Search 369 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

FAQ: GMail

information throughout the community while also efficiently managing and organizing emails and contacts. Q:  How can I access Gmail? A:  There are three ways to access a user’s SMC Gmail account

What is the Tech Bar?

further information on a technology related topic.  Walk-ins welcome and encouraged. Q: Where can I find the Tech Bar? The Tech Bar is on the first floor in Saint Albert's Hall (Library). Q: Can I

How-To setup 2-Factor Verification on Google

required to present something you know (Password) and something you have (your phone or other security key). ... What is 2-Factor Verification? 2-Step Verification is designed to create an additional layer of protection agains malicious users trying to gain access to your information. By enabling 2-Factor

What is Phishing?

Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and/or other sensitive data. Phishing is most often seen in the form of ... Overview Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and/or other sensitive data. Phishing is most often seen in the

FAQ: Repair

move to a "Bring Your Own Device" (BYOD) model in the future after a considerable investment in infrastructure, operations and security, the care and repair of personally-owned information technology

Technology Use Policy

Mary’s College of California Password Policy Saint Mary’s College of California Web and Blog Use Policy Saint Mary’s College of California Institutional Information Security Policy

Moodle - Quiz: Review Options

, and during their attempt in "adaptive mode." It is a matrix with check boxes.  Quiz information that can be controlled The attempt - Will show how the student responded to each question

Phishing Example: Unofficial "Benefits" Email

as login credentials, credit card information, or bank account details. Although we maintain controls to help protect our networks and computers from cyber threats, we rely on you to be our first

Google Drive - Basic instructions

easily store, search, and access their files anywhere; for example, when working a project together). More information about “Shared drives” from Google Support: https://support.google.com/a/users

YouTube: How to upload a video to your SMC YouTube Channel

information about your video. After you have done so, click <Next>. 8.  At the Video Elements screen, click <Next>.  9.  At the Visibility screen, set your video to <Unlisted> and click <Save>. 10

Zoom: Schedule a Meeting

window appears (B), click <Start Zoom Meeting> or <Join Zoom Meeting>. (B)  More detailed information on how to schedule meetings from Zoom Help Center:  https://support.zoom.us/hc/en-us/articles/201362413-How-Do-I-Schedule-Meetings-

Creating a GMail Signature

An email signature is a bit of text, such as a user’s contact information or a favorite quote, that’s automatically inserted at the bottom of every message they send. To create a new signature

FAQ: Google Drive

menu select Drive. Key in this or click on this url  https://drive.google.com/a/stmarys-ca.edu/  and log in with your SMC account information. Q:  What kind of files can I store on my Google

Phishing Example: Google Doc Phishing Message

can take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details. Although we maintain

Asset Management Process

type be used. If the information you are entering doesn't exist under that specific field, i.e. Product Model, Supplier, etc., you will need to create it by clicking on +New on the main screen of TDX