SlideShare a Scribd company logo
The different types of computer users 
Coder – The user who codes scripts or programs usually for fun or learning. 
Sometimes for for malicious purposes. 
Cracker – Someone who retrieves and cracks password hashes or the limitation of 
non-free software. 
eWriter – Writes tutorials or text files for online viewing/sharing. 
Gamer – Dedicated fan of computer games who plays them for fun or a sense of 
accomplishment over others. They also take gaming real seriously. 
H4x0r – Knows interesting facts about computers but does not know a lot or has 
less experience. The hacker in self-training. Many regard this user type as a n00b 
posing as a hacker. 
Script Kiddie – Steals scripts made by coders and posts/uses them for 
malicious/selfish purposes. 
n00b – Young or new user to the online world struggling to find their proper user 
type. They may in the meantime pose as different user types like gamers or 
hackers. 
Hacker – The user that knows a lot about computing and uses this knowledge to 
manipulate the computer in ways that is was not intended. Hackers may write 
code, viruses, and crack passwords or software. 
Leecher – The user who searches sites for free downloads of software or other 
files. The leecher may then sell it or re-post it. 
Pawn – Un-Distracted person who uses the computer and internet mainly for 
their work. 
Penny-Flasher – The user who mainly plays free flash games on the internet.
Imager – User who browses through images, icons, themes, and other eye-candy 
for the interface. 
Virus Writer – A form of coder who writes viruses and other malicious code as a 
form of art. 
Office-Freak – User who uses the computer mainly for work on an office-suite 
(Microsoft Office, Open Office). See Pawn. 
Social-Networker – User who mainly uses the net to access social-networking 
sites, chatrooms, and maybe email for online communication. 
Self-Broadcaster – User who uploads video media to broadcast themselves, make 
tutorials, or even share music. 
Blogger – Updates and posts on blogs. See Social-Networker. 
Forum-Member – Dedicated member of a forum who makes updates and posts 
regularly for the rest of the members. See Social-Networker. 
Pirate – Cracks and/or distributes cracked software. 
Artist – Creates and uploads images, icons, or other media to enhance or 
personalize the look of the interface. (Find them on DevianArt). 
Programmer – Not exactly the same as the coder but still codes. Programmers 
create GUI Programs that makes a particular process faster, more productive, or 
even possible. They distribute their programs for rep or profit or for reference of 
code. 
Tweaker – Tweaks the settings, configuration, and the look and performance of 
their own OS and/or hardware to fit their need. 
Note :You can be more than one type of computer user.

More Related Content

What's hot

Computer system, devices and peripherals
Computer system, devices and peripheralsComputer system, devices and peripherals
Computer system, devices and peripherals
Allan Roloma
 
Online Collaboration
Online CollaborationOnline Collaboration
Online Collaboration
LeAnn
 
3. Component of computer - System Unit ( CSI-321)
3. Component of computer - System Unit  ( CSI-321) 3. Component of computer - System Unit  ( CSI-321)
3. Component of computer - System Unit ( CSI-321)
ghayour abbas
 
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupIct 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Yonel Cadapan
 
Ports and Connectors
Ports and ConnectorsPorts and Connectors
Ports and Connectors
Haider Ali Malik
 
INTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptxINTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptx
StephenStanleyAndres1
 
7. computer usage
7. computer usage7. computer usage
Copyright law
Copyright law Copyright law
Copyright law
djesameatqc
 
Culture pre-hispanic-spanish-american-japanese (1)
Culture pre-hispanic-spanish-american-japanese (1)Culture pre-hispanic-spanish-american-japanese (1)
Culture pre-hispanic-spanish-american-japanese (1)
knhie
 
Evaluating Messages and/or Images
Evaluating Messages and/or ImagesEvaluating Messages and/or Images
Evaluating Messages and/or Images
RyanBuer
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
ŐŔaṉģ Zaib
 
History of Physical Education in the Philippines: Spanish Era
History of Physical Education in the Philippines: Spanish EraHistory of Physical Education in the Philippines: Spanish Era
History of Physical Education in the Philippines: Spanish Era
Norzie Morales
 
History of Physical Education in the Philippines: Pre-Spanish Times
History of Physical Education in the Philippines: Pre-Spanish TimesHistory of Physical Education in the Philippines: Pre-Spanish Times
History of Physical Education in the Philippines: Pre-Spanish Times
Norzie Morales
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
Jill Stassie
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
Froilan Cantillo
 
