Page 583 - Using MIS
P. 583

Glossary     551

            Trade-off  In project management, a balancing of three criti-  Usurpation  Occurs when unauthorized programs invade a
              cal factors: requirements, cost, and time.  481       computer system and replace legitimate programs. Such
            Train the trainer  Training sessions in which vendors train   unauthorized programs typically shut down the legitimate
              the organization’s employees, called Super Users, to be-  system and substitute their own processing to spy, steal and
              come in-house trainers in order to improve training quality   manipulate data, or achieve other purposes.  393
              and reduce training expenses.  272                  Value  As defined by Porter, the amount of money that a cus-
            Transport Layer Security (TLS)  The new name for a later   tomer is willing to pay for a resource, product, or service.  88
              version of Secure Sockets Layer (SSL).  405         Value chain  A network of value-creating activities.  88
            Trigger  A computer program stored within the database that   Value of social capital  Value determined by the number of
              is executed when certain conditions arise. Primarily used to   relationships in a social network, by the strength of those
              maintain database consistency.  271                   relationships, and by the resources controlled by those
            Trojan horses  Viruses that masquerade as useful programs   related. 303
              or files. A typical Trojan horse appears to be a computer   Vanity metrics  Measures that don’t improve decision
              game, an MP3 music file, or some other useful, innocuous    making.  314
              program. 407                                        Velocity  In scrum, the total number of points of work that a
            Tunnel  A  virtual,  private  pathway  over  a  public  or  shared   team can accomplish in each scrum period.  489
              network from the VPN client to the VPN server.  232  Version control  The process that occurs when the collabora-
            Unified Modeling Language (UML)  A series of diagramming   tion tool limits and sometimes even directs user activity.  58
              techniques that facilitates OOP development. UML has dozens   Version management  Tracking of changes to documents by
              of different diagrams for all phases of system development.   means of features and functions that accommodate concur-
              UML does not require or promote any particular development   rent work.  53
              process. Generally less popular that the E-R model.  179
                                                                  Vertical-market application  Software that serves the needs of
            Unix  An  operating  system  developed  at  Bell  Labs  in  the   a specific industry. Examples of such programs are those used
              1970s. It has been the workhorse of the scientific and engi-  by dental offices to schedule appointments and bill patients,
              neering communities since then.  127                  those used by auto mechanics to keep track of customer data
            Unstructured decision  A type of decision for which there is   and customers’ automobile repairs, and those used by parts
              no agreed-on decision-making method.  43              warehouses to track inventory, purchases, and sales.  131
            Unsupervised data mining  A form of data mining whereby   Videoconferencing  Communication  technology that  en-
              the analysts do not create a model or hypothesis before run-  ables online conferencing using video.  49
              ning the analysis. Instead, they apply the data mining tech-  Viral hook  An inducement that causes someone to share an
              nique to the data and observe the results. With this method,   ad, link, file, picture, movie, or other resource with friends
              analysts create hypotheses after the analysis to explain the   and associates over the Internet.  296
              patterns found.  359
                                                                  Virtual machines (vm)  Computer programs that present the
            URL (Uniform Resource Locator)  An address on the       appearance of an independent operating system within a
              Internet. Consists of a protocol followed by a domain name   second host operating system. The host can support mul-
              or public IP address.  219                            tiple virtual machines, possibly running different operating
            Use increases value  The concept that the more people use   system programs (Windows, Linux), each of which is as-
              a site, the more value it has, and the more people will visit.   signed assets such as disk space, devices, and network con-
              Furthermore, the more value a site has, the more existing   nections over which it has control.  129
              users will return.  309                             Virtual meetings  Meetings in which participants do not meet
            User tier  In the three-tier architecture, the tier that consists   in the same place and possibly not at the same time.  49
              of computers, phones, and other mobile devices that have   Virtual private cloud (VPC)  A subset of a public cloud that
              browsers and request or process Web pages and other   has highly restricted, secure access.  233
              services. 220
                                                                  Virtual private network (VPN)  A  WAN connection alterna-
            User-generated content (UGC)  Content on an organiza-   tive that uses the Internet or a private internet to create the
              tion’s social media presence that is contributed by nonem-  appearance of private point-to-point connections. In the IT
              ployee users.  321                                    world, the term virtual means something that appears to  exist

            Users  Individuals and organizations that use social media   that does not exist in fact. Here a VPN uses the public Internet
              sites to build social relationships.  295             to create the appearance of a private connection.  231
   578   579   580   581   582   583   584   585   586   587   588