|
|
||
|
Term |
Definition |
| validation | The process of checking user data entry against the keystroke filters you specify in the screen editor. Validation generally occurs when a user tabs out of a field. Validation also occurs for all fields on a screen at screen exit. |
| value judgement | When a question has an answer that is in a continuous range a value judgement as a way of providing a single often numerical answer. E.g. how good is our hotel on a scale of one to four |
| vector based graphics | mathematical method for storing pictures uses less space than BITMAPS and has other advantages |
| Verification | This is the process of verifying the accuracy of the data entered into a computer database. The most effective method is to use the double entry technique. One data entry clerk will enter the data for a study into a database and another data entry clerk will re-enter the same data on another occasion. The computer will automatically indicate if an error has occurred. A list of errors can be produced at the end of the second entry process and a Data Manager will determine which entry is correct and the database will be amended accordingly. |
| Veronica | (Very Easy Rodent Oriented Net-wide Index to Computerized Archives) -- Developed at the University of Nevada, Veronica is a constantly updated database of the names of almost every menu item on thousands of gopher servers. The Veronica database can be searched from most major gopher menus. |
| video conferencing | Video conferencing allows individuals at separate locations to see and hear each other, conduct meetings, and work together using interactive television- like video and audio technology. |
| virus | A self-replicating code segment that must be attached to a host executable. When the host is executed, the virus code also executes. If possible, the virus will replicate by attaching a copy of itself to another executable. The virus may include an additional "payload" that triggers when specific conditions are met. |
| VPN | (Virtual Private Network) -- Usually refers to a network in which some of the parts are connected using the public Internet, but the data sent across the Internet is encrypted, so the entire network is "virtually" private. |