|
|
TM 5-6350-275-10
GLOSSARY
TERM
DEFINITION
Numeric
The second part of a point mnemonic which identifies a point by a number in the range
1-9999.
Object
A complete or partial drawing, consisting of one or more elements, such as text, lines,
rectangles, circles, or triangles, which can be configured to move or change color to
indicate the value and/or state of an item of monitored equipment. Once created, an
object can be copied as often as required into any number of system graphics. It can,
therefore, represent different points in the same graphic, or different points in different
graphics.
Off Normal
The condition where a point is not considered to be in its normal state.
Old Version Record
The master copy of the engineering table records which maintains the "last saved"
version of the working copy and can be reloaded to restore the database to its original
state, if changes have been introduced which produced unforeseen effects.
Operating Aperture
The time that elapses between the system issuing a control to an item of equipment and
the expected status change being detected. If the specified time elapses, the item of
equipment is considered to have failed.
Operator Mode
The mode of operation a workstation is said to be in when an operator has logged in.
Operator Profile Record
A record within the reconfiguration program used to tailor the system to suit the needs of
an individual operator.
Operator Utilities
The program downloaded to the workstation when an operator logs in, providing facilities
Program
for the monitoring and control of remote equipment.
Operator Environment
The mode of operation in which a workstation is said to be when an operator has logged
in to the ICIDS system.
Operator Workstation
A workstation which is being used to run the operator utilities program.
Optical Fiber
A medium for the transmission of data using light signals.
Partition
System partitions can be used in the CCTV subsystem, indicating which monitors and
cameras are controllable by which operators. They are defined at engineer level when
the system is first configured.
Passback Violation
The attempted misuse of the access control subsystem by "passing back" a card from an
authorized holder, so that it can be used to gain access by an unauthorized person. The
system maintains a check against passback violation by ensuring that cards are not
presented at the same reader within a very short time and/or that the record of zones
entered by holders does not contain inconsistencies.
Password
A word or sequence of characters entered into the Password field of the SignOn form
which is not displayed for security reasons. The password ensures that only authorized
personnel are able to access a particular program.
PIC
Personnel Identification Cipher. A six-digit code used with keypads.
Glossary-7
|
Privacy Statement - Press Release - Copyright Information. - Contact Us |