Tuesday, January 28, 2020

Tobacco Mosaic Virus Essay Example for Free

Tobacco Mosaic Virus Essay Hosts for Tomatoe Mosaic Virus include tobacco, tomato, and other solanaceous plants. TMV enters the plant cell through minor wounds. The virus can also contaminate seed coats, and the plants germinating from these seeds can become infected. Once TMV enters the cell, the virus particles disassemble in an organized manner to expose the TMV RNA. The virus RNA is positive-sense, or + sense, and serves directly as a messenger RNA (mRNA) that is translated using host ribosomes. Translation of the replicase-associated proteins (RP) than begins. As soon as these proteins have been synthesized, the replicase associates with the 3 end of the + sense TMV RNA for the production of a negative sense RNA. The sense RNA is the template to produce both full-length genomic + sense RNA as well as the + sense subgenomic RNAs (sgRNAs). The sgRNAs are translated by the host ribosomes to produce the movement protein (MP) (30 kDa) and the coat protein (CP). These virus particles are very stable and, at some point when the cells are broken or the leaf dries up, they are released to infect new plants. Alternatively, the + sense TMV RNA is wrapped in a movement protein, and this can infect adjacent cells. TMV uses its movement protein to spread from cell-to-cell through plasmodesmata, which connect plant cells. Normally, the plasmodesmata are too small for passage of intact TMV particles. The movement protein (probably with some unknown assistance) enlarges the plasmodesmatal openings so that TMV RNA can move to the adjacent cells, release the movement protein and host proteins, and initiate a new round of infection. As the virus moves from cell to cell, it eventually reaches the plants vascular system (veins) for rapid systemic spread through the phloem to the roots and tips of the growing plant.

Monday, January 20, 2020

Surrendering Freedom for Peace of Mind :: Technology Technological Papers

Surrendering Freedom for Peace of Mind A glance back into history illustrates many eras that have come and gone which have left their mark on the world and its people. The industrial revolution changed the face of modern society and yet there is no comparison between its effect and that of the computer. Today, it is difficult to find an area of our lives that computer technology has not touched. The recent attempt by the longshoremen in California to strike was a prime example of the fear of computer technology that many feel. These men stated that they wanted guarantees that they would not lose their jobs as the freight industry becomes more and more computerized. Conversely, the shipping magnets are trying to compete in a world where the computer dominates the way freight is handled and they fear they are being forced to let progress pass them by. We were recently asked in class if anyone could identify a â€Å"computer free† part of our world. No one offered a suggestion since it is intuitive that the computer dominates all areas of our lives. Examples range from how we travel, the way our food is grown, what we eat, how we place restaurant orders, the size of food portions, the practice of medicine, how we shop, what we buy, how it gets to our home. There are countless other examples that could help to illustrate this point. Technologies that we could not even imagine a few short years ago are now common, accepted parts of our daily lives. We have passed through eras of information, networking and e-mail. Are we quickly headed to the point where we have lost all privacy and freedom? Are we moving to the era of personal invasion? Or are we already there? And more importantly, do we care? Have we been on the â€Å"slippery slope† so long that we have lost track of where we are headed and what we are leaving behind? One of the most troubling technologies being developed are highly precise tracking devices which can be used to detect the whereabouts of humans anywhere on earth. We are all familiar with the â€Å"teathers† that our probationers wear around their ankles. They are â€Å"free† to move around and live a relatively normal life since they can sleep at home, drive vehicles and maintain employment while being tracked by a teather officer. Surrendering Freedom for Peace of Mind :: Technology Technological Papers Surrendering Freedom for Peace of Mind A glance back into history illustrates many eras that have come and gone which have left their mark on the world and its people. The industrial revolution changed the face of modern society and yet there is no comparison between its effect and that of the computer. Today, it is difficult to find an area of our lives that computer technology has not touched. The recent attempt by the longshoremen in California to strike was a prime example of the fear of computer technology that many feel. These men stated that they wanted guarantees that they would not lose their jobs as the freight industry becomes more and more computerized. Conversely, the shipping magnets are trying to compete in a world where the computer dominates the way freight is handled and they fear they are being forced to let progress pass them by. We were recently asked in class if anyone could identify a â€Å"computer free† part of our world. No one offered a suggestion since it is intuitive that the computer dominates all areas of our lives. Examples range from how we travel, the way our food is grown, what we eat, how we place restaurant orders, the size of food portions, the practice of medicine, how we shop, what we buy, how it gets to our home. There are countless other examples that could help to illustrate this point. Technologies that we could not even imagine a few short years ago are now common, accepted parts of our daily lives. We have passed through eras of information, networking and e-mail. Are we quickly headed to the point where we have lost all privacy and freedom? Are we moving to the era of personal invasion? Or are we already there? And more importantly, do we care? Have we been on the â€Å"slippery slope† so long that we have lost track of where we are headed and what we are leaving behind? One of the most troubling technologies being developed are highly precise tracking devices which can be used to detect the whereabouts of humans anywhere on earth. We are all familiar with the â€Å"teathers† that our probationers wear around their ankles. They are â€Å"free† to move around and live a relatively normal life since they can sleep at home, drive vehicles and maintain employment while being tracked by a teather officer.

