- 注册时间
- 2008-9-13
- 最后登录
- 1970-1-1
- 在线时间
- 0 小时
- 阅读权限
- 200
- 积分
- 0
- 帖子
- 24482
- 精华
- 4
- UID
- 9
  
|
Common
$ j- ]3 E8 I UAutomated- E8 C! R# Q r5 A X& y$ V* k7 w
System
" i, [3 T/ B; s0 I% P( _4 V' JExecution (CASE)4 p6 J* x& W V+ ~5 {0 \# g$ Q, o
An Army segment of the Command and Control Element responsible for the SDS, `6 l8 C5 u6 Y2 B7 t/ L7 M
functions which task the associated sensors and weapons (e.g., WTA) and
& a& ?7 Z& F6 u# ]1 D5 {2 zprocess the information resulting from those taskings (e.g., perform multi-sensor
9 U, W/ p7 ?5 h7 e$ O: F8 p8 Mtrack function). Expected to consist of survivable computer hardware and
- u( F/ j- Y. \; p8 D. isoftware.+ ^9 n% e9 M5 m8 }( u5 a) b* p, {
Common
! }) b |) p0 |# r; V \% @" gIntegration and" m: `4 X5 T, b( W/ v# q8 S0 y v
Tasks Execution1 i6 N% F% k' ~( ^6 [# d
(CITE)9 k* c9 x, j, u& \0 {7 G& C
An Air Force segment of the Command and Control Element that performs multisensor data correlation and tactics execution for space based elements./ J' O# X' U+ G: h/ j5 c2 K
Expected to consist of survivable computer hardware and software.
) w2 ^0 ], u) ~" i) K! D9 KCommon Mode
: T: z! E7 s3 x& E% m4 R, [: QFailure2 f8 R' R) U( O' x, S, R
A type of system failure in which diverse components are disabled by the same
' Y, z/ F" i4 J) Bsingle cause.- `! F$ ]& f8 }1 ^/ z
Communication- s2 }+ B/ n6 ~4 Q2 O" g
Control Character T# Z! k- D: z! |
A functional character intended to control or facilitate transmission over data
1 ^1 t- _/ t+ x- j/ inetworks. There are 10 control characters specified in ASCII, which form the2 _) Z5 i4 W2 m$ e
basis for character-oriented communications control procedures.
: y5 e4 r# X mCommunications
8 u3 P5 i# U1 B8 d. \Data Base
' L4 n! g( H- |Communications data files and updates including, but not limited to,
( Z7 s4 W/ T, T( u) kcommunications message file, network management file, information! x, e) X6 g1 B$ ^& \3 |9 D6 j
management file, link quality file, synchronization file, security file and. @: ^8 A1 h/ M, Z4 d+ J5 n
communications health and status file.% r- L* B4 d; F
Communications
7 M0 j! V: ], Z, g; wIntelligence
) D7 q7 `; C) `& Q* w( D$ [(COMINT)
6 x4 ?. U" }9 z" c j' YTechnical and intelligence information derived from foreign communications by/ C+ y. R! g/ D2 T/ h5 R
other than intended recipients.2 L/ J# y9 ^: c Y0 h/ Z
Communications
$ @8 o& V3 G A; F; r) M0 bSecurity
% f" Y2 v; m& ?) ~' h ?/ ?(COMSEC)
/ l5 }1 ]0 M7 YThe protection resulting from all measures designed to deny unauthorized
! B4 q9 _( }0 t2 v0 ?3 x$ ]. D8 Fpersons information of value, which might be derived from the possession and, i6 O; N$ q0 B" _3 G
study of telecommunications, or to mislead unauthorized persons in their
* W6 _: x/ Y- Q! K0 k% P ?interpretation of the results of such possession and study. Communications. k- O1 H @# M" i' ~
security includes crypto security; transmission security; emission security; and
, [: N& k$ u* O6 ^4 a' X5 \physical security of communications security materials and information.+ k, H8 h) Z; k1 r: K
Communications
, |, o' H: Q0 [System Segment D% i: ~/ J7 G7 O' n+ j; g
(CSS)6 a3 ]) B; e5 w1 l6 ?, l
The communications front end for all Cheyenne Mountain Air Force Base6 A9 C! A6 e; a
(CMAFB) missions for non-common user traffic, performing circuit and message
1 _) u- _& F3 R5 G- uswitching.
