Free Essay

Classification Key

In:

Submitted By ohhmyyluzzy94
Words 457
Pages 2
Classification Key:
Kingdom Animalia- eukaryote, mulitcellular, and hetero
Phylum Chordata- animal with dorsal hollow nerve cord; notochord- gill slits paired muscles
Subphylum Vertebrata- backbone chordates jawless fishes
Class Mammalia – with keratin hair, live birth, feed young milk from mammary glands.
1a) Not mammals go to 2
1b) mammals go to 9
2a) keratin scales C. Reptilia go to 3 Order Chelonia : sea turtle( with waterproof keratin scales & eggs)
2b) keratin feathers C. Aves got to 5 ( birds with keratin feather beaks and lay eggs)
3a) has shell go to 4
3b) no shell O. Squamata end ( reptile: sea snakes & Marine iguanas)
4a) shell O. Crocodilia end –( salt water crocodile)
5a) Can not fly O. Sphenisiciformes end (penguins have stubby flippers that allow them to fly underwater)
5b) can fly got to 6
6a) duck beak 0. Anseriformes end (duck)
6b) not a duck go to 7
7a) Pouch beak 0. Pelicaniformes end ( have a unique pouch below their beaks)
7b) not pouch go to 8
8a) funnel beak o. Porcellariformes end ( tube like nostrils and heavy beaks curved at the tip- Tubenoses)
8b) not a funnel end O. Charadriiformes end ( great black backed and bottom white long bill- EX. Gull related birds.)
9a) 4 appendages go to 10
9b) 2 appendages go to 14
10a) No flippers 0. Carnivora go to 11 (sea otters,weasels….skunks- molars slice like scissors)
10b) flippers go to 12 0. Pinnipedia (have flippers)
11a) bears F. Ursidae end
11b) otter F. Musteiidae end
12a) no external ears go to 13 (elephant seals)
12b) has external ears F. Otaridae end ( sea lions, eared seals, fur seals, external ears and long necks and can walk on hind flippers.)
13a) can’t walk on hind flippers F. Phocidae end (earless seals, no external ear)
13b) can walk on hind flippers F. Odobenidae end ( Pinnipedia- walk on hind legs, but don’t have external ears)
14a) fluke tail O. Cetacea go to 15 ( one or two blow holes)
14b) Platyl shape tail ). Sirenia end ( Ex. Sea cow)
15a) teeth go to suborder Odontoceti (tooth whales/ orcas)
15b) baleen go to suborder Mysticeti (mustache) F. Balaenidae end (take in large amounts of water and food- Minke Whales—REVERSE WITH FAMILY BALAENOPTERIDAE)
16a) not whale go to 17
16b) whale go to 18
17a) Porpoises F. Phocidae end
17b) dolphins F. Delphinidae end (cone shaped teeth, long beak)
18a) that eat amphipods that live in the mud end F. Eschrichtiidae
18b) toothed whales Order Cetacea/ Suborder Odontoceti go to 19
19a) sperm whales F. Physeteridae end
19b) Beaked Whales F. Ziphidae end
20a) One toothed family O. Cetacea/ Odontoceti- Beluga Whale, Narwhals end
20b) Pleated throat- right whales: slow- moving F. Balaenopteridae ( REVERSE WITH FAMILY BALAENIDAE)

Similar Documents

Free Essay

Different Types of Encryption

...be understood by unauthorized readers.” (Dyson) Encryption can be thought as locking something valuable into a strong box with a key. Sensitive data is encrypted by using a key algorithm, which renders it unreadable without the knowledge of the key. Data encryption keys are determined at connect time between a connection and the computer on the other end. The use of data encryption can be initiated by a personal computer or by the server it’s connecting to. On these terms, “Encryption is the technology that makes E-COMMERCE possible because it underlies the security systems used to protect electronic financial transactions.” (Dyson) Similarly, Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford University, gives another definition for the term. “Encryption is a method for users to securely share data over an insecure network or storage server.” (Boneh, Sahai and Waters) Since there are many transactions people do every day such as online banking or online shopping, it is necessary to make sure that they are done safely with the use of Encryption. As a matter of fact, the applications of encryption are very important. First of all we have data protection. Here we are referring to files and email encryption. The data is protected in the hard disk in case a hacker gets into the system. However, if the person who has the key of the encryption to decode...

