My Personal Story About Getting Scammed

The same people that I had sent money to had also sent me gifts to sell for money. The gifts themselves came to my sister’s house in another person’s name. I was supposed to sell them for money and send it to Accra, Ghana. I still have the gifts that were sent to me back in 2009. I cannot wear any of the clothes that they have sent me. My family members really think there is something wrong with me. I have tried to tell everyone that this is not my fault. I still have all of my Western Union receipts if anyone wants to challenge me in any way because this is not a laughing matter. I could have taken all of that money and pay my rent as well as stayed at my job.

I lost both of my jobs simply because I got scammed. The scammers and computer hackers were calling me at my job asking for money during the time I have worked at the University of North Carolina at Charlotte. The scammers and hackers also have all of my family members email addresses and phone numbers. They also have all of my friend’s information as well. The email addresses that; the computer hackers and scammers used to chat with me did not belong to them. This information was hacked. I was a fool and I did not know that everything was hacked, cloned, and duplicated.

The scammers and computer hackers called me all the time from telephone numbers that were cloned. I always thought that telephone cloning was done by law enforcement whenever they are tracking down suspects. I have sent all of my information to every newspaper worldwide as well as the police department because these suspects are still getting away with this sort of crimes. I had reported all of my information to Western Union Fraud Department so that I can file a fraud report as well as file fraud charges against these people. I still have all of my receipts for record keeping purposes. I also have the original criminal report from all of the law enforcement agencies worldwide.

The criminals themselves are using credit cards right now to engage in their crimes right now. One of them had recently contacted me online and asked me if I had a credit card. I told them that my credit cards were maxed out. This means that my credit cards are over their limits. I cannot use them. The police always told me to save my information online and request for phone records. I have to request for all of my telephone records because these criminals must be stopped. All of the cell phone calls came from Accra, Ghana; which is a city in western Africa. A lot of crimes like this take place in Africa, United States, Canada, Brazil, Cuba, India, Russia, Nigeria, and Malaysia.

Online Scamming has been going on since 1974. This is when a lot of people had started using Western Union and Money gram to send money. One of the scammers had the nerve to call my mother on February 27, 2010 requesting for money. My family members have been cussing them out because they already know that; they have brought me a whole lot of distress. Whenever a hacker or scammers call you on the telephone, it means that you have made an agreement to do something for them.

The computer hackers and scammers started calling me because I thought that I was going to get married to someone overseas. They used the pictures of women who were living in the United States as a cover. The women’s profiles provide a shield for each hacker and scammer to converse with men and women online. Another thing that a person can do is provide a password so that both of you can remember whenever you are online with each other. I had voluntary gave my information out to the scammers and computer hackers because at first, I thought I was talking to someone from the United States.
I thought I was talking to someone from the United States when it turned out to be a legitimate scam. I was set up from the very beginning. Whenever anyone is talking to a scammer or a computer hacker, always look out for words or phrases such as “I am cool!” and you. This means that you are talking to a scammer. Whenever you are talking to a female scammer or computer hacker, they always use the word love a whole lot. This is a clue!!! This means that you are talking to a computer hacker and scammer. Always keep your information from Western Union and Money gram. Whenever you receive a phone call from a computer hacker or scammer, it is always an unavailable phone number or private phone call.

The numbers themselves are impossible to trace. Always remember that whenever you are communication with a scammer or a computer hacker, always check the information at its entirety. Always thoroughly check and see how long the person remained online. If I would have known what I know right now, I would have kept my job at the University of North Carolina at Charlotte, and I would not have been evicted out of my apartments and rooming houses. I would have paid a whole lot of attention to the clues online;

Test Scores

 15,102 1627 568

Great job, Anthony Joseph Hopkins!

