All > Technology > Defense
All > Technology > Defense
(1) Air Combat Command (USAF), Langley AFB, VA. (2) Air Component Commander. (3) Area Coordination Center. 3
- Browse Related Terms: ACC, ACE, CAC, COCOM, Combat Information Center, CRA, Fire Support Coordinating Line (FSCL), Joint Doctrine, Joint Force Commander (JFC), Joint Tactics, Techniques, and Procedures (JTTP), Regional Operations Control Center (ROCC), Spoofing
All > Technology > E-mail > Lotus Domino
In a user interface, a key or combination of keys that invokes an application-defined function. For example, ALT+F shows the File menu. In IBM® Lotus® Notes® menus, accelerators are underlined. See also extended.
- Browse Related Terms: accelerator, Adjacent Domain document, alarm, application catalog, Blog, CA (Certificate Authority), database, database cache, encryption key, extended ACL, form, hierarchical naming, IMAP (Internet Message Access Protocol), LDAP directory, library, manager access, named element, newsgroup, Personal Address Book, portal applications catalog, Replica, Sametime Contacts, SSL (Secure Sockets Layer), tag, TCP port, User-ID, WebDAV (Web-based Authoring and Versioning), XML (Extensible Markup Language)
All > Technology > Search > Enterprise Search
Character normalization can preserve both original and normalized forms for accented words (e.g. hôtel).
- Browse Related Terms: Accent normalization, escape character, ligature, masking character, n-gram segmentation, tokenizer, trailing character, Unicode-based white space segmentation, Wildcard, wildcard character
All > Technology > Telecommunications
In data transmission, the condition assumed by a primary or secondary station upon correct receipt of a frame for processing.
- Browse Related Terms: accept, backward supervision, basic status, carrier sense multiple access with collision avoidance (CSMA/CA), carrier sense multiple access with collision detection (CSMA/CD), command frame, respond opportunity, response frame, slot time
All > Technology > Telecommunications
The condition that exists when a system or functional unit meets the specified performance and security requirements.
- Browse Related Terms: acceptance, certificate hold, command, control and communications (C3), Federal Telecommunications System 2000 service, network management, network security architecture, password length parameter, restriction certificate, security exchange, shadow, signatory authority, tactical communications, Warner exemption
Also listed in:
- All > Business > Real Estate
- All > Law > Common Legal Terms
All > Technology > Telecommunications
In fiber optics, half the vertex angle of that cone within which optical power may be coupled into bound modes of an optical fiber. Note 1: The axis of the cone is collinear with the fiber axis, the vertex of the cone is on the fiber end-face, and the base of the cone faces the optical power source. Note 2: The acceptance angle is measured with respect to the fiber axis. Note 3: Rays entering an optical fiber at angles greater than the acceptance angle are coupled into unbound modes. [After 2196]
- Browse Related Terms: acceptance angle, acceptance cone, alpha profile, bound mode, cable cutoff wavelength (λcc), mode volume, multimode distortion, multimode optical fiber, normalized frequency (V), numerical aperture (NA), refracted ray, single-mode optical fiber, skew ray, spot size, step-index profile, vertex angle
All > Technology > Telecommunications
In fiber optics, the cone within which optical power may be coupled into the bound modes of an optical fiber. Note: The acceptance cone is derived by rotating the acceptance angle about the fiber axis. [After 2196]
- Browse Related Terms: acceptance angle, acceptance cone, alpha profile, bound mode, cable cutoff wavelength (λcc), mode volume, multimode distortion, multimode optical fiber, normalized frequency (V), numerical aperture (NA), refracted ray, single-mode optical fiber, skew ray, spot size, step-index profile, vertex angle
All > Technology > Telecommunications
The bound on performance that is allowed at service turnup or interexchange carrier (IC) acceptance of a circuit or connection, or when corrective action is taken to restore a parameter after an immediate action limit (IAL) failure. Performance as measured by a parameter is satisfactory if the value of the parameter is equal to or better than the limit. [T1.208-1989]
- Browse Related Terms: acceptance limit (AL), access service area, exchange carrier (EC), facility code, other common carrier (OCC), point of presence (POP), point of termination (POT), public switched network (PSN), service code, specialized common carrier (SCC), switched exchange access network, tariff, teletext, viewdata, wireline common carrier
All > Technology > Telecommunications
Of an antenna, for a given plane, a distribution plot of the off-axis power relative to the on-axis power as a function of angle or position. [After 2196] Note: The acceptance pattern is the equivalent of a horizontal or vertical antenna pattern. 2. Of an optical fiber or fiber bundle, a curve of total transmitted power plotted against the launch angle.
- Browse Related Terms: acceptance pattern, aligned bundle, bandwidthdistance product, Bus, cladding mode stripper, end finish, excess insertion loss, fiber, fiber bandwidth, fiber cable, fiber optic link, fiber optics (FO), four-wire circuit, meridional ray, microbend loss, minimum bend radius, multifiber cable, multiple media, optical amplifier, optical cable, optical fiber cable, optical fiber link, optical fiber waveguide, optical waveguide, polarization-maintaining (PM) optical fiber, spectral loss curve, Tap
All > Technology > Telecommunications
A test of a system or functional unit to ensure that contractual requirements are met. Note: An acceptance test may be performed at the factory or user premises by the user, vendor, or a third party.
