英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

Uredinales    
锈菌目

锈菌目

Uredinales
n 1: rust fungi: parasitic fungi causing rust in plants;
sometimes placed in [synonym: {Uredinales}, {order Uredinales}]

Uredinales \Uredinales\, prop. n. pl. (Biol.)
An order of fungi of the phylum Basidiomycota, comprising the
rust fungi.
[PJC]

The order {Uredinales} includes between an estimated
5,000 and 7,000 species of diverse plant pathogens.
They have been around since the Carboniferous Age
(250-300 million years ago), and were well established
on the very first ferns. Members of Uredinales are well
enough adapted that they inhabit every continent except
for Antarctica. Commonly known as the "rust fungi,"
they attack nearly all types of plant life, and are
economically devastating to many crops. Members of
Uredinales have a very diverse and complex life
cycle-that may affect more than one host family and
include up to five different stages.
Morphological Features:
Uredinales includes both autoecious and heteroecious
parasites. Autoecious genera infect only one plant
host, while heteroecious genera carry out different
parts of their life cycle on two different hosts. One
example of a heteroecious fungus, Puccinia graminis,
the black stem rust of wheat, requires both the
barberry bush and a grass to complete its complicated
life cycle.
Life cycles of Uredinales are very diverse and complex.
Some genera have up to five stages of their life cycle:
Spermagonia, Aecia, Uredinia, Telia, and Basidia.
Spores are produced in each stage with differing
ploidy: spermatia (n), aeciospores (nn),
unidiniospores (nn), teliospores (nn to 2n), and
basidiospores (n). Genera that do not exhibit all five
of these stages either show three or four instead.
Ecology:
Uredinales comprise the most devastating plant
pathogens of all Basidiomycota. Genera of Uredinales
are responsible for diseases such as: coffee rust,
cedar-apple rust, black stem rust of cereals, carnation
rust, and peanut rust. There are thousands of other
rusts that havent been listed that are also
responsible for being seriously detrimental to many
genera of plants.
Despite all of the ecological problems that these fungi
cause to plants, recent efforts have attempted to use
some of these rusts to control weedy pests.
--Kari Jensen (University of Wisconsin, course material)
[available at:
http://botit.botany.wisc.edu/courses/Botany_332/uredinales.html]
[PJC]


请选择你想看的字典辞典:
单词字典翻译
Uredinales查看 Uredinales 在百度字典中的解释百度英翻中〔查看〕
Uredinales查看 Uredinales 在Google字典中的解释Google英翻中〔查看〕
Uredinales查看 Uredinales 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • What Is Cloud Security? | Google Cloud | Google Cloud
    What Is Cloud Security? | Google Cloud | Google Cloud
  • What Is Cloud Security? | Microsoft Security
    An effective cloud security strategy, which often includes a cloud-native application protection platform (CNAPP), provides robust protection for sensitive data, applications, and infrastructure, so organizations are able to safely use the scalability, flexibility, and efficiency of cloud computing while mitigating risks and addressing compliance
  • What Is Cloud Security? Best Practices and Strategies - CrowdStrike
    Cloud security refers to a broad set of strategies and technologies designed to protect data, applications, and infrastructure hosted in the cloud As more organizations rely on cloud computing to store and manage critical business data, ensuring the security of these environments has become a top priority Cloud security includes various tools
  • What is Cloud Security? - IBM
    Cloud security is a collection of procedures and technology designed to address external and internal threats to business security Organizations need cloud security as they move toward their digital transformation strategy and incorporate cloud-based tools and services as part of their infrastructure
  • What Is Cloud Security: Types, How It Works Benefits 2025 - Cloudwards
    Cloud security is a type of cybersecurity (aka digital or data security) that focuses on cloud-based architecture and securing it from external and internal threats
  • How does cloud security work? | Cloud computing security
    What is cloud security? Cloud security is the set of strategies and practices for protecting data and applications that are hosted in the cloud Like cyber security, cloud security is a very broad area, and it is never possible to prevent every variety of attack However, a well-designed cloud security strategy vastly reduces the risk of cyber
  • What Is Cloud Security? (Definition, Types, Areas) - Built In
    Cloud security is accomplished through a combination of data security, identity and access management (IAM); data retention, business continuity planning and governance, such as threat prevention; detection and mitigation policies IAM is the process that ensures the correct user has specific access privileges Common IAM techniques include
  • What Is Cloud Security? - Cisco
    Types of cloud security threats Malware Malware is a type of software designed to gain unauthorized access or cause damage to a computer Protect your endpoint against threats Reduce the risk from web-based attacks Ransomware Ransomware is a type of malicious software designed to extort money by blocking access to files or the computer system until a ransom is paid
  • Cloud computing security - Wikipedia
    Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing It is a sub-domain of computer security, network security and, more broadly, information security
  • Cloud Computing Security - GeeksforGeeks
    Cloud security is non-negotiable for any organization relying on cloud services Implementing access control, encryption, network security, intrusion detection, and proactive monitoring ensures a resilient cloud security framework Addressing cloud security challenges, continuously assessing threats, and enforcing best security practices will





中文字典-英文字典  2005-2009