SlideShare a Scribd company logo
1 of 2
The different types of computer users 
Coder – The user who codes scripts or programs usually for fun or learning. 
Sometimes for for malicious purposes. 
Cracker – Someone who retrieves and cracks password hashes or the limitation of 
non-free software. 
eWriter – Writes tutorials or text files for online viewing/sharing. 
Gamer – Dedicated fan of computer games who plays them for fun or a sense of 
accomplishment over others. They also take gaming real seriously. 
H4x0r – Knows interesting facts about computers but does not know a lot or has 
less experience. The hacker in self-training. Many regard this user type as a n00b 
posing as a hacker. 
Script Kiddie – Steals scripts made by coders and posts/uses them for 
malicious/selfish purposes. 
n00b – Young or new user to the online world struggling to find their proper user 
type. They may in the meantime pose as different user types like gamers or 
hackers. 
Hacker – The user that knows a lot about computing and uses this knowledge to 
manipulate the computer in ways that is was not intended. Hackers may write 
code, viruses, and crack passwords or software. 
Leecher – The user who searches sites for free downloads of software or other 
files. The leecher may then sell it or re-post it. 
Pawn – Un-Distracted person who uses the computer and internet mainly for 
their work. 
Penny-Flasher – The user who mainly plays free flash games on the internet.
Imager – User who browses through images, icons, themes, and other eye-candy 
for the interface. 
Virus Writer – A form of coder who writes viruses and other malicious code as a 
form of art. 
Office-Freak – User who uses the computer mainly for work on an office-suite 
(Microsoft Office, Open Office). See Pawn. 
Social-Networker – User who mainly uses the net to access social-networking 
sites, chatrooms, and maybe email for online communication. 
Self-Broadcaster – User who uploads video media to broadcast themselves, make 
tutorials, or even share music. 
Blogger – Updates and posts on blogs. See Social-Networker. 
Forum-Member – Dedicated member of a forum who makes updates and posts 
regularly for the rest of the members. See Social-Networker. 
Pirate – Cracks and/or distributes cracked software. 
Artist – Creates and uploads images, icons, or other media to enhance or 
personalize the look of the interface. (Find them on DevianArt). 
Programmer – Not exactly the same as the coder but still codes. Programmers 
create GUI Programs that makes a particular process faster, more productive, or 
even possible. They distribute their programs for rep or profit or for reference of 
code. 
Tweaker – Tweaks the settings, configuration, and the look and performance of 
their own OS and/or hardware to fit their need. 
Note :You can be more than one type of computer user.

More Related Content

What's hot

Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
NSU-Biliran Campus
 
Interactive Multimedia
Interactive MultimediaInteractive Multimedia
Interactive Multimedia
Jason Hando
 
4 evolution-of-programming-languages
4 evolution-of-programming-languages4 evolution-of-programming-languages
4 evolution-of-programming-languages
Rohit Shrivastava
 
Lesson plan storage devices(latest)
Lesson plan storage devices(latest)Lesson plan storage devices(latest)
Lesson plan storage devices(latest)
fizahPhd
 

What's hot (20)

BCA-121 Computer Fundamental.pdf
BCA-121 Computer Fundamental.pdfBCA-121 Computer Fundamental.pdf
BCA-121 Computer Fundamental.pdf
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
 
Parts of motherboard and its function
Parts of motherboard and its functionParts of motherboard and its function
Parts of motherboard and its function
 
Lecture 1 introduction to computing
Lecture 1 introduction to computingLecture 1 introduction to computing
Lecture 1 introduction to computing
 
ICT EXAM.pdf
ICT EXAM.pdfICT EXAM.pdf
ICT EXAM.pdf
 
Interactive Multimedia
Interactive MultimediaInteractive Multimedia
Interactive Multimedia
 
Semi Detailed Lesson Plan in Programming Languages
Semi Detailed Lesson Plan in Programming LanguagesSemi Detailed Lesson Plan in Programming Languages
Semi Detailed Lesson Plan in Programming Languages
 
Integrated Development Environments (IDE)
Integrated Development Environments (IDE) Integrated Development Environments (IDE)
Integrated Development Environments (IDE)
 
4 evolution-of-programming-languages
4 evolution-of-programming-languages4 evolution-of-programming-languages
4 evolution-of-programming-languages
 
Visual basic
Visual basicVisual basic
Visual basic
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Lesson plan storage devices(latest)
Lesson plan storage devices(latest)Lesson plan storage devices(latest)
Lesson plan storage devices(latest)
 
Motherboard parts & functions
Motherboard parts & functionsMotherboard parts & functions
Motherboard parts & functions
 
How to install Windows 7
How to install Windows 7 How to install Windows 7
How to install Windows 7
 
Audio Media and information
Audio Media and informationAudio Media and information
Audio Media and information
 
MILQ1W4-Lesson1.pptx
MILQ1W4-Lesson1.pptxMILQ1W4-Lesson1.pptx
MILQ1W4-Lesson1.pptx
 
6. categories of computers
6. categories of computers6. categories of computers
6. categories of computers
 
Multimedia development process
Multimedia development processMultimedia development process
Multimedia development process
 

Viewers also liked (10)

P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer Systems
 
Types of computer
Types of computerTypes of computer
Types of computer
 
The purpose of different types of computer systems
The purpose of different types of computer systemsThe purpose of different types of computer systems
The purpose of different types of computer systems
 
Types of Computer
Types of ComputerTypes of Computer
Types of Computer
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of Computers
 
Types of computers
Types of computersTypes of computers
Types of computers
 
Microphones
MicrophonesMicrophones
Microphones
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
multimedia element
multimedia elementmultimedia element
multimedia element
 