You’ve taken #300 in the Weekly Competition in Ohio (The United States). Way to go!Share on Facebook

Ohio, The United States

Regional competition

Number of players: 448 (0 friends)

February, 26 — March, 03

  • All players
  • Friends

1Dave Smith Since: 01/201622162 2Mike Papa Since: 03/20164798 3drcat Since: 01/20194704 

TOP 10

7 players

2905 

TOP 50

40 players

1690 

TOP 100

54 players

1290 

TOP 150

51 players

1005 

TOP 200

52 players

519 

TOP 250

52 players

141 

TOP 300

119 players

251gracie’smom 140 252Cindy Evans 137 253Bayani Ramos 136 254Chris M de S 131 255Judy Franklin + 1 other player126 256Lorrie Hager 125 257smittic 123 258Paul Mary Jean Meyer 122 259Deborah Dunbar 119 260paliebhard 117 261bookem 113 262robintackett 111 263Janice Mastin-Kamps 110 264onlyskyefyre 108 265Cindy Miser 105 266Roesch bob 100 267Marta Richardson 98 268apelhome 95 269Kim Steigleder Knapp + 1 other player93 270Lhattab + 1 other player90 271Debbie Deal + 1 other player85 272Anne Thompson 75 273Leea Skaroupka + 1 other player72 274Wayne Foulk + 1 other player70 275Robert West 68 276Louise Ball 67 277S.D.Cohen 66 278Jack McDonald + 6 other players65 279sissy 64 280tenman + 1 other player62 281Mark Webber + 5 other players60 282Vicki Henkel + 1 other player57 283Leslie Mehne 56 284Kim Parker Wood + 5 other players55 285alykat + 1 other player53 286donnajp + 1 other player52 287Ilona Welker + 9 other players50 288Cathy Kinison 47 289fatboyflh 46 290fees ripple + 9 other players45 291Sandra Pendleton 43 292Bonnie Cairns Dunkle + 9 other players40 293Jimmy LiPuma 38 294Martha Fülöp Reed + 5 other players35 295Debbe Smith Schmidt + 1 other player34 296Tina Amorini 32 297Lynn Romeo + 10 other players30 298llldpack 29 299Patricia Dalton 27 300Anthony Joseph Hopkins We know you can be the best player. Keep up the good work!26 

TOP 350

70 players

https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-9255725336631350&output=html&h=320&slotname=2426541103&adk=1263212853&adf=3791006476&pi=t.ma~as.2426541103&w=384&lmt=1709784978&rafmt=1&format=384×320&url=https%3A%2F%2Fquizzclub.com%2Fstatewide-weekly-competition-ranking%3FCSSource%3DNotifications%26CompetitionId%3D145375%23google_vignette&fwr=1&fwrattr=true&rpe=1&resp_fmts=3&sfro=1&wgl=1&uach=WyJBbmRyb2lkIiwiMTQuMC4wIiwiIiwiU00tQTE0NlUiLCIxMjIuMC42MjYxLjkxIixudWxsLDEsbnVsbCwiIixbWyJDaHJvbWl1bSIsIjEyMi4wLjYyNjEuOTEiXSxbIk5vdChBOkJyYW5kIiwiMjQuMC4wLjAiXSxbIkdvb2dsZSBDaHJvbWUiLCIxMjIuMC42MjYxLjkxIl1dLDBd&dt=1709784977825&bpp=3&bdt=189&idt=400&shv=r20240305&mjsv=m202403040101&ptt=9&saldr=aa&abxe=1&cookie=ID%3D663dff75daf11490%3AT%3D1708056354%3ART%3D1709784956%3AS%3DALNI_MYJsLm3M04uTvhtU36ANS3kEeeqbQ&gpic=UID%3D00000dc11b77c7c1%3AT%3D1708056354%3ART%3D1709784956%3AS%3DALNI_MagmkK_N0XC78EaGnH41gAvkPwidA&eo_id_str=ID%3D1125324ad139782f%3AT%3D1708056354%3ART%3D1709784956%3AS%3DAA-AfjZY5bZEQREW-olKilDSKFC8&prev_fmts=0x0&nras=1&correlator=1403722780369&frm=20&pv=1&ga_vid=1792413675.1708056354&ga_sid=1709784978&ga_hid=2075290713&ga_fc=1&ga_cid=1346952509.1709778351&u_tz=-300&u_his=3&u_h=857&u_w=384&u_ah=857&u_aw=384&u_cd=24&u_sd=2.813&dmc=4&adx=0&ady=4289&biw=384&bih=729&scr_x=0&scr_y=197&eid=44759875%2C44759926%2C44759842%2C44785293%2C44798934%2C95325753%2C95325976%2C31081603%2C95322184%2C95324160%2C95325785%2C95326430%2C95326919%2C31078663%2C31078665%2C31078668%2C31078670&oid=2&pvsid=2899506652601433&tmod=2109274293&uas=0&nvt=2&ref=https%3A%2F%2Fquizzclub.com%2Fstatewide-weekly-competition-ranking%3FCSSource%3DNotifications%26CompetitionId%3D145375&fc=1920&brdim=0%2C0%2C0%2C0%2C384%2C0%2C384%2C729%2C384%2C729&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=128&bc=31&bz=1&td=1&psd=W251bGwsbnVsbCxudWxsLDNd&nt=1&ifi=2&uci=a!2&btvi=1&fsb=1&dtd=418

