fbpx
Wikipedia

User (computing)

A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name).[a] Some software products provide services to other systems and have no direct end users.

Within a computer program or website, a user is often represented by an abstract icon of a person.

End user

End users are the ultimate human users (also referred to as operators) of a software product. The end user stands in contrast to users who support or maintain the product such as sysops, database administrators and computer technicians. The term is used to abstract and distinguish those who only use the software from the developers of the system, who enhance the software for end users.[1] In user-centered design, it also distinguishes the software operator from the client who pays for its development and other stakeholders who may not directly use the software, but help establish its requirements.[2][3] This abstraction is primarily useful in designing the user interface, and refers to a relevant subset of characteristics that most expected users would have in common.

In user-centered design, personas are created to represent the types of users. It is sometimes specified for each persona which types of user interfaces it is comfortable with (due to previous experience or the interface's inherent simplicity), and what technical expertise and degree of knowledge it has in specific fields or disciplines. When few constraints are imposed on the end-user category, especially when designing programs for use by the general public, it is common practice to expect minimal technical expertise or previous training in end users.[4]

The end-user development discipline blurs the typical distinction between users and developers. It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language.

Systems whose actor is another system or a software agent have no direct end users.

User account

A user's account allows a user to authenticate to a system and potentially to receive authorization to access resources provided by or connected to that system; however, authentication does not imply authorization. To log into an account, a user is typically required to authenticate oneself with a password or other credentials for the purposes of accounting, security, logging, and resource management.

Once the user has logged on, the operating system will often use an identifier such as an integer to refer to them, rather than their username, through a process known as identity correlation. In Unix systems, the username is correlated with a user identifier or user ID.

Computer systems operate in one of two types based on what kind of users they have:

  • Single-user systems do not have a concept of several user accounts.
  • Multi-user systems have such a concept, and require users to identify themselves before using the system.

Each user account on a multi-user system typically has a home directory, in which to store files pertaining exclusively to that user's activities, which is protected from access by other users (though a system administrator may have access). User accounts often contain a public user profile, which contains basic information provided by the account's owner. The files stored in the home directory (and all other directories in the system) have file system permissions which are inspected by the operating system to determine which users are granted access to read or execute a file, or to store a new file in that directory.

While systems expect most user accounts to be used by only a single person, many systems have a special account intended to allow anyone to use the system, such as the username "anonymous" for anonymous FTP and the username "guest" for a guest account.

Password storage

On Unix systems, local user accounts are stored in the file /etc/passwd, while user passwords may be stored at /etc/shadow in its hashed form.[5]

On Microsoft Windows, user passwords can be managed within the Credential Manager program.[6][better source needed] The passwords are located in the Windows profile directory.[7]

Username format

Various computer operating-systems and applications expect/enforce different rules for the format.

In Microsoft Windows environments, for example, note the potential use of:[8]

  • User Principal Name (UPN) format – for example: UserName@Example.com
  • Down-Level Logon Name format – for example: DOMAIN\UserName

Terminology

Some usability professionals have expressed their dislike of the term "user" and have proposed changing it.[9] Don Norman stated that "One of the horrible words we use is 'users'. I am on a crusade to get rid of the word 'users'. I would prefer to call them 'people'."[10]

The term "user" may imply lack of the technical expertise required to fully understand how computer systems and software products work.[11] Power users use advanced features of programs, though they are not necessarily capable of computer programming and system administration.[12][13]

See also

Notes

  1. ^ Other terms for username include login name, screenname (or screen name), account name, nickname (or nick) and handle, which is derived from the identical citizens band radio term.[citation needed]

