25.E: Specific Adaptive Host Defenses (Exercises)
- Page ID
- 78157
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)25.1: B Lymphocytes and Antibodies
Humoral immunity refers to mechanisms of the adaptive immune defenses that are mediated by antibodies secreted by B lymphocytes, or B cells. This section focuses on B cells and discusses their production and maturation, receptors, and mechanisms of activation.
Multiple Choice
Which of the following would be a T-dependent antigen?
- lipopolysaccharide
- glycolipid
- protein
- carbohydrate
- Answer
-
C
Which of the following would be a BCR?
- CD4
- MHC II
- MHC I
- IgD
- Answer
-
D
Which of the following does not occur during the lag period of the primary antibody response?
- activation of helper T cells
- class switching to IgG
- presentation of antigen with MHC II
- binding of antigen to BCRs
- Answer
-
B
Fill in the Blank
________ antigens can stimulate B cells to become activated but require cytokine assistance delivered by helper T cells.
- Answer
-
T-dependent
T-independent antigens can stimulate B cells to become activated and secrete antibodies without assistance from helper T cells. These antigens possess ________ antigenic epitopes that cross-link BCRs.
- Answer
-
repetitive
Critical Thinking
A patient lacks the ability to make functioning T cells because of a genetic disorder. Would this patient’s B cells be able to produce antibodies in response to an infection? Explain your answer.
25.2: Vaccines
By artificially stimulating the adaptive immune defenses, a vaccine triggers memory cell production similar to that which would occur during a primary response. In so doing, the patient is able to mount a strong secondary response upon exposure to the pathogen—but without having to first suffer through an initial infection. In this section, we explore several different kinds of artificial immunity along with various types of vaccines and their mechanisms for inducing artificial immunity.
Multiple Choice
A patient is bitten by a dog with confirmed rabies infection. After treating the bite wound, the physician injects the patient with antibodies that are specific for the rabies virus to prevent the development of an active infection. This is an example of:
- Natural active immunity
- Artificial active immunity
- Natural passive immunity
- Artificial passive immunity
- Answer
-
D
A patient gets a cold, and recovers a few days later. The patient's classmates come down with the same cold roughly a week later, but the original patient does not get the same cold again. This is an example of:
- Natural active immunity
- Artificial active immunity
- Natural passive immunity
- Artificial passive immunity
- Answer
-
A
Matching
Match each type of vaccine with the corresponding example.
___inactivated vaccine | A. Weakened influenza virions that can only replicate in the slightly lower temperatures of the nasal passages are sprayed into the nose. They do not cause serious flu symptoms, but still produce an active infection that induces a protective adaptive immune response. |
___live attenuated vaccine | B. Tetanus toxin molecules are harvested and chemically treated to render them harmless. They are then injected into a patient’s arm. |
___toxoid vaccine | C. Influenza virus particles grown in chicken eggs are harvested and chemically treated to render them noninfectious. These immunogenic particles are then purified and packaged and administered as an injection. |
___subunit vaccine | D. The gene for hepatitis B virus surface antigen is inserted into a yeast genome. The modified yeast is grown and the virus protein is produced, harvested, purified, and used in a vaccine. |
- Answer
-
C, A, B, D
Fill in the Blank
A(n) ________ pathogen is in a weakened state; it is still capable of stimulating an immune response but does not cause a disease.
- Answer
-
attenuated
________ immunity occurs when antibodies from one individual are harvested and given to another to protect against disease or treat active disease.
- Answer
-
Artificial passive
In the practice of ________, scabs from smallpox victims were used to immunize susceptible individuals against smallpox.
- Answer
-
variolation
Short answer
Briefly compare the pros and cons of inactivated versus live attenuated vaccines.