ADVERTISEMENT

Copyright © 2024 quizzclub.com. All rights reserved


This site is not a part of the Facebook website or Facebook Inc. Additionally, this site is NOT endorsed by Facebook in any way.
FACEBOOK is a trademark of FACEBOOK, Inc.

Disclaimer: All content is provided for entertainment purposes only

Data Thieves

Data Thieves

What are data thieves? Let’s start off by revealing the definition of a data thief. First, the definition of data is raw facts and numbers; whereas a thief is a man, woman, or child that takes something that does not belong to them. To put it all together, a data thief is a man, woman, or child that illegally retrieves and steals personal data from innocent people. When it comes to certain data thieves, especially on Moco Space, Face Book, Yahoo, and MySpace dotcommed websites, the thieves usually start off by leaving instant messages to others while they are online. It starts off subtle or innocent. There are people who are online for example, on their Moco Space homepage; suddenly they receive an instant message from a friend or stranger. The instant message starts off by saying “How are U?”, or hello. It is your choice to whether to reply or decline the instant message. Most people like me have a lot of friends on Moco Space, Face Book, Yahoo, and MySpace.

Next, the message that you type into the small square box is revealed to everyone in the entire world. The reason why is because your privacy and confidentiality has been deprived from you. Data Thieves on the other hand collect sensitive information, such as social security numbers, names, addresses, bank account information, and anything that has an account on it. Anything that has an account on it especially in your name, data thieves retrieve it and use it as their own. The best way to resolve this issue with data thieves is by establishing a private account consisting of your friends online and no one else. However, the data thieves are so savvy and computer smart because right now, what they are doing is retrieving your picture from your private account and name and placing it into a database that you are not aware of. These data thieves are classified as online voyeurs. They use web cameras, computers, fax machines, scammers, printers, laptops, I-Pads, and Smart phones just to retain your information.

In addition to all of this, data thieves are using chat rooms a whole lot. Some of these chat rooms are unknown to an average person. This is because there are international accounts as well as accounts in other countries. For example, I have a Yahoo account in Japanese. I really did not know that I can translate Japanese language and the symbols are a giveaway. Each symbol has a message or a sentence. Each language can be translated and understood by average American Citizens. It is not really hard. The Data Thieves that are on Moco Space are located worldwide. Most of the thieves of this magnitude are located overseas. The only thing that a person need to do is only ignore the instant messages and the instant messages will eventually go away. Most of the instant messages come from other men who are online who are located in the United States. However, an average person’s account can be hacked and safe cracked.

Further, the data thieves that are online period will display your information to everyone that is online without your common knowledge. If a person is logged off their account, and if your information is still revealed to others, then your account is hacked by data thieves that are using a chat room in an unknown location. The only thing that a person can do at that time is close their accounts and open up another account. It is best to inform the Information Technology Department and Help Desk at the website that you are using so that you will be able to make a report. By filing a cyber-crimes report, you will be able to report the incident and location of the online incident.

Finally, always remember to examine your information on your homepage to determine whether there are any changes that you are not familiar with. For example, if a person added their name or anything to your homepage. The e-cards from your friends are well understood. However, if a person sends anything such as e-cards or messages that are derogatory in nature, this means that you are talking to a data thief. If there are too many acronyms in one sentence, then you are talking to your friends or a computer hacker. This is very serious because I have had questions on my account because there I have a whole lot of friends and the computer hackers, scammers, and data thieves take full advantage of it. It is best to check with your friends to see if they have sent you a message first before jumping to conclusions. One thing that people do not want to do is jump to conclusions. Always stay calm and relaxed when it comes to these kinds of situations when it comes to data thieves, computer hackers, and scammers. Always remember that you have the power over your account and personal information. Be really careful and stay strong!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Test to Determine Education

College Graduate

You graduated from college with distinction. You are committed to lifelong learning, and you have a no-limit mindset. You were flexible and organized. You’ve shown a positive attitude toward study, and a passion for your chosen course subjects. Keep it up!!

