2. Bacteria adapt to their environment by producing a Glycocalyx coating made of repeating polysaccharides, proteins, or both. This coating, either as a slime layer or capsule, protects the cell and sometimes helps the cell adhere to its environment. The protective properties of this coating can function as a shield which helps protect against phagocytes. The adhesive qualities of this coating help bacteria form biofilm. Another way bacteria adapt to their environment is through the formation of a ridged cell wall. The cell wall helps bacteria maintain their structure in a fluid environment and prevents cell rupture due to osmotic pressure. A third way bacteria adapt, is by producing inclusion bodies. These inclusion bodies store nutrients in times of abundance which are then used when nutrients are depleted. Some inclusion bodies also include gas vesicles that act as flotation devices for the bacteria. A final was bacteria adapt is by producing endospores. When harsh environmental conditions are met, vegetative cells will produce endospores. These endospores are able to survive extreme heat, cold, dryness, radiation and even deadly chemicals.
3. Louis Pasteur was a Fren...
... middle of paper ...
...a present is staph, since only staph will grow on the plate and the acidic by-product will turn this plate yellow.
9. Bacteria within our bodies have formed delicate and balanced colonies known as resident biota. These normal biota keep the invading and possibly pathogenic bacteria in check by preventing their overgrowth. Bacteria in a healthy functioning act as microbial antagonists in every non-sterile environment in or on the body, from our skin, to our external ear canals, and even our external genitals. An example of what happens when the helpful bacteria in our resident biota is removed, is when antibiotic use results in oral thrush or a yeast infection. By removing the positive and beneficial bacteria from these environments, harmful bacteria is given the opportunity to grow uninhibited, thus infecting the habitat of these once friendly and helpful bacteria.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Any computing device (Included but not limited to: Computers, Laptops, Tablets, PDA, Mobile Phones, Smart Phones and other similar devices) that can be used to connect to Seneca network through Internet or Seneca’s local network, or interact with Seneca network or other Seneca’s community members in any form (Emails, files transfer, Sending Messages, any form of storage like Hard Disk, USB Devices, DVD, CD, etc. ), whether to be used inside or outside of the Seneca properties or campuses or in only in Students home or workplace, is subject to this policy.... [tags: Computer, Personal computer, User, Access code]
895 words (2.6 pages)
- Viruses: Nature’s Hackers Over a billion years of evolution has gifted us with DNA that is very well adapted to the environment. Each strand of DNA is like a bit of computer code, and surprisingly, they are open source code. The easiest way to modify the code is through viruses, which have evolved specifically to splice new genes into the host’s DNA. The question is: does mankind have the right to tamper with this code. The answer lies in the nature of mankind; humans are explorers who have pushed beyond every boundary we have encountered.... [tags: Evolution, DNA, Code, Viruses]
1421 words (4.1 pages)
- Description of Physiochemical Properties Sorption Coefficient (mL/g) for Parent: The Kd is a very important parameter in estimating the potential for the adsorption of dissolved contaminants in contact with soil. As typically used in fate and contaminant transport calculations, the Kd is defined as the ratio of the contaminant concentration associated with the solid to the contaminant concentration in the surrounding aqueous solution when the system is at equilibrium. The Kd is usually a measured parameter that is obtained from laboratory experiments.... [tags: Water, Chemistry, Solubility, Chemical properties]
712 words (2 pages)
- Solutions to Computer Viruses Table Of Contents I Intro II Computer Virus Components a.Worms b.Trojan horses c.Logic bombs III Types of Viruses a.Boot sector virus b.File virus c.Macro virus d.Multipartite virus e.Polymorphic virus f.Stealth virus IV How Viruses Work a.Virus introduced to system b.Trojan activated c.Logic bomb activated d.Destructive part of virus activated V Most Common Viruses a.Jerusalem virus b.Cascade virus c.Brain virus d.Italian virus e.New Zealand virus VI Macro Virus a.What are they.... [tags: Computer Viruses Software Technology Essays]
2603 words (7.4 pages)
- Virus An invisible organism enters your body. It penetrates into your tissues and then takes over the machinery in your own cells to make more copies of itself. This tiny infiltrator works silently, producing thousands of these clones that fill up the cell and cause it to explode. The clones mercilessly continue the process of invading, taking over and destroying cells. The result might be a minor inconvenience to you as the host, or it could result in a slow or rapid death. It depends only on which variant of this unwanted infiltrator overcomes your body’s defenses.... [tags: Biochemistry]
838 words (2.4 pages)
- Viruses change every form of life. All life forms can be divided into two states, one that stores and second that acts upon information, to duplicate an organism (Levine 1992). They populate the world between the living and non-living, the ability to duplicate themselves and ones that cannot. Viruses are inherent in organization and their properties are many of secrets of life processes and life (Levine 1992). Viruses may be present in living organisms almost since the origin of life (Levy, Owens 1988).... [tags: Virus Biology]
1794 words (5.1 pages)
- ... Other uses for garlic were gastro intestinal spasms, menstrual pain and for treatment of diabetes (Phyllis & Balch 2012, p.70). Ancient Ayuvdic texts suggest garlic is good for blood flow, and ancient Egyptians recommended garlic for worms, bites, tumours and heart disease (Alternative Medicine Alert 2012). Typically it was used for warts, corns, muscle pain and arthritis (Phyllis & Balch 2012, p.70). Potential Therapeutic indications: Chronic bacterial prostatitis: One study shows that garlic can help with the symptoms of chronic bacterial prostatitis.... [tags: anti-inflamatory, anti-oxidant]
1471 words (4.2 pages)
- For approximately three-thousand years, smallpox has ravaged and plagued the four corners of the globe. In fact, in the 17 th and 18 th centuries, it was claimed to be the most infectious disease in the West, with an astounding 90% mortality rate in America. It wasn't until 1796, with English surgeon Edward Jenner's smallpox vaccination, that the world saw relief from this devastating virus. However, even with this inoculation in use, the world continued to witness death from both the virus and the vaccine.... [tags: Smallpox Viruses]
2185 words (6.2 pages)
- Most of us swap disks with friends and browse the Net looking for downloads. Rarely do we ever consider that we are also exchanging files with anyone and everyone who has ever handled them in the past. If that sounds like a warning about social diseases, its right along the same lines. Computer viruses are every bit as harmful and destructive, and come in a vast variety of types and strains. Computer viruses, can tear up your hard drive and bring down your system. However, unlike social diseases, computer viruses are almost always curable, and the cures for new strains are usually a matter of days away, rather than months or years.... [tags: essays research papers]
1236 words (3.5 pages)
- Computers have become much more important and popular to our society in recent decades. The computer’s ability to perform so many tasks speedily and reliably makes it useful for a wide variety of purposes. Therefore much important information is stored on computers. Because people and organisations depend on computers every day for a variety of significant tasks, it is imperative that the systems which are used are protected from loss, damage and misuse. This essay identifies some potential risks to computer systems and software and the safeguards that can be taken to minimise these risks.... [tags: essays research papers]
2617 words (7.5 pages)