Pits, PL-SQL Programming

Assignment Help:

PITS

  • Depressions in secondary cell wall is called pit.
  • A pit present on the free cell wall surface without its partner is called Blind pit.
  • It consists of 2 parts - Pit chamber and Pit membrane.
  • Pit chamber / pit cavity is depression in wall where secondary wall is absent.
  • Opening of pit chamber into cell is called pit pore / aperture.
  • Pit membrane is formed of (PCW + middle lamella + PCW) it is "trilaminar".
  • Pit membrane also called closing membrane.
  • Pit membrane is permeable due to permeability of primary cell wall.
  • Pits are of 2 types (depending upon the shape of the pit chamber.)

1318_pits.png

(i) Simple pit

  • Pit chamber has uniform width.
  • Diameter of lumen remains the same.
  • Found in vessels, tracheids & sclerenchyma.

(ii) Bordered pit

  • Pit chamber is flask-shaped.
  • Diameter of lumen is increases from inner to outer side.
  • A disc-shaped thickening called Torus is present in the middle of pit chamber on pit membrane.
  • It controls diffusion, it prevents rupturing of pit membrane when unequal pressure is present on its both sides.

1106_pits 1.png


Related Discussions:- Pits

Using trim - collection method, Using TRIM This process has two forms....

Using TRIM This process has two forms. The TRIM removes an element from the end of the collection. The TRIM(n) removes the n elements from the end of the collection. For e.g.

Level - sql pseudocolumns, LEVEL You use the LEVEL with the SELECT CON...

LEVEL You use the LEVEL with the SELECT CONNECT BY statement to categorize rows from a database table into a tree structure. The LEVEL returns the level number of a node in a

Referencing records, Referencing Records Unlike the elements in a coll...

Referencing Records Unlike the elements in a collection, that are accessed using subscripts, the fields in a record are accessed by name. To reference an individual field, you

Enforce security in the database system, Question: (a) In the context o...

Question: (a) In the context of database security explain how the following database features help to enforce security in the database system: (i) Authorisation (ii) Access

How to use the explain plan for statement, Using the student and faculty ta...

Using the student and faculty tables create a select query that outputs all students for a specific advisor. Generate the execution plan, select out the explain plan . Create an

Procedures - syntax, Procedures The procedure is a subprogram which can...

Procedures The procedure is a subprogram which can take parameters and be invoked. Normally, you can use a procedure to perform an action. The procedure has 2 sections: the spe

Majority of differences among 9i-10g-11g, Majority of Differences among 9i,...

Majority of Differences among 9i, 10G, 11G :- These are some combine feature which has differences among others. Automatic Workload Repository (AWR) Drop database' s

Components of an object type in pl/sql, Components of an Object Type: A...

Components of an Object Type: An object type encapsulates the operations and data. Therefore, you can declare the methods and attributes in an object type specification, but no

Like operator-comparison operators, LIKE Operator You use the LIKE opera...

LIKE Operator You use the LIKE operator to compare the character value to a pattern. The Case is significant. LIKE returns the Boolean value TRUE when the character patterns mat

Using operator ref - manipulating objects pl sql, Using Operator REF: ...

Using Operator REF: You can retrieve refs by using the operator REF that, like VALUE, takes as its argument a correlation variable. In the illustration below, you retrieve one

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd