Static Quiz 01 May 2023 (Science and Technology)
Quiz-summary
0 of 5 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
Information
Static Quiz 01 May 2023 (Science and Technology)
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- Answered
- Review
- Question 1 of 5
1. Question
With reference to Biotechnology, ‘CRISPR-Cas9’ is a gene editing technology that is often seen in the news. With reference to this, the term ‘CRISPER’ refers to?
CorrectAbout Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR)-Cas 9
• CRISPR is a genetic code or sequence found in bacteria.
o Formed due to the activity of the previous bacteriophages that had infected them.
• Bacteria uses CRISPR sequence to remember each specific virus that attacks them by incorporating virus DNA into their own bacterial genome.
• This gives the bacteria protection when a specific virus tries to attack again.
• CRISPR-associated protein 9 (Cas9): A bacterial RNA-guided endonuclease that once activated will make special enzymes that seem to have coevolved with CRISPR.IncorrectAbout Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR)-Cas 9
• CRISPR is a genetic code or sequence found in bacteria.
o Formed due to the activity of the previous bacteriophages that had infected them.
• Bacteria uses CRISPR sequence to remember each specific virus that attacks them by incorporating virus DNA into their own bacterial genome.
• This gives the bacteria protection when a specific virus tries to attack again.
• CRISPR-associated protein 9 (Cas9): A bacterial RNA-guided endonuclease that once activated will make special enzymes that seem to have coevolved with CRISPR. - Question 2 of 5
2. Question
Consider the following statements about the CAR-T therapy:
1) It is a way of generating special type of T cell in the laboratory which is further edited by adding a gene for a man-made receptor called CAR.
2) It is a short time treatment to treat cancer and is administered only once to a patient.
Which of the following statements is/are correct?CorrectAbout CAR-T therapy
• It is a way to get immune cells called T cells to fight cancer by editing them in the lab.
o T cells are a type of white blood cell that attacks foreign pathogens.
• T cells are taken from patient’s blood and are edited by adding a gene for a man-made receptor (called CAR).
o CAR is special receptor, created in the laboratory, that is designed to bind to certain proteins on cancer cells.
o CAR is then added to T cells. This helps them better identify specific cancer cell antigens.
o These changed T cells called CAR- T cells.
• CAR-T cells are then given back to the patient.
• Benefits of CAR-T therapy
o While existing treatments work towards increasing life of patients, CAR-T technology holds promise of curing certain types of cancers.
o Unlike chemotherapy, CAR-T is administered only once to a patient.
o Short treatment time needed and more rapid recovery.IncorrectAbout CAR-T therapy
• It is a way to get immune cells called T cells to fight cancer by editing them in the lab.
o T cells are a type of white blood cell that attacks foreign pathogens.
• T cells are taken from patient’s blood and are edited by adding a gene for a man-made receptor (called CAR).
o CAR is special receptor, created in the laboratory, that is designed to bind to certain proteins on cancer cells.
o CAR is then added to T cells. This helps them better identify specific cancer cell antigens.
o These changed T cells called CAR- T cells.
• CAR-T cells are then given back to the patient.
• Benefits of CAR-T therapy
o While existing treatments work towards increasing life of patients, CAR-T technology holds promise of curing certain types of cancers.
o Unlike chemotherapy, CAR-T is administered only once to a patient.
o Short treatment time needed and more rapid recovery. - Question 3 of 5
3. Question
Consider the following statements about the Radiofrequency Identification (RFID):
1) It is a technology that uses radio waves to automatically identify various tagged objects
2) It does not require a direct line of sight to be read.
3) No real time tracking can be done as the data stored in an RFID tag cannot be updated in real-time.
Select the correct answer using the code given below.CorrectWhat is Radio-frequency identification (RFID) Technology?
About:
It is a technology that uses radio waves to automatically identify various tagged objects.
It is a wireless tracking method that uses tags and readers to track objects.
The Low Frequency, High Frequency, and Ultra-High Frequency bands are used by RFID systems.
Components:
Transponder, receiver, and transmitter.
Functioning:
The RFID reader continually sends radio waves of a specific frequency in the RFID system.
If the object to which the RFID tag is attached is within the range of the radio waves, it provides feedback to the RFID reader, which then identifies the object based on the feedback.IncorrectWhat is Radio-frequency identification (RFID) Technology?
About:
It is a technology that uses radio waves to automatically identify various tagged objects.
It is a wireless tracking method that uses tags and readers to track objects.
The Low Frequency, High Frequency, and Ultra-High Frequency bands are used by RFID systems.
Components:
Transponder, receiver, and transmitter.
Functioning:
The RFID reader continually sends radio waves of a specific frequency in the RFID system.
If the object to which the RFID tag is attached is within the range of the radio waves, it provides feedback to the RFID reader, which then identifies the object based on the feedback. - Question 4 of 5
4. Question
With reference to Cyber-security, consider the following statements with reference to Coin Mining:
1) Coin mining is an illegitimate, competitive process used to release new crypto coins into circulation
2) Cryptojacking is a cyber-attack that is hard to detect, wherein a computing device is hacked by the attacker, and its resources are used to illicitly coin mining of cryptocurrency.
Which of the following statements is/are correct?CorrectCryptojacking
• Cryptojacking is a cyber-attack that is hard to detect, wherein a computing device is hacked by the attacker, and its resources are used to illicitly coin mining of cryptocurrency.
• Coin mining is a legitimate, competitive process used to release new crypto coins into circulation or to verify new transactions.
• It involves solving complex computational problems to generate blocks of verified transactions that get added to the blockchain.IncorrectCryptojacking
• Cryptojacking is a cyber-attack that is hard to detect, wherein a computing device is hacked by the attacker, and its resources are used to illicitly coin mining of cryptocurrency.
• Coin mining is a legitimate, competitive process used to release new crypto coins into circulation or to verify new transactions.
• It involves solving complex computational problems to generate blocks of verified transactions that get added to the blockchain. - Question 5 of 5
5. Question
Which among the following is India’s first public sector undertaking in the space sector and commercial arm of ISRO aimed at production and marketing of space-based services?
CorrectNew Space India Limited (NSIL)
o It is country’s first public sector undertaking in the space sector and commercial arm of ISRO aimed at production and marketing of space-based services, also empowered to own the operational launch vehicles and space assets of ISRO.IncorrectNew Space India Limited (NSIL)
o It is country’s first public sector undertaking in the space sector and commercial arm of ISRO aimed at production and marketing of space-based services, also empowered to own the operational launch vehicles and space assets of ISRO.