Name:___________________________________________________________

Dichotomous Keys Using Smiley Faces Instructions: Use the key below to identify the species name of each of the smileys below. 1. Teeth visible ....................go to 2 .....Teeth not visible .................go to 4 2. Has a wide, toothy smile .......Smilus toothyus ....Is not smiling ......................go to 3 3. Visibly crying .................Smilus dramaticus .... Frowning .......................Smilus upsettus 4. Eyes are symmetrical .... go to 5 ....Eyes not symmetrical .....go to 8 5. Eyes shaped like hearts ..... Smilus valentinus ....Eyes are shaped as ovals .....go to 6

6. Smiling, happy face ...... Smilus traditionalis .....Not happy, frowning or other .....go to 7 7. Mouth curved down, frowning .... Smilus saddus .... Mouth is a small circle .................Smilus suprisus 8. Has a pirate eye patch ...............Smilus piratus ....Does not have eye patch ............ go to 9 9. One eye is much larger than the other eye  ...... Smilus mutatus One eye is winking .................Smilus winkus

__________________ __________________ __________________ __________________ __________________

__________________ __________________ __________________ __________________ __________________

Extension: A. The names of the smilies give you another bit of information about their taxonomy. Each of these smilies belongs to the same genus. What is their genus? _______________________________ B. Names are often given to an organism by the person who discovers it, though they follow certain conventions, often they are named after the person, or where the organism was found, or given a name that describes the creature. Which convention was used in naming these smilies? ______________________________________________ C. Suppose you discovered the new smiley pictured to the right.  What name would you give it? _____________________________________ D. Create a small dichotomous key that names the following creatures.

Related Documents: Dichotomous Key with Creatures | Pamishan Key

Dichotomous Key with Smilies.pdf

Page 1 of 2. 6. Smiling, happy face ...... Smilus traditionalis .....Not happy, frowning or other .....go to 7. 7. Mouth curved down, frowning .... Smilus saddus .... Mouth is a small circle .................Smilus suprisus. 8. Has a pirate eye patch ...............Smilus piratus ....Does not have eye patch ............ go to 9. 9. One eye is much larger ...

295KB Sizes 1 Downloads 188 Views

Recommend Documents

Dichotomous Key Practice-Pamisham Creatures A through E.pdf ...
Page 1 of 2. Dichotomous Key Practice-Pamishan Creatures Name. Date ______ Period ___. Help! Scientists have discovered quite a few new creatures on ...

Dichotomous Keys (Shark Activity).pdf
Dichotomous Keys (Shark Activity).pdf. Dichotomous Keys (Shark Activity).pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Dichotomous Keys ...

Comparing dichotomous and trichotomous approaches ...
that they have minimal unique predictive validity; however, they are not identical ..... complex models, and is less sensitive to sample size and violations of ...

Heterogeneous anchoring in dichotomous choice valuation framework
Flachaire E., Hollard, G. et Luchini S., Heterogeneous anchoring in dichotomous choice valuation framework,. Recherches ... the contingent valuation method in eliciting individual willingness to pay 1. In the dichotomous choice .... with a “missing

Comparing dichotomous and trichotomous approaches ...
In view of these benefits, it is important to understand the regulatory ..... In view of these findings, we consider the model fit of TEOSQ as ...... 29, pp.271–360).

ECET - 2013 Question paper with key (Mathematics, Physics ...
ECET - 2013 Question paper with key (Mathematics, Physics, Chemistry).pdf. ECET - 2013 Question paper with key (Mathematics, Physics, Chemistry).pdf. Open.

Efficient Identity-Based Key Issue with TPM
Institute of Software, School of EECS, Peking University. Key Lab. of ... decryption any former data. In this paper we ... efficient, especially for large-scale deployment of identity- ..... ample IBM Crypto Coprocessor 4758 and smart cards. Our.

Implementation of Multicast Key Distribution with ...
sensors etc., in multicast group communication, all the authorized members share a session key, which will be changed dynamically to ensure forward and ... perform well as the new technology has a very long delay network path and possible link distri

Key english test 3 with answers.pdf
Page 3 of 125. Key english test 3 with answers.pdf. Key english test 3 with answers.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Key english ...

CSIR-NET-LDec-2013-Question-Paper-with-Answer-Key-solved.pdf
CSIR-NET-LDec-2013-Question-Paper-with-Answer-Key-solved.pdf. CSIR-NET-LDec-2013-Question-Paper-with-Answer-Key-solved.pdf. Open. Extract.

Refuting Security Proofs for Tripartite Key Exchange with ... - CiteSeerX
School of Computing and Information Technology. University of Western ... Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06).