Knowledge

User (computing)

Source 📝

75: 44: 252:
are created to represent the types of users. It is sometimes specified for each persona which types of user interfaces it is comfortable with (due to previous experience or the interface's inherent simplicity), and what technical expertise and degree of knowledge it has in specific fields or
264:
discipline blurs the typical distinction between users and developers. It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language.
636:
Ko, Andrew J.; Abraham, Robin; Beckwith, Laura; Blackwell, Alan; Burnett, Margaret; Erwig, Martin; Scaffidi, Chris; Lawrance, Joseph; Lieberman, Henry; Myers, Brad; Rosson, Mary Beth; Rothermel, Gregg; Shaw, Mary; Wiedenbeck, Susan (April 2011).
257:. When few constraints are imposed on the end-user category, especially when designing programs for use by the general public, it is common practice to expect minimal technical expertise or previous training in end users. 372:, which contains basic information provided by the account's owner. The files stored in the home directory (and all other directories in the system) have file system permissions which are inspected by the 379:
While systems expect most user accounts to be used by only a single person, many systems have a special account intended to allow anyone to use the system, such as the username "anonymous" for
907: 323:
Once the user has logged on, the operating system will often use an identifier such as an integer to refer to them, rather than their username, through a process known as
296:
resources provided by or connected to that system; however, authentication does not imply authorization. To log into an account, a user is typically required to
229:. The term is used to abstract and distinguish those who only use the software from the developers of the system, who enhance the software for end users. In 669: 455:
stated that "One of the horrible words we use is 'users'. I am on a crusade to get rid of the word 'users'. I would prefer to call them 'people'."
710: 937: 458:
The term "user" may imply lack of the technical expertise required to fully understand how computer systems and software products work.
515:, a technique that allows people who are not professional developers to perform programming tasks, i.e. to create or modify software. 899: 418:, user passwords can be managed within the Credential Manager program. The passwords are located in the Windows profile directory. 438: 80: 686: 828: 79: 795: 767: 638: 376:
to determine which users are granted access to read or execute a file, or to store a new file in that directory.
964: 249: 183: 97: 81: 217:) of a software product. The end user stands in contrast to users who support or maintain the product such as 451:
Some usability professionals have expressed their dislike of the term "user" and have proposed changing it.
969: 158: 364:
pertaining exclusively to that user's activities, which is protected from access by other users (though a
480: 35: 518: 708:
User-Centered Design: A Case Study on Its Application to the Tactical Tomahawk Weapons Control System.
233:, it also distinguishes the software operator from the client who pays for its development and other 17: 245:, and refers to a relevant subset of characteristics that most expected users would have in common. 426:
Various computer operating-systems and applications expect/enforce different rules for the format.
78: 852: 234: 781: 707: 222: 352:
systems have such a concept, and require users to identify themselves before using the system.
929: 525:), a contract between a supplier of software and its purchaser, granting the right to use it. 467: 238: 214: 512: 463: 365: 324: 261: 230: 8: 612: 317: 226: 661: 500: 408: 31: 974: 506: 430: 415: 313: 127: 107: 753: 342:
Computer systems operate in one of two types based on what kind of users they have:
665: 653: 373: 180: 151: 122: 66: 48: 714: 558: 543: 332: 731: 812: 485: 357: 293: 285: 273: 242: 198:). Some software products provide services to other systems and have no direct 842: 462:
use advanced features of programs, though they are not necessarily capable of
958: 538: 397: 380: 361: 289: 117: 56: 657: 403: 369: 297: 132: 878: 829:"Words Matter. Talk About People: Not Customers, Not Consumers, Not Users" 873: 305: 269: 144: 112: 563: 553: 548: 459: 452: 349: 309: 254: 495: 102: 30:"Username" redirects here. Within Knowledge, "Username" may refer to 503:, systems in which non-programmers can create working applications. 490: 346:
