic input and output system chip or integrated circuit is fixed on the board and is easily identifiable. CMOS battery, the complementary metal oxide semiconductor is a small battery on the system board that powers the CMOS memory. Power supply and connectors is the electrical unit of the system and if it’s bad the system will not work. Keyboard connector are located on the motherboard and there are two main types. The AT has a round connecting interface into the motherboard and the PS/2 connector is rectangular in shape and smaller. Modern motherboards come with both. Mouse connector its connecting port is located on the motherboard and its interface is usually round. Floppy...

Words: 431 - Pages: 2

Premium Essay

Future

...Fall BIOS – Instructor: Mrs. Nicholas – NT1110 – 1 May 2014 Lavon Hawkins BIOS SUMMARY Lavon Hawkins BIOS SUMMARY BIOS BIOS: The BIOS is software which is stored on the motherboard. It tells the computer how to perform a number of basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer such as hard drive, floppy drive, optical drive, CPU, memory and so on. CMOS: The complementary metal oxide semiconductor is the type of semiconductor chip on the motherboard which stores the system information and computer settings such as date, time, hard drive settings, boot sequence, parallel part settings, on-base audio and video etc. Firmware: Firmware is a combination of software and hardware. Computer chips that have data or programs recorded on them are firmware. POST: The POST or power on self-test is a test the computer does when it first boots up. It’s to verify all the hardware is working. If all checks out it usually gives a single beep. If not a beep code could come up. Beep Code: A beep code is an audible code which is generated during the POST (Power On Self Test) when the BIOS has an issue but has not made it all the way up the boot sequence that it can give you the error as a message on the monitor BIOS update: Updating the BIOS can fix or enhance aspects of a computers performance. Or it may provide support for newly installed hardware. 1 Flash BIOS update: A BIOS chip...

Words: 353 - Pages: 2

Free Essay

Exploring Reverse Engineering

...products that are new and cheaper than the ones that came before. This way a company is able to take a product that is already out on the market and take it apart piece by piece and see how it works so they can rebuild it cheaper and more efficiently. One famous example of reverse engineering is in the mid-1980s Phoenix Technologies Ltd wanted to produce a BIOS for PCs that would be compatible with the IBM PCs proprietary BIOS. To protect themselves from any charges of illegally copying their BIOS they used what is called a clean room. With the clean room approach there are two teams; one that studies the BIOS that they are trying to recreate and they come up with a detailed report of what it is exactly the BIOS does without using any of the code or anything that will link their description to that particular BIOS. Then this description is given to another team that has not looked at the code of the BIOS they are recreating and they build whole new BIOS off those instructions. This way even if some of the code is the same it will not be a copy right infringement since the second team who actually wrote the code and built the BIOS...

Words: 792 - Pages: 4

Premium Essay

Exploring Motherboards and Busses

...on a motherboard? Why can these busses not be replaced with a single bus? • With 64-bit busses available, why should 32-bit busses be provided as well? The motherboard of a computer is also known as the System Board. The circuit board is the platform on which all the hardware of the computer is connected. It is said to be the most important part of the computer. The expansion cards, and slots, BIOS chip, CMOS battery, jumpers and DIP switches, heat sink, PCI, Power connector, on board disk drive connectors, memory slots, keyboard connectors, Peripheral ports and connectors are all the things that one may find on the motherboard. The expansion cards are a typical part of nonintegrated system board. An example of this is a graphic card. Memory slots are one of the most important part of the system board. The number of memory chips on a motherboard depends on the type of CPU and its capacity. The slots are usually white and black and close in proximity to one another. The BIOS chip is also a very important part of the system board. It directs the CPU to other parts of the computer. BIOS and its manufacturers name are usually written on the chip. The CMOS battery or (complementary Metal Oxide Semiconductor) is a small battery on the system...

Words: 617 - Pages: 3

Free Essay

Information and Communication Technology

...that starts the “chain reaction” which ends with the entire operating system being loaded is known as the boot loader (or bootstrap loader). The term creatively came from early designiners imagining that before a computer “runs” it must have it’s “boots strapped”. The boot loader’s only job is to load other software for the operating system to start. Often, multiple-stage boot loaders are used, in which several small programs of increasing complexity sequentially summon one after the other, until the last of them loads the operating system. Boot Devices The boot device is the device from which the operating system is loaded. A modern PC BIOS (Basic Input/Output System) supports booting from various devices. These include the local hard disk drive, optical drive, floppy drive, a network interface card, and a USB device. Typically, the BIOS will allow the user to configure a boot order. If the boot order is set to: 1. CD Drive 2. Hard Disk Drive 3....

Words: 646 - Pages: 3

Free Essay

Attacks

...Ransomware Discuss the threat When infected restricts you to access to a computer system. This will become more refined in its targets and methods. Experts predict that the variants of ransomware that hurt the security software that are installed within a computer may particularly target the endpoints which sign up with cloud-based storage solutions like Google Drive, Dropbox, OneDrive and many more. On detecting the endpoint, ransomware will exploit the stored personal credentials of the logged-in user and will even infect the cloud storage that is backed up. McAfee has warned that ransomware attackers will try out as many ways possible to shell out ransom payments from their victims. Degree of damage The most advanced and most damaging ransomware in the wild at the moment, specifically targeting U.S. businesses and individuals. It's a $70 million per year criminal enterprise. Its magnitude is now confirmed by law enforcement. Some quick math shows $18,145 in costs per victim, caused by network mitigation, network countermeasures, loss of productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. As you can see, the total costs of a ransomware infection goes well above just the ransom fee itself, which is usually around $500 but can go up to $10,000. What it attacked Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware...

Words: 2057 - Pages: 9