franchise-star-trek-tng-technical-manual1
franchise-star-trek-tng-technical-manual1 franchise-star-trek-tng-technical-manual1
11.8 DEFLECTOR SHIELDS11.8.2 Deflector grids (dorsal view)Outer Saucer Module gridInner Saucer Module gridEngineering Hull grid (P/S)directed energy weapon are known, it is possible to dramaticallyincrease deflector efficiency by adjusting the shieldingfrequencies to match those of the incoming weapon. Similartechniques are used to protect the vehicle against variousnatural hazards, as when shielding is increased in the 10 10meter band to protect against X rays generated by a supernova.Raising shields to defensive configuration also triggers anumber of special operating rules. First, active sensor scansare operated according to special protocols that are intendedto minimize the interference due to the shielding effects. Forcertain types of scans, sensors are continually recalibrated totake advantage of any EM "windows" left open by rotation ofshield frequencies. In other cases, the random variation ofshield frequencies is modified slightly to allow a specific EMwindow at specific intervals necessary for data collection.Such sensor operation techniques generally result in substantiallyreduced data collection rates, so sensor usage isstrictly prioritized during Alert situations. Further, most defensivescenarios require sensors to be operated in "silentrunning" mode during which the usage of active scan sensorsis not permitted and only passive sensors may be used.serves as the transmission medium for the transporter beamrequires such a wide EM and subspace bandwidth that it isnormally impossible to transport through shields. Additionally,the shields' spatial distortion effects can be severelydisruptive of the transporter beam's pattern integrity.Shield operation also has a significant impact on warpdrive operation. Because of the spatial distortion inherent inthe shielding generation process, there is a measurable effecton the geometry of the warp fields that propel the ship. Warpdrive control software therefore includes a number of routinesdesigned to compensate for the presence of deflector shields,which would otherwise cause (at maximum rated output) a32% degradation in force coupling energy transfer. Simultaneously,shield generator output must be upshifted by approximately147 kilohertz to compensate for translational fieldinteraction.Also affected by deflector shield usage is operation of thetransporter system. The annular confinement beam thatThe idea of frequency "windows" in the shields used for sensor scans was the basis of O'Brien's trick in "The Wounded" whenhe was able to beam onto the USS Phoenix, even though that ship's shields were raised at the time.
11.9 AUTO DESTRUCT SYSTEMS11.9 AUTO DESTRUCT SYSTEMSIt is an accepted fact of life aboard Starfleet vessels thatthe ultimate sacrifice may have to be made to insure thafneitherthe intact starshipnorthe technology contained thereinwill fall into the possession of Threat forces. The totaldestruction of the docked spacecraft or either of its twoseparated components can be executed by special commandauthorization procedures, and may be accomplished with tworelated systems.DESTRUCT SCENARIOSMost situations in which vehicle destruct would occurhave been extensively modeled using computer simulations.As this is a tactic of extreme last resort, all other availableoptions must first be exhausted. The bulk of the modeling hascentered around potential loss of the ship during combatoperations with known and computer-created Threat forces,although sophisticated hijacking schemes cannot be ruledout.In the worst-case examples, all propulsion and defensivesystems are irreversibly disabled or destroyed, and thereis no possibility of assistance by other Starfleet or alliedvessels. A high probability that the ship can be boarded ortractored then exists, and the activation of the auto-destructsequence within the computer is to be the final event. To alesser degree, certain scenarios judge a disabled starship tobe a catastrophic danger to a greater number of living beings;e.g., the population of a planet, requiring the abandonment ofthe ship and its subsequent destruction to prevent the disaster.COMMAND AUTHORIZATIONThe command to activate auto-destruct can be issuedonly by a limited number of crew members according tospecific flight rules. Conditional tests programmed into themain computers are distributed to key autonomous subprocessornodes throughout the ship to allow the autodestructsequence to be carried out, even if the main computersare disabled. These tests check for the proper sequenceactivation inputs by command personnel, beginning with thecaptain and first officer. The programmed conditions checkforthe succession of command personnel; if eitherthe captainor first officer is determined by the computer to be unavailable,the system will accept-inputs from officers only down to theposition of Operations Manager.In the case of authorization issued by the captain andexecutive officer, the captain activates the destruct sequenceprogram, and both officers provide verbal input, which permitsthe computer to recognize the identity and authority of bothofficers. The computer then requests verbal confirmation ofthe executive officer's concurrence with the destruct order.Following such confirmation, the computer will request the de-11.9.1 Location of auto-destruct ordnance packages
