Summary: Difference Between Username and Password is that password is a private combination of characters associated with the user name that allows access to certain computer resources. While A user name is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
Username
A user name is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user. In an Internet e-mail address, an @ (pronounced at) symbol separates the user name from the domain name. Your service provider supplies the domain name. A possible e-mail address for Kiley Barnhill would be [email protected], which would be read as follows: K Barnhill at e site dot com. Most e-mail programs allow you to create an address book, or contacts folder, which contains a list of names and e-mail addresses.
Password
A password is a private combination of characters associated with the user name that allows access to certain computer resources. Some operating systems allow the computer or network administrator to assign passwords to files and commands, restricting access to only authorized users.
To prevent unauthorized users from accessing computer resources, keep your password confidential. While users type a password, most computers hide the actual password characters by displaying some other characters, such as asterisks (*) or dots. After entering a user name and password, the operating system compares the user’s entry with a list of authorized user names and passwords. If the entry matches the user name and password kept on file, the operating system grants the user access. If the entry does not match, the operating system denies access to the user.
Also Read:
Difference Between Username and Email Address
Difference Between Username and User ID
Difference Between Username and Screen Name
Difference Between Instant Messaging and Text Messaging
Difference Between Instant Messaging and Sms
Difference Between Spreadsheet and Worksheet
Term | Definition For each user, a network administrator establishes this, which enables a user to access, or log on to, a computer or to a network. | |
|
Term | Definition When the contents of a file are scattered across two or more noncontiguous sectors. | |
|
Term | Definition A private combination of characters associated with the user name that allows access to a certain computer resources. | |
|
Term | Definition Compression type in which a compressed file can be returned to its exact original state. | |
|
Term | Definition A filtering program that attempts to remove spam before it reaches a users inbox. | |
|
Term | Definition To protect a computer from virus attacks, install this kind of program and update it frequently. | |
|
Term | Definition The practice of sharing or pooling computing resources, such as servers. | |
|
Term | Definition A mini-program with minimal functionality that connects to another program or provides information. | |
|
Term | Definition Define who can access certain resources and when they can access those resources. | |
|
Term | Definition An internet advertisement that appears ina new window in the foreground of a web page displayed in a users browser. | |
|
Term | Definition When purchasing this, users must ensure that it works with the operating system installed on their computer. | |
|
Term | Definition Enables you to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network. | |
|
Term | Definition If application software has stopped responding and the hard disks LED blinks repeatedly, the operating system is probably doing this. | |
|
Term | Definition Type of compression in which the quality of a file decreases slightly each time the file is compressed, which makes it impossible to restore that file to its exact original state. | |
|
Term | Definition A unique combination of characters that identifies a specific user.
| |
|
Term | Definition To make a program active in windows, click its program button here. | |
|
Term | Definition Saves any open documents and programs to RAM, turns off all unnedded functions, and then places the computer in a low-power state. | |
|
Term | Definition Saves any open documents and programs to a hard disk before removing power from the computer. | |
|
Term | Definition Items sometimes are placed in buffers because the processor operates at a much _______ rate of speed than peripheral devices. | |
|
Term | Definition In most cases the operating system is installed and resides on a computers ___________. | |
|
Term | Definition users with broadband internet connection are _________ susceptible to attacks from a hacker. | |
|
Term | Definition Windows _______ acesses the registry during the computers operation. | |
|
Term | Definition When turning on a computer that has been powered off completely, users are performing a _________ boot. | |
|
Term | Definition Fragmentation _________ disk access and thus the performance of the entire computer. | |
|
Term | Definition In most cases, drive ___ is the boot drive. | |
|
Term | Definition Many backup programs _______, or shrink the size of, files during the backup process. | |
|
Term | Definition A disk ___________ is a utility that reorganzes the files and unused space on a computers hard disk so the operating system accesses data more quickly and programs run faster. | |
|
Term | Definition Errors in programs are known as _______. | |
|
Term | Definition Bell Labs developed __________ in the early 1970's and liscensed it for a low fee to numerous colleges and universities, where the operating system obtained a wide following. | |
|
Term | Definition Screen savers originaly were developed to prevent aproblem called ________, in which images could be permanately etched on a moniters screen. | |
|
Term | Definition Some of the file management functions that a ________ performs are displying a list of files on a storage medium; organzing files in folders; copying, renaming, deleting, moving, and sorting files and folders; and creating shortcuts. | |
|
Term | Definition An image ________ allows users to display, print, and copy the contents of a graphic file. | |
|
Term | Definition Windows automatically enables its built in personal firewall, called __________. | |
|
Term | Definition Like Linux, __________ is a multipurpose operating system because it is both a stand alone and network operating system. | |
|
Term | Definition The two most popular GUI's available for _________ are GNOME and KDE. | |
|
Term | Definition A ________ is a type of system sofware that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs. | |
|
Term | Definition The three basic categories of operating sytems that exist today are stand-alone, server, and __________. | |
|
Term | Definition _________ is an open source multitasking operating system designed for smart phones.
| |
|
Term | Definition ________ is the process of encoding data and information into an unreadable form. | |
|
Term | Definition If a new device, such as a printer or scanner, is attached to a computer, its _______ must be installed before the device can be used. | |
|
Term | Definition A ________ is a utility that detects and protects a personal computer from unautherized intrusions. | |
|
Term | Definition Windows 7 includes an image viewer called Windows ____________. | |
|
Term | Definition A ____________ is a mini-program with minimal functionality that connects to another program or provides information. | |
|
Term | Definition A new feature of Windows 7 is the _____________ technology that helps programs start faster. | |
|
Term | Definition _____________ programs included with most operating systems help with managing files, viewing images, uninstalling programs, diagnosing problems, and removing viruses, for example. | |
|
Term | Definition ____________ a disk, or reorganizing it so the files are stored in contiguous sectors, speed up disk access and thus the performance of the entire computer. | |
|
Term | Definition A _______ is an icon on the desktop that provides a user with immediate acces to a program or file. | |
|
Term | Definition The person overseeing network operations, called the network _____________, uses the severs OS to add and remove users, computers, and other devices to and from a network. | |
|
Term | Definition Mac ________ includes features from previous apple computer operating systems, such as large photo-quality icons, built in networking support, and enhanced speech recognition. | |
|
Term | Definition Some stand-alone operating systems are called _________ operating systems because they also work in conjunction with a server operating system. | |
|
Term | Definition A performance __________ is a program that assesses and reports information about various computer resources and devices. | |
|