0% found this document useful (0 votes)
73 views13 pages

Tle Ic 1 Module 9 Computer Users

Uploaded by

noprebetty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views13 pages

Tle Ic 1 Module 9 Computer Users

Uploaded by

noprebetty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

TLE IC 1

MODULE 9

COMPUTER USERS

TEACHING ICT AS AN EXPLORATORY COURSE


First Semester AY 20__-20__
TLE IC 1: Teaching ICT as an Exploratory Course
Module 9: Computer Users

Republic Act 8293 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation
of such work for profit. Such agency or office may, among other things, impose
as a condition the payment of royalties.
Borrowed materials (i.e. songs, stories, poems, pictures, photos, brand
names, trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission
to use these materials from their respective copyright owners. The publisher
and the authors do not represent nor claim ownership over them.

Development Team

Department: ICT
Writer: GLADYS S. MENDIOLA

Editor: ALBERT S. LLAVA

Reviewers: JOAQUIN G. ATAYZA


RENE C. BAROLA
VIRGIE C. MALAGUEÑO

Layout Artist: GLADYS S. MENDIOLA

INTRODUCTION

There are a million different kinds of people in the world, and also a million
different kinds of computer users.
There is no official “international classification” to the types of computer users,
and so, I am just going to compile the various ways in which people have categorized
them all over the Internet. This module focuses on the different types of computer
users and their generic categorization. Hopefully, one of these will be the answer you
are looking for. Read on!
OBJECTIVES

At the end of this module, students must be able to:


1. Identify the different computer users
2. Classify computer users based on their classification level.

PRE-ASSESSMENT

Directions: Write the letter of the correct answer in your answer sheet.
_________1. ________________ are widely characterized as the class of people that use a
system without complete technical expertise required to understand the system fully.
a. Computer-oriented User c. Application-Oriented User
b. Computer User d. Standard User
_________2. This user’s actions are usually recorded, and unable to open any
application, game, or any content that says “parental guidance is advised”.
a. Child User c. Administrator
b. Guest User d. Standard
_________3. This user can fix a broken computer or a gadget.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________4. There are three types of hackers. Which of the following is not belong to
the group?
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________5. This king od hackers are good guys who mess with computers with
permission, to warn other people of security loopholes.
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________6. These are type of users who don’t care about what applications are used,
as long as things get done using computers.
a. Computer-Oriented User c. Goal-Oriented User
b. Application-Oriented User d. Computer User
_________7. Computers are widely used in different aspects. In what industry and
purpose does computer used to solve crimes?
a. Academic c. Commerce
b. Science d. Military and Law Enforcement
_________8. The guys who have so many computer tricks.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________9. Gamers: Entertainment; Operators: __________________
a. Manufacturing and Production c. Military and Law Enforcement
b. Banking and Finance d. Commerce
_________10. All of these are Skill level, except ______________.
a. Computer Dummy c. Computer Wizard
b. Power User d. Application-Oriented User
READ AND STUDY

Classification of Computer Users

User is an agent, either a human agent (end-user) or software agent, who


uses a computer or network service. Users are also widely characterized as the
class of people that use a system without complete technical expertise required to
understand the system fully. Computer users can be classified into the following
levels based on the way they think about computers: User Level, Skill Level, User
Intent level, Industry level.

SECTION A There are various user levels in an operating system, and they are
used to control access to various functions on the system. This is a
USER LEVEL generic categorization by the common user levels found in most
operating systems.

1) ADMINISTRATOR
The “god level” unrestricted user who
has the power to install and delete
applications, copy and delete files, even
cause a massive system crash by
messing with the critical system files.

2) STANDARD USER
The regular Joe user who is able to
install and delete applications, update
the system, but is otherwise unable to
mess with the critical system files.

3) GUEST
A restricted user that you can create for
allowing a friend to access your
computer. Able to run the applications
and maybe touch some files, but is
otherwise unable to install or delete
anything.
4) CHILD
Following up with a slew of “too
many violent adult contents”, some
operating systems actually adopted
the use of parental control or a child
account. This user’s actions are
usually recorded, and unable to
open any application, game, or any
content that says “parental guidance
is advised”.