Ethics and religion
Ethics and religionEthics and religion
Ethics and religion
marymaypaleyan
 
Integrating images and external material in word processor
Integrating images and external material in word processorIntegrating images and external material in word processor
Integrating images and external material in word processor
MaridelBajeta
 
Parts of the system unit
Parts of the system unitParts of the system unit
Parts of the system unit
Samantha Regis
 
Chapter02
Chapter02Chapter02
Chapter02
Izaham
 
Collaboration and team content development
Collaboration  and team content developmentCollaboration  and team content development
Collaboration and team content development
EILLEN IVY PORTUGUEZ
 

What's hot (20)

Computer system, devices and peripherals
Computer system, devices and peripheralsComputer system, devices and peripherals
Computer system, devices and peripherals
 
Online Collaboration
Online CollaborationOnline Collaboration
Online Collaboration
 
3. Component of computer - System Unit ( CSI-321)
3. Component of computer - System Unit  ( CSI-321) 3. Component of computer - System Unit  ( CSI-321)
3. Component of computer - System Unit ( CSI-321)
 
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupIct 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setup
 
Ports and Connectors
Ports and ConnectorsPorts and Connectors
Ports and Connectors
 
INTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptxINTEGRATIVE PROGRAMMING ch1.pptx
INTEGRATIVE PROGRAMMING ch1.pptx
 
7. computer usage
7. computer usage7. computer usage
7. computer usage
 
Copyright law
Copyright law Copyright law
Copyright law
 
Culture pre-hispanic-spanish-american-japanese (1)
Culture pre-hispanic-spanish-american-japanese (1)Culture pre-hispanic-spanish-american-japanese (1)
Culture pre-hispanic-spanish-american-japanese (1)
 
Evaluating Messages and/or Images
Evaluating Messages and/or ImagesEvaluating Messages and/or Images
Evaluating Messages and/or Images
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
History of Physical Education in the Philippines: Spanish Era
History of Physical Education in the Philippines: Spanish EraHistory of Physical Education in the Philippines: Spanish Era
History of Physical Education in the Philippines: Spanish Era
 
History of Physical Education in the Philippines: Pre-Spanish Times
History of Physical Education in the Philippines: Pre-Spanish TimesHistory of Physical Education in the Philippines: Pre-Spanish Times
History of Physical Education in the Philippines: Pre-Spanish Times
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
 
Ethics and religion
Ethics and religionEthics and religion
Ethics and religion
 
Integrating images and external material in word processor
Integrating images and external material in word processorIntegrating images and external material in word processor
Integrating images and external material in word processor
 
Parts of the system unit
Parts of the system unitParts of the system unit
Parts of the system unit
 
Chapter02
Chapter02Chapter02
Chapter02
 
Collaboration and team content development
Collaboration  and team content developmentCollaboration  and team content development
Collaboration and team content development
 

Viewers also liked

P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsJamesBennett15
 
Types of computer
Types of computerTypes of computer
Types of computer
Online
 
The purpose of different types of computer systems
The purpose of different types of computer systemsThe purpose of different types of computer systems
The purpose of different types of computer systemslukasgoda456
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of Computers
DanielAtkinson96
 
Microphones
MicrophonesMicrophones
Microphonesbsutton
 
Classification of computer
Classification of computerClassification of computer
Classification of computerVicky Maliks
 
multimedia element
multimedia elementmultimedia element
multimedia element
AZMAN KADIR
 

Viewers also liked (10)

P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer Systems
 
Types of computer
Types of computerTypes of computer
Types of computer
 
The purpose of different types of computer systems
The purpose of different types of computer systemsThe purpose of different types of computer systems
The purpose of different types of computer systems
 
Types of Computer
Types of ComputerTypes of Computer
Types of Computer
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of Computers
 
Types of computers
Types of computersTypes of computers
Types of computers
 
Microphones
MicrophonesMicrophones
Microphones
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
multimedia element
multimedia elementmultimedia element
multimedia element
 

Similar to The different types of computer users

Password Attack
Password Attack Password Attack
Password Attack
Sina Manavi
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
Samiullah Khan
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202James Ruffer
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
Esteban Bedoya
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
Elike Ikechukwu
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school intro
Peter Hlavaty
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
NAWAZ KHAN
 
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Nargis Parveen
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
zeus7856
 
