Knowledge

User (computing)

Source 📝

75: 44: 252:
are created to represent the types of users. It is sometimes specified for each persona which types of user interfaces it is comfortable with (due to previous experience or the interface's inherent simplicity), and what technical expertise and degree of knowledge it has in specific fields or
264:
discipline blurs the typical distinction between users and developers. It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language.
634:
Ko, Andrew J.; Abraham, Robin; Beckwith, Laura; Blackwell, Alan; Burnett, Margaret; Erwig, Martin; Scaffidi, Chris; Lawrance, Joseph; Lieberman, Henry; Myers, Brad; Rosson, Mary Beth; Rothermel, Gregg; Shaw, Mary; Wiedenbeck, Susan (April 2011).
257:. When few constraints are imposed on the end-user category, especially when designing programs for use by the general public, it is common practice to expect minimal technical expertise or previous training in end users. 372:, which contains basic information provided by the account's owner. The files stored in the home directory (and all other directories in the system) have file system permissions which are inspected by the 379:
While systems expect most user accounts to be used by only a single person, many systems have a special account intended to allow anyone to use the system, such as the username "anonymous" for
905: 323:
Once the user has logged on, the operating system will often use an identifier such as an integer to refer to them, rather than their username, through a process known as
296:
resources provided by or connected to that system; however, authentication does not imply authorization. To log into an account, a user is typically required to
229:. The term is used to abstract and distinguish those who only use the software from the developers of the system, who enhance the software for end users. In 667: 453:
stated that "One of the horrible words we use is 'users'. I am on a crusade to get rid of the word 'users'. I would prefer to call them 'people'."
708: 935: 456:
The term "user" may imply lack of the technical expertise required to fully understand how computer systems and software products work.
513:, a technique that allows people who are not professional developers to perform programming tasks, i.e. to create or modify software. 897: 418:, user passwords can be managed within the Credential Manager program. The passwords are located in the Windows profile directory. 80: 684: 826: 79: 793: 765: 636: 376:
to determine which users are granted access to read or execute a file, or to store a new file in that directory.
962: 249: 183: 97: 81: 217:) of a software product. The end user stands in contrast to users who support or maintain the product such as 449:
Some usability professionals have expressed their dislike of the term "user" and have proposed changing it.
967: 158: 364:
pertaining exclusively to that user's activities, which is protected from access by other users (though a
478: 35: 516: 706:
User-Centered Design: A Case Study on Its Application to the Tactical Tomahawk Weapons Control System.
233:, it also distinguishes the software operator from the client who pays for its development and other 17: 245:, and refers to a relevant subset of characteristics that most expected users would have in common. 426:
Various computer operating-systems and applications expect/enforce different rules for the format.
78: 850: 234: 779: 705: 222: 352:
systems have such a concept, and require users to identify themselves before using the system.
927: 523:), a contract between a supplier of software and its purchaser, granting the right to use it. 465: 238: 214: 510: 461: 365: 324: 261: 230: 8: 610: 317: 226: 659: 498: 408: 31: 972: 504: 430: 415: 313: 127: 107: 751: 342:
Computer systems operate in one of two types based on what kind of users they have:
663: 651: 373: 180: 151: 122: 66: 48: 712: 556: 541: 332: 729: 810: 483: 357: 293: 285: 273: 242: 198:). Some software products provide services to other systems and have no direct 840: 460:
use advanced features of programs, though they are not necessarily capable of
956: 536: 397: 380: 361: 289: 117: 56: 655: 403: 369: 297: 132: 876: 827:"Words Matter. Talk About People: Not Customers, Not Consumers, Not Users" 871: 305: 269: 144: 112: 561: 551: 546: 457: 450: 349: 309: 254: 493: 102: 30:"Username" redirects here. Within Knowledge, "Username" may refer to 437:
User Principal Name (UPN) format – for example: UserName@Example.com
501:, systems in which non-programmers can create working applications. 488: 346:
Single-user systems do not have a concept of several user accounts.
301: 210: 199: 176: 845: 531: 52: 766:"[Solved] Where Are Passwords Stored in Windows 10/11" 685:"Understanding Organizational Stakeholders for Design Success" 237:
who may not directly use the software, but help establish its
43: 780:"Password Storage Locations For Popular Windows Applications" 526: 218: 440:
Down-Level Logon Name format – for example: DOMAIN\UserName
392: 328: 633: 507:, a collection of data developed by individual end-users. 356:
Each user account on a multi-user system typically has a
241:. This abstraction is primarily useful in designing the 637:"The State of the Art in End-User Software Engineering" 368:
may have access). User accounts often contain a public
809:
The down-level logon name format is used to specify a
433:
environments, for example, note the potential use of:
34:. For information on altering your own username, see 395:
systems, local user accounts are stored in the file
213:are the ultimate human users (also referred to as 833: 954: 928:"Windows Confidential: Power to the Power User" 77: 383:and the username "guest" for a guest account. 704:Rigsbee, Sarah, and William B. Fitzpatrick. " 152: 55:, a user is often represented by an abstract 27:Person who uses a computer or network service 841:"Don Norman at UX Week 2008 © Adaptive Path" 752:"What is /etc/passwd and /etc/shadow files" 331:systems, the username is correlated with a 824: 159: 145: 401:, while user passwords may be stored at 42: 288:to a system and potentially to receive 14: 955: 609:, which is derived from the identical 190:and is identified to the system by a 925: 813:and a user account in that domain . 800:. Developer technologies. Microsoft 386: 24: 865: 717:Johns Hopkins APL Technical Digest 673:from the original on 1 April 2011. 421: 284:A user's account allows a user to 73: 25: 984: 908:from the original on Jun 27, 2015 581:Other terms for username include 938:from the original on Apr 4, 2015 919: 890: 853:from the original on 2021-12-21 825:Don Norman (17 November 2008). 818: 279: 786: 772: 758: 744: 722: 698: 677: 627: 575: 444: 13: 1: 620: 7: 471: 205: 175:is a person who utilizes a 36:Knowledge:Changing username 10: 989: 926:Chen, Raymond (Feb 2012). 517:End-user license agreement 479:1% rule (Internet culture) 276:have no direct end users. 29: 248:In user-centered design, 568: 656:10.1145/1922649.1922658 272:is another system or a 223:database administrators 186:. A user often has a 84: 60: 963:Computing terminology 644:ACM Computing Surveys 466:system administration 83: 46: 898:"Power Users' Guide" 511:End-user development 462:computer programming 366:system administrator 360:, in which to store 325:identity correlation 308:for the purposes of 262:end-user development 231:user-centered design 227:computer technicians 968:Identity management 794:"User Name Formats" 730:"What is end user?" 719:31.1 (2012): 76–82. 611:citizens band radio 318:resource management 711:2017-10-14 at the 499:End-user computing 98:Process management 85: 61: 32:Knowledge:Username 849:. February 2010. 505:End-user database 431:Microsoft Windows 416:Microsoft Windows 169: 168: 108:Memory management 67:Operating systems 16:(Redirected from 980: 947: 946: 944: 943: 923: 917: 916: 914: 913: 894: 888: 887: 885: 883: 869: 863: 862: 860: 858: 837: 831: 830: 822: 816: 815: 806: 805: 790: 784: 783: 776: 770: 769: 762: 756: 755: 748: 742: 741: 739: 737: 732:. September 1996 726: 720: 702: 696: 695: 693: 692: 681: 675: 674: 672: 641: 631: 614: 579: 406: 400: 387:Password storage 374:operating system 161: 154: 147: 76: 63: 62: 49:computer program 21: 988: 987: 983: 982: 981: 979: 978: 977: 953: 952: 951: 950: 941: 939: 924: 920: 911: 909: 902:SAP Help Portal 896: 895: 891: 881: 879: 875: 870: 866: 856: 854: 839: 838: 834: 823: 819: 803: 801: 792: 791: 787: 778: 777: 773: 764: 763: 759: 754:. 7 March 2021. 