Sunday, January 12, 2020

Cause and Effects of Cigarettes

Cause and Effect of cigarettes The question is why people smoke cigarettes knowing the dangers that have been proven over the years. Cigarettes are one of the most popular addictions in the world. They may be the most popular addiction drug in the world but it is also the most deadly in it also. Cigarettes are filled with a high quantity of nicotine which is the addicting part of it. For many people, smoking is a reliable lifestyle tool to cope with reality. Although every person's specific reasons to smoke are unique, they all share a common theme.Smoking is used as a way to suppress uncomfortable feelings, and smoking is used to relive stress, calm nerves, and relax. No wonder when you are deprived of smoking, your mind and body are unsettled for a little while. Here are a few examples of ways people use smoking for relief. oCoping with anger, stress, anxiety, tiredness, or sadness oSmoking is pleasant and relaxing oSmoking is stimulating oAcceptance – being part of a group oAs a way to socialize oProvides support when things go wrong oA way to look confident and in control oKeeps weight downSmoking is also a way to avoid feeling emotions such as sadness, grief, and anxiety. When smoking, the release of brain chemicals makes smokers feel like they are coping and dealing with life and stressful emotional situations. Nicotine brings up a level of good feelings. Cigarette smokers are aware when nicotine levels and good feelings begin to decrease, and light up quickly enough to stay in their personal comfort zone. However, they may not realize that avoiding their feelings is not the same as taking positive steps to create a life of greater potential and meaning.Smokers often say that lighting up a cigarette can calm their nerves, satisfy their cravings, and help them feel energized. Smoking acts as a drug, inducing a feeling of well-being with each puff. But, it's a phony sense of well-being that never produces a permanent satisfying or fulfilling result. Smoking lures you into believing that you can escape some underlying truth or reality. However, smoking doesn't allow you to actually transform your day-to-day life and live connected to your deeper hopes and dreams.Those were all reasons why smokers smoke with the risk and now here are some dangers of smoking. Smoking is the leading cause of death for both men and women in the United States. About 420,000 estimated to die each year as a result of smoking cigarettes. Individuals who smoke are likely to develop disease more opposed to non-smokers. There’s also a risk if you combine cigarette smoking with alcohol use. Smokers experience symptoms while smoking such as, persistent coughing, chest pain, and loss of breath. The fear of dying is what leads a lot of people to stop smoking cigarettes.It takes 2 of 3 serious efforts before this mission can be accomplished and sometimes may take even longer. It is a slow process, which requires hard work and dedication. When the person finally hits the actual â€Å"quitting day†, the person stops smoking and it can be called as the ending of the addiction of smoking. The Cause and effect of smoking cigarettes is that people smoke them to relive themselves of all the stress from the day. Also from the problems like weight and family related. The effect of that is smoking leads to cancer, and breathing problems, and all sorts of health issues down the road.

Saturday, January 4, 2020

What Does the NSA Acronym PRISM Stand For

PRISM is an acronym for the program launched by the National Security Agency to collect and analyze massive volumes of private data stored on servers operated by Internet service providers and held by large web companies including Microsoft, Yahoo!, Google, Facebook, AOL, Skype, YouTube and Apple. Specifically, national intelligence director James Clapper defined the PRISM program in June 2013 as an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision. The NSA does not need a warrant to obtain the information, though the constitutionality of the program has been called into question. A federal judge declared the program illegal in 2013. Here are some questions and answers about the program and the NSA acronym. What Does PRISM Stand For? PRISM is an acronym for Planning Tool for Resource Integration, Synchronization, and Management. So What Does PRISM Really Do? According to published reports, the National Security Agency has been using the PRISM program to monitor information and data communicated via the Internet. Those data are contained in audio, video and image files, email messages and web searches on major U.S. Internet company websites. The National Security Agency has acknowledged that it inadvertently collects from some Americans without a warrant in the name of national security. It has not said how often that happens, though. Officials have said the governments policy is to destroy such personal information. All that intelligence officials will say is that the Foreign Intelligence Surveillance Act cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States. Instead, PRISM is used for an appropriate, and documented, foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States. Why Does the Government Use PRISM? Intelligence officials say they are authorized to monitor such communications and data in an effort to prevent terrorism. They monitor servers and communications in the United States because they may hold valuable information that originated overseas. Has PRISM Prevented Any Attacks Yes, according to unnamed government sources. According to them, the PRISM program helped stop an Islamist militant named Najibullah Zazi from carrying out plans to bomb the the New York City subway system in 2009. Does the Government Have the Right to Monitor Such Communication? Members of the intelligence community say they have a right to use the PRISM program and similar surveillance techniques for monitoring electronic communications under the Foreign Intelligence Surveillance Act. When Did the Government Start Using PRISM? The National Security Agency started using PRISM in 2008, the last year of Republican George W. Bushs administration, which ramped up national security efforts in the wake of the terrorist attacks of Sept. 11, 2001. Who Oversees PRISM The National Security Agencys surveillance efforts are governed, foremost, by the U.S. Constitution and are supposed to be overseen by a number of entities including the executive, legislation and judicial branches of the federal government. Specifically, oversight on PRISM come from the Foreign Intelligence Surveillance Act Court, the Congressional Intelligence and Judiciary Committees, and of course the president of the United States. Controversy over PRISM The revelation that the government was monitoring such Internet communications was disclosed during President Barack Obamas administration. It came under scrutiny by members of both major political parties. Obama defended the PRISM program, however, by saying it was necessary for Americans to give up some measure of privacy in order to remain safe from terrorist attacks. I think it’s important to recognize that you can’t have a hundred percent security and also then have a hundred percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society, Obama said in June 2013.