| D007753 |
Laboratories |
Facilities equipped to carry out investigative procedures. |
Laboratory |
|
| D010957 |
Plasmids |
Extrachromosomal, usually CIRCULAR DNA molecules that are self-replicating and transferable from one organism to another. They are found in a variety of bacterial, archaeal, fungal, algal, and plant species. They are used in GENETIC ENGINEERING as CLONING VECTORS. |
Episomes,Episome,Plasmid |
|
| D002460 |
Cell Line |
Established cell cultures that have the potential to propagate indefinitely. |
Cell Lines,Line, Cell,Lines, Cell |
|
| D002984 |
Clinical Laboratory Information Systems |
Information systems, usually computer-assisted, designed to store, manipulate, and retrieve information for planning, organizing, directing, and controlling administrative and clinical activities associated with the provision and utilization of clinical laboratory services. |
Laboratory Information Systems,Information Systems, Clinical Laboratory,Information System, Laboratory,Information Systems, Laboratory,Laboratory Information System,System, Laboratory Information,Systems, Laboratory Information |
|
| D000906 |
Antibodies |
Immunoglobulin molecules having a specific amino acid sequence by virtue of which they interact only with the ANTIGEN (or a very similar shape) that induced their synthesis in cells of the lymphoid series (especially PLASMA CELLS). |
|
|
| D001709 |
Biotechnology |
Body of knowledge related to the use of organisms, cells or cell-derived constituents for the purpose of developing products which are technically, scientifically and clinically useful. Alteration of biologic function at the molecular level (i.e., GENETIC ENGINEERING) is a central focus; laboratory methods used include TRANSFECTION and CLONING technologies, sequence and structure analysis algorithms, computer databases, and gene and protein structure function analysis and prediction. |
Biotechnologies |
|
| D012984 |
Software |
Sequential operating programs and data which instruct the functioning of a digital computer. |
Computer Programs,Computer Software,Open Source Software,Software Engineering,Software Tools,Computer Applications Software,Computer Programs and Programming,Computer Software Applications,Application, Computer Software,Applications Software, Computer,Applications Softwares, Computer,Applications, Computer Software,Computer Applications Softwares,Computer Program,Computer Software Application,Engineering, Software,Open Source Softwares,Program, Computer,Programs, Computer,Software Application, Computer,Software Applications, Computer,Software Tool,Software, Computer,Software, Computer Applications,Software, Open Source,Softwares, Computer Applications,Softwares, Open Source,Source Software, Open,Source Softwares, Open,Tool, Software,Tools, Software |
|
| D014584 |
User-Computer Interface |
The portion of an interactive computer program that issues messages to and receives commands from a user. |
Interface, User Computer,Virtual Systems,User Computer Interface,Interface, User-Computer,Interfaces, User Computer,Interfaces, User-Computer,System, Virtual,Systems, Virtual,User Computer Interfaces,User-Computer Interfaces,Virtual System |
|
| D016208 |
Databases, Factual |
Extensive collections, reputedly complete, of facts and data garnered from material of a specialized subject area and made available for analysis and application. The collection can be automated by various contemporary methods for retrieval. The concept should be differentiated from DATABASES, BIBLIOGRAPHIC which is restricted to collections of bibliographic references. |
Databanks, Factual,Data Banks, Factual,Data Bases, Factual,Data Bank, Factual,Data Base, Factual,Databank, Factual,Database, Factual,Factual Data Bank,Factual Data Banks,Factual Data Base,Factual Data Bases,Factual Databank,Factual Databanks,Factual Database,Factual Databases |
|
| D016494 |
Computer Security |
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. |
Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer |
|