750: 749: 745: 735: 733: 728: 727: 723: 713:Wayback Machine 703: 699: 690: 688: 683: 682: 678: 670: 639: 632: 628: 623: 618: 617: 580: 576: 571: 566: 557:User experience 542:Registered user 474: 447: 424: 422:Username format 402: 396: 389: 333:user identifier 316:, logging, and 300:oneself with a 282: 208: 165: 90:Common features 82: 74: 39: 28: 23: 22: 15: 12: 11: 5: 986: 976: 975: 970: 965: 949: 948: 918: 889: 864: 832: 817: 785: 771: 757: 743: 721: 697: 676: 625: 624: 622: 619: 616: 615: 573: 572: 570: 567: 565: 564: 559: 554: 549: 544: 539: 534: 529: 524: 514: 508: 502: 496: 491: 486: 484:Anonymous post 481: 475: 473: 470: 446: 443: 442: 441: 438: 423: 420: 388: 385: 358:home directory 354: 353: 347: 281: 278: 274:software agent 268:Systems whose 243:user interface 207: 204: 167: 166: 164: 163: 156: 149: 141: 138: 137: 136: 135: 130: 125: 120: 118:Device drivers 115: 110: 105: 100: 92: 91: 87: 86: 70: 69: 26: 9: 6: 4: 3: 2: 985: 974: 971: 969: 966: 964: 961: 960: 958: 937: 933: 929: 922: 907: 903: 899: 893: 878: 873: 868: 852: 848: 847: 842: 836: 828: 821: 814: 812: 799: 795: 789: 781: 775: 767: 761: 753: 747: 731: 725: 718: 714: 710: 707: 701: 686: 680: 669: 665: 661: 657: 653: 649: 645: 638: 630: 626: 612: 608: 604: 600: 596: 592: 588: 584: 578: 574: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 522: 518: 515: 512: 509: 506: 503: 500: 497: 495: 492: 490: 487: 485: 482: 480: 477: 476: 469: 467: 463: 459: 454: 452: 439: 436: 435: 434: 432: 427: 419: 417: 412: 410: 405: 399: 394: 384: 382: 381:anonymous FTP 377: 375: 371: 367: 363: 359: 351: 348: 345: 344: 343: 340: 338: 334: 330: 326: 321: 319: 315: 311: 307: 303: 299: 295: 291: 290:authorization 287: 277: 275: 271: 266: 263: 258: 256: 251: 246: 244: 240: 236: 232: 228: 224: 220: 216: 212: 203: 201: 197: 193: 189: 185: 182: 178: 174: 162: 157: 155: 150: 148: 143: 142: 140: 139: 134: 131: 129: 126: 124: 121: 119: 116: 114: 111: 109: 106: 104: 101: 99: 96: 95: 94: 93: 89: 88: 72: 71: 68: 65: 64: 58: 54: 50: 45: 41: 37: 33: 19: 940:. Retrieved 931: 921: 910:. Retrieved 901: 892: 880:. Retrieved 867: 855:. Retrieved 844: 835: 820: 808: 802:. Retrieved 797: 788: 774: 760: 746: 734:. Retrieved 724: 716: 700: 689:. Retrieved 687:. 2004-05-06 679: 647: 643: 629: 606: 602: 598: 595:account name 594: 590: 586: 582: 577: 520: 455: 448: 428: 425: 413: 390: 378: 370:user profile 355: 341: 336: 322: 298:authenticate 286:authenticate 283: 280:User account 267: 259: 247: 239:requirements 235:stakeholders 209: 195: 191: 188:user account 187: 172: 170: 133:Input/output 59:of a person. 40: 882:November 7, 872:Jargon File 736:November 7, 650:(3): 1–44. 591:screen name 458:Power users 445:Terminology 404:/etc/shadow 398:/etc/passwd 306:credentials 255:disciplines 113:File system 957:Categories 942:2015-01-14 912:2015-01-14 874:entry for 857:8 November 804:2016-01-11 691:2016-08-31 621:References 587:screenname 583:login name 562:User space 552:User agent 547:User error 451:Don Norman 350:Multi-user 310:accounting 123:Networking 103:Interrupts 932:Microsoft 494:Pseudonym 304:or other 215:operators 211:End users 200:end users 196:user name 47:Within a 18:User name 973:Consumer 936:Archived 906:Archived 851:Archived 709:Archived 668:Archived 599:nickname 537:Nickname 489:Prosumer 472:See also 314:security 302:password 250:personas 206:End user 192:username 177:computer 128:Security 846:YouTube 664:9435548 532:Namechk 407:in its 337:user ID 184:service 181:network 53:website 877:"User" 811:domain 662:  607:handle 605:) and 411:form. 409:hashed 294:access 219:sysops 671:(PDF) 660:S2CID 640:(PDF) 613:term. 569:Notes 527:Luser 362:files 327:. In 270:actor 884:2010 859:2010 798:MSDN 738:2010 603:nick 601:(or 589:(or 521:EULA 464:and 393:Unix 329:Unix 260:The 225:and 194:(or 173:user 57:icon 652:doi 593:), 429:In 414:On 391:On 335:or 292:to 179:or 51:or 959:: 934:. 930:. 904:. 900:. 843:. 807:. 796:. 666:. 658:. 648:43 646:. 642:. 597:, 585:, 468:. 339:. 320:. 312:, 221:, 202:. 171:A 945:. 915:. 886:. 861:. 829:. 782:. 768:. 740:. 715:" 694:. 654:: 519:( 160:e 153:t 146:v 38:. 20:)

Index

User name
Knowledge:Username
Knowledge:Changing username

computer program
website
icon
Operating systems
Process management
Interrupts
Memory management
File system
Device drivers
Networking
Security
Input/output
v
t
e
computer
network
service
end users
End users
operators
sysops
database administrators
computer technicians
user-centered design
stakeholders

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.