Is It True the God is Giving us Instructions while we are sleeping?

Is It True That God Gives Us Instructions While We Sleep?

        Good Day Everyone!! I have a very important question to ask all of you.  Is it true that God gives us instructions while we sleep?  The answer to this question is yes!!  The Lord God instructs us what to do in advance, even while we are sleeping.  Let’s look at this Bible verse for a moment.  As I was reading inside of the Book of Job, I happen to stumble on this Bible verse.  It intrigued me because one thing that I can say is that God is still working with all of us.

 Do you know that some people do not read through this particular Book of the Bible?  I literally read through the entire Bible each day of the week.  I am starting all over right now.  I read the Bible and highlight all of the promises that are located inside of the Old and New Testament.  One of my favorite Bible verses happens to be Jeremiah 1:5.

        I really like this Bible verse because God knew us when we were inside of the womb of our mothers.  He has ordained us as prophets unto the nations.  I am thrilled to be a Child of the Most High God!!  I am so enthused about being born again that I am not afraid to share with everyone what the Lord have done for me.  I am happy because I have a second chance at life.  When it comes to God sealing our instructions for all of us, I am very happy that I have things that I have to do for the Lord in advance.  Therefore, my entire day has already been planned out for me.

        Finally, I will admit that I have been with principalities for the past 9 years.  Even though I have been distracted by things that are not of God.  I am happy that God is still working inside of me.  It is God who is doing for me more than I am doing for myself.  I have been clean and sober for the past 33 years now.  I no longer have a desire to drink and smoke marijuana.  I no longer have a desire for the things of the world.  I am happy, joyous, and free right now. 

        In conclusion, all of my instructions by the Lord have been sealed in advance.  I do not have to worry about principalities, powers, and the ruler of darkness of this age.  I realize that I am a man, and there are times when things are going to bother me, but I do not have to let it get the best of me.  2nd Timothy 1:7 says For God has not given us a spirit of fear, but of love, power, and of a sound mind.  I no longer have anything to worry about, nor fear because God has my back, front, and still remain by my side.  It is true everyone that God gives us instructions even while we are sleeping.  God Bless Everyone!!

Mistakes

Mistakes that are made by Computer Hackers

Most of your computer hackers and scammers ask questions to others when they are online. For instance, if a computer hacker or scammer ask you what time is it in the day, this means that they are located in another city, state, or country. It is very important for everyone to pay attention to what the computer hackers and scammers are asking you. This is because they are trying to devise a scheme or plan to obtain some information or money from you. What most hackers and scammers are using right now are credit cards from other victims. What they usually asked another person or victim to do is for their credit card information and they will take advantage of you. In most cases, the victim will be charged with credit card fraud. This is because the hacker or scammer has gained someone else’s information illegally and without their consent or knowledge. It is very important not to give another person that you are online with your personal information. Never leave your phone number, physical address, and anything that a computer hacker, scammer, or data thief can gain access to it. Never give your personal information to someone that you do not know. A computer hacker asked me this afternoon 1/25/2013 what time is it where I was located. It baffled me because most of your hackers and scammers are overseas. They also greeted me Good Morning and they also asked me whether or not it was morning where I lived. I told them no!! This is extremely unusual because most computer hackers and scammers that are on certain websites know exactly what time it is. Another thing that computer hackers, scammers, and data thieves can do is change information while a person is on the website. This is also very suspicious as well. Whenever a person’s profile changes while you are examining it, this means that there is a likelihood that the profile is hacked. Another thing is that a computer hacker, scammer, or data thief can revise your profile without you even knowing it. They can add or delete information without you even knowing it. It is extremely important for everyone to please examine their profile very carefully. It is important that you know the person that you are talking to; so that you can be reassured. Always examine and check your profile each day that you are online to make sure that everything is right where you left it. Accuracy is important!!!!!!!!!!!!!!!!!!!!!!

