User (computing)
Operating systems |
---|
Common features |
A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name).[a] Some software products provide services to other systems and have no direct end users.
End user
In user-centered design,
The end-user development discipline blurs the typical distinction between users and developers. It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language.
Systems whose actor is another system or a software agent have no direct end users.
User account
A user's account allows a user to
.Once the user has logged on, the operating system will often use an identifier such as an integer to refer to them, rather than their username, through a process known as identity correlation. In Unix systems, the username is correlated with a user identifier or user ID.
Computer systems operate in one of two types based on what kind of users they have:
- Single-user systems do not have a concept of several user accounts.
- Multi-usersystems have such a concept, and require users to identify themselves before using the system.
Each user account on a multi-user system typically has a home directory, in which to store files pertaining exclusively to that user's activities, which is protected from access by other users (though a system administrator may have access). User accounts often contain a public user profile, which contains basic information provided by the account's owner. The files stored in the home directory (and all other directories in the system) have file system permissions which are inspected by the operating system to determine which users are granted access to read or execute a file, or to store a new file in that directory.
While systems expect most user accounts to be used by only a single person, many systems have a special account intended to allow anyone to use the system, such as the username "anonymous" for
Password storage
On
On Microsoft Windows, user passwords can be accessed within the Credential Manager program.[6] These passwords are located in the Windows profile directory[7]
Username format
Various computer operating-systems and applications expect/enforce different rules for the format.
In Microsoft Windows environments, for example, note the potential use of:[8]
- User Principal Name (UPN) format – for example: [email protected]
- Down-Level Logon Name format – for example: DOMAIN\UserName
Terminology
Some usability professionals have expressed their dislike of the term "user" and have proposed changing it.[9] Don Norman stated that "One of the horrible words we use is 'users'. I am on a crusade to get rid of the word 'users'. I would prefer to call them 'people'."[10]
The term "user" may imply lack of the technical expertise required to fully understand how computer systems and software products work.
See also
- 1% rule (Internet culture)
- Anonymous post
- Prosumer
- Pseudonym
- End-user computing, systems in which non-programmers can create working applications.
- End-user database, a collection of data developed by individual end-users.
- End-user development, a technique that allows people who are not professional developers to perform programming tasks, i.e. to create or modify software.
- End-user license agreement (EULA), a contract between a supplier of software and its purchaser, granting the right to use it.
- Luser
- Namechk
- nickname
- Registered user
- User error
- User agent
- User experience
- User space
Notes
- ^ Other terms for username include login name, screenname (or screen name), account name, nickname (or nick) and handle, which is derived from the identical citizens band radio term.[citation needed]
References
- (PDF) from the original on 1 April 2011.
- ^ "Understanding Organizational Stakeholders for Design Success". 2004-05-06. Retrieved 2016-08-31.
- ^ Rigsbee, Sarah, and William B. Fitzpatrick. "User-Centered Design: A Case Study on Its Application to the Tactical Tomahawk Weapons Control System. Archived 2017-10-14 at the Wayback Machine"Johns Hopkins APL Technical Digest 31.1 (2012): 76–82.
- ^ "What is end user?". September 1996. Retrieved November 7, 2010.
- ^ "What is /etc/passwd and /etc/shadow files". 7 March 2021.
- ^ "[Solved] Where Are Passwords Stored in Windows 10/11".
- ^ "Password Storage Locations For Popular Windows Applications".
- ^
"User Name Formats". MSDN. Developer technologies. Microsoft. Retrieved 2016-01-11.
The down-level logon name format is used to specify a domain and a user account in that domain [...].
- ^ Don Norman (17 November 2008). "Words Matter. Talk About People: Not Customers, Not Consumers, Not Users".
- ^ "Don Norman at UX Week 2008 © Adaptive Path". YouTube. Archived from the original on 2021-12-21. Retrieved 8 November 2010.
- ^ Jargon File entry for "User". Retrieved November 7, 2010.
- ^ "Power Users' Guide". SAP Help Portal. Archived from the original on Jun 27, 2015. Retrieved 2015-01-14.
- ^ Chen, Raymond (Feb 2012). "Windows Confidential: Power to the Power User". Microsoft. Archived from the original on Apr 4, 2015. Retrieved 2015-01-14.