SECTION B Following up, this section groups the computer users by their
skill levels – From a dummy to a computer ninja.
SKILL LEVEL

5) COMPUTER DUMMY
A complete beginner and
someone who is new to the cyber
world. These users always need
assistance.

6) COMPUTER USER
The guys who have “used enough”
computer and is “good enough”
with most of the basics.

7) POWER USER
The guys who have “used too much”
computer and have some technology
tricks up the sleeve.
8) COMPUTER WIZARD
The almighty tech geeks. Give them
a mess of wires, and they can sort it
out. Bring them a broken gadget,
and they can fix it. Everything bad
will turn good in their magic hands.

9) HACKER
Hackers are a different breed from the
wizards. While wizards are
constructive, hackers usually do the
opposite of reverse engineering. They
are generally divided into 3 hats:
Black hat – The bad guys who mess
with computers to do bad things.
White hat – The good guys who mess
with computers with permission, to
warn other people of security loopholes.
Grey hat – The naughty guys who break
the laws, but don’t do a lot of damage.

SECTION C Next, here is a list of users grouped by their usage


intent.
USER INTENT

10) APPLICATION-ORIENTED USERS


These are the type of users who have been
trained to use particular software
applications. Their purpose for using a
computer, be it for school, work, or play,
is to exactly use those applications to
complete a task. They understand
concepts peculiar to computers such as
files, folders, saving, and deleting.
They live in a WYSIWYG world; although
they may be aware that what they see on
the screen is not an entirely accurate
representation of what the computer is
actually doing, they are not interested in
understanding hidden implementations.
11) GOAL ORIENTED USERS
These are the type of users who don’t care about what
applications are used, as long as things get done using
computers.These users focus exclusively on the goals
they want to accomplish and neither understands nor
cares about the software they use to accomplish those
goals. This could be called the ―I just want to type a
letter‖ group. They only see the final product. They do
not care about, for example, the difference between a
word processor document and a PDF image of that same
document.

12) COMPUTER ORIENTED USERS


The uncommon group of users, where they use
computers for the sake of computers. Sounds
confusing? Simply put, these people are either
hackers or programmers. They have learned how to
think like a computer, to understand the processes
the computer goes through. They tend to seek out
the abstract. They will create whatever new tools
are needed to bring the computer up to the level of
the problem, rather than trying to adapt the
problem to fit the computer. On the other hand,
their solutions tend to be brittle, with a lot of
exposed complexity that makes them unsuitable
for non-hacker users.

SECTION D Finally, every industry sector and everyone has a


different reason to use a computer. Here is a list of
INDUSTRY & PURPOSE
users by the industry and why.

13) ENTERTAINMENT
Examples users – Gamers, streamers, artists.
These users are fond of using computers for
gaming, blogging and streaming. The gaming
and entertainment industry is hug. It is so
common these days to see people glued to the
smartphone for gaming or watching videos.

14) ACADEMIC
Example users – Teachers and
students.
Gone are the good old days where
teachers write on chalkboards.
Computers simply offer a better way to
teach with slides, images, and videos;
Also a better way to learn with
illustrations and not a whole bunch of
text.
15) SCIENCE
Example users – Researchers and
scientists.
These users do all kinds of mad
scientists’ calculations and simulations.

16) COMMERCE
Example users– Cashiers, managers,
analysts, office workers.
Computer users for the commerce
section are so wide these days. To do
office work, manage customer orders,
generate reports, monthly sales,
warehouse management, etc…

17) BANKING & FINANCE


Example users – Bankers and
traders.
The people who use computers to
keep their money safe in the
bank… Or use it to make more
money.

18) MANUFACTURING &


PRODUCTION
Example users – Publishers,
operators, managers.
Hand made with love these days are
rare. Factories adopt computers and
machines for mass production these
days, people use computers to control
and manage the production line.

