Search 76 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
Basic Personal Computing Device Security Guidelines
We all want to be safe, and have a network that is fast and always available. Here are some recommendations that we in SMC IT Services hope you'll consider as ground rules beyond our ability to enforce them while you are on campus or using Internet-connected SMC resources. ... or loss of files, loss of e-mail and email system delays, confidential information disclosure, network slowdown and disruption, and attacks on other computers and networks, such as denial of service
Moodle - Access/Login
.
If you don’t have a SMC account, you will not have access to Moodle or any other SMC-related systems. Please inform your hiring manager . Your hiring manager should get the SMC account creation
Technical Requirements that should be stated in the Syllabus
most basic requirements are:
A stable Internet connection. (Broadband wired or wireless 3G or 4G/LTE. If needed, consult with your Internet Service Provider to get the optimal Internet speed
Asset Management Process
Request (TPR).
Click on the ticket.
Click on the Assets/Cls tab.
Click +Assets/Cls.
Search the asset by Serial Number or Service Tag.
Click the pre-populated field type, i.e. Desktop, Laptop
User Guide: TV setup
Setting up TV's on the Saint Mary's cable TV system consists of 3 steps:
Physically connecting TV to coaxial cable network
Confirming TV has an internal QAM tuner or supplying external QAM tuner
DUO Multi Factor Authentication
Duo Security is a company that provides a cloud-based software service that utilizes two-factor authentication to ensure secure access to services and data. This factor is available on MySMC for Faculty and Staff. Read about how it works here. ... What is Duo Security?
Duo Security is a company that provides a cloud-based software service that utilizes two-factor authentication to ensure secure access to services and data.
What is Two-Factor
LastPass End User FAQ's
create an account and complete the setup process.
3. I lost my invite, how do i get a new one?
Please call or enter a ticket with the Service Desk. A member from the IT Security team will issue you
Getting started with Polycom X30/Zoom Room
required video conferencing service. A Laptop with HDMI output can also be connected to an HDMI bypass connection on the X30. (additional HDMI cable required)
The X30 is accompanied by a Poly
Illegal File Sharing FAQ
sophisticated systems that crawl the internet to detect copies of songs, movies and software, owned by their clients, that are located on individual computing devices that are on the internet. When a copyright
Moodle - How to: Downloading papers for program/department review
doing the downloads.
To Request This Role
Call the Service Desk (925) 631-4266. Best practice is for the program director, chair, or dean to make the call, specifying the individual who is
FAQ: Campus Authentication Portal
) 631-4266
Email Support: servicedesk@stmarys-ca.edu
Q: I got locked out of OneLogin: what do I do?
When a user has entered his or her password incorrectly too many times the system will
AIRTAME: connecting from a MacOS and Windows device.
the Applications folder to open it.
CONNECTING TO AIRTAME IN THE CLASSROOM
Click to open the Airtame application and the following window will appear.
Click on the button, Request
Moodle - How to: Integrate an External Tool
. Data includes rosters, roles, and grades. Most often, your browser opens a new tab in which to to use the third-party system. Moodle calls these "External Tools." These include, but are not limited to
How to: Chromebook setup instructions
community. Chromebooks are a newer type of computer that runs the Chrome opperating system that is designed by Google.
A Chromebook is neither a Windows PC nor a Mac and cannot run Windows nor Mac
FAQ: Data Protection and Privacy - Best Practices
not been altered or destroyed in an unauthorized manner. Data from one system is consistently and accurately transferred to other systems.
Availability – the data or information is accessible and