Everyone has the Internet. And today, almost every child knows how to use a computer, not to mention adults. Computer literacy is to some extent mastered in schools, universities and colleges. But who the student becomes next, what skills he masters - this is a matter of time and the user himself. It is only known that all those who communicate with a PC fall into one of five groups: a teapot, a user, a lamer, a solver and a hacker. Everything is individual. And now we will talk about the most secret - the ability to manage electronic systems.
The kettle boiled, and at least henna
Speaking about who the kettle, user, lamer and other users of personal computers are, they mean specifically a person, and not household items and not kitchen utensils. Although the namesake sitting at the computer has advanced little further in his knowledge than his cousin in the kitchen. And both perform the functions of boiling, only one - water, and the second - brains. You have probably heard the expression "brains melt", and so - it went from here. A teapot is actually a user of a computer and everything attached to it (Internet, hardware, communications), who understands little in such areas and does notwants to delve into because of his laziness or other reasons. The only thing he can do is turn the system unit on and off and crawl with the mouse. And the rest - nothing. Another significant obstacle to skillful surfing for dummies is their fears. Fearing to click in the wrong place or press the wrong key, such people try not to go anywhere.
Who is a user and how is he different from a teapot
Don't feed these Internet users with bread, but let them climb the expanses of the World Wide Web. They are everywhere and as many as ants. Ninety percent of PC, laptop, tablet and smartphone users are the most avid users. They do nothing significant except play games, register on social networks and other obscure projects, communicate in instant messengers. In short, they spend time in entertainment and searching for interesting information. Also, users are permanent residents of online stores, where you can buy some cool little thing for next to nothing. They are not a burden to write comments on blogs and forums and watch movies on YouTube and Yandex-video all day long. Who is a user, knows, perhaps, any dog whose owner has a more or less decent computer. Unlike dummies, these brave men are not afraid of anything and boldly clog hard drives with a bunch of unnecessary rubbish, coupled with viruses, from which their electronic pieces of iron take a long time to cure.
Lamer, or Plyushkin
Well, now it's clear who the user is. Considerthe next category is lamer. These people spend their precious time on the Internet out of curiosity. Basically, these are clients of visited resources, forums, blogs, investment companies and business sites. They hang out online and do pretty much the same things every day. Lamers like to subscribe to various mailing lists, write big complaints to admins and gossip in chats. Such users do not want to get acquainted with the architecture of computers. They tend to know antiviruses and cleaning utilities, as well as software for collecting rather than for use. But no more. Lamers are ordinary Plushkins. This is where their functions end, and although they boast of their literacy in software and drivers, the rest of the work is done for them by the so-called solvers or professionals.
Internet Experts
We figured out the definitions of who a user is, as well as a lamer and a teapot. The most reliable contingent on the Internet, who have risen to the highest level, can be called specialists in various fields of information systems and management. These are true experts in their field. Programmers and marketers, freelancers and designers, copywriters and content managers in different directions. They work wonders. To be more precise, they are developing software in computer languages: Visual Basic, JavaScript, C ++. Implement Internet codes: html, php, css. They build databases and architecture, create websites, cms systems and design. They manage advertising campaigns and fill resources with textual and graphic information. Experts carry out any technical work, starting fromfrom the basics of computer hardware to complex web site diagrams.
From user to hacker - and kings
It turns out that those who can be called a user, in a sense, are not far behind the hackers in the hierarchy. Although the latter are not just anyone, but seasoned masters in writing malware and hacking resources. In essence, a user is a user who does not understand program codes, but this is where the trick is hidden. Without delving into the meaning of infection, such thoughtless onlookers can spread viruses to thousands of computers without even wanting to. They do not know how to defend themselves and pick up Trojans and rootkits wherever possible. Then they pass them on to acquaintances and friends, and then it is already clear without words … But hackers are a specialized team trained in accordance with all the rules and canons. They "ate their teeth" in fraud and, not shunning anything, they can destroy any Internet target with a wave of their hand, whether it is a site of an ordinary lamer or a portal of national importance. But, thank God, they are now creating and implementing reliable means of protection.
Everyone has their own way
Having learned to use an electronic machine at least a little, the teapot willy-nilly understands who a user is, and moves into this caste. Having wandered around the World Wide Web, he chooses one of two roads:
- Stay the same and get stronger in internet surfing.
- Continue learning and become a confident pro.
Everyone has their own way. Well, if youfeel confidence and excitement in acquiring computer skills, then go ahead and do not stop there!