<span>a. Acoelomates. Flatworm is a type of acoelomate animal; they have no body cavity or ceolom but they have </span>mesenchyme in their body cavity that surrounds the gut and organs in one solid body.
Answer:
A law in science is a generalized rule to explain a body of observations in the form of a verbal or mathematical statement.
Explanation:
Scientific laws (also known as natural laws) imply a cause and effect between the observed elements and must always apply under the same conditions.
evolution is fundamentally unpredictable.the theory of evolution as it is used here refers to "macroevolution'a theory is meant to both explain and predict;the theory of evolution only explains .the theory of evolution is not a theory and it is suggested calling it a working hypothesis:the working hypothesis of evolution
Answer:
Correct option is C.
Explanation:
Gram staining is a technique of separation of the bacteria based on the cell wall composition. Steps involved in gram staining are:
1) Primary stain application which is known as crystal voilet, it stains all cells purple/blue.
2) Mordant stain application which is known as iodine solution, is added, and form crystal iodine complex, all cells continue to stain blue/purple.
3) Decoloration step, in this step, we can differentiate gram negative or gram positive bacteria. So, decolorizing agent such as ethanol or acetone extracts blue color from thin walled peptidoglycan layer gram negative bacteria, and gram positive bacteria remain blue/purple because it contains thick walled peptidoglycan layer.
4) Counterstain application in this step safranin red dye stain the gram negative decolorized cells red/pink, and gram positive bacteria remain same blue.
So, if a student is performing a Gram stain of a mixed culture of both E. coli and S. aureus, and he forgets to decolorize with ethanol Both the bacteria should appear blue/purple color.
Answer: Computer security, cyber security or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Explanation: