Definition of Login

1. Noun. (computing) A combination of a user's identification and password used to enter a computer, program, network, etc. ¹

2. Noun. (computing) The process of logging in. ¹

¹ Source: wiktionary.com

Definition of Login

1. the process of identifying oneself to a computer [n -S]

Lexicographical Neighbors of Login

logicists
logicize
logicized
logicizes
logicizing
logick
logicless
logics
logie
logier
logies
logiest
logification
logifications
logily
login (current term)
loginess
loginesses
logins
logion
logions
logisitic
logistic
logistic curve
logistic function
logistic functions
logistic model
logistic models

Literary usage of Login

Below you will find example usage of this term as found in modern and/or classical literature:

1. The British and Foreign Medical Review Or Quarterly Journal of Practical (1846)
"ABT. I.—Memoir on tlie Field Carriage of Sick and Wounded Soldiers in the. Bengal Army. By JS login, MD, Surgeon to the British Residency at Lucknow, ..."

2. Guidelines for the Evaluation of Electronic Data Interchange Products by John J. Garguilo, Paul Markovitz (1998)
"3.2.1 login Procedure One method of restricting access to EDI software is by ... Only users with valid login names and passwords are permitted access. ..."

3. The Medico-chirurgical Review, and Journal of Practical Medicine (1845)
"S. login, MD Surgeon to the British Residency at Lucknow, ... We have attentively perused the Memoir of Ur. login, and we find much in it that ought to ..."

4. Proceedings of the Society for Experimental Biology and Medicine (1903)
"... in Male Rats Treated with Psychotropic Drugs (40644)1 NAGY, CARLOS A. VALDENEGRO, IVAN S. login, AND ROBERT M. MACLEOD nt of Internal Medicine, ..."

5. Someone Comes to Town, Someone Leaves Town by Cory Doctorow (2006)
""I'd better login to that thing and get it onto the network, huh?" "Yeah," Anders said. "I'm gonna order some lunch, lemme get you something. ..."

6. Report of the Annual Meeting (1870)
"... FRS, and T. login. Torn Committee considered, in the first place, what experiments would be necessary in order to furnish the data required for the ..."

7. Network Security by David J. Stang (1991)
"Comparisons can be made by encrypting the password entered at login and comparing the encrypted Torm with the encrypted password stored in the password ..."

Other Resources:

Search for Login on Dictionary.com!Search for Login on Thesaurus.com!Search for Login on Google!Search for Login on Wikipedia!

Search