Search 369 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
FAQ: GMail
information throughout the community while also efficiently managing and organizing emails and contacts.
Q: How can I access Gmail?
A: There are three ways to access a user’s SMC Gmail account
What is the Tech Bar?
further information on a technology related topic. Walk-ins welcome and encouraged.
Q: Where can I find the Tech Bar?
The Tech Bar is on the first floor in Saint Albert's Hall (Library).
Q: Can I
How-To setup 2-Factor Verification on Google
required to present something you know (Password) and something you have (your phone or other security key). ... What is 2-Factor Verification?
2-Step Verification is designed to create an additional layer of protection agains malicious users trying to gain access to your information. By enabling 2-Factor
What is Phishing?
Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and/or other sensitive data. Phishing is most often seen in the form of ... Overview
Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and/or other sensitive data. Phishing is most often seen in the
FAQ: Repair
move to a "Bring Your Own Device" (BYOD) model in the future after a considerable investment in infrastructure, operations and security, the care and repair of personally-owned information technology
Technology Use Policy
Mary’s College of California Password Policy
Saint Mary’s College of California Web and Blog Use Policy
Saint Mary’s College of California Institutional Information Security Policy
Moodle - Quiz: Review Options
, and during their attempt in "adaptive mode." It is a matrix with check boxes.
Quiz information that can be controlled
The attempt - Will show how the student responded to each question
Phishing Example: Unofficial "Benefits" Email
as login credentials, credit card information, or bank account details.
Although we maintain controls to help protect our networks and computers from cyber threats, we rely on you to be our first
Google Drive - Basic instructions
easily store, search, and access their files anywhere; for example, when working a project together). More information about “Shared drives” from Google Support: https://support.google.com/a/users
YouTube: How to upload a video to your SMC YouTube Channel
information about your video. After you have done so, click <Next>.
8. At the Video Elements screen, click <Next>.
9. At the Visibility screen, set your video to <Unlisted> and click <Save>.
10
Zoom: Schedule a Meeting
window appears (B), click <Start Zoom Meeting> or <Join Zoom Meeting>. (B)
More detailed information on how to schedule meetings from Zoom Help Center: https://support.zoom.us/hc/en-us/articles/201362413-How-Do-I-Schedule-Meetings-
Creating a GMail Signature
An email signature is a bit of text, such as a user’s contact information or a favorite quote, that’s automatically inserted at the bottom of every message they send.
To create a new signature
FAQ: Google Drive
menu select Drive.
Key in this or click on this url https://drive.google.com/a/stmarys-ca.edu/ and log in with your SMC account information.
Q: What kind of files can I store on my Google
Phishing Example: Google Doc Phishing Message
can take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details.
Although we maintain
Asset Management Process
type be used. If the information you are entering doesn't exist under that specific field, i.e. Product Model, Supplier, etc., you will need to create it by clicking on +New on the main screen of TDX