% \1 x/ K' g/ _) v* QCommunications; z4 ~; g& I" A2 f3 o" G* d& \3 \
System* N0 k: }- ]0 Y
Synchronization: `% O4 E9 P$ i- [' ~) d/ r! s! I/ ^" U
Coordination of timing among communications system elements to permit
5 |- f, E; K/ U% x/ r/ s* y5 ztransmission/reception of messages/data which may be distorted by time delays
9 r7 N6 v+ [! I- f5 C2 {: Eand Doppler shifts between communications nodes.0 A, D5 v1 ^% h+ p3 I) {2 i
Communications9 c# M/ p x. h* x8 Q0 c: M; [
Zone6 \; B' j; |9 ]$ e
Rear part of the theater of operations (behind but contiguous to the combat& V9 d& Y5 a) d& k" f" g$ M
zone) which contains the lines of communications, establishments for supply and3 C E- n* ^2 G! g
evacuation, and other agencies required for the immediate support and
2 p9 u; O/ c8 D. P: i3 cmaintenance of the field forces.& f/ c' p9 S' r, ^
COMNAVFOR Commander, Naval Forces.
3 y+ O* k7 A: B* r% G; {5 I2 SMDA GLOSSARY, VER. 4.0 C
9 u! _9 P9 t; X0 W8 A574 t: u4 B, O' p+ [
COMNAV-
' \9 y8 G3 g3 {3 U, x/ K- @: p gSEASYSCOM! c2 \1 t! K$ g( O% q* x
Commander, Naval Sea Systems Command.6 p7 c. d6 ~! ^
COMNAV-- K4 Q: |- I' p7 u9 d, {. \7 ^
SPACECOM
8 ]% |- z1 c; ?( l! A- P/ D% x( s# ACommander, Naval Space Command.1 D% y" Q* l0 d+ e, A
COMNAVSECGRU Commander Naval Security Group.
- v7 p2 W% e1 U MCOMOCK Computer Mock-up
9 l9 Q: Z( g: s. t; t+ X8 WCOMOPTEVFOR Commander, Operational Test and Evaluation Force (Navy).
8 Y" V1 n8 x9 a9 ~8 qComp Completion.
1 X9 K ]! ?( q$ h8 n: }& pCOMPASS Common Operational Mission Planning and Support System (Army term)
$ ?. ^, f3 d" e$ zCOMPES Contingency Operations/Mobility Planning and Executing System.5 ^$ v- W, T! e, m
Component Subsystem, assembly, or subassembly of logically grouped hardware and4 l1 N, C x% F$ q9 o; ^. ^
software, that performs interacting tasks to provide BMDS capability at a, b/ J. P1 @% T6 V# k; b @& b
functional level.
4 |2 Q/ c0 y1 I* V# b/ B1 dComponent
! G8 I2 r* Q$ e) j( ^Acquisition5 v1 }8 |9 ~$ q7 W/ m
Executive
- K w% H' r( T: f$ v4 P. iA single official within a DoD component who is responsible for all acquisition) X8 v4 P& z( S8 G2 q
functions within that Component. This includes Service Acquisition Executives
6 U7 Y; N* S4 ~0 Gfor the Military Departments and Acquisition Executives in other DoD components* ^5 `& ?# Z: s) J- J
that have acquisition management responsibilities.