References

  1. ^ Ko, Andrew J.; Abraham, Robin; Beckwith, Laura; Blackwell, Alan; Burnett, Margaret; Erwig, Martin; Scaffidi, Chris; Lawrance, Joseph; Lieberman, Henry; Myers, Brad; Rosson, Mary Beth; Rothermel, Gregg; Shaw, Mary; Wiedenbeck, Susan (April 2011). "The State of the Art in End-User Software Engineering" (PDF). ACM Computing Surveys. 43 (3): 1–44. doi:10.1145/1922649.1922658. S2CID 9435548. (PDF) from the original on 1 April 2011.
  2. ^ "Understanding Organizational Stakeholders for Design Success". 2004-05-06. Retrieved 2016-08-31.
  3. ^ Rigsbee, Sarah, and William B. Fitzpatrick. "User-Centered Design: A Case Study on Its Application to the Tactical Tomahawk Weapons Control System. 2017-10-14 at the Wayback Machine"Johns Hopkins APL Technical Digest 31.1 (2012): 76–82.
  4. ^ "What is end user?". September 1996. Retrieved November 7, 2010.
  5. ^ "What is /etc/passwd and /etc/shadow files". 7 March 2021.
  6. ^ "[Solved] Where Are Passwords Stored in Windows 10/11".
  7. ^ "Password Storage Locations For Popular Windows Applications".
  8. ^ "User Name Formats". MSDN. Developer technologies. Microsoft. Retrieved 2016-01-11. The down-level logon name format is used to specify a domain and a user account in that domain [...].
  9. ^ Don Norman (17 November 2008). "Words Matter. Talk About People: Not Customers, Not Consumers, Not Users".
  10. ^ "Don Norman at UX Week 2008 © Adaptive Path". YouTube. Archived from the original on 2021-12-21. Retrieved 8 November 2010.
  11. ^ Jargon File entry for "User". Retrieved November 7, 2010.
  12. ^ "Power Users' Guide". SAP Help Portal. from the original on Jun 27, 2015. Retrieved 2015-01-14.
  13. ^ Chen, Raymond (Feb 2012). "Windows Confidential: Power to the Power User". Microsoft. from the original on Apr 4, 2015. Retrieved 2015-01-14.

