Wi-Fi not working as fast as you’d like? Believe it or not, there are reasons your Netflix account isn’t streaming as fast as you’d like. Going wireless is not faster for anyone. The signal quality is affected by a number of things, all of which you and your neighbors can control.
Wireless printers and personal routers, for example, contribute to poor wireless signal for everyone. Don’t blame ITS next time your internet is slow; your neighbor’s wireless printer could be the true culprit. Ask them to use a USB cable for printing, and report unapproved wireless routers to your RA.
Read more about network routers and wireless printers on the college’s Acceptable Use Policy: http://www.etown.edu/offices/its/Policies.aspx
So, you waited until the last minute, and now you’re scrambling to find the perfect Valentine’s Day gift for that certain someone. Well, you might have to settle for a chuckle, because perfect requires more shipping time, but here’s a few cool V-Day gifts anyway. Psst, pro-tip! Thinkgeek.com has great gifts for anyone any time of the year, but especially the geek or nerd in your life on Valentine’s Day. Plus, the site has free shipping on orders over $75, so buy yourself something while you’re at it! What will you choose?
These days it seems that pop-ups are worse than ever. All new pages bring pop-ups with them. Or do they? If a page is causing pop-ups or constantly encouraging you to download/update software, that is a page you might want to avoid.
The internet is filled with Malware, fake software that often loads viruses onto your computer. To avoid Malware, be very cautious about the links you click. A Java updater isn’t always an actual Java updater. Sometimes, it’s clever Malware waiting to fill your computer with viruses that slow your computer down or even cause serious problems like lost files.
How exactly do you avoid Malware?
Well, it’s not a science. Just be careful what you click. If a website doesn’t look reputable, then don’t click any links or ads. If a website opens with a pop-up, then go back. Sometimes viruses can sneak in the second you open a website without even clicking any bad ads.
Avoid websites that seem sketchy right off the bat.You wouldn’t open doorways down a haunted hallway, you’d turn around and run for your life. When you’re on a bad website, you’re running for your computer’s life.
A simple ad blocker can prevent many of the pop-ups or ads that you see on websites. For most browsers, like Chrome and Firefox, you can search for something called an extension or an add-on. These are often free apps that you can download to improve your user experience. A recommended program would be Adblock Plus for Chrome or Firefox. Remember though, not all add-ons or extensions are safe either. Double check before you download anything from the internet.
What do I do if I already have Malware on my computer?
That’s where antivirus software and pop-up blockers come to the rescue. A virus scanner, like Symantec Endpoint Protection, will help protect your computer from unwanted Malware and viruses. Symantec will also eliminate viruses that manage to get onto your computer too. For more assistance eliminating viruses or malware from your computer, you can try MalwareBytes. Stop by the Help Desk for more information.
Antivirus software ultimately works to protect the entire system from viruses. Each computer on campus is a player in protecting our system. That is why every single computer on campus must have Symantec installed to access our Wi-Fi. For more information on Symantec, or instructions for updating your software, check out this Knowledgebase article on Symantec Endpoint Protection.
Be careful where you click, and make sure that your antivirus software is running and up-to-date. You never know if there is a virus hiding behind a link. For more information on internet security check out these Knowledgebase articles on Computer Security. To read more about avoiding Malware, check out Tips to avoid Malware on your Windows PC or Mac Isn’t Safe Anymore.
If you find yourself with a virus on your computer, stop by the Help Desk in Nicarry or call to set up an appointment x3333. There are specialists that can help clean your computer and remove the malicious software (Malware.)
Canvas recently enhanced the email notifications for discussions and announcements. All users can reply directly to announcements and discussions from the email notification. Learn more about other updates in this video.