Single-user systems do not have a concept of several user accounts.
301: 210: 199: 176: 847: 533: 52: 768:"[Solved] Where Are Passwords Stored in Windows 10/11" 687:"Understanding Organizational Stakeholders for Design Success" 237:
who may not directly use the software, but help establish its
43: 782:"Password Storage Locations For Popular Windows Applications" 528: 218: 442:
Down-Level Logon Name format – for example: DOMAIN\UserName
392: 328: 635: 509:, a collection of data developed by individual end-users. 356:
Each user account on a multi-user system typically has a
241:. This abstraction is primarily useful in designing the 639:"The State of the Art in End-User Software Engineering" 368:
may have access). User accounts often contain a public
811:
The down-level logon name format is used to specify a
433:
environments, for example, note the potential use of:
34:. For information on altering your own username, see 395:
systems, local user accounts are stored in the file
213:are the ultimate human users (also referred to as 835: 956: 437:User Principal Name (UPN) format – for example: 930:"Windows Confidential: Power to the Power User" 77: 383:and the username "guest" for a guest account. 706:Rigsbee, Sarah, and William B. Fitzpatrick. " 152: 55:, a user is often represented by an abstract 27:Person who uses a computer or network service 843:"Don Norman at UX Week 2008 © Adaptive Path" 754:"What is /etc/passwd and /etc/shadow files" 331:systems, the username is correlated with a 826: 159: 145: 401:, while user passwords may be stored at 42: 288:to a system and potentially to receive 14: 957: 611:, which is derived from the identical 190:and is identified to the system by a 927: 815:and a user account in that domain . 802:. Developer technologies. Microsoft 386: 24: 867: 719:Johns Hopkins APL Technical Digest 675:from the original on 1 April 2011. 421: 284:A user's account allows a user to 73: 25: 986: 910:from the original on Jun 27, 2015 583:Other terms for username include 940:from the original on Apr 4, 2015 921: 892: 855:from the original on 2021-12-21 827:Don Norman (17 November 2008). 820: 279: 788: 774: 760: 746: 724: 700: 679: 629: 577: 446: 13: 1: 622: 7: 473: 205: 175:is a person who utilizes a 36:Knowledge:Changing username 10: 991: 928:Chen, Raymond (Feb 2012). 519:End-user license agreement 481:1% rule (Internet culture) 276:have no direct end users. 29: 248:In user-centered design, 570: 658:10.1145/1922649.1922658 272:is another system or a 223:database administrators 186:. A user often has a 84: 60: 965:Computing terminology 646:ACM Computing Surveys 468:system administration 83: 46: 900:"Power Users' Guide" 513:End-user development 464:computer programming 366:system administrator 360:, in which to store 325:identity correlation 308:for the purposes of 262:end-user development 231:user-centered design 227:computer technicians 970:Identity management 796:"User Name Formats" 732:"What is end user?" 721:31.1 (2012): 76–82. 613:citizens band radio 318:resource management 713:2017-10-14 at the 501:End-user computing 98:Process management 85: 61: 32:Knowledge:Username 851:. February 2010. 507:End-user database 431:Microsoft Windows 416:Microsoft Windows 169: 168: 108:Memory management 67:Operating systems 16:(Redirected from 982: 949: 948: 946: 945: 925: 919: 918: 916: 915: 896: 890: 889: 887: 885: 871: 865: 864: 862: 860: 839: 833: 832: 824: 818: 817: 808: 807: 792: 786: 785: 778: 772: 771: 764: 758: 757: 750: 744: 743: 741: 739: 734:. September 1996 728: 722: 704: 698: 697: 695: 694: 683: 677: 676: 674: 643: 633: 616: 581: 406: 400: 387:Password storage 374:operating system 161: 154: 147: 76: 63: 62: 49:computer program 21: 990: 989: 985: 984: 983: 981: 980: 979: 955: 954: 953: 952: 943: 941: 926: 922: 913: 911: 904:SAP Help Portal 898: 897: 893: 883: 881: 877: 872: 868: 858: 856: 841: 840: 836: 825: 821: 805: 803: 794: 793: 789: 780: 779: 775: 766: 765: 761: 756:. 7 March 2021. 