- 注册时间
- 2008-9-13
- 最后登录
- 1970-1-1
- 在线时间
- 0 小时
- 阅读权限
- 200
- 积分
- 0
- 帖子
- 24482
- 精华
- 4
- UID
- 9
  
|
Common- T) C8 s0 {% ~
Automated
C9 d! \' B( ~9 M) O- mSystem3 V( h# y3 t- G7 ^9 ~
Execution (CASE)
( l/ \4 D# S5 V @An Army segment of the Command and Control Element responsible for the SDS( L* c& D* R3 D) u7 s8 t
functions which task the associated sensors and weapons (e.g., WTA) and
+ |' i+ P. n; i4 U0 j) Z4 B" kprocess the information resulting from those taskings (e.g., perform multi-sensor+ k& D+ h& T4 M
track function). Expected to consist of survivable computer hardware and
- ~9 c( a/ r3 ^! ?! z3 f& Ssoftware.% r" @1 B2 B& }( F& i+ V! O
Common/ F0 {# O7 `/ n0 y9 t
Integration and7 E" c% f; z" ~; u1 ]
Tasks Execution+ n7 z" q, r2 u
(CITE)
, _+ o6 l# G1 n H% n1 t: VAn Air Force segment of the Command and Control Element that performs multisensor data correlation and tactics execution for space based elements.8 N$ _ ?% a9 e' J: E, I& n) T8 A
Expected to consist of survivable computer hardware and software.
7 e X* a, b0 p0 k5 _Common Mode
3 B N, r! p8 i4 W, p rFailure
+ K$ [6 D, s0 Z& V$ F4 _A type of system failure in which diverse components are disabled by the same
8 m( i+ o1 `/ P8 O* o8 rsingle cause.
6 _: _, W9 s9 d5 e- I0 f9 y. @Communication
$ n: T$ u, [8 q1 b. r) LControl Character
6 c/ Z+ y$ L/ o2 JA functional character intended to control or facilitate transmission over data
: ^. F- j J5 w O; Q# P, lnetworks. There are 10 control characters specified in ASCII, which form the6 C8 q, Z% k% o# |; d8 \5 k5 M
basis for character-oriented communications control procedures./ _+ ^4 X) Q9 v1 t5 S# h+ E, @
Communications/ ^1 e5 J6 U& S
Data Base* D: I. u5 W$ U& i
Communications data files and updates including, but not limited to,
5 p9 W" x u. s: E, _communications message file, network management file, information) X8 e! a$ ? S9 d9 g1 N3 V
management file, link quality file, synchronization file, security file and
/ n. N8 v. t/ f9 R, C! v4 Q3 Gcommunications health and status file.
' V u, j1 u4 e* p8 B r" kCommunications
/ |+ r+ H% Z0 n! L, GIntelligence, `* U' x4 p$ t3 S. s
(COMINT)
* u) M$ Y) Y9 B6 ITechnical and intelligence information derived from foreign communications by# `8 t. h; _8 O5 G% y3 g9 G' q
other than intended recipients., t- ?6 b7 Y8 g
Communications
! \- S& w6 L# a0 p0 }Security
4 o6 P$ n9 B" v+ b4 e: u(COMSEC)7 O/ o7 U" y) J0 g
The protection resulting from all measures designed to deny unauthorized0 N! E0 H( w& J% i" `% G
persons information of value, which might be derived from the possession and
' z& z! ^2 x- M- ^; c X# L% estudy of telecommunications, or to mislead unauthorized persons in their
+ p' A; g3 l( @) t( x2 e7 ?4 j- Hinterpretation of the results of such possession and study. Communications
- Z2 ?, l% U& Esecurity includes crypto security; transmission security; emission security; and, m" W# J) ~7 L% ^& u( Q
physical security of communications security materials and information.