History of Online Scamming

Online Scamming has been going on since 1974. This is when a lot of people had started using Western Union and Money gram to send money. One of the scammers had the nerve to call my mother on February 27, 2010 requesting for money. My family members have been cussing them out because they already know that; they have brought me a whole lot of distress. Whenever a hacker or scammers call you on the telephone, it means that you have made an agreement to do something for them.

The computer hackers and scammers started calling me because I thought that I was going to get married to someone overseas. They used the pictures of women who were living in the United States as a cover. The women’s profiles provide a shield for each hacker and scammer to converse with men and women online. Another thing that a person can do is provide a password so that both of you can remember whenever you are online with each other. I had voluntary gave my information out to the scammers and computer hackers because at first, I thought I was talking to someone from the United States.
I thought I was talking to someone from the United States when it turned out to be a legitimate scam. I was set up from the very beginning. Whenever anyone is talking to a scammer or a computer hacker, always look out for words or phrases such as “I am cool!” and you. This means that you are talking to a scammer. Whenever you are talking to a female scammer or computer hacker, they always use the word love a whole lot. This is a clue!!! This means that you are talking to a computer hacker and scammer. Always keep your information from Western Union and Money gram. Whenever you receive a phone call from a computer hacker or scammer, it is always an unavailable phone number or private phone call.

The numbers themselves are impossible to trace. Always remember that whenever you are communication with a scammer or a computer hacker, always check the information at its entirety. Always thoroughly check and see how long the person remained online. If I would have known what I know right now, I would have kept my job at the University of North Carolina at Charlotte, and I would not have been evicted out of my apartments and rooming houses. I would have paid a whole lot of attention to the clues online; such as “My mother and father live overseas in Africa.” Another phrase to pay attention to is my mummy or daddy needs money. They always misspell a lot of words. This means that you are talking to a computer hacker.

Computer Hackers and Scammers always use profiles of people who have a lot of friends or who are extremely attractive. They prefer women to be wearing their underwear and short shorts. All computer hackers and scammers prefer women’s profiles. They use chat rooms a whole lot as well as instant messenger from Yahoo and Black planet as well as Face Book. It is always best to pay attention to all of the words and sentences that really do not make sense. If a person does not use proper grammar and too much short sentences, then you are talking to a computer hacker. Always tell your friends online to start using proper English. Tell them that you have been hacked before and all of this hmu complicates things. Tell your friends to spell it out. Please be perfectly careful and never give your personal information out to anyone.

Personal Story About Getting Scammed 2

Online Scamming has been going on since 1974. This is when a lot of people had started using Western Union and Money gram to send money. One of the scammers had the nerve to call my mother on February 27, 2010 requesting for money. My family members have been cussing them out because they already know that; they have brought me a whole lot of distress. Whenever a hacker or scammers call you on the telephone, it means that you have made an agreement to do something for them.

The computer hackers and scammers started calling me because I thought that I was going to get married to someone overseas. They used the pictures of women who were living in the United States as a cover. The women’s profiles provide a shield for each hacker and scammer to converse with men and women online. Another thing that a person can do is provide a password so that both of you can remember whenever you are online with each other. I had voluntary gave my information out to the scammers and computer hackers because at first, I thought I was talking to someone from the United States.
I thought I was talking to someone from the United States when it turned out to be a legitimate scam. I was set up from the very beginning. Whenever anyone is talking to a scammer or a computer hacker, always look out for words or phrases such as “I am cool!” and you. This means that you are talking to a scammer. Whenever you are talking to a female scammer or computer hacker, they always use the word love a whole lot. This is a clue!!! This means that you are talking to a computer hacker and scammer. Always keep your information from Western Union and Money gram. Whenever you receive a phone call from a computer hacker or scammer, it is always an unavailable phone number or private phone call.

The numbers themselves are impossible to trace. Always remember that whenever you are communication with a scammer or a computer hacker, always check the information at its entirety. Always thoroughly check and see how long the person remained online. If I would have known what I know right now, I would have kept my job at the University of North Carolina at Charlotte, and I would not have been evicted out of my apartments and rooming houses. I would have paid a whole lot of attention to the clues online; such as “My mother and father live overseas in Africa.” Another phrase to pay attention to is my mummy or daddy needs money. They always misspell a lot of words. This means that you are talking to a computer hacker.