752: 751: 747: 737: 735: 730: 729: 725: 715:Wayback Machine 705: 701: 692: 690: 685: 684: 680: 672: 641: 634: 630: 625: 620: 619: 582: 578: 573: 568: 559:User experience 544:Registered user 476: 449: 424: 422:Username format 402: 396: 389: 333:user identifier 316:, logging, and 300:oneself with a 282: 208: 165: 90:Common features 82: 74: 39: 28: 23: 22: 15: 12: 11: 5: 988: 978: 977: 972: 967: 951: 950: 920: 891: 866: 834: 819: 787: 773: 759: 745: 723: 699: 678: 627: 626: 624: 621: 618: 617: 575: 574: 572: 569: 567: 566: 561: 556: 551: 546: 541: 536: 531: 526: 516: 510: 504: 498: 493: 488: 486:Anonymous post 483: 477: 475: 472: 448: 445: 444: 443: 440: 423: 420: 388: 385: 358:home directory 354: 353: 347: 281: 278: 274:software agent 268:Systems whose 243:user interface 207: 204: 167: 166: 164: 163: 156: 149: 141: 138: 137: 136: 135: 130: 125: 120: 118:Device drivers 115: 110: 105: 100: 92: 91: 87: 86: 70: 69: 26: 9: 6: 4: 3: 2: 987: 976: 973: 971: 968: 966: 963: 962: 960: 939: 935: 931: 924: 909: 905: 901: 895: 880: 875: 870: 854: 850: 849: 844: 838: 830: 823: 816: 814: 801: 797: 791: 783: 777: 769: 763: 755: 749: 733: 727: 720: 716: 712: 709: 703: 688: 682: 671: 667: 663: 659: 655: 651: 647: 640: 632: 628: 614: 610: 606: 602: 598: 594: 590: 586: 580: 576: 565: 562: 560: 557: 555: 552: 550: 547: 545: 542: 540: 537: 535: 532: 530: 527: 524: 520: 517: 514: 511: 508: 505: 502: 499: 497: 494: 492: 489: 487: 484: 482: 479: 478: 471: 469: 465: 461: 456: 454: 441: 439: 436: 435: 434: 432: 427: 419: 417: 412: 410: 405: 399: 394: 384: 382: 381:anonymous FTP 377: 375: 371: 367: 363: 359: 351: 348: 345: 344: 343: 340: 338: 334: 330: 326: 321: 319: 315: 311: 307: 303: 299: 295: 291: 290:authorization 287: 277: 275: 271: 266: 263: 258: 256: 251: 246: 244: 240: 236: 232: 228: 224: 220: 216: 212: 203: 201: 197: 193: 189: 185: 182: 178: 174: 162: 157: 155: 150: 148: 143: 142: 140: 139: 134: 131: 129: 126: 124: 121: 119: 116: 114: 111: 109: 106: 104: 101: 99: 96: 95: 94: 93: 89: 88: 72: 71: 68: 65: 64: 58: 54: 50: 45: 41: 37: 33: 19: 942:. Retrieved 933: 923: 912:. Retrieved 903: 894: 882:. Retrieved 869: 857:. Retrieved 846: 837: 822: 810: 804:. Retrieved 799: 790: 776: 762: 748: 736:. Retrieved 726: 718: 702: 691:. Retrieved 689:. 2004-05-06 681: 649: 645: 631: 608: 604: 600: 597:account name 596: 592: 588: 584: 579: 522: 457: 450: 428: 425: 413: 390: 378: 370:user profile 355: 341: 336: 322: 298:authenticate 286:authenticate 283: 280:User account 267: 259: 247: 239:requirements 235:stakeholders 209: 195: 191: 188:user account 187: 172: 170: 133:Input/output 59:of a person. 40: 884:November 7, 874:Jargon File 738:November 7, 652:(3): 1–44. 593:screen name 460:Power users 447:Terminology 404:/etc/shadow 398:/etc/passwd 306:credentials 255:disciplines 113:File system 959:Categories 944:2015-01-14 914:2015-01-14 876:entry for 859:8 November 806:2016-01-11 693:2016-08-31 623:References 589:screenname 585:login name 564:User space 554:User agent 549:User error 453:Don Norman 350:Multi-user 310:accounting 123:Networking 103:Interrupts 934:Microsoft 496:Pseudonym 304:or other 215:operators 211:End users 200:end users 196:user name 47:Within a 18:Usernames 975:Consumer 938:Archived 908:Archived 853:Archived 711:Archived 670:Archived 601:nickname 539:Nickname 491:Prosumer 474:See also 314:security 302:password 250:personas 206:End user 192:username 177:computer 128:Security 848:YouTube 666:9435548 534:Namechk 407:in its 337:user ID 184:service 181:network 53:website 879:"User" 813:domain 664:  609:handle 607:) and 411:form. 409:hashed 294:access 219:sysops 673:(PDF) 662:S2CID 642:(PDF) 615:term. 571:Notes 529:Luser 362:files 327:. In 270:actor 886:2010 861:2010 800:MSDN 740:2010 605:nick 603:(or 591:(or 523:EULA 466:and 393:Unix 329:Unix 260:The 225:and 194:(or 173:user 57:icon 654:doi 595:), 429:In 414:On 391:On 335:or 292:to 179:or 51:or 961:: 936:. 932:. 906:. 902:. 845:. 809:. 798:. 668:. 660:. 650:43 648:. 644:. 599:, 587:, 470:. 339:. 320:. 312:, 221:, 202:. 171:A 947:. 917:. 888:. 863:. 831:. 784:. 770:. 742:. 717:" 696:. 656:: 521:( 160:e 153:t 146:v 38:. 20:)

Index

Usernames
Knowledge:Username
Knowledge:Changing username

computer program
website
icon
Operating systems
Process management
Interrupts
Memory management
File system
Device drivers
Networking
Security
Input/output
v
t
e
computer
network
service
end users
End users
operators
sysops
database administrators
computer technicians
user-centered design
stakeholders

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.