Words: 1201 - Pages: 5

Premium Essay

Cryptography

...Egyptians with their use of hieroglyphics, the Greeks and Spartan and the use of Scytale, and the Romans with the use of the Caesar Cipher. All these encryption methods could be thought of as symmetric encryption, which uses the same key to encrypt and decrypt the ciphertext. With a more contemporary look at symmetric key encryption with computer data, we can classify it into two categories called block ciphers and stream ciphers. The data in a block cipher would be broken down into specific sizes, for example 64-bit blocks or 128-bit blocks, which then the blocks would be encrypted separately. In stream ciphers, data would be encrypted in a stream of bits as oppose to dividing the data into blocks of bits. The decryption process for these two classification of symmetric encryption, of course, would be to use the same encryption key. Differences and Similarities with Symmetric and Asymmetric The fundamental difference between symmetric and asymmetric cryptography would be that asymmetric uses two keys, a public and private key, for encryption and decryption. If a private key is used to encrypt, then a related public key would be used to decrypt. This could also work the other way around when a public key is used to encrypt, then a related private key would be used to decrypt. Unlike symmetric encryption, which is considered to be a very efficient, asymmetric tends to be very resource intensive because it takes a substantial amount of processing power to encrypt and decrypt data...

Words: 558 - Pages: 3

Premium Essay

Lab3

...(EFS) to encrypt files and folders on a Windows Server 2008 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft® BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the server and created a recovery key. Lab Assessment Questions & Answers 1. Within a Microsoft® Windows 2008 server R2 environment, who has access rights to the EFS features and functions in the server? 2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords? 38542_Lab03_Pass2.indd 56 3/2/13 10:01 AM Assessment Worksheet 3. What was the recover key created by BitLocker in this lab? 57 4. BitLocker secured drives. How would you grant additional users access rights to your EFS encrypted folders and data files? 5. What are the main differences between EFS and BitLocker? 6. The customer privacy data policy in your company’s data classification standard requires encryption in 3 Configure BitLocker and Windows Encryption two places: data stored in a user’s personal data folders and data stored on the LAN’s shared disk drives. Describe your solution for meeting this policy requirement. 38542_Lab03_Pass2.indd 57 3/2/13 10:01 AM 38542_Lab03_Pass2.indd 58 3/2/13 10:01 AM...

Words: 279 - Pages: 2

Free Essay

Classical Crypto

...has its own problems, and the ubiquity of recording devices ma kes “wearing a wire” seem almost quaint, but it certainly requires attackers to ma ke a potentially expensive investment to reach their targets. Cities currently cluste r groups of powerful people who prefer personal contact when possible, despite t he options for dispersal that the digital world keeps expanding.Physical and in-per son approaches also make it easier to return to old models of compartmentalizati on and cells, where information is shared on a need to know basis rather than rou gh classification levels. When “need to know” information travels electronically, it ’s easily intercepted, forwarded, or duplicated. Person to person contact isn’t just useful for conversation, but also for exchanging information about and keys to fut ure messages that may travel digitally but hide in other content, require specific o ne-time pads or keys, or will arrive at a particular time. (And then those messages can include information about future messages, but extending the chain makes it more brittle.)” The histogram found from the text is given below: 0.12 0.1 0.08 0.06 Series1 0.04 0.02 0 A B C D E F G H I J K L MN O P...

