Search 76 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Basic Personal Computing Device Security Guidelines

We all want to be safe, and have a network that is fast and always available. Here are some recommendations that we in SMC IT Services hope you'll consider as ground rules beyond our ability to enforce them while you are on campus or using Internet-connected SMC resources. ... or loss of files, loss of e-mail and email system delays, confidential information disclosure, network slowdown and disruption, and attacks on other computers and networks, such as denial of service

Moodle - Access/Login

.   If you don’t have a SMC account, you will not have access to Moodle or any other SMC-related systems. Please inform your hiring manager . Your hiring manager should get the SMC account creation

Technical Requirements that should be stated in the Syllabus

most basic requirements are: A stable Internet connection. (Broadband wired or wireless 3G or 4G/LTE. If needed, consult with your Internet Service Provider to get the optimal Internet speed

Asset Management Process

Request (TPR). Click on the ticket. Click on the Assets/Cls tab. Click +Assets/Cls. Search the asset by Serial Number or Service Tag. Click the pre-populated field type, i.e. Desktop, Laptop

User Guide: TV setup

Setting up TV's on the Saint Mary's cable TV system consists of 3 steps: Physically connecting TV to coaxial cable network Confirming TV has an internal QAM tuner or supplying external QAM tuner

DUO Multi Factor Authentication

Duo Security is a company that provides a cloud-based software service that utilizes two-factor authentication to ensure secure access to services and data. This factor is available on MySMC for Faculty and Staff. Read about how it works here. ... What is Duo Security? Duo Security is a company that provides a cloud-based software service that utilizes two-factor authentication to ensure secure access to services and data. What is Two-Factor

LastPass End User FAQ's

create an account and complete the setup process.  3. I lost my invite, how do i get a new one? Please call or enter a ticket with the Service Desk. A member from the IT Security team will issue you

Getting started with Polycom X30/Zoom Room

required video conferencing service. A Laptop with HDMI output can also be connected to an HDMI bypass connection on the X30. (additional HDMI cable required) The X30 is accompanied by a Poly

Illegal File Sharing FAQ

sophisticated systems that crawl the internet to detect copies of songs, movies and software, owned by their clients, that are located on individual computing devices that are on the internet. When a copyright

Moodle - How to: Downloading papers for program/department review

doing the downloads.  To Request This Role Call the Service Desk (925) 631-4266. Best practice is for the program director, chair, or dean to make the call, specifying the individual who is

FAQ: Campus Authentication Portal

) 631-4266 Email Support: servicedesk@stmarys-ca.edu Q: I got locked out of OneLogin: what do I do? When a user has entered his or her password incorrectly too many times the system will

AIRTAME: connecting from a MacOS and Windows device.

the Applications folder to open it.   CONNECTING TO AIRTAME IN THE CLASSROOM Click to open the Airtame application and the following window will appear. Click on the button, Request

Moodle - How to: Integrate an External Tool

. Data includes rosters, roles, and grades. Most often, your browser opens a new tab in which to to use the third-party system. Moodle calls these "External Tools." These include, but are not limited to

How to: Chromebook setup instructions

community.  Chromebooks are a newer type of computer that runs the Chrome opperating system that is designed by Google.  A Chromebook is neither a Windows PC nor a Mac and cannot run Windows nor Mac

FAQ: Data Protection and Privacy - Best Practices

not been altered or destroyed in an unauthorized manner. Data from one system is consistently and accurately transferred to other systems. Availability – the data or information is accessible and