1-)In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer. Almost always a logon requires that the user have (1) a user ID and (2) a password. Often, the user ID must conform to a limited length such as eight characters and the password must contain at least one digit and not match a natural language word. The user ID can be freely known and is visible when entered at a keyboard or other input device. The password must be kept secret (and is not displayed as it is entered). Some Web sites require users to register in order to use the site; registered users can then enter the site by logging on.
The popularity and success of your website rely on many factors, but the most important one is the user experience and usability. The design quality should begin with your website onboarding and especially in your signup/ login options. The website screen is extremely important for conversion rates and its design is grueling. You need to consider efficiency and speed of the login process while maintaining simplicity, privacy, and data security. Keeping up with all these requirements on a simple screen is hard, but for those who manage to nail it, it gives better conversion rate and retention rates. The design quality should begin with your website onboarding and especially in your signup/ login options. The sign-up screen of a website is extremely important for conversion rates and its design is grueling. You need to consider efficiency and speed of the login process while maintaining simplicity, privacy, and data security. Keeping up with all these requirements on a simple screen is hard, but for those who manage to nail it, it gives better conversion rate and retention rates.
2-)A login page is very common for a computer application, websites and mobile apps. Login is used to control access to the system by identifying and authenticating the user as per the credentials provided. Alternatively, it is referred as sign in, log on or sign on. Once the user is logged in, the actions performed by the user can also be tracked. For the security purposes, access of confidential data can also be restrained for a particular user or for a specific group of users. Generally, login consists of a username and password. However, it also may include other information as a PIN number, passcode, passphrase, biometric identifier etc.
The login page usually consists of following sections:
Username uniquely identifies user on a system. The input type of username field is ‘text’. It is a mandatory field. By using username, multiple users can be allowed to use the same computer or online service with their personal settings and files. While using a website, a username is used for maintaining personal settings and identification with that website or service. A username is case-sensitive and always paired with a password. Most of the cases, username contains alphanumeric characters (A-Z, a-z and 0-9) but spaces cannot be used. If the username contains an e-mail account, the part before the “@” is considered as username.
A password is a string of characters used for authenticating a user on a computer system. The input type of password field is ‘password’. This input type is used to mask the field as the value of password should not be displayed. Instead of displaying original values, bullets are being displayed in this field. This is also another mandatory field as username. The most secure passwords use a combination of uppercase letters, lowercase letters, numbers, and symbols but spaces cannot be used.
The combination of username and password is referred to as a login and is often required for users to log in to websites. The input type of login is ‘button’. If the username and password combination does not match a user account, the login gets rejected. Several rejections may lock the account for security reason for several hours or days before it can be unlocked.
4.Forgot Password :