25 multiple choice questions and 4 extended short answer questions covering all 21 lessons. Questions are drawn from across the module — some will integrate content from multiple lessons.
Part A Multiple Choice — 25 marks
Part B Extended Short Answer — 25 marks
Marking guide: 1 mark: herd immunity threshold correctly calculated for R₀=4 (75%) | 1 mark: elimination strategy described with specific tools (border control; contact tracing; rapid case isolation) | 1 mark: chain of infection analysis — which links each tool breaks | 1 mark: mitigation strategy described with different threshold rationale | 1 mark: R₀=9 analysis — threshold rises to ~89%; elimination becomes extremely difficult | 1 mark: evaluative conclusion comparing feasibility of each strategy at both R₀ values
The herd immunity threshold is calculated as 1 − 1/R₀. For a pathogen with R₀ = 4, the threshold is 1 − 1/4 = 75% — meaning 75% of the population must be immune to break sustained transmission chains. In the early stages of an outbreak, before any population immunity has developed through infection or vaccination, an elimination strategy is more likely to succeed biologically. Elimination aims to drive effective R to zero by preventing the pathogen from establishing community transmission. The chain of infection model identifies the tools: border closure with mandatory quarantine breaks the transmission link between the external reservoir (infected travellers) and the susceptible domestic population; rapid testing and contact tracing identifies cases and quarantines their contacts before they become infectious — breaking the transmission chain at its next link; isolation of confirmed cases separates the infectious agent from susceptible hosts. At R₀ = 4, these tools collectively — if applied promptly and at scale — can keep effective R below 1 and eventually drive it toward zero. Australia's success with this approach for COVID-19 in 2020 (when R₀ was approximately 2–3) demonstrates that elimination is achievable at moderate R₀ values with sufficient social and logistical capacity. A mitigation strategy at R₀ = 4 would accept some ongoing community transmission while using healthcare capacity planning, targeted restrictions, and eventual vaccination to prevent hospital overload. The threshold of 75% immunity means a large majority of the population would need to have been infected or vaccinated before herd immunity provides population-level protection — during which period significant morbidity and mortality would accumulate. If R₀ increases to 9 due to a new variant, the situation changes substantially. The herd immunity threshold rises to 1 − 1/9 ≈ 89%. Achieving this through vaccination alone requires near-universal coverage with high-efficacy vaccines. Achieving it through natural infection would cause enormous preventable harm. More critically for elimination: with R₀ = 9, each infected person produces on average nine secondary infections in a fully susceptible population. Keeping effective R below 1 requires reducing transmission by approximately 89% through the combined effect of immunity and interventions — a level that typically requires restrictions far beyond what any society will sustain long-term. Omicron (R₀ approximately 8–15) demonstrated this in practice: even countries that had successfully eliminated earlier strains found elimination mathematically impossible. At R₀ = 9, mitigation becomes the more rational strategy — accepting that elimination is not achievable and instead focusing the public health response on preventing severe disease, protecting the most vulnerable through vaccination, and maintaining healthcare system capacity. The evaluative conclusion: elimination is the superior strategy at R₀ = 4 because it is biologically achievable and prevents all harm rather than managing it. At R₀ = 9, elimination becomes unachievable under any sustainable restriction regime and mitigation is the only viable approach. The strategy decision must be reassessed as the biology of the pathogen changes.