In PowerPoint, the size of slides can change with just a few clicks of the mouse. The default size in PPT 2013 or newer is in Widescreen (16:9). In older versions, the default size is Standard (4:3). To change from widescreen (16:9) to standard (4:3) or vice versa, open PowerPoint and navigate to the Design tab. Select Slide Size, and choose either Standard or Widescreen. If you choose Standard, you will be given scaling options. Maximize increases the size of the slide content and may result in not all of your content fitting on the slide. Ensure Fit decreases the size of the slide content and may make your content appear smaller, but all content will fit on the slide. Click here to view the Knowledgebase Article on Slide Size.
Every year some students bring wireless printers or routers on campus hoping to use them to make life easier. However, attempting to set up these devices interferes with the campus wireless network and can affect not only your devices but those of students around you.
Using a wireless printer is similar to blasting music from your room when the school radio station is already broadcasting. The two music streams interfere with each other and neither broadcast can be enjoyed. A wireless printer slows down the Wi-Fi connection for everyone around you and on campus.
Instead of using the wireless feature, bring a USB printer cable and use a wired connection to print in your room. Also, be sure that the wireless is turned off on the printer. Check your Owner’s Manual for instructions. If you’ve lost the Owner’s Manual, most major companies have a version online for convenience. If you don’t have a printer that uses a wired connection, don’t worry. Etown allots 500 pages per semester free of charge for printing on campus.
Routers are not allowed in any capacity on campus. They interfere with connections to the campus wireless network and are against the college’s Acceptable Use Policy. All students signed this policy as part of the First Year Student ITS Tech Orientation and must adhere to it during their time as students at Elizabethtown College.
If you have already brought a router to campus and have been using it, please stop immediately. This improves the wireless experience for everyone on campus.
Format painter is a neat little tool that allows the user to take all the font formatting they have created and use them on another line.
Open an office program like Word. Style the first line how you would like it to be replicated. You can format things such as font, text size, text color, uppercase/lowercase, etc. Highlight the formatted text, and select Format Painter under the Home tab. Then highlight the lines you would like to be formatted to match. The cursor should have a paint brush tool on the left hand side of the cursor. When you click away from the text it will automatically format.
At the beginning of nearly any class, students always ask the same questions. “Is attendance graded? Is the final cumulative? Can we use laptops to take notes?”
With fewer and fewer people taking notes by hand or doing any kind of handwritten work in the real world on a daily basis, should students still take handwritten notes in class? With the elimination of cursive from the Common Core Curriculum Standards in 2014, and every student now being required to take a typing class, the US has made a commitment to the transition to digital notes. The great debate is whether typed notes are really in the students’ best interest.
Typing is faster than handwritten notes, that’s for sure, but there is less freedom with the typed page. The Guardian argues that pen and paper allows for more graphic freedom than the computer screen. Paper can be formed into anything you need such as instantly created pictures, tables, or diagrams, whereas the computer requires more time and work to create these items.
If that’s the only thing that’s keeping paper around then why not switch to laptops? Notes are faster that way, and students can’t ‘lose’ their homework quite so easily if it’s saved to their network folder. There are no pencils to be sharpened, and no one ever runs out of paper on a laptop computer. Searching back through notes is easier too. Flipping through a semester’s worth of notes for one bit of information can take time, but with computers it can be found easily and quickly. Is that really what’s best though?
Neuroscientists don’t think so. Writing and drawing letters by hand improves recognition and memory. Much like practicing a play over and over again improves muscle memory for game-time, writing out notes can improve recall according to Princeton and UCLA researchers Pam Mueller and Daniel Oppenheimer. Students using pen and paper reworded and analyzed their notes more than students using laptops. This allowed pen and paper students to gain a better understanding of concepts as well as recall facts better.
Students using laptops took more notes than students writing long-hand according to Mueller and Oppenheimer. However, that did not transcribe into better scores on assessments of factual or conceptual understanding of the material. Pen and paper students that studied for a mock exam did better than all other groups of students in this study of college students including those who took verbatim typed notes and studied for the mock exam.
