Page 583 - Using MIS
P. 583
Glossary 551
Trade-off In project management, a balancing of three criti- Usurpation Occurs when unauthorized programs invade a
cal factors: requirements, cost, and time. 481 computer system and replace legitimate programs. Such
Train the trainer Training sessions in which vendors train unauthorized programs typically shut down the legitimate
the organization’s employees, called Super Users, to be- system and substitute their own processing to spy, steal and
come in-house trainers in order to improve training quality manipulate data, or achieve other purposes. 393
and reduce training expenses. 272 Value As defined by Porter, the amount of money that a cus-
Transport Layer Security (TLS) The new name for a later tomer is willing to pay for a resource, product, or service. 88
version of Secure Sockets Layer (SSL). 405 Value chain A network of value-creating activities. 88
Trigger A computer program stored within the database that Value of social capital Value determined by the number of
is executed when certain conditions arise. Primarily used to relationships in a social network, by the strength of those
maintain database consistency. 271 relationships, and by the resources controlled by those
Trojan horses Viruses that masquerade as useful programs related. 303
or files. A typical Trojan horse appears to be a computer Vanity metrics Measures that don’t improve decision
game, an MP3 music file, or some other useful, innocuous making. 314
program. 407 Velocity In scrum, the total number of points of work that a
Tunnel A virtual, private pathway over a public or shared team can accomplish in each scrum period. 489
network from the VPN client to the VPN server. 232 Version control The process that occurs when the collabora-
Unified Modeling Language (UML) A series of diagramming tion tool limits and sometimes even directs user activity. 58
techniques that facilitates OOP development. UML has dozens Version management Tracking of changes to documents by
of different diagrams for all phases of system development. means of features and functions that accommodate concur-
UML does not require or promote any particular development rent work. 53
process. Generally less popular that the E-R model. 179
Vertical-market application Software that serves the needs of
Unix An operating system developed at Bell Labs in the a specific industry. Examples of such programs are those used
1970s. It has been the workhorse of the scientific and engi- by dental offices to schedule appointments and bill patients,
neering communities since then. 127 those used by auto mechanics to keep track of customer data
Unstructured decision A type of decision for which there is and customers’ automobile repairs, and those used by parts
no agreed-on decision-making method. 43 warehouses to track inventory, purchases, and sales. 131
Unsupervised data mining A form of data mining whereby Videoconferencing Communication technology that en-
the analysts do not create a model or hypothesis before run- ables online conferencing using video. 49
ning the analysis. Instead, they apply the data mining tech- Viral hook An inducement that causes someone to share an
nique to the data and observe the results. With this method, ad, link, file, picture, movie, or other resource with friends
analysts create hypotheses after the analysis to explain the and associates over the Internet. 296
patterns found. 359
Virtual machines (vm) Computer programs that present the
URL (Uniform Resource Locator) An address on the appearance of an independent operating system within a
Internet. Consists of a protocol followed by a domain name second host operating system. The host can support mul-
or public IP address. 219 tiple virtual machines, possibly running different operating
Use increases value The concept that the more people use system programs (Windows, Linux), each of which is as-
a site, the more value it has, and the more people will visit. signed assets such as disk space, devices, and network con-
Furthermore, the more value a site has, the more existing nections over which it has control. 129
users will return. 309 Virtual meetings Meetings in which participants do not meet
User tier In the three-tier architecture, the tier that consists in the same place and possibly not at the same time. 49
of computers, phones, and other mobile devices that have Virtual private cloud (VPC) A subset of a public cloud that
browsers and request or process Web pages and other has highly restricted, secure access. 233
services. 220
Virtual private network (VPN) A WAN connection alterna-
User-generated content (UGC) Content on an organiza- tive that uses the Internet or a private internet to create the
tion’s social media presence that is contributed by nonem- appearance of private point-to-point connections. In the IT
ployee users. 321 world, the term virtual means something that appears to exist
Users Individuals and organizations that use social media that does not exist in fact. Here a VPN uses the public Internet
sites to build social relationships. 295 to create the appearance of a private connection. 231