We pulled these BIOTECHNOLOGY questions from our study pack NDDC Scholarship aptitude-test past questions studypack. Each sample question includes correct answers, so you can see how to crack it!
Sample NDDC Scholarship BIOTECHNOLOGY Aptitude Test Past Questions and answers
1. Restriction enzymes were discovered by
a. Smith and Nathans
b. Alexander Fleming
c. Berg
d. None
2. Bacteria protect themselves from viruses by fragmenting viral DNA with
a. Ligase
b. Endonuclease
c. Exonuclease
d. Gyrase
3. Klenow fragment is derived from
a. DNA Ligase
b. DNA Pol-I
c. DNA Pol-II
d. Reverse Transcriptase
4. Southern blotting is
a. Attachment of probes to DNA fragments
b. Transfer of DNA fragments from electrophoretic gel to a nitrocellulose sheet
c. Comparison of DNA fragments to two sources
d. Transfer of DNA fragments to electrophoretic gel from cellulose membrane
5. ELISA is
a. Using radiolabelled second antibody
b. Usage of RBCs
c. Using complement-mediated cell lysis
d. Addition of substrate that is converted into a coloured end product
6. The Golden Rice variety is rich in
a. Vitamin C
b. Β-carotene and ferritin
c. Biotin
d. Lysine
7. The DNA fragments have sticky ends due to
a. Endonuclease
b. Unpaired bases
c. Calcium ions
d. Free methylation
8. Plasmids are used as cloning vectors for which of the following reasons?
a. Can be multiplied in culture
b. Self-replication in bacterial cells
c. Can be multiplied in laboratories with the help of enzymes
d. Replicate freely outside bacterial cells
9. The human genome project was launched in the year
a. 1980
b. 1973
c. 1990
d. 1989
10. The vaccines prepared through recombinant DNA technology are
a. Third generation vaccines
b. First-generation vaccines
c. Second-generation vaccines
d. None
8. A (n) is a device or application used to inspect all network traffic and alert the user or administrator when there has been unauthorized attempts or access.
A. firewall
B. network monitor
C. IDS (Intrusion Detection System)
D. Honeypot
9. What is pharming in computer security and privacy?
A. Pharming is a scamming practice in which malicious code is installed on a Domain name server, misdirecting users to fraudulent Web sites without their knowledge or consent.
B. It is the similarity between two computer names.
C. It is an unsecure way of acquiring computer name.
D. It is a very safe method of sharing computer names and applications
10. What is Nonrepudiation in computer security?
A. It means that when a person sends a mail, such person(s) cannot deny that he sent that mail and the recipient cannot deny that the mail has been received.
B. It implies sending mail randomly.
C. It means resending mail to spam.
D. Sending spam mails to randomly.
If you need support on your study materials or just to ask us a question, You can chat with a Teststreams support agent using the live chat link below, or send us a quick in-mail.