; I5 m# S6 H1 \4 XCommunications: C( I% g( `) @5 h3 N0 e+ F
System Segment( V+ \0 _ H& F
(CSS)3 z3 o' h' j/ G+ ^# O
The communications front end for all Cheyenne Mountain Air Force Base
+ o1 p _! v9 [3 O(CMAFB) missions for non-common user traffic, performing circuit and message( n$ t. K! P1 z( ^+ Q) Y1 a$ w
switching.2 B, D& n$ ^" d4 t4 O; G4 h
Communications
2 Y- W: v7 a0 X8 H2 I! r% ?" p* vSystem) ]7 A. _/ J& j# G, a1 [& F
Synchronization. ^: R( h6 g* S: g/ I9 p9 |/ l
Coordination of timing among communications system elements to permit
" K& y# g+ b, z+ r# ^transmission/reception of messages/data which may be distorted by time delays5 }2 t, a# t6 i4 i8 m) ?& Y1 p! c
and Doppler shifts between communications nodes., _$ l0 O7 ]; T5 j5 J6 Q
Communications% Q8 N+ o% p( e
Zone
$ p; z& }& C+ e* d$ }% G& }7 b# f) VRear part of the theater of operations (behind but contiguous to the combat
; _7 t# t" m/ l3 `$ c Kzone) which contains the lines of communications, establishments for supply and
/ n( ?. [/ n0 a7 C8 ?" v+ ?* Kevacuation, and other agencies required for the immediate support and
1 V h$ y* v! g7 L; |! f* U3 b0 ^maintenance of the field forces.
1 {& p% j! l. }1 u* R9 h" C5 eCOMNAVFOR Commander, Naval Forces.* V3 n {: U/ S0 d7 `# u
MDA GLOSSARY, VER. 4.0 C
9 y) `! @5 r3 R, V4 k6 a! l2 ^& r57
: c0 \& T, ~0 b7 l/ n( T2 q O8 b" gCOMNAV-8 A# q4 c, h M+ ^6 {6 x; s
SEASYSCOM. r* w- d3 E4 B+ {, x: q
Commander, Naval Sea Systems Command.
5 `; O) O# [* ?" s/ { YCOMNAV-2 {. @$ w) Z7 t' h7 A2 r. i1 x
SPACECOM
+ I- q( \) p. h% l7 nCommander, Naval Space Command.
3 ~5 ]5 K q2 F# I/ k- b+ C8 jCOMNAVSECGRU Commander Naval Security Group.% K g* e# y; y4 r
COMOCK Computer Mock-up
3 [4 J, M, E, U' e5 \COMOPTEVFOR Commander, Operational Test and Evaluation Force (Navy).
1 d- t; L# y, ?/ K) q1 XComp Completion.
# i4 M* ^$ I1 i# T/ Y6 }! h5 ] k2 ?COMPASS Common Operational Mission Planning and Support System (Army term)7 U) L# Y7 j7 @4 } l4 p- H) s- O, H J- N$ U
COMPES Contingency Operations/Mobility Planning and Executing System.
% Q1 ^+ {# Y! s# h7 ]! {$ \Component Subsystem, assembly, or subassembly of logically grouped hardware and
$ N: K; n# p% M% M, H J) O% Lsoftware, that performs interacting tasks to provide BMDS capability at a
/ W! Q' B+ J4 \+ y. o* g4 p0 v2 nfunctional level., z2 q* @; X H8 X; Y- }! d
Component
6 F2 k5 U3 V/ W/ U) a% ~Acquisition) `' {" T3 |- q! S& {
Executive
' c% ]3 ~+ Z2 R& x$ v* m JA single official within a DoD component who is responsible for all acquisition V1 F6 z1 f' n: }! V
functions within that Component. This includes Service Acquisition Executives" n. s$ A: u2 a% F ?( u$ T: z
for the Military Departments and Acquisition Executives in other DoD components
( {7 y: L7 d2 I4 Xthat have acquisition management responsibilities.
