Ethosuzimide, which was developed in the 1950s, is commonly used to treat epilepsy, though it is no known precisely how the drug controls convulsions. There is no anecdotal evidence that it has had an anti-aglng effect in people. The next step, Komfeld sa

题目

Ethosuzimide, which was developed in the 1950s, is commonly used to treat epilepsy, though it is no known precisely how the drug controls convulsions. There is no anecdotal evidence that it has had an anti-aglng effect in people. The next step, Komfeld says, is to test if the drugs have an anti-aging effect on animal like flies and mice。 Very little is known about the aging process. From genetic analysis, researchers have found that an in sulin-like signaling system regulates aging and longevity. A good diet can delay aging and extend a person life span. But scientists know virtually nothing about the effect of drugs on aging. “It’s a big void, ” Konfeld said。 In addition to delaying age-related degenerative changes, the drugs also increased neuromuscular activty, suggesting a link between the neuromuscular system and the aging process。

A. But Komfeld said scientists will not know about the applicability of the drugs in humans until a similar study is done on humans. “What’s very encouraging is that these drugs were developed to treat humans, and they are well understood, because they’ve been used for a long time, ” he said。

B. Later the scientists discovered that two related anticonvulsant drugs also lengthened the lives of the worms-in the case of one drug, by almost 50 percent. “This was a big surprise to use, Komfeld said. ”“We didn’t think anticonvulsant drugs had any particular relationship to aging. That connection was completely unexpected. ”

C. Roundworms are a poor subject for experiments, because they are not like humans, even though their molecules are similar. For example, they have no bones, nor do they show emotions, making it difficult to know how exactly human subjects would react to these drugs in large quantities. However, using the worms allows experiments to be conducted quickly, because they do not live for long。

D. “Somehow the neural activity seems to regulate the aging of all of the body the skin, musculature, and reproductive tract, ” Kornfeld said. “Somehow the nervous system coordinates the progress of all these tissues, evidently, though the life stages. But we don’t know how it does that. ”

E. The discovery may also shed light on the little-understood aging process. Since the drugs act on the neuromuscular systems of both humans and worms, the findings hint at a link between neural activity and aging。

F. Unlike vertebrates, the worms are ideal subjects for the study of aging because of their short life spans, which last only a couple of weeks in a laboratory. The worm is well known in genetics, and the worm’s genome has been sequenced。

G. Use of this drug has been permitted by law since 1998 and wider use is now expected as a result of the studies. “We can clearly link this drug with human aging, but we still need to find proof, says Kornfeld optimistically. ”


相似考题
更多“Ethosuzimide, which was developed in the 1950s, is commonly used to treat epilepsy, ”相关问题
  • 第1题:

    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()

    A. Source Quench.

    B. Learning.

    C. Buffering.

    D. Windowing.

    E. Cut-Through.


    参考答案:A, C, D

  • 第2题:

    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()

    • A、Source Quench.
    • B、Learning.
    • C、Buffering.
    • D、Windowing.
    • E、Cut-Through.

    正确答案:A,C,D

  • 第3题:

    Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()

    • A、L2TP
    • B、IPsec
    • C、PPTP
    • D、RSA

    正确答案:B

  • 第4题:

    Which one of the following is the most commonly used layer 2 network device?()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router
    • E、Repeaters
    • F、None of the above

    正确答案:C

  • 第5题:

    Which of the following protocols is commonly used for VoIP technology?()

    • A、Telnet
    • B、SMTP
    • C、SIP
    • D、SNMP

    正确答案:C

  • 第6题:

    In addition to better overall price performance, which other factor most significantly contributes to a lower three-year TCO advantage for a pSeries customer than for a SUN customer?()

    • A、Sharing commonly used peripherals
    • B、Maximum capacity of CPU, Memory and I/O
    • C、Minimum number of processors in a partition
    • D、Support for different versions of the operating system

    正确答案:C

  • 第7题:

    单选题
    In a commonly used fuel oil system, the oil is stored in tanks in the double bottom from which it is pumped to () and heated.
    A

    a service tank

    B

    a settling tank

    C

    an expansion tank

    D

    a double bottom tank


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    The controversy mentioned in the passage focuses on _____.
    A

    whether psychologists should use drugs to cure their patients

    B

    how psychologists should treat their patients

    C

    the fact that all of the drugs have harmful side effects

    D

    the extent to which drugs should be used to fight psychological illness


    正确答案: B
    解析:
    第二段第一句作者提到现代医学界重要的争论之一就是医生,特别是心理医生,应该在多大程度上依靠药物来“治愈”他们的患者。

  • 第9题:

    多选题
    Which two data intergrity algorithms are commonly used in VPN solutions?()
    A

    HMAC-MD5

    B

    RSA

    C

    HMAC-SHA-1

    D

    DH1

    E

    DH2


    正确答案: D,E
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements regarding asymmetric key encryption are true?()
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    单选题
    NAS, SAN, and Tape library are MOST commonly used for which of the following?()
    A

    System paging file

    B

    Virtual memory

    C

    GPU processing

    D

    Backup and file storage


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which two data intergrity algorithms are commonly used in VPN solutions?()

    A.HMAC-MD5

    B.RSA

    C.HMAC-SHA-1

    D.DH1

    E.DH2


    参考答案:A, C

  • 第14题:

    If a vessel subject to PSC inspection, PSC Officer shall give the inspection to the Captain, the given timeframe for rectification of each deficiency is commonly given in a coded form which called “action code”, which code listed below is used for indication of detention of the vessel?()

    • A、10
    • B、30
    • C、17
    • D、16

    正确答案:B

  • 第15题:

    Which two data intergrity algorithms are commonly used in VPN solutions?()

    • A、HMAC-MD5
    • B、RSA
    • C、HMAC-SHA-1
    • D、DH1
    • E、DH2

    正确答案:A,C

  • 第16题:

    Which of the following protocols is commonly used by ping?()

    • A、SIP
    • B、ICMP
    • C、TFTP
    • D、ARP

    正确答案:B

  • 第17题:

    Which of the following connectors is MOST commonly used for UTP cable?()

    • A、RJ-45
    • B、RJ-11
    • C、LC
    • D、SC

    正确答案:A

  • 第18题:

    Which two statements regarding asymmetric key encryption are true?()

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption

    正确答案:A,B

  • 第19题:

    单选题
    If a vessel subject to PSC inspection, PSC Officer shall give the inspection to the Captain, the given timeframe for rectification of each deficiency is commonly given in a coded form which called “action code”, which code listed below is used for indication of detention of the vessel?()
    A

    10

    B

    30

    C

    17

    D

    16


    正确答案: D
    解析: 暂无解析

  • 第20题:

    多选题
    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
    A

    Source Quench.

    B

    Learning.

    C

    Buffering.

    D

    Windowing.

    E

    Cut-Through.


    正确答案: E,B
    解析: 暂无解析

  • 第21题:

    单选题
    Which one of the following is the most commonly used layer 2 network device?()
    A

    Hub

    B

    Bridge

    C

    Switch

    D

    Router

    E

    Repeaters

    F

    None of the above


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following connectors is commonly used on a shielded twisted pair cable?()
    A

    BNC

    B

    RJ-45

    C

    F

    D

    HDMI


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Ethanol is commonly used()a gasoline supplement.
    A

    for

    B

    to

    C

    by

    D

    as


    正确答案: A
    解析: 暂无解析