Similar to The different types of computer users

Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
James Ruffer
 

Similar to The different types of computer users (20)

Password Attack
Password Attack Password Attack
Password Attack
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school intro
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Useful Shareware for Technical Communicators - STC New England Interchange co...
Useful Shareware for Technical Communicators - STC New England Interchange co...Useful Shareware for Technical Communicators - STC New England Interchange co...
Useful Shareware for Technical Communicators - STC New England Interchange co...
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Digital literacy – part 3
Digital literacy – part 3Digital literacy – part 3
Digital literacy – part 3
 
SDT introduction as given at MKIS, KL, 2023
SDT introduction as given at MKIS, KL, 2023SDT introduction as given at MKIS, KL, 2023
SDT introduction as given at MKIS, KL, 2023
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
The Digital Demise - by Robin Turner
The Digital Demise - by Robin TurnerThe Digital Demise - by Robin Turner
The Digital Demise - by Robin Turner
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 

More from Hafiz Latfi

Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Hafiz Latfi
 
Sejarah elektrik_assignment
Sejarah elektrik_assignmentSejarah elektrik_assignment
Sejarah elektrik_assignment
Hafiz Latfi
 
Check driver install
Check driver installCheck driver install
Check driver install
Hafiz Latfi
 
Lp05 practical practice install driver
Lp05 practical practice install driverLp05 practical practice install driver
Lp05 practical practice install driver
Hafiz Latfi
 

More from Hafiz Latfi (17)

Task 5(1) : Komponen Mekanikal Perkakasan Komputer
Task 5(1) : Komponen Mekanikal Perkakasan KomputerTask 5(1) : Komponen Mekanikal Perkakasan Komputer
Task 5(1) : Komponen Mekanikal Perkakasan Komputer
 
Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)
 
0210 monitor work and tideness
0210   monitor work and tideness0210   monitor work and tideness
0210 monitor work and tideness
 
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
 
Cidb 13122
Cidb 13122Cidb 13122
Cidb 13122
 
03 provide training - kertas kerja
03 provide training - kertas kerja03 provide training - kertas kerja
03 provide training - kertas kerja
 
Modul 2 : Organizational structure ( Ncs )
Modul 2 : Organizational structure ( Ncs )Modul 2 : Organizational structure ( Ncs )
Modul 2 : Organizational structure ( Ncs )
 
Checklist mini project
Checklist mini projectChecklist mini project
Checklist mini project
 
Aktiviti mini project
Aktiviti mini projectAktiviti mini project
Aktiviti mini project
 
Sejarah elektrik_assignment
Sejarah elektrik_assignmentSejarah elektrik_assignment
Sejarah elektrik_assignment
 
OsiI model
OsiI modelOsiI model
OsiI model
 
10 pendapat anda
10 pendapat anda10 pendapat anda
10 pendapat anda
 
02.08 carry out part installation ( simple presentation design )
02.08 carry out part installation ( simple presentation design )02.08 carry out part installation ( simple presentation design )
02.08 carry out part installation ( simple presentation design )
 
Check driver install
Check driver installCheck driver install
Check driver install
 
Introduction of driver
Introduction of driverIntroduction of driver
Introduction of driver
 
Lp05 practical practice install driver
Lp05 practical practice install driverLp05 practical practice install driver
Lp05 practical practice install driver
 
Lp05 practical practice install windows7
Lp05 practical practice install windows7Lp05 practical practice install windows7
Lp05 practical practice install windows7
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

The different types of computer users

  • 1. The different types of computer users Coder – The user who codes scripts or programs usually for fun or learning. Sometimes for for malicious purposes. Cracker – Someone who retrieves and cracks password hashes or the limitation of non-free software. eWriter – Writes tutorials or text files for online viewing/sharing. Gamer – Dedicated fan of computer games who plays them for fun or a sense of accomplishment over others. They also take gaming real seriously. H4x0r – Knows interesting facts about computers but does not know a lot or has less experience. The hacker in self-training. Many regard this user type as a n00b posing as a hacker. Script Kiddie – Steals scripts made by coders and posts/uses them for malicious/selfish purposes. n00b – Young or new user to the online world struggling to find their proper user type. They may in the meantime pose as different user types like gamers or hackers. Hacker – The user that knows a lot about computing and uses this knowledge to manipulate the computer in ways that is was not intended. Hackers may write code, viruses, and crack passwords or software. Leecher – The user who searches sites for free downloads of software or other files. The leecher may then sell it or re-post it. Pawn – Un-Distracted person who uses the computer and internet mainly for their work. Penny-Flasher – The user who mainly plays free flash games on the internet.
  • 2. Imager – User who browses through images, icons, themes, and other eye-candy for the interface. Virus Writer – A form of coder who writes viruses and other malicious code as a form of art. Office-Freak – User who uses the computer mainly for work on an office-suite (Microsoft Office, Open Office). See Pawn. Social-Networker – User who mainly uses the net to access social-networking sites, chatrooms, and maybe email for online communication. Self-Broadcaster – User who uploads video media to broadcast themselves, make tutorials, or even share music. Blogger – Updates and posts on blogs. See Social-Networker. Forum-Member – Dedicated member of a forum who makes updates and posts regularly for the rest of the members. See Social-Networker. Pirate – Cracks and/or distributes cracked software. Artist – Creates and uploads images, icons, or other media to enhance or personalize the look of the interface. (Find them on DevianArt). Programmer – Not exactly the same as the coder but still codes. Programmers create GUI Programs that makes a particular process faster, more productive, or even possible. They distribute their programs for rep or profit or for reference of code. Tweaker – Tweaks the settings, configuration, and the look and performance of their own OS and/or hardware to fit their need. Note :You can be more than one type of computer user.