SlideShare a Scribd company logo
Tree Pests Creatures That Bug Our Trees Bless Christian Caralde Botany 202
Asian Longhorn Beetles      Native to China Transported to United States in infested packing material.
Emerald Ash Borer     Killed 20 million trees in Michigan, Ohio, and Indiana .     Firewood quarantines  to prevent  new  infestations.
Gypsy Moth     Spread to U.S. in 1870     Oaks and Aspens are most common hosts     Larva defoliate trees .      Small mammals and birds are predators.
Western Pine Beetle      Infest Ponderosa and         Coulter pine trees Mainly Western states Tree loss considered normal ecological process.
Acknowledgements Photos and information courtesy of the USDA Forest Service Forestry.about.com

More Related Content

What's hot

Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
Emman James
 
Tree pests
Tree pestsTree pests
Tree pests
asim1301
 
Jenkins - Ecology & silviculture of northern Rockies forests
Jenkins - Ecology & silviculture of northern Rockies forestsJenkins - Ecology & silviculture of northern Rockies forests
Jenkins - Ecology & silviculture of northern Rockies forests
Northern Institute of Applied Climate Science
 
Mica Pelizza and Facundo Pérez
Mica Pelizza and Facundo PérezMica Pelizza and Facundo Pérez
Mica Pelizza and Facundo Pérez
Fabiana R.
 
Presentation2
Presentation2Presentation2
Presentation2
jonathanjun
 
Felix
FelixFelix
Felix
gcocciolo
 
Better Wildlife Habitat: Water, Woods and Beyond
Better Wildlife Habitat: Water, Woods and BeyondBetter Wildlife Habitat: Water, Woods and Beyond
Better Wildlife Habitat: Water, Woods and Beyond
The Piedmont Environmental Council
 
Mountain gorillas - Jade
Mountain gorillas - JadeMountain gorillas - Jade
Mountain gorillas - Jade
Mrs Hepburn's Classes
 
Blandy Experimental Farm
Blandy Experimental FarmBlandy Experimental Farm
Blandy Experimental Farm
The Piedmont Environmental Council
 

What's hot (9)

Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Tree pests
Tree pestsTree pests
Tree pests
 
Jenkins - Ecology & silviculture of northern Rockies forests
Jenkins - Ecology & silviculture of northern Rockies forestsJenkins - Ecology & silviculture of northern Rockies forests
Jenkins - Ecology & silviculture of northern Rockies forests
 
Mica Pelizza and Facundo Pérez
Mica Pelizza and Facundo PérezMica Pelizza and Facundo Pérez
Mica Pelizza and Facundo Pérez
 
Presentation2
Presentation2Presentation2
Presentation2
 
Felix
FelixFelix
Felix
 
Better Wildlife Habitat: Water, Woods and Beyond
Better Wildlife Habitat: Water, Woods and BeyondBetter Wildlife Habitat: Water, Woods and Beyond
Better Wildlife Habitat: Water, Woods and Beyond
 
Mountain gorillas - Jade
Mountain gorillas - JadeMountain gorillas - Jade
Mountain gorillas - Jade
 
Blandy Experimental Farm
Blandy Experimental FarmBlandy Experimental Farm
Blandy Experimental Farm
 

Viewers also liked

Chap1 case3
Chap1 case3Chap1 case3
Law powerpoint team 10 final
Law powerpoint team 10 finalLaw powerpoint team 10 final
Law powerpoint team 10 final
patrickrhoward
 
Chap1 lab1
Chap1 lab1Chap1 lab1
Identify theft 2
Identify theft 2Identify theft 2
Identify theft 2
bless christian caralde
 
Caralde chap 2 lab 3
Caralde chap 2 lab 3Caralde chap 2 lab 3
Caralde chap 2 lab 3
bless christian caralde
 
Cralde chap 2 case 1
Cralde chap 2 case 1Cralde chap 2 case 1
Cralde chap 2 case 1
bless christian caralde
 