- Page 92 and 93: 7.5 TRACTOR BEAMS7.5 TRACTOR REAMS7
- Page 94 and 95: 7.6 REPLICATOR SYSTEMSgeometry tran
- Page 96 and 97: 8.1 INTRASHIP COMMUNICATIONS8.1.1 I
- Page 98 and 99: 8.2 PERSONAL COMMUNICATOR8.2.2 Pers
- Page 100 and 101: subspace transceiver network is the
- Page 102 and 103: 8.5 SUBSPACE COMMUNICATIONS NETWORK
- Page 104 and 105: 8.6 UNIVERSAL TRANSLATORThe technic
- Page 106 and 107: iDHiiiiniriiriiiiinin9.2.1 Personne
- Page 108 and 109: virtual-focus molecular imaging sca
- Page 110 and 111: Time(seconds)DeviceEventTime(second
- Page 112 and 113: 9.4 LIMITATIONS OF USE 9.5 TRANSPOR
- Page 114 and 115: In addition, there are several pack
- Page 116 and 117: 10.3 NAVIGATIONAL SENSORS10.3 NAVIG
- Page 118 and 119: 10.4 LATERAL SENSOR ARRAYS10.4 LATE
- Page 120 and 121: 1U.5 INSTRUMENTED PROBES10.5.5 Clas
- Page 122 and 123: 10.6 TRICORDER10.6 TRICORDERThe sta
- Page 124 and 125: 10.6 TRICORDER10.6.3 Handheld senso
- Page 126 and 127: 11.0 TACTICAL SYSTEMS11.1 PHASERS11
- Page 128 and 129: 11.1 PHASERS11.1.4 Phaser bank empl
- Page 130 and 131: 11.2 PHASER OPERATIONSSPACECRAFT TA
- Page 132 and 133: 11.3 PHOTON TORPEDOES11.3.2 Photon
- Page 134 and 135: Targeting is directed by the Tactic
- Page 136 and 137: 11.6 TACTICAL POLICIES11.6 TACTICAL
- Page 138 and 139: 11.7 PERSONAL PHASERS11.7.2 Type II
- Page 140 and 141: • Setting 11: Explosive/Disruptio
- Page 144 and 145: 11.9 AUTO DESTRUCT SYSTEMSsired int
- Page 146 and 147: 1Z.Z ATMOSPHERIC SYSTEMAdditionally
- Page 148 and 149: 12.4 EMERGENCY ENVIRONMENTAL SYSTEM
- Page 150 and 151: 13.0 CREW SUPPORT SYSTEMS13.1 CREW
- Page 152 and 153: MEDICAL SYSTEMS13.2.2 Biobed and su
- Page 154 and 155: 13.3 MEDICAL TRICORDER13.3.1 Medica
- Page 156 and 157: 13.5 FOOD REPLICATION SYSTEM13.5.1
- Page 158 and 159: 13.6 TURBOLIFT PERSONNEL TRANSPORT
- Page 160 and 161: 13.7.2 Omnidirectional holo diode c
- Page 162 and 163: 14.2 SHUTTLEBAYS14.2.1 Location of
- Page 164 and 165: 14.3.4 Personnel Shuttle Type 6PROD
- Page 166 and 167: 14.4 EXTRAVEHICULAR ACTIVITY14.4 EX
- Page 168 and 169: 15.0 USS ENTERPRISE FLIGHT OPERATIO
- Page 170 and 171: Ib.S YtLLUVU MLtHl15.5 YELLOW ALERT
- Page 172 and 173: 15.7 EXTERNAL SUPPORT MODE 15.8 SEP
- Page 174 and 175: 16.0 EMERGENCY OPERATIONS16.2 FIRE
- Page 176 and 177: to those compartments include biome
- Page 178 and 179: 16.4 LIFEBOATSmary spacecraft maneu
- Page 180 and 181: 17.0 CONCLUSION17.2 FUTURE DIRECTIO
- Page 182: 17.3 MISSION BACKGROUND17.3 MISSION
11.9 AUTO DESTRUCT SYSTEMS11.9 AUTO DESTRUCT SYSTEMSIt is an accepted fact of life aboard Starfleet vessels thatthe ultimate sacrifice may have to be made to insure thafneitherthe intact <strong>star</strong>shipnorthe technology contained thereinwill fall into the possession of Threat forces. The totaldestruction of the docked spacecraft or either of its twoseparated components can be executed by special commandauthorization procedures, and may be accomplished with tworelated systems.DESTRUCT SCENARIOSMost situations in which vehicle destruct would occurhave been extensively modeled using computer simulations.As this is a tactic of extreme last resort, all other availableoptions must first be exhausted. The bulk of the modeling hascentered around potential loss of the ship during combatoperations with known and computer-created Threat forces,although sophisticated hijacking schemes cannot be ruledout.In the worst-case examples, all propulsion and defensivesystems are irreversibly disabled or destroyed, and thereis no possibility of assistance by other Starfleet or alliedvessels. A high probability that the ship can be boarded ortractored then exists, and the activation of the auto-destructsequence within the computer is to be the final event. To alesser degree, certain scenarios judge a disabled <strong>star</strong>ship tobe a catastrophic danger to a greater number of living beings;e.g., the population of a planet, requiring the abandonment ofthe ship and its subsequent destruction to prevent the disaster.COMMAND AUTHORIZATIONThe command to activate auto-destruct can be issuedonly by a limited number of crew members according tospecific flight rules. Conditional tests programmed into themain computers are distributed to key autonomous subprocessornodes throughout the ship to allow the autodestructsequence to be carried out, even if the main computersare disabled. These tests check for the proper sequenceactivation inputs by command personnel, beginning with thecaptain and first officer. The programmed conditions checkforthe succession of command personnel; if eitherthe captainor first officer is determined by the computer to be unavailable,the system will accept-inputs from officers only down to theposition of Operations Manager.In the case of authorization issued by the captain andexecutive officer, the captain activates the destruct sequenceprogram, and both officers provide verbal input, which permitsthe computer to recognize the identity and authority of bothofficers. The computer then requests verbal confirmation ofthe executive officer's concurrence with the destruct order.Following such confirmation, the computer will request the de-11.9.1 Location of auto-destruct ordnance packages