Tle Ic 1 Module 9 Computer Users
Tle Ic 1 Module 9 Computer Users
MODULE 9
COMPUTER USERS
Republic Act 8293 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation
of such work for profit. Such agency or office may, among other things, impose
as a condition the payment of royalties.
Borrowed materials (i.e. songs, stories, poems, pictures, photos, brand
names, trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission
to use these materials from their respective copyright owners. The publisher
and the authors do not represent nor claim ownership over them.
Development Team
Department: ICT
Writer: GLADYS S. MENDIOLA
INTRODUCTION
There are a million different kinds of people in the world, and also a million
different kinds of computer users.
There is no official “international classification” to the types of computer users,
and so, I am just going to compile the various ways in which people have categorized
them all over the Internet. This module focuses on the different types of computer
users and their generic categorization. Hopefully, one of these will be the answer you
are looking for. Read on!
OBJECTIVES
PRE-ASSESSMENT
Directions: Write the letter of the correct answer in your answer sheet.
_________1. ________________ are widely characterized as the class of people that use a
system without complete technical expertise required to understand the system fully.
a. Computer-oriented User c. Application-Oriented User
b. Computer User d. Standard User
_________2. This user’s actions are usually recorded, and unable to open any
application, game, or any content that says “parental guidance is advised”.
a. Child User c. Administrator
b. Guest User d. Standard
_________3. This user can fix a broken computer or a gadget.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________4. There are three types of hackers. Which of the following is not belong to
the group?
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________5. This king od hackers are good guys who mess with computers with
permission, to warn other people of security loopholes.
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________6. These are type of users who don’t care about what applications are used,
as long as things get done using computers.
a. Computer-Oriented User c. Goal-Oriented User
b. Application-Oriented User d. Computer User
_________7. Computers are widely used in different aspects. In what industry and
purpose does computer used to solve crimes?
a. Academic c. Commerce
b. Science d. Military and Law Enforcement
_________8. The guys who have so many computer tricks.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________9. Gamers: Entertainment; Operators: __________________
a. Manufacturing and Production c. Military and Law Enforcement
b. Banking and Finance d. Commerce
_________10. All of these are Skill level, except ______________.
a. Computer Dummy c. Computer Wizard
b. Power User d. Application-Oriented User
READ AND STUDY
SECTION A There are various user levels in an operating system, and they are
used to control access to various functions on the system. This is a
USER LEVEL generic categorization by the common user levels found in most
operating systems.
1) ADMINISTRATOR
The “god level” unrestricted user who
has the power to install and delete
applications, copy and delete files, even
cause a massive system crash by
messing with the critical system files.
2) STANDARD USER
The regular Joe user who is able to
install and delete applications, update
the system, but is otherwise unable to
mess with the critical system files.
3) GUEST
A restricted user that you can create for
allowing a friend to access your
computer. Able to run the applications
and maybe touch some files, but is
otherwise unable to install or delete
anything.
4) CHILD
Following up with a slew of “too
many violent adult contents”, some
operating systems actually adopted
the use of parental control or a child
account. This user’s actions are
usually recorded, and unable to
open any application, game, or any
content that says “parental guidance
is advised”.
SECTION B Following up, this section groups the computer users by their
skill levels – From a dummy to a computer ninja.
SKILL LEVEL
5) COMPUTER DUMMY
A complete beginner and
someone who is new to the cyber
world. These users always need
assistance.
6) COMPUTER USER
The guys who have “used enough”
computer and is “good enough”
with most of the basics.
7) POWER USER
The guys who have “used too much”
computer and have some technology
tricks up the sleeve.
8) COMPUTER WIZARD
The almighty tech geeks. Give them
a mess of wires, and they can sort it
out. Bring them a broken gadget,
and they can fix it. Everything bad
will turn good in their magic hands.
9) HACKER
Hackers are a different breed from the
wizards. While wizards are
constructive, hackers usually do the
opposite of reverse engineering. They
are generally divided into 3 hats:
Black hat – The bad guys who mess
with computers to do bad things.