Case1
Case1Case1
Chap1case2
Chap1case2Chap1case2
Chap1 lab3
Chap1 lab3Chap1 lab3
Chap1case4
Chap1case4Chap1case4
Caralde chap 2 case 2
Caralde chap 2 case 2Caralde chap 2 case 2
Caralde chap 2 case 2
bless christian caralde
 
Caralde chap 2 case 4
Caralde chap 2 case 4Caralde chap 2 case 4
Caralde chap 2 case 4
bless christian caralde
 
Chap1 lab2
Chap1 lab2Chap1 lab2
My expectation for the upcoming sports fest
My expectation for the upcoming sports festMy expectation for the upcoming sports fest
My expectation for the upcoming sports fest
bless christian caralde
 
Caralde maintaining a healthy lifestyle
Caralde maintaining a healthy lifestyleCaralde maintaining a healthy lifestyle
Caralde maintaining a healthy lifestyle
bless christian caralde
 
Mon album de famille
Mon album de famille Mon album de famille
Mon album de famille em311
 
Mon autobiographie
Mon autobiographieMon autobiographie
Mon autobiographieem311
 
遊戲企劃如何快速開發原型
遊戲企劃如何快速開發原型遊戲企劃如何快速開發原型
遊戲企劃如何快速開發原型
tppr2046
 

Viewers also liked (18)

Chap1 case3
Chap1 case3Chap1 case3
Chap1 case3
 
Law powerpoint team 10 final
Law powerpoint team 10 finalLaw powerpoint team 10 final
Law powerpoint team 10 final
 
Chap1 lab1
Chap1 lab1Chap1 lab1
Chap1 lab1
 
Identify theft 2
Identify theft 2Identify theft 2
Identify theft 2
 
Caralde chap 2 lab 3
Caralde chap 2 lab 3Caralde chap 2 lab 3
Caralde chap 2 lab 3
 
Cralde chap 2 case 1
Cralde chap 2 case 1Cralde chap 2 case 1
Cralde chap 2 case 1
 
Case1
Case1Case1
Case1
 
Chap1case2
Chap1case2Chap1case2
Chap1case2
 
Chap1 lab3
Chap1 lab3Chap1 lab3
Chap1 lab3
 
Chap1case4
Chap1case4Chap1case4
Chap1case4
 
Caralde chap 2 case 2
Caralde chap 2 case 2Caralde chap 2 case 2
Caralde chap 2 case 2
 
Caralde chap 2 case 4
Caralde chap 2 case 4Caralde chap 2 case 4
Caralde chap 2 case 4
 
Chap1 lab2
Chap1 lab2Chap1 lab2
Chap1 lab2
 
My expectation for the upcoming sports fest
My expectation for the upcoming sports festMy expectation for the upcoming sports fest
My expectation for the upcoming sports fest
 
Caralde maintaining a healthy lifestyle
Caralde maintaining a healthy lifestyleCaralde maintaining a healthy lifestyle
Caralde maintaining a healthy lifestyle
 
Mon album de famille
Mon album de famille Mon album de famille
Mon album de famille
 
Mon autobiographie
Mon autobiographieMon autobiographie
Mon autobiographie
 
遊戲企劃如何快速開發原型
遊戲企劃如何快速開發原型遊戲企劃如何快速開發原型
遊戲企劃如何快速開發原型
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Caralde chap 2 Lab 2

  • 1. Tree Pests Creatures That Bug Our Trees Bless Christian Caralde Botany 202
  • 2. Asian Longhorn Beetles Native to China Transported to United States in infested packing material.
  • 3. Emerald Ash Borer Killed 20 million trees in Michigan, Ohio, and Indiana . Firewood quarantines to prevent new infestations.
  • 4. Gypsy Moth Spread to U.S. in 1870 Oaks and Aspens are most common hosts Larva defoliate trees . Small mammals and birds are predators.
  • 5. Western Pine Beetle Infest Ponderosa and Coulter pine trees Mainly Western states Tree loss considered normal ecological process.
  • 6. Acknowledgements Photos and information courtesy of the USDA Forest Service Forestry.about.com