& R4 r/ r* a8 V. EComponent
0 h/ c/ b: _3 j7 M; w6 n2 GCommand( _( Y2 l- s) v1 g' G' O
Centers$ n7 K" d# O, _3 O
The Component Command Centers (which will contain Army and Air Force
( v: O& K D; K4 v1 ]unique capabilities) will be capable of supporting the USSPACECOM Command
+ ?, |' m, @" M0 q0 { |( l" VCenter and distributed Operations Centers by functioning as “Hot Backups” to- }$ @! B# h. T- F, _: @0 Q
provide for BM/C3 availability and survivability. The Component Command
8 ]+ h" J- k3 O6 G* l _, ]Centers will be capable of executing real-time control of BMD engagement1 U" \0 L6 r; h" d9 W3 a
operations.) {9 [' T- W+ s9 |
Component
/ |. p+ T* d% E2 b1 Z% MProgram
" P& j- \' c4 u2 KA major defense acquisition program delegated to the Military Department of
0 S1 h3 J# t2 ~% d6 ZDefense Agency for management.! z* m; r- F2 f0 \
Compton Current Electron current generated as a result of Compton processes. (See Compton
6 F: ?9 u6 ~) f- c |* I) t0 ?Effect and Compton Electron.)
; R+ h' e) S' s. {Compton Effect The scattering of photons (of gamma or x-rays) by the orbital electrons of atoms.
% W% t8 F* Q4 IIn a collision between a (primary) photon and an electron, some of the energy of
# s& E. B& ?; V4 a9 `, ?; Uthe photon is transferred to the electron which is generally ejected from the! _4 T9 ], k. h# j
atom. Another (secondary) photon, with less energy, then moves off in a new" d4 v+ u3 ?1 G
direction at an angle to the direction of motion of the primary photon. (See
8 M! l" R6 l6 @9 vScattering.)
; I" s6 y* e# C! K2 {9 ^0 G+ L& ICompton
( z7 _1 [5 _$ O, ~' rElectron, s6 X9 | _ I, e
An electron of increased energy ejected from an atom as a result of a Compton% D6 G* {# M4 N p, c
interaction with a photon. (See Compton Effect.)' v* a2 c* U5 l2 f" \, }, ?
MDA GLOSSARY, VER. 4.0 C( g- \* m" _% [: M* a( F
58
8 W) g5 u$ y4 h; o* A9 S! `Computer% c$ w' k, H" k$ C' S
Security
1 l: n- m% t. n3 ]6 g(COMPUSEC)
o N F) E& `5 O' [3 sThe totality of security safeguards needed to provide acceptable level of) R: r$ H& W! G K( `( d8 N/ f
protection for automatic data processing (ADP) systems and the classified data& V( e7 O* |) J1 l) a. Q
processed. Includes all hardware/software functions, characteristics, features;
$ V2 q! f- `6 g8 [2 f7 A' foperational, accountability, and access control procedures at the computer and/ I& f1 w# o. i( K/ R" @
remote terminal facilities; and, the management constraints, physical structures,
" g3 f& O+ K. h' j0 T# V' M [and devices needed to provide an acceptable level of protection for classified0 L! N0 ~5 g0 O1 T) {
information in any state of storage, processing, display or communication within
0 k: h8 `% k5 E6 T- Vthe ADP system.
5 q6 A' O" a; ?% C1 gComputer
" K8 Y1 y2 S) v% XSoftware
! Q/ `: d9 _- B; gConfiguration0 P0 B0 e' X) B+ y
Item (CSCI)
; _' g- Z- \( g$ x2 ]1 k6 Y) S( AAn aggregation of software that satisfies an end use function and is designated& q. j* e$ G& t, \8 [' D) I
by the Government for separate configuration management. They are selected+ Q% S, R y8 M0 I5 W
based on tradeoffs among software function, size, host or target computers,7 N- R4 Z( Q1 V' C
developer, support concept, plans for reuse, criticality, interface considerations,% O" k7 A2 z$ E+ O+ ?5 S
need to be separately documented and controlled, and other factors. |
|