Computer Hackers and Scammers always use profiles of people who have a lot of friends or who are extremely attractive. They prefer women to be wearing their underwear and short shorts. All computer hackers and scammers prefer women’s profiles. They use chat rooms a whole lot as well as instant messenger from Yahoo and Black planet as well as Face Book. It is always best to pay attention to all of the words and sentences that really do not make sense. If a person does not use proper grammar and too much short sentences, then you are talking to a computer hacker. Always tell your friends online to start using proper English. Tell them that you have been hacked before and all of this hmu complicates things. Tell your friends to spell it out. Please be perfectly careful and never give your personal information out to anyone.

Personal Story about getting scammed.

Computer Hackers and Scammers always use profiles of people who have a lot of friends or who are extremely attractive. They prefer women to be wearing their underwear and short shorts. All computer hackers and scammers prefer women’s profiles. They use chat rooms a whole lot as well as instant messenger from Yahoo and Black planet as well as Face Book. It is always best to pay attention to all of the words and sentences that really do not make sense. If a person does not use proper grammar and too much short sentences, then you are talking to a computer hacker. Always tell your friends online to start using proper English. Tell them that you have been hacked before and all of this hmu complicates things. Tell your friends to spell it out.

Please be perfectly careful and never give your personal information out to anyone. There is still a problem online!!! There are too many people who are still submitting their telephone numbers online on Yahoo, Black Planet, Moco Space, and Face Book. There are a lot of single people who are still leaving their phone numbers online on these websites as well as dating websites to others. Do you know that whenever you are online, computer hackers and scammers are online waiting for you? This is very serious!! This means that you are more than likely to get computer hacked.

Another thing that hackers are doing right now is downloading pictures from women who have private accounts. This has been going on for years. It is that these women do not know that the hackers and scammers can cut and paste a female’s photograph and paste it onto their private websites. This has happened a whole lot lately. This is very serious. Even though your profile is private, you can still be hacked. They have another way of getting your information. This is very serious!! Always be extremely careful whenever you are online and you will not get hacked. Private profiles are not exempt to getting hacked. This is the reason why it is very important that you be careful!!! Whenever, you are online, you are taking a chance of getting hacked on non secure websites.

Cybercriminals

These criminals are very, very, sneaky, and devious. They are also computer savvy. There are millions of women’s profiles that are cut and pasted each day by computer hackers, scammers, and data thieves. What makes everyone very sad is that these criminals are very hard to catch. It takes a member of law enforcement, who works in cyber crimes to catch these types of criminals. There are cyber criminals who are just as savvy as members of law enforcement. They also have the latest gadgets that law enforcement is using each day to try to curtail this type of crime. Cyber criminals have a tendency to only focus on account information of their victims. This type of criminal focuses on information pertaining to bank accounts, payroll information, as well as social security numbers of people who are online.

This is a type of criminal who is a white collar criminal and this individual is capable of wiping out all of your money in your bank account. Cyber Criminals are usually come from middle class homes and they possess computers and laptops as well as a smart phone in their pocket. These criminals have a printer, as well as a fax machine and scanner. Cyber criminals are very smooth talking people and they usually collect information from databases very easy. This is a criminal who is usually someone from any ethnic background and they have computer jobs in the past. This is an individual who is really computer savvy and is always eager to stay active online.

Cyber criminals are located anywhere worldwide. They are always busy 24 hours per day online. These criminals remind us of a snake. A snake usually warns an average person by hissing. This means to stay away from me. A cyber criminal is the same exact way. The difference is that a criminal of this magnitude is online anywhere and they are always active at night. Between the hours of 12:00am -8:00am is when they are usually their busiest. It really has a lot to do with time. If the time is different than it is in the United States, then most of the criminals are active.
For example, in Africa it is a 7 to 8 hour time difference when it comes to USA time. In other countries it is an 8 to 14 hour time difference. Computer criminals are active all over the entire globe. There are other countries that are active than others. Most of these criminals are college educated and they have at least a graduate degree in computer science. There are criminals who are younger than 18 years old who illegally gain access information about other people by hacking and tampering with their records. This is done by illegally intercepting usernames and passwords of officials or others who are employed at a school or facility. Cyber criminals are very bright individuals. They have an above average IQ. These criminals as well as scammers know how to use computer programs.