Marking guide: 1 mark: innate response sequence correctly described (barrier breach → inflammation → neutrophil recruitment → phagocytosis) | 1 mark: adaptive humoral response sequence (APC → T helper → B cell → plasma cells → antibodies) | 1 mark: adaptive cell-mediated response (APC → T helper → CTL activation → infected cell killing) | 1 mark: memory cell formation — B and T memory cells | 1 mark: interaction between systems — APCs bridge innate to adaptive; cytokines coordinate; innate buys time | 1 mark: evaluation of innate for immediate response; no memory | 1 mark: evaluation of adaptive for long-term protection via memory cells
When a bacterial pathogen breaches the skin through a wound, the innate immune system mounts an immediate non-specific response. Mast cells in the surrounding tissue release histamine and other inflammatory mediators, causing local vasodilation and increased capillary permeability — the cardinal signs of inflammation (redness, heat, swelling). Neutrophils are recruited to the site by chemotaxis — migrating along a chemical gradient of cytokines and complement proteins toward the infection. Complement proteins and antibodies (opsonins) coat the bacterial surface, facilitating recognition by neutrophil Fc receptors. Neutrophils engulf the bacteria through phagocytosis, forming a phagosome that fuses with lysosomes to create a phagolysosome — hydrolytic enzymes and reactive oxygen species destroy the pathogen. Natural killer cells patrol for cells displaying stress signals and destroy them. This entire innate response begins within minutes to hours and does not require prior exposure to the specific pathogen. Simultaneously, antigen-presenting cells (APCs) — particularly dendritic cells — engulf bacterial material and migrate to lymph nodes. They display bacterial peptide fragments on MHC class II molecules and activate T helper cells (CD4+) whose T-cell receptors match the antigen. Activated T helper cells then drive two branches of the adaptive response. In the humoral branch, T helpers activate antigen-specific B cells that have also recognised the same antigen. These B cells undergo clonal selection — proliferating to form a large clone of identical cells. Most differentiate into plasma cells that secrete specific antibodies at high rate; a small proportion become long-lived memory B cells. In the cell-mediated branch, T helpers activate cytotoxic T cells (CTLs, CD8+) that can kill host cells displaying bacterial antigens on MHC class I — relevant if bacteria are intracellular. The two systems interact in several ways: the innate response buys critical time (days) while the slower adaptive response develops; APCs form the bridge between innate detection and adaptive activation; cytokines produced during innate activation (IL-1, IL-6, TNF) enhance adaptive response efficiency; and antibodies produced by the adaptive system opsonise bacteria for more efficient phagocytosis by innate cells — each system enhancing the other. The innate system is critical for immediate containment of the pathogen during the first hours to days of infection — without it, bacterial replication during the lag phase of the adaptive response would be unchecked. However, the innate system has no immunological memory: it responds identically to every encounter with a pathogen regardless of prior exposure. Long-term protection against re-infection is the exclusive province of the adaptive immune system, specifically through the memory B and T cells that persist after the primary response. On re-exposure to the same pathogen, memory B cells rapidly proliferate and produce antibodies within 1–3 days — far faster than the 7–14 days of the primary response — and at far higher titres. Memory CTLs similarly mount a rapid cytotoxic response. This secondary response typically clears the pathogen before symptoms even develop, conferring the protective immunity that vaccination exploits.
Marking guide: 1 mark: SIT mechanism correctly described | 1 mark: Wolbachia mechanism correctly described (maternal inheritance; vector competence reduction) | 1 mark: resistance assessment for both — SIT (no selectable trait); Wolbachia (no lethal pressure) | 1 mark: ecological implications compared (population reduction vs competence change) | 1 mark: recommendation with justification | 1 mark: quality of evaluation — explicitly addresses trade-offs; uses evidence
The sterile insect technique works by flooding the wild Aedes aegypti population with sterile males — reared at scale, sterilised by radiation or genetic modification, and released in ratios substantially exceeding the wild male population. Wild females mate predominantly with sterile males and produce no offspring. Over successive generations, fewer fertile matings occur and the population declines — potentially to local eradication if releases are sustained at sufficient intensity. The Wolbachia approach operates differently: Wolbachia-infected Aedes aegypti are released into the wild population. Because Wolbachia is inherited maternally, infected females pass the bacterium to all their offspring. Over several generations, Wolbachia spreads through the wild population via a process of cytoplasmic incompatibility — matings between uninfected males and Wolbachia-infected females produce normal offspring, while matings between infected males and uninfected females produce inviable eggs, giving Wolbachia-infected mosquitoes a reproductive advantage. The end result is a mosquito population that is self-sustaining but carries Wolbachia — and Wolbachia-infected mosquitoes have dramatically reduced competence to transmit dengue virus. The Yogyakarta randomised controlled trial demonstrated a 77% reduction in dengue incidence. Regarding resistance: SIT carries almost no resistance risk because there is no selectable trait available — wild females cannot distinguish sterile males from fertile males, so there is no fitness advantage to avoiding them. Natural selection cannot act on a trait that cannot be detected. Wolbachia resistance is also low risk because Wolbachia does not kill mosquitoes — it reduces their vector competence. Since there is no lethal selection pressure on the mosquito, there is no mechanism by which insecticide-style resistance can evolve against it. The ecological implications of the two approaches differ in an important way: SIT reduces the Aedes aegypti population, potentially to eradication in the target area. This has a more pronounced ecological impact — removing a species from its ecological role (food source for birds and bats; larval filter feeders; minor pollinators) — though the ecological consequences of removing Aedes aegypti specifically are generally considered minimal because it is an introduced urban species in most endemic areas and its ecological roles are filled by other species. Wolbachia maintains the mosquito population at normal levels but removes its disease-transmitting function — ecologically less disruptive but less effective at eliminating transmission to absolute zero. For a major tropical city with endemic dengue, I would recommend the Wolbachia approach. The evidence base is stronger for large urban settings — the Yogyakarta trial enrolled a city of 400,000 and demonstrated sustained protection with a single round of releases that subsequently self-maintained. SIT requires continuous releases at industrial scale to maintain population suppression; once releases cease, the wild population rebounds. In an urban setting with abundant mosquito breeding habitat, the logistical demands of SIT are substantially more challenging than for geographically bounded agricultural settings like the Queensland fruit fly program. Wolbachia, once established in a population, is self-sustaining — requiring only an initial release program rather than ongoing operational infrastructure. The 77% reduction in dengue incidence, while not eliminating dengue entirely, represents a dramatic public health benefit achievable at lower long-term cost. For a city where dengue is endemic and where the goal is sustained burden reduction rather than eradication of the vector, Wolbachia is the more pragmatic and evidence-supported recommendation.
