Classification of Computer Users

Only available on StudyMode
  • Download(s) : 435
  • Published : January 22, 2012
Open Document
Text Preview
Steven Cespedes


College Writing

January 9th, 2012

Classification of Computer Users

The sound of the keyboard typing away and the clicking of the mouse throughout the night has become a normal occurrence in every American household. Staying up until two or three in the morning browsing the web has become a characteristic of many computer users today. Since the personal computer has been invented life, work, and pleasure have changed drastically. With the creation of the internet, the possibilities with computers are all but endless. People now have the ability to communicate with others from all over the world. With both of these technologies working together, computers have become a necessity for homes and businesses everywhere. Although the majority of computers are similar in concept, different people use them in different ways. Some use their computers for work and others as a source of entertainment. As long as the world exists, there will be several different types of computer users.

The hacker is one type of computer user, they spend most of their time electronically breaking into other computer’s. The word hacker is synonymous with internet crimes, however hackers are highly intelligent individuals with a vast knowledge of computers. They spend their time trying to break through security systems of various networks connected to the internet. Hackers are infamous for infiltrating CIA databases, credit card companies, or more recently the PlayStation Network and wreaking havoc. These people stay up for hours looking for codes and passwords for various systems on the internet in the hopes of obtaining some sort of valuable information. There are many websites and forums dedicated to this past time which educates the general public as well as new hackers to their game. They know how the computers operate and are usually very familiar with programming languages, so they can create their own programs to break passwords. Half of the time...
tracking img