Useful Shareware for Technical Communicators - STC New England Interchange co...
Useful Shareware for Technical Communicators - STC New England Interchange co...Useful Shareware for Technical Communicators - STC New England Interchange co...
Useful Shareware for Technical Communicators - STC New England Interchange co...
Ed Marshall
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Digital literacy – part 3
Digital literacy – part 3Digital literacy – part 3
Digital literacy – part 3
Gisele Fernandes Loures Domith
 
SDT introduction as given at MKIS, KL, 2023
SDT introduction as given at MKIS, KL, 2023SDT introduction as given at MKIS, KL, 2023
SDT introduction as given at MKIS, KL, 2023
FerryKemperman
 
The Digital Demise - by Robin Turner
The Digital Demise - by Robin TurnerThe Digital Demise - by Robin Turner
The Digital Demise - by Robin Turner
robinturner
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
roniee1234567890
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
Patel Mit
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
Vi Tính Hoàng Nam
 

Similar to The different types of computer users (20)

Password Attack
Password Attack Password Attack
Password Attack
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school intro
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Useful Shareware for Technical Communicators - STC New England Interchange co...
Useful Shareware for Technical Communicators - STC New England Interchange co...Useful Shareware for Technical Communicators - STC New England Interchange co...
Useful Shareware for Technical Communicators - STC New England Interchange co...
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Digital literacy – part 3
Digital literacy – part 3Digital literacy – part 3
Digital literacy – part 3
 
SDT introduction as given at MKIS, KL, 2023
SDT introduction as given at MKIS, KL, 2023SDT introduction as given at MKIS, KL, 2023
SDT introduction as given at MKIS, KL, 2023
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
The Digital Demise - by Robin Turner
The Digital Demise - by Robin TurnerThe Digital Demise - by Robin Turner
The Digital Demise - by Robin Turner
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 

More from Hafiz Latfi

Task 5(1) : Komponen Mekanikal Perkakasan Komputer
Task 5(1) : Komponen Mekanikal Perkakasan KomputerTask 5(1) : Komponen Mekanikal Perkakasan Komputer
Task 5(1) : Komponen Mekanikal Perkakasan Komputer
Hafiz Latfi
 
Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)Hafiz Latfi
 
0210 monitor work and tideness
0210   monitor work and tideness0210   monitor work and tideness
0210 monitor work and tideness
Hafiz Latfi
 
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
Hafiz Latfi
 
Cidb 13122
Cidb 13122Cidb 13122
Cidb 13122
Hafiz Latfi
 
03 provide training - kertas kerja
03 provide training - kertas kerja03 provide training - kertas kerja
03 provide training - kertas kerja
Hafiz Latfi
 
Modul 2 : Organizational structure ( Ncs )
Modul 2 : Organizational structure ( Ncs )Modul 2 : Organizational structure ( Ncs )
Modul 2 : Organizational structure ( Ncs )
Hafiz Latfi
 
Checklist mini project
Checklist mini projectChecklist mini project
Checklist mini project
Hafiz Latfi
 
Aktiviti mini project
Aktiviti mini projectAktiviti mini project
Aktiviti mini project
Hafiz Latfi
 
Sejarah elektrik_assignment
Sejarah elektrik_assignmentSejarah elektrik_assignment
Sejarah elektrik_assignmentHafiz Latfi
 
OsiI model
OsiI modelOsiI model
OsiI model
Hafiz Latfi
 
10 pendapat anda
10 pendapat anda10 pendapat anda
10 pendapat anda
Hafiz Latfi
 
02.08 carry out part installation ( simple presentation design )
02.08 carry out part installation ( simple presentation design )02.08 carry out part installation ( simple presentation design )
02.08 carry out part installation ( simple presentation design )
Hafiz Latfi
 
Check driver install
Check driver installCheck driver install
Check driver installHafiz Latfi
 
Introduction of driver
Introduction of driverIntroduction of driver
Introduction of driver
Hafiz Latfi
 
Lp05 practical practice install driver
Lp05 practical practice install driverLp05 practical practice install driver
Lp05 practical practice install driverHafiz Latfi
 
Lp05 practical practice install windows7
Lp05 practical practice install windows7Lp05 practical practice install windows7
Lp05 practical practice install windows7
Hafiz Latfi
 

More from Hafiz Latfi (17)