White hat – The good guys who mess
with computers with permission, to
warn other people of security loopholes.
Grey hat – The naughty guys who break
the laws, but don’t do a lot of damage.
13) ENTERTAINMENT
Examples users – Gamers, streamers, artists.
These users are fond of using computers for
gaming, blogging and streaming. The gaming
and entertainment industry is hug. It is so
common these days to see people glued to the
smartphone for gaming or watching videos.
14) ACADEMIC
Example users – Teachers and
students.
Gone are the good old days where
teachers write on chalkboards.
Computers simply offer a better way to
teach with slides, images, and videos;
Also a better way to learn with
illustrations and not a whole bunch of
text.
15) SCIENCE
Example users – Researchers and
scientists.
These users do all kinds of mad
scientists’ calculations and simulations.
16) COMMERCE
Example users– Cashiers, managers,
analysts, office workers.
Computer users for the commerce
section are so wide these days. To do
office work, manage customer orders,
generate reports, monthly sales,
warehouse management, etc…
ACTIVITY 2
1. Directions: Classify computer users based on their classification level.
by putting a check (/) mark under the appropriate column.
POINTS TO REMEMBER
Computer users are widely characterized as the class of people that use a
system without complete technical expertise required to understand the system
fully.
There are still more computer users. These mentioned above are just compiled
the various ways in which people have categorized them all over the internet.
There can be more.
You can be more than one type of computer user
POST-ASSESSMENT
Multiple choice: Read, analyze and answer each question. Write the letter of the correct
answer in your answer sheet.
_________1. ________________ are widely characterized as the class of people that use a
system without complete technical expertise required to understand the system fully.
a. Computer-oriented User c. Application-Oriented User
b. Computer User d. Standard User
_________2. This user’s actions are usually recorded, and unable to open any
application, game, or any content that says “parental guidance is advised”.
a. Child User c. Administrator
b. Guest User d. Standard
_________3. This user can fix a broken computer or a gadget.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________4. There are three types of hackers. Which of the following is not belong to
the group?
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________5. This king od hackers are good guys who mess with computers with
permission, to warn other people of security loopholes.
a. Black Hat b. Blue hat c. White hat d. Gray hat
_________6. These are type of users who don’t care about what applications are used,
as long as things get done using computers.
a. Computer-Oriented User c. Goal-Oriented User
b. Application-Oriented User d. Computer User
_________7. Computers are widely used in different aspects. In what industry and
purpose does computer used to solve crimes?
a. Academic c. Commerce
b. Science d. Military and Law Enforcement
_________8. The guys who have so many computer tricks.
a. Computer dummy c. computer wizard
b. Power user d. hacker
_________9. Gamers: Entertainment; Operators: __________________
a. Manufacturing and Production c. Military and Law Enforcement
b. Banking and Finance d. Commerce
_________10. All of these are Skill level, except ______________.
a. Computer Dummy c. Computer Wizard
b. Power User d. Application-Oriented User
GOING FURTHER
In what type of computer user do you think you fall into? Support your
answer in 10 sentences.
References:
Asafe, Yekini Nureni, Information Communication Technology (ICT) Concepts and Application:
Self-Directed & Collaborative Learning Approach. Vol.1.Pdf. Department of Computer Technology,
Yaba College of Technology-Yeknua ICT &Educational Research-Publication Centre, No.7, Christ
Possibility Street, Sang-Ota, Ogun State Nigeria 2014
PRE-ASSESSMENT
1. B
2. A
3. C
4. B
5. C
6. C
7. D
8. C
9. A
10. D
ACTIVITY 1
1. B
2. E
3. C
4. I
5. A
6. G
7. J
8. H
9. D
10. F
ACTIVITY 2
POST ASSESSMENT
1. B
2. A
3. C
4. B
5. C
6. C
7. D
8. C
9. A
10.D