Ethosuzimide, which was developed in the 1950s, is commonly used to treat epilepsy, though it is no known precisely how the drug controls convulsions. There is no anecdotal evidence that it has had an anti-aglng effect in people. The next step, Komfeld says, is to test if the drugs have an anti-aging effect on animal like flies and mice。 Very little is known about the aging process. From genetic analysis, researchers have found that an in sulin-like signaling system regulates aging and longevity. A good diet can delay aging and extend a person life span. But scientists know virtually nothing about the effect of drugs on aging. “It’s a big void, ” Konfeld said。 In addition to delaying age-related degenerative changes, the drugs also increased neuromuscular activty, suggesting a link between the neuromuscular system and the aging process。
A. But Komfeld said scientists will not know about the applicability of the drugs in humans until a similar study is done on humans. “What’s very encouraging is that these drugs were developed to treat humans, and they are well understood, because they’ve been used for a long time, ” he said。
B. Later the scientists discovered that two related anticonvulsant drugs also lengthened the lives of the worms-in the case of one drug, by almost 50 percent. “This was a big surprise to use, Komfeld said. ”“We didn’t think anticonvulsant drugs had any particular relationship to aging. That connection was completely unexpected. ”
C. Roundworms are a poor subject for experiments, because they are not like humans, even though their molecules are similar. For example, they have no bones, nor do they show emotions, making it difficult to know how exactly human subjects would react to these drugs in large quantities. However, using the worms allows experiments to be conducted quickly, because they do not live for long。
D. “Somehow the neural activity seems to regulate the aging of all of the body the skin, musculature, and reproductive tract, ” Kornfeld said. “Somehow the nervous system coordinates the progress of all these tissues, evidently, though the life stages. But we don’t know how it does that. ”
E. The discovery may also shed light on the little-understood aging process. Since the drugs act on the neuromuscular systems of both humans and worms, the findings hint at a link between neural activity and aging。
F. Unlike vertebrates, the worms are ideal subjects for the study of aging because of their short life spans, which last only a couple of weeks in a laboratory. The worm is well known in genetics, and the worm’s genome has been sequenced。
G. Use of this drug has been permitted by law since 1998 and wider use is now expected as a result of the studies. “We can clearly link this drug with human aging, but we still need to find proof, says Kornfeld optimistically. ”
第1题:
A. Source Quench.
B. Learning.
C. Buffering.
D. Windowing.
E. Cut-Through.
第2题:
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
第3题:
Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()
第4题:
Which one of the following is the most commonly used layer 2 network device?()
第5题:
Which of the following protocols is commonly used for VoIP technology?()
第6题:
In addition to better overall price performance, which other factor most significantly contributes to a lower three-year TCO advantage for a pSeries customer than for a SUN customer?()
第7题:
a service tank
a settling tank
an expansion tank
a double bottom tank
第8题:
whether psychologists should use drugs to cure their patients
how psychologists should treat their patients
the fact that all of the drugs have harmful side effects
the extent to which drugs should be used to fight psychological illness
第9题:
HMAC-MD5
RSA
HMAC-SHA-1
DH1
DH2
第10题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第11题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第12题:
System paging file
Virtual memory
GPU processing
Backup and file storage
第13题:
A.HMAC-MD5
B.RSA
C.HMAC-SHA-1
D.DH1
E.DH2
第14题:
If a vessel subject to PSC inspection, PSC Officer shall give the inspection to the Captain, the given timeframe for rectification of each deficiency is commonly given in a coded form which called “action code”, which code listed below is used for indication of detention of the vessel?()
第15题:
Which two data intergrity algorithms are commonly used in VPN solutions?()
第16题:
Which of the following protocols is commonly used by ping?()
第17题:
Which of the following connectors is MOST commonly used for UTP cable?()
第18题:
Which two statements regarding asymmetric key encryption are true?()
第19题:
10
30
17
16
第20题:
Source Quench.
Learning.
Buffering.
Windowing.
Cut-Through.
第21题:
Hub
Bridge
Switch
Router
Repeaters
None of the above
第22题:
BNC
RJ-45
F
HDMI
第23题:
for
to
by
as