Task 5(1) : Komponen Mekanikal Perkakasan Komputer
Task 5(1) : Komponen Mekanikal Perkakasan KomputerTask 5(1) : Komponen Mekanikal Perkakasan Komputer
Task 5(1) : Komponen Mekanikal Perkakasan Komputer
 
Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)Task 3 : Menyemak Komponen Sistem Unit (BIOS)
Task 3 : Menyemak Komponen Sistem Unit (BIOS)
 
0210 monitor work and tideness
0210   monitor work and tideness0210   monitor work and tideness
0210 monitor work and tideness
 
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
ELEKTRIK - ASAS 1[PERKAKASAN DAN MENGENAL]
 
Cidb 13122
Cidb 13122Cidb 13122
Cidb 13122
 
03 provide training - kertas kerja
03 provide training - kertas kerja03 provide training - kertas kerja
03 provide training - kertas kerja
 
Modul 2 : Organizational structure ( Ncs )
Modul 2 : Organizational structure ( Ncs )Modul 2 : Organizational structure ( Ncs )
Modul 2 : Organizational structure ( Ncs )
 
Checklist mini project
Checklist mini projectChecklist mini project
Checklist mini project
 
Aktiviti mini project
Aktiviti mini projectAktiviti mini project
Aktiviti mini project
 
Sejarah elektrik_assignment
Sejarah elektrik_assignmentSejarah elektrik_assignment
Sejarah elektrik_assignment
 
OsiI model
OsiI modelOsiI model
OsiI model
 
10 pendapat anda
10 pendapat anda10 pendapat anda
10 pendapat anda
 
02.08 carry out part installation ( simple presentation design )
02.08 carry out part installation ( simple presentation design )02.08 carry out part installation ( simple presentation design )
02.08 carry out part installation ( simple presentation design )
 
Check driver install
Check driver installCheck driver install
Check driver install
 
Introduction of driver
Introduction of driverIntroduction of driver
Introduction of driver
 
Lp05 practical practice install driver
Lp05 practical practice install driverLp05 practical practice install driver
Lp05 practical practice install driver
 
Lp05 practical practice install windows7
Lp05 practical practice install windows7Lp05 practical practice install windows7
Lp05 practical practice install windows7
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

The different types of computer users

  • 1. The different types of computer users Coder – The user who codes scripts or programs usually for fun or learning. Sometimes for for malicious purposes. Cracker – Someone who retrieves and cracks password hashes or the limitation of non-free software. eWriter – Writes tutorials or text files for online viewing/sharing. Gamer – Dedicated fan of computer games who plays them for fun or a sense of accomplishment over others. They also take gaming real seriously. H4x0r – Knows interesting facts about computers but does not know a lot or has less experience. The hacker in self-training. Many regard this user type as a n00b posing as a hacker. Script Kiddie – Steals scripts made by coders and posts/uses them for malicious/selfish purposes. n00b – Young or new user to the online world struggling to find their proper user type. They may in the meantime pose as different user types like gamers or hackers. Hacker – The user that knows a lot about computing and uses this knowledge to manipulate the computer in ways that is was not intended. Hackers may write code, viruses, and crack passwords or software. Leecher – The user who searches sites for free downloads of software or other files. The leecher may then sell it or re-post it. Pawn – Un-Distracted person who uses the computer and internet mainly for their work. Penny-Flasher – The user who mainly plays free flash games on the internet.
  • 2. Imager – User who browses through images, icons, themes, and other eye-candy for the interface. Virus Writer – A form of coder who writes viruses and other malicious code as a form of art. Office-Freak – User who uses the computer mainly for work on an office-suite (Microsoft Office, Open Office). See Pawn. Social-Networker – User who mainly uses the net to access social-networking sites, chatrooms, and maybe email for online communication. Self-Broadcaster – User who uploads video media to broadcast themselves, make tutorials, or even share music. Blogger – Updates and posts on blogs. See Social-Networker. Forum-Member – Dedicated member of a forum who makes updates and posts regularly for the rest of the members. See Social-Networker. Pirate – Cracks and/or distributes cracked software. Artist – Creates and uploads images, icons, or other media to enhance or personalize the look of the interface. (Find them on DevianArt). Programmer – Not exactly the same as the coder but still codes. Programmers create GUI Programs that makes a particular process faster, more productive, or even possible. They distribute their programs for rep or profit or for reference of code. Tweaker – Tweaks the settings, configuration, and the look and performance of their own OS and/or hardware to fit their need. Note :You can be more than one type of computer user.