Browse Definitions :
Definition

airplane mode

Airplane mode is a setting on cell phones, smartphones and other mobile devices that prevents the device from sending or receiving calls and text messages. Airplane mode is also known as offline mode, standalone mode and flight mode.

Airplane mode varies from one device to another. On an iPhone, airplane mode disables connectivity for cellular voice and data, Wi-Fi, Bluetooth, GPS and location-based services.

Some airlines are beginning to implement in-flight Wi-Fi but transmission functions have not, until recently, been allowed during air travel. The most commonly stated explanation for barring wireless connectivity during flights is the need to prevent interference with the plane's onboard communications. There is some controversy as to whether that explanation is valid. In any case, however, cellular networks are not equipped to deal with devices connecting from flight heights and moving at flight speeds.

Airplane mode allows travelers to continue to use their devices unless airline rules require that the devices be turned off altogether. In airplane mode, only functions that require a transmission signal are disabled; the user can still access the device’s camera, games, Mp3 player and so on. Some devices also allow users to write and save text and email messages to be sent when transmission is permitted again. 

“Airplane mode” is also used metaphorically, to refer to a lack of service or the user’s intentional avoidance of communications.

This was last updated in July 2012

Continue Reading About airplane mode

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close