I'm the I.S. manager of a small manufacturing company. Recently, I had a user approach me to ask if she could open her own "things" on someone else's computer.
Tech Support: "Yes, just log in as yourself."
User: "How do I do that?"
Tech Support: "Just type the name you usually use where it says Name and your usual password."
User: "Oh, ok. But how does the computer know it's me and not [the person who normally uses the machine]?"
Two days later, I received a similar call from another employee. Tech Support: "Yes, just log in as yourself."
User: "With my name, you mean?"
Tech Support: "Yes, that's right."
User: "So how does the computer know that I'm using it and not [the person who normally uses the machine]?"
Shaking my head somewhat, I settled down to do some network maintenance, when lo and behold YET ANOTHER user rang. User: "I need to access my files whilst I cover reception. Can I do that?"
Tech Support: "Yes, if you get [receptionist] to log off and just log on as yourself."
User: "But won't I get [receptionist's] stuff?"
Tech Support: "No, if you log on with your name, you'll get your own things."
User: "Oh, ok. How does it know whose things to display?"
This question and answer has now been submitted to the company newsletter.