Words: 2459 - Pages: 10

Free Essay

Attraction of Melaka

...PROCEDURE FOR KEY MANAGEMENT 1.0 Introduction Proper procedures for management of keys are vital for both safety and security. These procedures are made known after realizing that one of the main reason for lost of items is because of the weakness in office key management system. 2.0 Purpose The purpose of these procedures is to standardize the office key management system that has to be implemented by all Cost Centers. 3.0 Responsibility 3.1 Occupational Safety and Health Committee have decided that the following officers are held responsible for office key management system at their respective Cost Center :Responsible Officer Manager or Senior Manager Assistant Manager, Manager, or Senior Manager Hostel Assistant Manager Cost Center Department/Center/Unit Faculty Hostel 3.2 For Cost Centers without the above officers, the management of these keys will be under the responsibility of their respective senior officer. 4.0 Classification of Key Categories 4.1 Office key can be classified into three categories:i. Reserve Keys – these key (main entrance door key, room door key where keys are kept, key box cabinet key) is the duplicate keys which are handed over to Security Department for use in emergency only. These keys are not given to anyone except to the officer in-charge during emergency and only with permission. ii. Daily Keys – office keys which are kept by Cost Centers. iii. Crucial Areas Keys – office keys which are in crucial areas. The keys under...

Words: 663 - Pages: 3

Free Essay

Future Innovations on Phones

...Summary: The number of illiterates in India is estimated to be over 400 million of which 75% live in rural areas. Of the literate population, a significant proportion lack basic vocational skills. India has world-class institutes of higher learning, such as the IITs, IIMs and medical colleges but the rural India still remain isolated to them. India’s most valuable intellectual capital migrates to western countries keeping gap in demand and supply of such intellectual capital in India, therefore we need to develop the equal opportunities for the isolated communities and enable them to access the elitist structure of Indian education. With the weak and tottering foundation India will not be able to achieve social and economic development The key challenge of India is to rapidly provide opportunities to the rural population to empower them with education and make them literate, and develop basic leadership and problem-solving skills. Have strong basic education foundation rural India will be able to raise productivity, entrepreneurship and material standards of living Here we would like to opt to do research into how into how provide solution to the critical issues of primary education in India through innovation strategy. As a part of research we will be meeting and collecting information from founders of NGO called “eVidyaloka (www.eVidyaloka.org)”. eVidyaloka is a not for profit organization registered under the Trusts Act, focuses on...

Words: 702 - Pages: 3

Free Essay

Journey of the Self: Example Through Symobols

...Journey of the Self The road I’m traveling on I see as a dirt road through a light forest in the mountains of northern California. I’m not sure exactly where I am, but it is a bright day with some clouds and blue skies, but off to the distance I can see storm clouds. All I have with me is my backpack containing a notebook, a pen, a pair of gym shorts, a spare t-shirt, a pack of cigarettes with a lighter, a bottle of water and a couple of granola bars. In my pockets I have a cell phone with a dead battery, a pocketknife, and my wallet with five dollars and my I.D. inside. I’m walking, surrounded by trees of all types. There is a light breeze, but it’s quiet as I walk and look around. As I’m walking, the road is flat and somewhat narrow, but it is easy going for the most part, with random spots where the road becomes rocky and somewhat stressful, but it evens itself out and becomes smooth for a period of time again. I feel happy and serene, but exhausted at times and in need of a bit of rest, but I always continue and begin to walk again. As I’m walking, I come to a two-way fork in the road with a sign in the middle. The sign has two arrows with words printed on them. Each arrow is pointing in the opposite direction of the other. To the left I have the choice to walk to the city, while to the right I have the choice to walk to a small country town. After some thought and consideration of both of my choices, I eventually choose to head towards the Country. I’m not sure exactly...

Words: 2126 - Pages: 9

Premium Essay

What Is Honor?

