The 2018 Nobel Prize in Physics has been awarded in laser physics for the optical tweezers and their applications to biological systems for the method of generating high-intensity, ultra-short optical pulses. Which of the following verifies the given statement? I:  The 2018 Nobel Prize in Physics has been awarded in laser physics for the optical tweezers. II: The 2018 Nobel Prize in Physics has been awarded for applications of the optical tweezers to biological systems. III: The 2018 Nobel Prize in Physics has been awarded for the method of generating high-intensity, ultra-short optical pulses using the optical tweezers.

The 2018 Nobel Prize in Physics has been awarded in laser physics for the optical tweezers and their applications to biological systems for the method of generating high-intensity, ultra-short optical pulses. Which of the following verifies the given statement? I:  The 2018 Nobel Prize in Physics has been awarded in laser physics for the optical tweezers. II: The 2018 Nobel Prize in Physics has been awarded for applications of the optical tweezers to biological systems. III: The 2018 Nobel Prize in Physics has been awarded for the method of generating high-intensity, ultra-short optical pulses using the optical tweezers. Correct Answer Only II and III

II and III are correct. They clearly state that the 2018 Nobel Prize in Physics has been awarded in laser physics for the optical tweezers and their applications to biological systems for the method of generating high-intensity, ultra-short optical pulses.

Statement I is rejected as it does not mention 'their applications to biological systems for the method of generating high-intensity, ultra-short optical pulses'. 

Hence option 2 is correct.

Related Questions

The question given below consists of a statement, followed by three arguments I, II and III. You have to decide which of the arguments is/are ‘strong’ arguments is/are ‘weak’ arguments and accordingly choose your answer from the alternatives given below each question. Statement: Chat bots and other interfaces are saving employees and HR heads time for more productive activities by providing information and replies to diverse queries or concerns. A few years ago, business communication was driven by multiple faxes in a day and emails were the only quick mode of exchanging information. This information went through the organisation's who's who, while the others were mostly engaged in the daily rut of redundant activities, preventing them from directing their capabilities towards more productive areas. Which of the following arguments brig out the idea that introduction of chat bots and other interfaces is not helping in boosting up the processes? Arguments: I. Using these conversational interfaces, HR departments are successfully aligning themselves with the swiftly-changing organisational processes. These platforms represent people friendly technologies that keep employee experience at the centre, continuously evolving with them.  II. HR technologies are increasingly using advanced machine learning for measuring and analysing workforce engagement. Sentiment analysis is a unique way of gauging an employee's disposition towards the organisation, providing valuable insights essential for improving productivity and predicting attrition rates.  III. The seamless experience chat bots provide makes employees focus on activities that require critical abilities and strategic thinking. Besides enabling HR processes such as generating leave applications and reimbursement forms, the use of chatbots provides quick and smooth access to data from anywhere, anytime. 
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.