equipment class
A diagram utilized for transient activity during assembly (e.g. sequence of activity) and not finished work.
A list of all parts and sub assemblies that constitute a particular assembly, showing the quantity of each required item. Typically developed from analyzing a drawing.
Declaration that contains sufficient information to enable an recipient of the declaration of conformity to identify the issuer of the declaration, the object of the declaration, the standards and other specified requirements with which conformity is declared, and the person signing for and on behalf of the issuer of the declaration of conformity (first party).
A document issued by a recognised independent authority certifying that a type test has satisfied the specified standards; e.g. ATEX, BASEEFA, PTB, UL, CSA, etc. Examples of ratings include 'intrinsically safe & explosion proof'.
An authoritative collection of values with a relationship to a specific equipment. List to show input and output of an equipment (e.g. instrument, telecom equipment) connected to other equipment (e.g. distributed control system, programmable logic controller).The columns of this collection is specified and controlled.
A datasheet which provides precise information about a equipment/model or package which shows how it meets the 'equipment specification' and the 'design datasheet requirements'; includes noise and other test results prepared by manufacturer/supplier.
A document certifying a material's chemical and physical properties and states a product made of metal's compliance with an international standards organization (ANSI, ASME, etc.).
A list describing the contents of a shipment received.
A document certifying conformity to local regulations which accompanies shipment of equipment and/or goods. e.g., official certificate issued by OEM/supplier or approved licensed agent of OEM/supplier.
Is a network security device, either hardware- or software-based, that monitors and controls incoming and outgoing network traffic based on a set of security rules in order to protect internal private networks from unauthorized access, malicious attacks, or intrusions.