Marking guide: 1 mark: Nagoya Protocol requirements correctly stated (FPIC; mutually agreed terms; benefit sharing; prior to use) | 1 mark: IP law limitation — oral TK not recognised as prior art; patent gap | 1 mark: biopiracy correctly defined and applied — company proceeding without consent | 1 mark: ethical obligation grounded in the TK's contribution to the discovery | 1 mark: proposed process — specific steps in correct order | 1 mark: quality of evaluation — acknowledges both company's legitimate interests and community's rights; doesn't reduce to simple right/wrong
The scenario describes exactly the conditions under which biopiracy occurs: traditional knowledge held by an Aboriginal community directed researchers (implicitly or explicitly) toward a biologically active plant, and a company now wishes to commercialise it. The Nagoya Protocol on Access and Benefit-Sharing establishes the framework that governs this situation. Its three core requirements are: free prior informed consent (FPIC) must be obtained from the community before access or use of the knowledge begins; mutually agreed terms must be negotiated between the company and the community governing the conditions of access and the nature of benefit sharing; and equitable benefit sharing — proportional to the contribution of the traditional knowledge — must be built into the commercial arrangement. Australia ratified the Nagoya Protocol in 2022, meaning these obligations now have domestic legal force, though implementation through specific legislation is still developing. Under current intellectual property law, the community's traditional knowledge is inadequately protected against patent appropriation. Patent law requires novelty — assessed by searching written prior art databases. The community's knowledge, transmitted orally, is almost certainly not documented in any indexed source that a patent examiner would search. The company could therefore file a patent on the active compound without the community's traditional knowledge appearing as prior art, even though the community has known of the plant's medicinal properties for generations. This is the core IP law gap that enables biopiracy. If the company proceeds without engaging the community, filing patents on compounds identified through knowledge the company did not originate, and commercialising the product without any benefit-sharing arrangement, this constitutes biopiracy — regardless of whether the company's intention was to cause harm. The community whose knowledge directed the discovery receives nothing while the company profits from that direction. The ethical obligation of the company is proportional to the contribution of the traditional knowledge to their discovery. If the community's use of the plant directly led researchers to test it — either through explicit knowledge sharing or through documented traditional use — the knowledge contributed materially to identifying the compound. This contribution creates an obligation as real as any other R&D contribution to a product. The company has a legal obligation (under the Nagoya Protocol and likely under developing Australian ABS legislation) and an ethical obligation beyond the legal minimum. The process the company should follow is: first, before any further research, development, or patent applications proceed, engage the relevant Aboriginal community through a formal, properly facilitated process of consultation. This engagement should explain what has been discovered, what the company proposes to do, and what the potential commercial outcomes are. Second, negotiate FPIC in writing — ensuring the community understands the scope of consent they are giving and retains the right to refuse or impose conditions. Third, negotiate mutually agreed terms for a benefit-sharing arrangement. This should be proportional and could include royalties on commercial product sales, co-ownership of relevant intellectual property, research funding directed to community health priorities, or other arrangements the community considers appropriate. Fourth, agree on governance of the ongoing relationship — including the community's rights to audit, withdraw, or renegotiate if the commercial context changes significantly. Fifth, acknowledge the community's contribution in all patent applications, scientific publications, and regulatory submissions. This process does not prevent the company from commercialising the product — it ensures that commercialisation is ethical and compliant with Australian and international law. The company's investment in development, clinical trials, and regulatory approval is genuine and deserving of protection. The community's contribution is equally genuine. Both interests are legitimate; the Nagoya Protocol's framework exists precisely to ensure both can be honoured simultaneously.