...What is Honor? My understanding of the term honor. Honor is defined as a source of credit or distinction, and is associated with reverence, dignity, reputation, good name and a good sense of what is morally correct. The key part to honor is having respect for others and for you; the two must act together because without both, there is nothing. I strongly believe that reputation is hard to gain and easily lost. Think about this, every day thousands of planes fly somewhere and there is never any news about a successful landing, but if any of those flights crash, it is all over the news. This fact tells me that in order to keep one’s honor, one must maintain a set standard of excellence. It will only take one infraction to cause said person to forfeit one’s honor. Nicholas Boileau once said: “Honor is like a rugged island without a shore, once you have left it, you cannot return.” Honor is something in which is not obtained and sustained easily. One must have patience and study to become a person of integrity and goodwill. Honor is an everyday thing; obstacles trying to deter one from being honorable lay in life’s everyday path. Perseverance is a key to honor; one must fight the constant impeding objects in order to maintain the highest level of honor. The shore of an island is often looked at as something isolated and secluded yet has a certain charm about it. Honor is much like the shore in this sense. Honor must come from inside and resist being influenced by minor factors...

Words: 556 - Pages: 3

Premium Essay

Business Management

...David Srep Computer Literacy New Tech Update These three phones allow you to have the Unikey app. No more digging your pockets and looking for your keys. There a new app that you can get for the phones that are above this paragraph. This key is called the Unikey system, and it has some cool features that are actually kind of clever. The unikey app transmits a Bluetooth signal from the user iPhone, android, or blackberry smart phone, which is picked up by a paired unikey deadbolt lock as it is approached by a user. All the user has to do is walk up to the door and the phone has to be nearby the door. Next the user has to touch the outer surface of the lock, at which point the bolt will electronically withdraw. You can do the same thing when you leave the house. What I like about the Unikey system is that you can text someone the key to your house. This way your family member doesn’t have to wait until you get home. It gives you an option if you want that person have the key permanent or a one- time use. If you lose your phone you can deactivate the app from a computer and the unikey comes with a spare key. The unikey system is being sold for 199.00. It will be cool if they can make these apps for cars. I have car key 3 times and hand to pay 80 dollars for someone to get my key out the car. Source: http://www.unikeytech.com/ Source:...

Words: 276 - Pages: 2

Free Essay

Cryptgraphh

...Cryptography Cryptography             Some data is very sensitive and therefore it has to be hidden away from parties who are not supposed to view it. In this age of computers, their capacity for transfer and retrieval of information may be exploited by other parties to gain access to confidential and potentially dangerous data. Therefore, measures have been taken to ensure that data is not accessed by others which is done by using several methods which, besides physical security, includes the use of encryption algorithms which are programs that change the way information looks by rendering it illegible. Data encryption is an important part of computing and, if done properly, can provide the user with means through which data can be protected from other parties. Encryption is done in many areas including end point devices such as computer terminals and servers which store important information. As such, data encryption has been applied in the military, banking sector, in businesses and other areas which require secure storage and transfer of data. Data encryption is simply the change of raw data or ordinary information referred to as plaintext into indecipherable material called cipher text. The data can then be stored or transferred securely since it cannot be read by another party. If the data is to be accessed, a cipher, which is the pair of algorithms that encrypts and decrypts data, is used to decrypt the data. The data can then be read and it is therefore accessible only...

Words: 1679 - Pages: 7

Premium Essay

Pfl Case Study

...Asia. product segments: Frozen savoury, Dessert, Fruit products customer segments: retailers (supermarkets), foodservice outlets (sporting venues or cafes), Petrol and Convenience Channel (Reliance BP sites) oversease markets: US market, Asia market Value chain: PFL doesn't sell directly to consumers. 2 What is the current life cycle position of the industry? (industry life cycle, and demonstrate why?) Maturity stage : The case mentioned that PFL has already achieved leadership in serveral markets. Besides, serveral other markets are very competitive. In addition, PFL is continuing to pursue conversion cost reduction, which is another character of maturity stage. So we conclude that this industry is in maturity stage. What are the key issues that will affect historical/future industry growth? What is their likely impact and the overall assessment of the industry’s future growth? (TEMPLES) Technology + The technology development, especially information systems and manufacuturing systems, will improve the efficiency and effectiveness of this industry by enabling economies of scale and scope. So the smaller compititors who doesn't have strong cash flow to invest in the new technology, will be swept out. And the left competitors will grow market share by both further acquisitions and cost management. Economy + The potential growing sales in US and Asia may make the total industry grow by expanding to international markets. The global financial crisis (Case doesn't mention)...

