Navigation Links
Lytic cycle


The lytic cycle is one of the two cycles of viral reproduction, the other being the lysogenic cycle. These cycles should not, however, be seen as discrete and separate, but rather as somewhat interchangeable. The lytic cycle is typically thought of as the main method of viral replication, since it results in the destruction of the infected cell, which is how viruses cause damage to their hosts.

Contents

Description

The lytic cycle is a three-stage process.

Infection

When a virus infects a cell, it first binds with the cell membrane using receptor molecules on the virus's surface. The virus then injects its genetic material, which can be either DNA or RNA, into the cell.

Growth

The viral nucleic acid takes over and uses the host cells organelles to make many copies of the virus. In the case of DNA viruses, the DNA transcribes itself into messenger RNA (mRNA) molecules that are then used to direct the ribosome. In retroviruses, or RNA viruses, a unique enzyme called reverse transcriptase transcribes the viral RNA into DNA, which is then transcribed again into mRNA.

Replication and lysis

After many virus copies are made, they are assembled into complete viruses. The cell eventually becomes filled with viruses (typically 100-200) until it bursts, or lyses; this end process gives the cycle its name. The new viruses are free to infect other cells.


'"/>


(Date:5/16/2017)... --  Bridge Patient Portal , an enterprise patient ... Systems , an electronic medical record solutions developer ... a partnership to build an interface between the ... products, including Centricity Practice Solution (CPS), Centricity Business ... integrations will allow healthcare delivery networks using GE ...
(Date:4/17/2017)... MELBOURNE, Florida , April 17, 2017 ... security technology company, announces the filing of its 2016 Annual Report ... Securities and Exchange Commission. ... Report on Form 10-K is available in the Investor Relations section ... well as on the SEC,s website at http://www.sec.gov . ...
(Date:4/11/2017)... 11, 2017 No two people are ... the New York University Tandon School of Engineering ... found that partial similarities between prints are common ... mobile phones and other electronic devices can be ... vulnerability lies in the fact that fingerprint-based authentication ...
Breaking Biology News(10 mins):
Other biology definition