||The mechanism used by the OSI/CACD System 2 to access discs.
Also known as a
||Artificial Intelligence. The underlying logic
by which cybertanks function.
||The act of creating a cybertank from a cybertank design. All cybertank
designs must be authorized by OSI before a cybertank can be created.
||Battlefield Design Module. The component of the OSI/CACD System 2 used to
create simulation battlefields.
||Computer Aided Cybertank Design. The process of using powerful computers
in the design and implementation of cybernetic machinery.
||Cybertank Authorization Module. The component of the OSI/CACD System 2 used
to identify cybertank design flaws. If any flaws are found, they are reported to
||Pre-written sections of Artificial Intelligence
(AI) which perform specific functions. These routines can be
Incorporated into any employee’s AI.
||The Cybertank Command Language. The computer language used to construct
||Cybertank Directional Indicator. Shows the direction of the cybertank and
scanner during a simulation.
||Chassis Design Module. The component of the OSI/CACD System 2 used to build
a cybertank’s chassis/body.
||Cybertank Evaluation Module. The component of the OSI/CACD System 2 which
carries out an employee’s request for a Clearance Evaluation.
||The body or frame of a cybertank including all electronic devices, weaponry,
||The act of erasing tent from the AI by first
selecting it then selecting Clear from the Edit menu. The text removed
is NOT retained In temporary storage.
||A formal request for an employee evaluation. If
passed, the employee achieves an increase in clearance level.
||Defines an employee’s position/rank within the OSI high-security
complex. As higher clearance levels are attained, the budget increases and additional
information and equipment becomes available.
||A special item available in the Chassis Module
which allows communications between cybertank team members. Only useful for team simulation designs.
||The act of duplicating tent In the AI by first
selecting it then selecting Copy from the Edit menu. The text is retained in temporary storage until other tent is copied or cut. Text in storage
can be retrieved.
||Construction Panel. An automatic, easy-to-use
tool used in the construction of a cybertank’s AI.
||Combat Simulation Module. The component of the OSI/CACD System 2 used to
observe a cybertank battle.
||Cybertank Test Module. The component of the OSI/CACD System 2 used to test
a cybertank design. Includes many powerful diagnostic tools.
||The act of removing tent from the AI by first
selecting it then selecting Cut from the Edit menu. The text removed is
retained in temporary storage until other text is copied or cut. Text
can be retrieved from temporary Storage.
||Cybertank Viewing Indicator. Shows the results of the last scanner usage.
||Design Control Module. The gateway to all
aspects of cybernetic design.
||Data Duplication Module. The component of the OSI/CACD System 2 used to
duplicate (or Copy) data files to and from discs.
||External Control Module. The main component of
the OSI/CACD System 2 computer.
It is from the ECM that the rest Of the OSI/CACD is accessed.
||Bulletin board system incorporated into the ECM which allows the posting
of OSI memorandums and international news bulletins.
||File Retrieval Panel. The control mechanism
used to load data files from a disc. FSP: File Storage Panel. The control mechanism used to record/save data
files to a disc.
||File Termination Panel. The control mechanism
used to delete data files from a disc.
||A name consisting of ten characters or less
that identifies a command routine in a cybertank’s AI.
||A predefined set of CCL commands Which execute a specific function.
||The Organization of Strategic intelligence. A
pioneer company in the field of cybernetics.
||The OSI communications and surveillance satellite. it is from the OSICOM
1 that an aerial view of a battlefield can be accessed.
||The act of inserting temporarily stored text
into the AI.
||Printer Setup Panel. The control mechanism used
to configure a printer for the OSI/CACD system.
||A closely approximated model of a cybernetic
battle used for testing or experimentation.
||Checks the cybertank AI for errors and notifies the employee of any problems.
Although similar to authorize, verify will not create a cybertank.