19) MILITARY & LAW


ENFORCEMENT
Example users – Intelligence
and crime analyst.
How do we know if a certain sicko will
most likely strike? Welcome to
criminal science, where smart people
use computers and past data to
predict the future.
ACTIVITY 1
Directions: Match column A to Column B. Write the letter of the correct answer on the
space provided.
Column A Column B
_________ 1. This type of users always seeks for A. Child User
assistance with somebody. They are a complete
beginner.
__________2. These are the type of users who B. Computer Dummmy
don’t care about what applications are used,
as long as things get done using computers.
__________3. A restricted user that you can C. Guest User
create for allowing a friend to access your
computer.
__________4. These are the type of users D. Standard User
who have been trained to use basic
software applications like MS Word.
__________5. This type user uses a parental E. Goal-Oriented User
control to and unable to open any application,
game, or any content that says “parental
guidance is advised”.
__________6. This type of users has so many F. Administrator
tricks in using computer.
__________7. This type of users are almighty G. Power User
tech geeks. They can fix anything in your
computer.
__________8. This type of user learned how H. Computer-Oriented User
to think like a computer, to understand the
processes that the computer goes through.
__________9. These users were able to install I. Application-Oriented User
and delete applications, update the system,
but is otherwise unable to mess with the
critical system files.
__________10. The “god level” unrestricted user J. Computer Wizard
who has the power to install and delete
applications, copy and delete files, even cause
a massive system crash by messing with the
critical system files.

ACTIVITY 2
1. Directions: Classify computer users based on their classification level.
by putting a check (/) mark under the appropriate column.

User Skill User-Intent Industry


COMPUTER USERS
Level Level level level
1. Bankers
2. Application-Oriented User
3. Guest
4. Standard
5. Academic
6. Computer Wizard
7. Computer-Oriented User
8. Computer Dummy
9. Gamers
10. Child

POINTS TO REMEMBER
 Computer users are widely characterized as the class of people that use a
system without complete technical expertise required to understand the system
fully.
 There are still more computer users. These mentioned above are just compiled
the various ways in which people have categorized them all over the internet.
There can be more.
 You can be more than one type of computer user

POST-ASSESSMENT
Multiple choice: Read, analyze and answer each question. Write the letter of the correct
answer in your answer sheet.
_________1. ________________ are widely characterized as the class of people that use a
system without complete technical expertise required to understand the system fully.
a. Computer-oriented User c. Application-Oriented User
b. Computer User d. Standard User
_________2. This user’s actions are usually recorded, and unable to open any
application, game, or any content that says “parental guidance is advised”.
a. Child User c. Administrator
b. Guest User d. Standard
_________3. This user can fix a broken computer or a gadget.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________4. There are three types of hackers. Which of the following is not belong to
the group?
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________5. This king od hackers are good guys who mess with computers with
permission, to warn other people of security loopholes.
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________6. These are type of users who don’t care about what applications are used,
as long as things get done using computers.
a. Computer-Oriented User c. Goal-Oriented User
b. Application-Oriented User d. Computer User
_________7. Computers are widely used in different aspects. In what industry and
purpose does computer used to solve crimes?
a. Academic c. Commerce
b. Science d. Military and Law Enforcement
_________8. The guys who have so many computer tricks.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________9. Gamers: Entertainment; Operators: __________________
a. Manufacturing and Production c. Military and Law Enforcement
b. Banking and Finance d. Commerce
_________10. All of these are Skill level, except ______________.
a. Computer Dummy c. Computer Wizard
b. Power User d. Application-Oriented User

GOING FURTHER
In what type of computer user do you think you fall into? Support your
answer in 10 sentences.

References:
Asafe, Yekini Nureni, Information Communication Technology (ICT) Concepts and Application:
Self-Directed & Collaborative Learning Approach. Vol.1.Pdf. Department of Computer Technology,
Yaba College of Technology-Yeknua ICT &Educational Research-Publication Centre, No.7, Christ
Possibility Street, Sang-Ota, Ogun State Nigeria 2014

2020 Red Dot Geek


KEY TO CORRECTION

PRE-ASSESSMENT
1. B
2. A
3. C
4. B
5. C
6. C
7. D
8. C
9. A
10. D

ACTIVITY 1
1. B
2. E
3. C
4. I
5. A
6. G
7. J
8. H
9. D
10. F

ACTIVITY 2

User Skill User-Intent Industry


COMPUTER USERS
Level Level level level
1. Bankers /
2. Application-Oriented User /
3. Guest /
4. Standard /
5. Academic /
6. Computer Wizard /
7. Computer-Oriented User /
8. Computer Dummy /
9. Gamers /
10. Child /

POST ASSESSMENT
1. B
2. A
3. C
4. B
5. C
6. C
7. D
8. C
9. A
10.D

You might also like