V

value axis

In spreadsheet programs, refers to the (usually) vertical axis in charts and graphs that shows the values being measured or compared. For clarity, refer to it as the value (y) axis on first mention. On subsequent mention, it is all right to use y-axis. You can also use vertical (y) axis in content for novice computer users. See also category axis.

VCR

Abbreviation for video cassette recorder. Don’t spell out.

versus, vs.

In headings, use the abbreviation vs., all lowercase. In text, spell out as versus.

Microsoft style (in headings)

Daily vs. weekly backups

VGA

Do not spell out VGA and related graphics specifications such as SVGA, XGA, UXGA, SXGA, and QXGA.

Do not use VGA+ to describe graphics specifications of higher resolution than VGA; there is no such thing.

It is all right to use the abbreviation for a graphics specification as a modifier for a graphics device such as a card or a monitor. See also Chapter 11.

Microsoft style

QXGA video card

SVGA monitor

VGA device

vibration

Refers to physical feedback provided by a controller’s motor. Do not use rumble.

video adapter

Obsolete term. Use video card instead.

video board

Do not use. Use video card instead.

video card

Use instead of video adapter or display adapter to describe the hardware that converts image data into electronic signals processed by a computer monitor. Do not use graphics adapter, graphics card, or graphics board.

video display

Do not use. Use screen to refer to the graphic portion of a monitor and display to refer generically to a visual output device. See also display, screen.

video driver

Use to describe the software that sends image data to a video card.

video game, video-game

Two words. Hyphenate as an adjective.

viewport

One word. Refers to a view of a document or image in computer graphics programs.

virtual

Do not use in content for a general audience unless you have no other choice.

In other content, use to describe a device or service that appears to the user as something that it actually is not or that does not physically exist. For example, a virtual disk performs like a physical disk but is actually a part of the computer’s memory. Some other virtual devices or services are virtual machine, virtual memory, and virtual desktop. Use the term only to refer to a specific element.

virtual root

All right to use to refer to the root directory that the user sees when connected to an Internet server. It is actually a pointer to the actual root directory. Do not use virtual directory as a synonym.

virtual server

All right to use in content for a technical audience to refer to a server that appears to a browser like a physical server. Sometimes used as a synonym for website. In that case, use website instead if possible.

virtualize

Do not use in content for a general audience.

In content for a technical audience, do not use as a synonym for simulate. If you must use virtualize, use it only to mean creating a virtual implementation. For example, “to virtualize storage” would mean to create virtual storage, which makes many physical storage devices appear to be one device.

visit

In the context of the Internet, use visit only to talk about going to a website for the purpose of spending time at that site. You may also use go to in this context.

To talk about going to a specific webpage, use go to.

Microsoft style

Visit our website at www.microsoft.com.

For information about Windows and Microsoft .NET programming, visit the Microsoft Developer Network Website.

When you visit a retail website, you can often put items that you want to purchase into a shopping basket.

For information about Windows and Microsoft .NET programming, go to the Microsoft Developer Network Website.

To learn how to convert text to numbers in Microsoft Excel 2002, go to http://support.microsoft.com/default.aspx?scid=kb;en-us;Q291047&sd=tech.

Not Microsoft style

To learn how to convert text to numbers in Microsoft Excel 2003, visit http://support.microsoft.com/default.aspx?scid=kb;en-us;Q291047&sd=tech.

voice mail

Two words. Do not abbreviate as v-mail or vmail.

vulnerability

Refers to any product weakness, administrative process or act, or physical exposure that makes a computer susceptible to exploit by a threat. Because vulnerability covers so many types of security problems, its misuse can easily confuse users on the very sensitive topic of security. Follow the guidelines in this topic to help ensure that your users do not misunderstand the security-related information that you are giving them. See also security.

On first mention, use a modifier to identify what kind of vulnerability you are discussing:

  • Product vulnerability. A set of conditions that violates an implied or explicit security policy. A product vulnerability is usually addressed by a Microsoft security bulletin or a service pack.

  • Administrative vulnerability. Failure to observe administrative best practices, such as when a user uses a weak password or logs on to an account that has more user rights than the user requires to perform a specific task.

  • Physical vulnerability. Failure to provide physical security for a computer, such as when an authorized user leaves an unlocked workstation running in a workspace that is available to unauthorized users.

Microsoft style

Do not expose your system to administrative vulnerabilities. For example, do not log on as an administrator unless you are doing a task that requires the user rights of an administrator.

This security update resolves a product vulnerability in Internet Explorer that could allow remote code execution if the user views a specially crafted webpage.

After the context is established, you can use vulnerability without a modifier on subsequent mention. However, it is a good idea to use the modifier again occasionally in your content.

For other security issues, use the most specific term that describes the issue, and define it if users might be unfamiliar with the term. If there is no specific term, use security issue.

Don’t describe intentionally designed behavior as a vulnerability.

Microsoft style

In Active Directory Domain Services, the administrator of any domain within a forest is trusted to control any other domain within the forest.

Not Microsoft style

There is a vulnerability within Active Directory Domain Services that can allow the administrator of any domain within a forest to gain control of any other domain within the forest.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.2.225