Definition of Login
1. Noun. (computing) A combination of a user's identification and password used to enter a computer, program, network, etc. ¹
2. Noun. (computing) The process of logging in. ¹
¹ Source: wiktionary.com
Definition of Login
1. the process of identifying oneself to a computer [n -S]
Click the following link to bring up a new window with an automated collection of images related to the term: Login Images
Lexicographical Neighbors of Login
Literary usage of Login
Below you will find example usage of this term as found in modern and/or classical literature:
1. The British and Foreign Medical Review Or Quarterly Journal of Practical (1846)
"ABT. I.—Memoir on tlie Field Carriage of Sick and Wounded Soldiers in the. Bengal Army. By JS login, MD, Surgeon to the British Residency at Lucknow, ..."
2. Guidelines for the Evaluation of Electronic Data Interchange Products by John J. Garguilo, Paul Markovitz (1998)
"3.2.1 login Procedure One method of restricting access to EDI software is by ... Only users with valid login names and passwords are permitted access. ..."
3. The Medico-chirurgical Review, and Journal of Practical Medicine (1845)
"S. login, MD Surgeon to the British Residency at Lucknow, ... We have attentively perused the Memoir of Ur. login, and we find much in it that ought to ..."
4. Proceedings of the Society for Experimental Biology and Medicine (1903)
"... in Male Rats Treated with Psychotropic Drugs (40644)1 NAGY, CARLOS A. VALDENEGRO, IVAN S. login, AND ROBERT M. MACLEOD nt of Internal Medicine, ..."
5. Someone Comes to Town, Someone Leaves Town by Cory Doctorow (2006)
""I'd better login to that thing and get it onto the network, huh?" "Yeah," Anders said. "I'm gonna order some lunch, lemme get you something. ..."
6. Report of the Annual Meeting (1870)
"... FRS, and T. login. Torn Committee considered, in the first place, what experiments would be necessary in order to furnish the data required for the ..."
7. Network Security by David J. Stang (1991)
"Comparisons can be made by encrypting the password entered at login and comparing the encrypted Torm with the encrypted password stored in the password ..."