user, computing, within, wikipedia, username, refer, wikipedia, username, information, altering, your, username, wikipedia, changing, username, user, person, utilizes, computer, network, service, user, often, user, account, identified, system, username, user, . Within Wikipedia Username may refer to Wikipedia Username For information on altering your own username see Wikipedia Changing username A user is a person who utilizes a computer or network service A user often has a user account and is identified to the system by a username or user name a Some software products provide services to other systems and have no direct end users Within a computer program or website a user is often represented by an abstract icon of a person Contents 1 End user 2 User account 2 1 Password storage 2 2 Username format 3 Terminology 4 See also 5 Notes 6 ReferencesEnd userEnd users are the ultimate human users also referred to as operators of a software product The end user stands in contrast to users who support or maintain the product such as sysops database administrators and computer technicians The term is used to abstract and distinguish those who only use the software from the developers of the system who enhance the software for end users 1 In user centered design it also distinguishes the software operator from the client who pays for its development and other stakeholders who may not directly use the software but help establish its requirements 2 3 This abstraction is primarily useful in designing the user interface and refers to a relevant subset of characteristics that most expected users would have in common In user centered design personas are created to represent the types of users It is sometimes specified for each persona which types of user interfaces it is comfortable with due to previous experience or the interface s inherent simplicity and what technical expertise and degree of knowledge it has in specific fields or disciplines When few constraints are imposed on the end user category especially when designing programs for use by the general public it is common practice to expect minimal technical expertise or previous training in end users 4 The end user development discipline blurs the typical distinction between users and developers It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language Systems whose actor is another system or a software agent have no direct end users User accountA user s account allows a user to authenticate to a system and potentially to receive authorization to access resources provided by or connected to that system however authentication does not imply authorization To log into an account a user is typically required to authenticate oneself with a password or other credentials for the purposes of accounting security logging and resource management Once the user has logged on the operating system will often use an identifier such as an integer to refer to them rather than their username through a process known as identity correlation In Unix systems the username is correlated with a user identifier or user ID Computer systems operate in one of two types based on what kind of users they have Single user systems do not have a concept of several user accounts Multi user systems have such a concept and require users to identify themselves before using the system Each user account on a multi user system typically has a home directory in which to store files pertaining exclusively to that user s activities which is protected from access by other users though a system administrator may have access User accounts often contain a public user profile which contains basic information provided by the account s owner The files stored in the home directory and all other directories in the system have file system permissions which are inspected by the operating system to determine which users are granted access to read or execute a file or to store a new file in that directory While systems expect most user accounts to be used by only a single person many systems have a special account intended to allow anyone to use the system such as the username anonymous for anonymous FTP and the username guest for a guest account Password storage On Unix systems local user accounts are stored in the file a href Passwd html Password file title Passwd etc passwd a while user passwords may be stored at a href Passwd html Shadow file title Passwd etc shadow a in its hashed form 5 On Microsoft Windows user passwords can be managed within the Credential Manager program 6 better source needed The passwords are located in the Windows profile directory 7 Username format Various computer operating systems and applications expect enforce different rules for the format In Microsoft Windows environments for example note the potential use of 8 User Principal Name UPN format for example UserName Example com Down Level Logon Name format for example DOMAIN UserNameTerminologySome usability professionals have expressed their dislike of the term user and have proposed changing it 9 Don Norman stated that One of the horrible words we use is users I am on a crusade to get rid of the word users I would prefer to call them people 10 The term user may imply lack of the technical expertise required to fully understand how computer systems and software products work 11 Power users use advanced features of programs though they are not necessarily capable of computer programming and system administration 12 13 See also1 rule Internet culture Anonymous post Prosumer Pseudonym End user computing systems in which non programmers can create working applications End user database a collection of data developed by individual end users End user development a technique that allows people who are not professional developers to perform programming tasks i e to create or modify software End user license agreement EULA a contract between a supplier of software and its purchaser granting the right to use it Luser Namechk Nickname Registered user User error User agent User experience User spaceNotes Other terms for username include login name screenname or screen name account name nickname or nick and handle which is derived from the identical citizens band radio term citation needed References Ko Andrew J Abraham Robin Beckwith Laura Blackwell Alan Burnett Margaret Erwig Martin Scaffidi Chris Lawrance Joseph Lieberman Henry Myers Brad Rosson Mary Beth Rothermel Gregg Shaw Mary Wiedenbeck Susan April 2011 The State of the Art in End User Software Engineering PDF ACM Computing Surveys 43 3 1 44 doi 10 1145 1922649 1922658 S2CID 9435548 Archived PDF from the original on 1 April 2011 Understanding Organizational Stakeholders for Design Success 2004 05 06 Retrieved 2016 08 31 Rigsbee Sarah and William B Fitzpatrick User Centered Design A Case Study on Its Application to the Tactical Tomahawk Weapons Control System Archived 2017 10 14 at the Wayback Machine Johns Hopkins APL Technical Digest 31 1 2012 76 82 What is end user September 1996 Retrieved November 7 2010 What is etc passwd and etc shadow files 7 March 2021 Solved Where Are Passwords Stored in Windows 10 11 Password Storage Locations For Popular Windows Applications User Name Formats MSDN Developer technologies Microsoft Retrieved 2016 01 11 The down level logon name format is used to specify a domain and a user account in that domain Don Norman 17 November 2008 Words Matter Talk About People Not Customers Not Consumers Not Users Don Norman at UX Week 2008 c Adaptive Path YouTube Archived from the original on 2021 12 21 Retrieved 8 November 2010 Jargon File entry for User Retrieved November 7 2010 Power Users Guide SAP Help Portal Archived from the original on Jun 27 2015 Retrieved 2015 01 14 Chen Raymond Feb 2012 Windows Confidential Power to the Power User Microsoft Archived from the original on Apr 4 2015 Retrieved 2015 01 14 Retrieved from https en wikipedia org w index php title User computing amp oldid 1217889486, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.