5 R" g& H" C" R6 Q9 @. W: wComponent
9 ^, l. _" v6 G+ y( ~6 k# dCommand
+ ?2 A2 W7 p+ g6 g3 lCenters
: H% Q. P1 b. SThe Component Command Centers (which will contain Army and Air Force
% A# X) t; Q* Q$ J: nunique capabilities) will be capable of supporting the USSPACECOM Command
' _2 D" l$ V) z, U) O; ~Center and distributed Operations Centers by functioning as “Hot Backups” to
2 T! ]: W( n5 Y h7 O* w N+ fprovide for BM/C3 availability and survivability. The Component Command/ z7 L3 ` M( V
Centers will be capable of executing real-time control of BMD engagement
' {1 O5 Q& ]: h$ goperations.
7 v7 L9 a& q1 a, I* N1 zComponent
2 v8 _, T; v& b c: UProgram( z+ o) L# @# A
A major defense acquisition program delegated to the Military Department of
0 H/ C4 C- ^, K9 i9 p: ?2 ]Defense Agency for management.8 c: y3 c' Y& O, C2 p
Compton Current Electron current generated as a result of Compton processes. (See Compton- w& w* i& {4 c* O l$ t, l" V
Effect and Compton Electron.)
0 s: A. `1 h( `( XCompton Effect The scattering of photons (of gamma or x-rays) by the orbital electrons of atoms.
9 e4 n: N' [. `# S, ? N: r+ C! z$ FIn a collision between a (primary) photon and an electron, some of the energy of% I! o" L! U' F0 J8 J
the photon is transferred to the electron which is generally ejected from the
7 c* Z& s( e2 q/ j/ p& u; K# u% \: J* Watom. Another (secondary) photon, with less energy, then moves off in a new: f) o5 g: H0 _
direction at an angle to the direction of motion of the primary photon. (See# l0 f" A# s1 f6 ]$ Y; J% M
Scattering.)2 a# e: @8 x7 R/ B" E
Compton
' W* z, i7 [( `( g' k8 EElectron$ J g g' X" e; H3 E7 n2 e
An electron of increased energy ejected from an atom as a result of a Compton' B: Z! K6 _, K' b% g
interaction with a photon. (See Compton Effect.)
1 w3 J$ }* K sMDA GLOSSARY, VER. 4.0 C* p+ v* f9 j( ~
58! ?0 }8 E G, d, r `
Computer
1 v% b' d# z8 [) w+ Z, X; N& j* YSecurity
8 o! v8 `. r# G! E! U(COMPUSEC)
9 W" L7 K, s, QThe totality of security safeguards needed to provide acceptable level of r5 w, c7 @' U" X4 D
protection for automatic data processing (ADP) systems and the classified data0 r2 K- Z' T) O% {( ?
processed. Includes all hardware/software functions, characteristics, features;
4 C* s# C, L: o- q& Zoperational, accountability, and access control procedures at the computer and' W |2 j- }, l
remote terminal facilities; and, the management constraints, physical structures,
$ V( j/ B6 r- tand devices needed to provide an acceptable level of protection for classified0 L. g. [; ?1 H1 {* j* B
information in any state of storage, processing, display or communication within, g" r/ U/ T1 ^
the ADP system./ O& G6 C; a$ e) ^
Computer
- D6 V4 [- s, q$ ~Software
+ p+ f' H T1 RConfiguration; O2 s3 _/ @6 P6 ], ~+ T7 E
Item (CSCI)
; C+ P! A6 s8 k% ?" w! Q( YAn aggregation of software that satisfies an end use function and is designated. t1 ^1 I( e7 ~7 D: u
by the Government for separate configuration management. They are selected# B8 y7 M. J2 \8 m( ^$ M9 L; L
based on tradeoffs among software function, size, host or target computers,
% Z/ A% @ ~ [- t; P5 W) |developer, support concept, plans for reuse, criticality, interface considerations,
! W9 k7 @- ^# z& }need to be separately documented and controlled, and other factors. |
|