Words: 932 - Pages: 4

Free Essay

Flash Burn

...Ariel Martin October 16, 2013 Descriptive narration Flash Burn My dad was set on fire when the car backfired. He was in the process of getting his Jeep fixed. On this particular day, the project of choice was working on the carburetor. The process was simple, he would pour gas into the carb well my boyfriend Mat would turn the key over. They must have done this at least a dozen times. The last time it all went wrong. My dad poured the gas and Mat turned the key. A loud bang like a gun shoot startled me, but I did not expect to turn my head to see the most devastating thing. I looked over to where the bang was there were flames coming from under the hood. The bottle of gas my dad was holding was on fire. He was unsure where my son was so he didn’t want to throw the bottle. Instead he tried to shake the bottle that’s when it all went wrong. The gas splashed his face then the flames; he hit the floor stop, drop and roll. It didn’t work as he hit the floor the bottle of gas fell and he rolled right into it. Now his chest is on fire, he realized it’s not working he stands up and rips his shirt off and starts hitting his head to put the flames out. The smell of burning flesh and hair was all we could smell. The sight was heart breaking when he turned around; the skin that was left on his face was hanging. From the time the fire started to when he looked me in the eyes and asked how he looked had only been about a minute and a half. That fast I had to look my dad in his...

Words: 515 - Pages: 3

Free Essay

Enterprise Security Services

...SECTION ONE INTRODUCTION BACKGROUND OF STUDY In years past, when enterprises were starting, it suffered data lose and information retrieval was difficult since there was no strong security service to protect already gathered information. Production, distribution and some other functions were very difficult to achieve due to weak security services but as the days passed by enterprise has struggled to secure its services and with the aid of growth in technology and programming enterprise services has reached a reasonable degree in achieving its dream by protecting its services from harm. An enterprise is an activity or a project that produces services or products. There are essentially two types of enterprise, business and social enterprises. Business enterprises are run to make profit for a private individual or group of individuals. This includes small business while social enterprise functions to provide services to individuals and groups in the community. These shows that an enterprise security service is a form of protecting the services or the product of individuals and groups in the community from harm (preventing unauthorized users from gaining access). Enterprise now uses Biometric, Encryption and some others forms of security to form the backbone of its services. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on...

Words: 4428 - Pages: 18

Free Essay

Wlan

...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...

Words: 254 - Pages: 2

Free Essay

Tehe!

...Dance like There's No Tomorrow As you open the door into Dance Like There's No Tomorrow, you will immediately see a cheerful, sprightly woman sitting at a maple oak desk full of neat, organized papers. Right in front of her, a bright green apple laptop sits, glowing. What hits you second is the lemony smell of air freshener, to mask the smell of the oak floor. She invites you to sign up with a shiny clipboard and yellow pencils. After you finish the tedious registration, you get to enter the studio! Your hand grabs the cold, slippery doorknob on the soundproof door and turns the knob. You get hit by a breeze of cold, fresh air coming from a grey fan hung in the back corner of the studio. Loud pop music from a stereo in the front of the room blasts out, and vibrates your eardrums. You find yourself enclosed by four walls of crystal, clear mirrors on every side of you and it mimics every move. Long, polished wooden bars wraps around two sides of the walls. A portable blue jug of ice water sits in the front of the room, covered with little beads of water. In the very back of the studio, there is a hidden door which blends into the walls because it also has mirrors on it. It contains apparel for dance, sweatpants, T-shirts, camis, dance shoes, and sweatshirts with Dance Like There's No Tomorrow on the very front of them. The shiny, glittering world of Dance is intriguing and popular for all ages. If you need to release your stress, want to have fun, or Dancing is just your...

Words: 284 - Pages: 2