Proponents of handwritten notes say that cursive can improve spelling whereas computers fix spelling errors before the user even knows they made an error allowing for perpetual spelling mistakes. Also, pen and paper allows for more emotion in writing compared to computers. Don’t forget one last important note, computers are distracting. Even students that might otherwise pay attention might be led astray by a distracting laptop screen.
Technology can be a major asset, but also a major crutch. So, when students ask if they can use laptops in class, will you allow them to? Or will you believe that The Pen is Mightier than the Keyboard? Read the article by Mueller and Oppenheimer for more information: http://pss.sagepub.com/content/25/6/1159.full.pdf+html.
As few as 25 years ago, communication was mostly limited to face-to-face interactions or word of mouth. With the tech age we live in now communication has changed, and so too have conventions and manners. Below are 10 tech faux pas to avoid this year according to Forbes Electronic Etiquette.
Avoid these tech faux pas and you’ll be good to go for the new year. For more tech etiquette tips, read more on Forbes Electronic Etiquette article.
|Press these keys||To do this|
|CTRL + Z||Undo|
|CTRL + Y||Redo|
|CTRL+ Alt +Tab||Use the arrow keys to switch between open items|
|CTRL + Mouse Scroll wheel||Change the size of the icons on the desktop|
|CTRL + Esc||Open the start menu|
|CTRL + Shift + Esc||Open Task Manager|
|CTRL+ E||Select the search box (Only in outlook)|
|CTRL+ F||Select the search box|
|CTRL+ S||Saves a document|
|CTRL+ P||Print a document|
|CTRL+O||Open a new document|
|CTRL+ A||Select all items in a document or window|
|CTRL + C||Copy a selected item*|
|CTRL + X||Cut Selected Items*|
|CTRL + V||Paste*|
|CTRL+ B||Bold all selected items in a document*|
|CTRL+ U||Underline all selected items in a document*|
|CTRL+ I||Italicize all selected items*|
* These need to be highlighted prior to using these commands.
Passwords are your first line of defense when it comes to protecting your devices, your information, and your identity. Identity theft is on the rise for the past 3 years. No one is safe from identity theft, not even college students. Thieves obtain sensitive information about someone from a variety of sources. The most common cause is a stolen wallet or purse, but stolen passwords is a major concern as well.
How can you protect yourself and your sensitive information?
Strong passwords are your first line of defense. Use long, complex passwords to protect your accounts. Etown requires your network password to be at least 8 characters long containing an upper and lowercase letter, a number, and a special character (# $ ! etc.) This requirement isn’t just because we like resetting passwords when you forget your complicated password; it’s to protect you, your account, and the network. The more complex your password is, the less likely it is that someone can guess your password.
Use different passwords for different accounts. By using the same password for everything, then you are increasing the chances that if someone figures out the password to one thing, they have access to everything else too. Don’t leave yourself open to that kind of vulnerability and use different passwords. Change your passwords regularly too, and while you’re at it backup your data!
Don’t give your password to anybody! Even giving your password to a friend could leave your account or information vulnerable. Especially beware phishing attempts! Phishing attempts are scams that attempt to trick you into releasing your passwords or other sensitive information.
Remember: ITS will never ask for your password.
If something doesn’t look right, then forward the email to firstname.lastname@example.org.
If you got a new Apple product over the holidays, then you might need to set up an Apple ID Account. When using any form of Apple product (Macs, iPads, iPhones, etc.) you need to have an Apple ID to get apps and pretty much do anything there is on an apple product.
To set up an Apple ID Account, navigate to Settings and select iCloud. If you are logged in to your Apple Account then your account information will be hear. If not, there will be a login screen. At the bottom of the screen is an option for creating an account.
When you select “Create a new Apple ID,” it will ask for your birthday first. Then input your email address or create a new iCloud address. Then set up your password, pick security questions, and decide if you want to receive Apple News. Lastly read and accept the Terms and Conditions. Congrats, you have an Apple ID, and you are logged in!