Question

In: Biology

Make a Dichotomous Key using the folowing bacteria to ultimately isolate the following organims using PEA,...

Make a Dichotomous Key using the folowing bacteria to ultimately isolate the following organims using PEA, gram stain, catalase test, oxidase test, MSA, etc.:

Proteus                           Acinetobacter                       Staphylococcus                     Micrococcus

Lactobacillus                  Salmonella                            Escherichia                            Neisseria

Bacillus                          Shingella                               Klebsiella                              Citrobacter

Serratia                           Enterobacter                         Pseudomonas                        Streptococcus

Solutions

Expert Solution

Bacteria

PEA

Gram Stain

Catalase Test

Oxidase Test

Proteus

Inhibits the growth

Negative

Positive

Negative

Lactobacilllus

Promotes the growth

Positive

Negative

Negative

Bacillus

Promotes the growth

Positive

Positive

Negative

Serratia

Inhibits the growth

Negative

Positive

Negative

Acinetobacter

Inhibits the growth

Negative

Positive

Negative

Salmonella

Inhibits the growth

Negative

Positive

Negative

Shingella

Inhibits the growth

Negative

Positive

Negative

Enterobacter

Inhibits the growth

Negative

Positive

Negative

Staphylococcus

Promotes the growth

Positive

Positive

Negative

Escherichia

Inhibits the growth

Negative

Positive

Negative

Klebsiella

Inhibits the growth

Negative

Positive

Negative

Pseudomonas

Inhibits the growth

Negative

Positive

Negative

Micrococcus

Promotes the growth

Positive

Positive

Positive

Neisseria

Inhibits the growth

Negative

Positive

Positive

Citrobacter

Inhibits the growth

Negative

Positive

Negative

Streptococcus

Promotes the growth

Positive

Negative

Negative

PEA Test – Phenylethyl alcohol agar (PEA) is a selective medium test which is specific for gram positive bacteria. The selective medium inhibits the growth of gram negative bacteria and promotes growth of gram positive ones.


Related Solutions

You need to construct a dichotomous key for the following taxa from the protists (below). Make...
You need to construct a dichotomous key for the following taxa from the protists (below). Make sure that you follow the rules for the construction of dichotomous keys. Ulva, Volvox, Spirogyra, Red algae, Plasmodial slime mold, Dinoflagellates, Stentor, Plasmodium, Trypanosoma, diatoms, Radiolaria, Euglena Brown algae
Dichotomous key for common skin bacteria: I. Cells arranged in tetrads, glucose not fermented (Micrococcus) A....
Dichotomous key for common skin bacteria: I. Cells arranged in tetrads, glucose not fermented (Micrococcus) A. Colonies have yellow pigment M. luteus B. Colonies have red or pink pigment M. roseus II. Cells arranged in clusters, glucose is fermented (Staphylococcus) A. Acid produced from mannitol 1. Coagulase-positive S. aureus 2. Coagulase-negative a. Acid produced from trehalose S. saprophyticus b. No acid from trehalose S. capitis B. Acid not produced from mannitol 1. Acid produced from trehalose S. saprophyticus 2. No...
Create a dichotomous key with these bacteria: Alcaligenes faecalis, Bacillus megatarium, Bacillus subtilis, Enterobacter aerogenes, Escherichia...
Create a dichotomous key with these bacteria: Alcaligenes faecalis, Bacillus megatarium, Bacillus subtilis, Enterobacter aerogenes, Escherichia coli, Lactococcus lactis, Mycobacterium smegmatis, Proteus vulgarius, Pseudomonas aeruginosa, Serratia marcescens, Staphylococcus aureus, Staphylococcus epidermidis
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key =...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key = D. ___________ Vespasian, key = P. _________ Caligula, key = H. _________ Nero, key = T. _____________
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
Clindamycin binds to the 50S ribosomal subunit of bacteria. Using this information, respond to the following:...
Clindamycin binds to the 50S ribosomal subunit of bacteria. Using this information, respond to the following: a. Referring to the 5 modes or mechanisms of actions of antibiotics, which one applies to clindamycin? b. Is this a broad or narrow spectrum antibacterial agent? Explain c. Does clindamycin have selective toxicity for bacteria? Explain
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Using the bisection method:     Make a program to use this method using the following three...
Using the bisection method:     Make a program to use this method using the following three functions and use it to find the root of this function f (x) = x * x * x-8. a) A function so that the user between xlower and xupper that meets the value of the function has a different sign and if he does not ask for new values. b) A function to find the root and call it bisection and perform a...
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE,...
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE, key = 12. TJNXWNVM, key = 19. LHAXEWJ, key = 22. DBSLEXO, key = 10. GDBPC ATVXDC, key =15. Decipher the following. They have been enciphered using a Shift Cipher with the given key. QSBHIFWCB, key = O. CQN ADKRLXW ARENA, key = J. ZKBYQD SQBUDTQH, key = Q. VTXLTKBTG LXVMBHG, key = T.
Decipher the following names. They have been enciphered using a Shift cipher with the given key....
Decipher the following names. They have been enciphered using a Shift cipher with the given key. GULWOM UOLYFCOM, key = U. IRGAJOAY, key = G. TYESBUJYQD, key = Q. HFXXNZX, key = F.   Encipher the following words using a Shift Cipher with the given key. Appian Way, key = F. Punic Wars, key = B. Carthage, key = N. Gladiator, key = W.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT