问题 问答题 简答题

简述PCR及其临床应用。

答案

参考答案:

聚合酶链反应(PCR):利用DNA聚合酶(如TagDNA聚合酶)等在体外条件下,催化一对引物间的特异DNA片段合成的基因体外扩增技术。引物:单链DNA片段。过程:变性DNA双链-单链(93~98℃),退火引物与模板结合(37~65℃),延伸双链合成(70~75℃)。常见PCR技术的类型:原位PCR、逆转录PCR(RT-PCR)及定量RT-PCR、反向PCR、PCR-SSCP、PCR-ELISA.固相锚定PCR、mRNA差异显示逆转录PCR。PCR的应用:(1)在感染性疾病中的应用:对传染性疾病进行病原学确证诊断;对病原体进行基因分型和同源性比较;克隆病原体各种蛋白质的基因,用于蛋白表达,制备诊断试剂或疫苗;发现新病原体;克隆病原体各种基因,建立基因表达载体,用于基因治疗。(2)遗传性疾病的基因诊断:发现的遗传病有4000多种;产前诊断PCR-RFLP;PCR-ASO。(3)肿瘤的研究及诊断:癌基因与抑癌基因。(4)在法医学中的应用:个人认识;亲子鉴定。(5)其他应用:DNA克隆;引入点突变、缺失或插入;重组PCR;DNA测序;示差PCR。

单项选择题 A1/A2型题
阅读理解

阅读理解

     "Get your hands off me, I have been stolen, " the laptop, a portable computer, shouted. That is a new

solution to laptop computer theft: a program that lets owners give their property a voice when it has been

taken.

     The program allows users to display alerts on the missing computer's screen and even to set a spoken message. Tracking software for stolen laptops has been on the market for some time, but this is thought

to be the first that allows owners to give the thief a piece of their mind.

    Owners must report their laptop missing by visiting a website, which sends a message to the model: a

red and yellow "lost or stolen" sign appears on its screen when it is started. Under the latest version(版本) of the software, users can also send a spoken message.

     The message can be set to reappear every 30 seconds, no matter how many times the thief closes it.

"One customer sent a message saying, 'You are being tracked. I am right at your door', " said Carrie

Hafeman, chief executive of the company which produces the program, Retriever.

     In the latest version, people can add a spoken message. For example, the laptop's speakers will say, "Help, this laptop is reported lost or stolen. If you are not my owner, report  me now."

    The Retriever software package, which costs $29.95 but has a free trial period, has the functions of

many security software programs. Owners can remotely switch to an alternative password prompt if they

fear that the thief has also got hold of the access details.

    If a thief accesses the Internet with the stolen laptop, Retriever will collect information on the Internet

service provider in use, so that the police can be alerted to its location.

Thousands of laptops are stolen every year from homes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.

     Other security software allows users to erase data remotely or lock down the computer.

1. The expression "to give the thief a piece of their mind" can be understood as "________".

A. to give the thief an alert mind

B. to express the owners' anger to the thief

C. to remind the thief of his conscience

D. to make the thief give up his mind

2. Different from other security software, Retriever can ________.

A. record the stealing process        

B. help recognize the lost laptop

C. lock down the computer remotely  

D. send a spoken message

3. One function of the program is that it allows the owner to ________ at a distance.

A. change some access details for switching on the laptop

B. turn on the laptop by using the original password

C. operate the laptop by means of an alternative password

D. erase the information kept in the stolen laptop

4. Which of the following can best summarize the main idea of the passage?

A. With no Retriever, thousands of laptops are stolen every year.

B. A new software provides a means to reduce laptop theft.

C. Retriever has helped to find thieves and lost computers.

D. A new program offers a communication platform with the thief.

5. What does the word "it" in Para. 4 refer to?

A. The alert message.    

B. The computer.

C. The program.        

D. The laptop.