Skip to main content

What is E. coli? What is it use as a model organism in Metabolic engineering?

What is E. coli?

Ans.  E. coli is a Gram-negative rod-shaped bacterium that is typically around 1μm long and 0.35μm wide. It is able to survive with or without oxygen and thus is a "facultative aerobe". Although it is able to grow fast without forming clumps in various inexpensive chemically defined media, it is not typically tolerant to very high or low temperatures or extreme acidity/alkalinity.

Its potential for fast growth, the number of molecular techniques for genetic manipulations available, and a good amount of knowledge about its genetics mean that it has the versatility to be utilized in many ways. Also, E. coli mainly replicates asexually, meaning that modifications made to the genome are maintained and thus effects seen in these mutants are reproducible. These factors make E. coli a good model organism for molecular genetics.


E. Coli Symptoms

Ans.  Symptoms of E. coli typically set in within 2-3 days of infection. Symptoms generally include:
  1. Tiredness
  2. Severe abdominal cramps
  3. Diarrhea
  4. Urinary tract infection
  5. Nausea and vomiting
  6. Perforation of the gastrointestinal tract (severe cases)
  7. High fever
  8. Bloody diarrhea (a characteristic feature of Shiga-toxin producing strains of E. coli)
  9. Kidney failure (sporadic)


E. coli and its use as a model organism in metabolic engineering

Ans.  There is a growing demand for a sustainable source of fuels and chemicals. This can potentially be achieved by using renewable sources such as biomass and wastewater sd s starting sources.

Because there are tools available to manipulate the genome of E. coli, it is a good candidate as a model organism for metabolic engineering; this is where E. coli is genetically manipulated so that it becomes able to produce desired chemicals from various sources during growth.

Modern techniques can be applied to optimize the production of engineered chemicals; this includes the integration of systems biology with metabolic engineering. For example, analysis of the proteome can be used as a guide.

In a study, a proteomics approach was used to access which E. coli membrane proteins were linked to phenylpropanoid tolerance and transport, and thus enabled the identification of potential target proteins which can be utilized in metabolic engineering.


Comments

Popular posts from this blog

Languages in DBMS

Languages in DBMS Structured Query Language(SQL) as we all know is the database language by the use of which we can perform certain operations on the existing database and also we can use this language to create a database. SQL uses certain commands like Create, Drop, Insert, etc. to carry out the required tasks. These SQL commands are mainly categorized into five categories as: DDL – Data Definition Language DQL – Data Query Language DML – Data Manipulation Language DCL – Data Control Language TCL – Transaction Control Language Now, we will see all of these in detail. DDL (Data Definition Language): DDL or Data Definition Language actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the database schema and is used to create and modify the structure of database objects in the database. DDL is a set of SQL commands used to create, modify, and delete database structures but not data. These commands are normally ...

Indexing in DBMS

Indexing in DBMS Indexing is used to optimize the performance of a database by minimizing the number of disk accesses required when a query is processed.  The index is a type of data structure. It is used to locate and access the data in a database table quickly. Index structure: Indexes can be created using some database columns. The first column of the database is the search key that contains a copy of the primary key or candidate key of the table. The values of the primary key are stored in sorted order so that the corresponding data can be accessed easily.  The second column of the database is the data reference. It contains a set of pointers holding the address of the disk block where the value of the particular key can be found. Indexing Methods Ordered indices The indices are usually sorted to make searching faster. The indices which are sorted are known as ordered indices. Example: Suppose we have an employee table with thousands of record and each of which is 10 byte...

SQL Injection

SQL Injection The SQL Injection is a code penetration technique that might cause loss to our database. It is one of the most practiced web hacking techniques to place malicious code in SQL statements, via webpage input. SQL injection can be used to manipulate the application's web server by malicious users. SQL injection generally occurs when we ask a user to input their username/userID. Instead of a name or ID, the user gives us an SQL statement that we will unknowingly run on our database. For Example - we create a SELECT statement by adding a variable "demoUserID" to select a string. The variable will be fetched from user input (getRequestString). demoUserI = getrequestString("UserId"); demoSQL = "SELECT * FROM users WHERE UserId =" +demoUserId; Types of SQL injection attacks SQL injections can do more harm other than passing the login algorithms. Some of the SQL injection attacks include: Updating, deleting, and inserting the data: An attack can mo...