30.01.2015 Views

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

402<br />

<strong>Picture</strong> <strong>Perfect</strong> <strong>4.6</strong><br />

<strong>User</strong> <strong>Manual</strong><br />

Table 134.<strong>Picture</strong> <strong>Perfect</strong> <strong>4.6</strong> terms explained (continued)<br />

Term<br />

Form<br />

Gateway<br />

Graphical Terminal<br />

Host<br />

Host Console<br />

Informix<br />

Input<br />

Input Field<br />

Input Group<br />

Insertion Point<br />

IP Address<br />

ISA<br />

Keypad Override<br />

Code<br />

LAN<br />

Linux<br />

Locale<br />

Log on<br />

Log off<br />

Definition<br />

An electronic data-entry worksheet used to enter, find, view, or update data. A form may have<br />

input fields, pop-up lists, and pushbuttons for various functions.<br />

A network device or machine that connects a local private network to another network or the<br />

Internet.<br />

A terminal using a graphical interface for logging on to a desktop environment, such as Windows,<br />

GNOME Desktop Manager (GDM), XDM and KDM.<br />

A host is generally a device or program that provides services to some smaller or less capable<br />

device or program.<br />

The host computer terminal used for AIX functions.<br />

The relational database management system (RDBMS) used by the <strong>Picture</strong> <strong>Perfect</strong> system. See<br />

Relational Database.<br />

A digital input (DI) or a logical condition detected by the microcontroller. An input is assigned to an<br />

inputgroup.<br />

An area of the screen where an operator can type in information.<br />

A group of one or more digital inputs (or logical inputs) that can cause an alarm (and/or trigger<br />

output groups) when any (or all) inputs in the group are detected as true.<br />

A point (marked by a cursor) where the text that you enter appears.<br />

A numeric address used by computer hosts to transmit and receive information over the Internet.<br />

A type of bus conforming to the Industry Standard Architecture.<br />

See Shunt.<br />

A Local Area Network. X Terminals are connected to the host computer using an Ethernet LAN.<br />

Linux (often pronounced LIH-nuhks with a short “i”) is a UNIX-like operating system that was<br />

designed to provide personal computer users a free or very low-cost operating system comparable<br />

to traditional and usually more expensive UNIX systems. Linux has a reputation as a very efficient<br />

and fast-performing system. Linux is a remarkably complete operating system, including a<br />

graphical user interface, an X Window System, TCP/IP, the Emacs editor, and other components<br />

usually found in a comprehensive UNIX system. Linux is publicly open and extendible by<br />

contributors. Because it conforms to the Portable Operating System Interface standard user and<br />

programming interfaces, developers can write programs that can be ported to other operating<br />

systems.<br />

A language and the location in which it is used. All languages in <strong>Picture</strong> <strong>Perfect</strong> are defined in<br />

terms of locale. Each language has a unique locale identifier. <strong>Picture</strong> <strong>Perfect</strong> uses the locale<br />

identifiers defined by AIX. Refer to the Operator’s form for a list of locale identifiers.<br />

The procedure used by operators to identify themselves to the system. To use the system, an<br />

operator must “log on” with a Login ID and Password. The Login ID is associated with a<br />

Permissions level that defines the functions an operator can perform. A Password provides<br />

secondary validation for that operator.<br />

A security procedure that protects the system from unauthorized use. When an operator logs off,<br />

the system displays the Login screen and requires the next operator to log on.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!