user


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms, Idioms, Wikipedia.
Related to user: User agent

user

[′yü·zər]
(communications)
An individual, installation, or activity having access to a switching center through a local private branch exchange, or by dialing an access code.
(computer science)
Anyone who requires the use of services of a computing system or its products.

user

(person)
Someone doing "real work" with the computer, using it as a means rather than an end. Someone who pays to use a computer. A programmer who will believe anything you tell him. One who asks silly questions without thinking for two seconds or looking in the documentation. Someone who uses a program, however skillfully, without getting into the internals of the program. One who reports bugs instead of just fixing them. See also luser, real user.

Users are looked down on by hackers to some extent because they don't understand the full ramifications of the system in all its glory. The term is relative: a skilled hacker may be a user with respect to some program he himself does not hack. A LISP hacker might be one who maintains LISP or one who uses LISP (but with the skill of a hacker). A LISP user is one who uses LISP, whether skillfully or not. Thus there is some overlap between the two terms; the subtle distinctions must be resolved by context.

user

(jargon)
Any person, organisation, process, device, program, protocol, or system which uses a service provided by others.

The term "client" (as in "client-server" systems) is rather more specific, usually implying two processes communicating via some protocol.

user

An individual who uses a computer or some other equipment. Also called an "end user." The terms "user" and "end user" are synonymous; however, because IT professionals are users themselves when they operate the computer, they may prefer to use "end user" for the target user (employee or customer). See system development life cycle.
References in periodicals archive ?
Users are aware of the name and location of the servers on which their data resides, as they must attach to each machine in order to access files.
Remote access seems to be expanding the potential user population for specific resources that perhaps were previously considered local resources.
In addition to sponsoring discussions, bulletin boards often maintain files for users to download, and the availability of these files is one of the biggest attractions of some systems.
Instant Messaging and Chat Safety Restrictions: Users can only receive instant messages from other users on their Friend list.
Depending on the system's configuration, users may input additional information about themselves into the IM server's user directory.
Imaging and mirroring-based backup solutions also limit users to complete system backups only.
The user assumes a passive role and essentially waits for the librarian to signal interest.
governmental agencies that explain their approaches to making records management non-intrusive to the desktop end user.
Despite the growing number of laptop users and the high-rates of theft and failure associated with laptop use, laptop backup does not yet appear to have risen to the top ranks of IT managers' concerns, according to the survey.
When a user enters the correct password to modify, a second user form comes up asking how the user wants to open the spreadsheet, as read-only or modify.
Despite the generally short nature of user Web queries and search sessions, recent studies are also showing that some users are engaging in more complex Web search interactions.
As the questions and Mike's responses appear in a portion of the computer screen, users see a full-body view of Mike seated in front of them and a close-up of his face in another part of the screen.