- Browse Related Terms: acceptance test, acceptance testing, acceptance trial, alarm event, conformance test, event, measured blocking threshold, operations system, reference waveform, self-testing circuit, system administration, ZBTSI (zero-byte time slot interchange)
All > Technology > Telecommunications
Operating and testing of a communication system, subsystem, or component, to ensure that the specified performance characteristics have been met.
- Browse Related Terms: acceptance test, acceptance testing, acceptance trial, alarm event, conformance test, event, measured blocking threshold, operations system, reference waveform, self-testing circuit, system administration, ZBTSI (zero-byte time slot interchange)
All > Technology > Telecommunications
A trial carried out by nominated representatives of the eventual military users of the weapon or equipment to determine if the specified performance and characteristics have been met.
- Browse Related Terms: acceptance test, acceptance testing, acceptance trial, alarm event, conformance test, event, measured blocking threshold, operations system, reference waveform, self-testing circuit, system administration, ZBTSI (zero-byte time slot interchange)
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
Any SMTP namespace for which an Exchange organization sends and receives e-mail. Accepted domains include those domains for which the Exchange organization is authoritative. An Exchange organization is authoritative when it handles mail delivery for recipients in the accepted domain. Accepted domains also include domains for which the Exchange organization receives mail and then relays to an e-mail server that is outside the Active Directory forest for delivery to the recipient. [Exchange 2007]
- Browse Related Terms: accepted domain, Active Directory contact, address rewriting, Address Rewritting, dynamic distribution group, mail contact, RBL (real-time block list), Safe Senders List, spoofed mail, Spoofing
All > Technology > Telecommunications
Interference at a higher level than that defined as permissible interference and which has been agreed upon between two or more administrations without prejudice to other administrations. [NTIA] [RR]
- Browse Related Terms: accepted interference, coordination contour, coordination distance, FCC, necessary bandwidth, permissible interference, public correspondence, radiocommunication, telecommand, telegraphy, telephony
All > Technology > Records Management
a verb is to inspect, examine, comprehend, read, see, or hear a public record, no matter what its medium or storage condition, so as to understand and use it for information or evidence; as a noun it is the means, opportunity, privilege, right, or effective accomplishment of such use of a public record. "Comprehend" is used here with the intent of including Braille and other means of making information known for the blind. See public access.
right, opportunity, or means of finding, using, or retrieving information
The availability of or the permission to consult records.
- Browse Related Terms: access, archives management, closed record, digital certificate, evidential integrity, government record or governmental record, intranet, official record, open record, permanent value, PKI, private record, project file, public access, publication, records appraisal, records management manual, records retention, state record, working paper
All > Technology > Security
Ability to make use of any information system (IS) resource.
- Browse Related Terms: access, application, Baselining, chain of custody, Computer Security Object (CSO), Computer Security Objects Register, Control Information, Denial of Service (DoS), Information Resources, information system, Metrics, records, security label, System, System Interconnection
All > Technology > Telecommunications
1. The ability and means necessary to store data in, to retrieve data from, to communicate with, or to make use of any resource of a system. 2. To obtain the use of a resource. 3. (COMSEC) [The] capability and opportunity to gain detailed knowledge of or to alter information or material. [NIS] 4. (AIS) [The] ability and means to communicate with (i.e., input to or receive output from), or otherwise make use of any information, resource, or component in an AIS. Note [for 3 and 4]: An individual does not have "access" if the proper authority or a physical, technical, or procedural measure prevents him/her from obtaining knowledge or having an opportunity to alter information, material, resources, or components. [NIS] 5. An assigned portion of system resources for one data stream of user communications or signaling. 6. [An] opportunity to make use of an information-system (IS) resource. [INFOSEC-99] 7. Condition where the potential exists for information to flow between entities [CESG]. 8. A specific type of interaction between a subject and an object that results in the flow of information from one to the other [CESG]. 9 A specific type of interaction between a subject and an object that results in the flow of information from one to the other. Possible information flows include the transfer of attributes pertaining to that object, the transfer of data pertaining to that object, or the fact of existence of that object [POSIX.6]. 10. A specific type of interaction between a subject and an object that results in the flow of information from one to the other [TCSEC].
- Browse Related Terms: access, attention character, controlled sharing, flaw hypothesis methodology, protection-critical portion of the TCB, reference validation mechanism, security kernel, security relevant event, sensitivity label, surrogate access, tag, TEMPEST, Trusted Path, trusted software
All > Technology > Telecommunications
An arrangement to transport access traffic between an end office and an IC POT (interexchange carrier point of termination) and may be either direct routed, tandem routed, or a combination of direct and tandem routed. (In the case of direct routed only, the access arrangement and access connection are synonymous.) [T1.Rpt 11-1991]
- Browse Related Terms: access arrangement, acoustic coupler, connect time, connection endpoint (CE), multiple access, network terminal number (NTN), Open Systems Interconnection--Reference Model (OSI--RM), premature disconnect, remote login, spurious tones, Telnet, terminal access controller (TAC), terminal endpoint (TE) functional group, transmitter-receiver pair, video teleconferencing unit (VTU), wireless mobility management
All > Technology > Telecommunications
The process by which one or more users interact with a telecommunications system to enable initiation of user information transfer. Note: An access attempt begins with an issuance of an access request by an access originator. An access attempt ends either in successful access or in access failure.
- Browse Related Terms: access attempt, access originator, point of interface (POI), reserved circuit service, telecommunications service, telecommunications system operator, timeliness