Washington County Public Schools Helpful Technology Tips Technology Department Presented by Rhonda Orndorff Senior HelpDesk

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Computer Care. The Power Cord Dont drop your laptop.
Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Baltic High School Classroom Connections Presentation.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
The Woodlands High School
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Perimeter Church Perimeter Network Introduction 2005.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Responsible Use Policy Technical Applications Mr. Hibbs, Mrs. Brau, & Coach Merkle Granbury Middle School.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
We are partners in learning.. Note: Office 365 works best in Internet Explorer V 9 or above. Some features do not work in PWCS’s Chrome Browser or in.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Grade 5 Student Assistants
Lesson 9 Windows Management
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Presented by Chad Kafka This Month’s Topic: Wikispaces Advanced Today’s session is an introduction to what a WIKI is and how they can be used in education.
Using SWHS: The AUP [Acceptable Use Policy]
Student 1-to-1 Netbook Program Care and Use of Computers.
You will find applications that are installed on the computer. Go to Start – Programs (depending on view Start – All Programs). All applications installed.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Wake Forest University How To Care For Your New ThinkPad AND Computer Usage Policies.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Information Systems Security
Grinnell High School Laptop Roll-Out: August 21, 2014 PURPOSE: To inform students of the expectations, policies, protections, care & maintenance information,
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
EMINTS Teachers are trained intensively in how to improve their teaching. Lots of tax-payer money is used to buy technological equipment to help students.
WELCOME WORD PROCESSING I
STUDENT LAPTOPS STUDENT ORIENTATION. WHAT HAPPENS IF IT IS NOT WORKING CORRECTLY? 1. You can do some troubleshooting Reboot - Turn the Computer Off (
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
Welcome to Week 2 in the computer lab Let’s get started!
Nashwaaksis Middle School Student Laptop Program Care and Use of Computers.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 Why Use Technology?  Research  Independent Learning  Immediate Feedback  Organization.
LAPTOP USE & POLICIES Laptop Acceptable Use Policy Everyone signed a copy of this policy when you received your laptop, therefore you have.
Desktop Basics & Introduction LIBS100 May 9, 2005.
August Millhopper Montessori School is excited to announce new procedures for troubleshooting computer issues. A new Help Desk has been created.
How to care for your computer Always keep your computer in the case whenever you are moving from one class to another. Keep your computer in a temperature.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Library Orientation Hours Open: Before School During Lunch
Using iLocker.
Computer Use Guidelines
Bluffs School 1:1 Digital Conversion Orientation for Parents August 2015.
File Stream and Team Drives
BCPS Student Device Orientation
Part 3.
BCPS Student Device Orientation
Windows Tutorial 9 Maintaining Hardware and Software
Responsible Use Policy
Dell Latitude Laptop Student setup.
Presentation transcript:

Washington County Public Schools Helpful Technology Tips Technology Department Presented by Rhonda Orndorff Senior HelpDesk

Maryland Technology Literacy Standards Standard 1 – Technology Systems: Develop foundations in the understanding and uses of technology systems. Identifies the understanding about technology that students will need to fully benefit from the use of technology. Identify the components of a computer system and being able to use a computer would be examples of what students would have to do to meet this standard.

When computer issues arise … If you experience a problem with your computer you may attempt to resolve the issue yourself or contact your schools Technical Coordinator. It is extremely important to provide as much information about your issue and include any error messages. Technical Coordinators are to attempt to resolve the issue however if they are unable to do so he/she should assign a work order with the Technology Department to have a Technician either remotely work the issue or come on site. Technicians will identify themselves if they are remotely working on your machine. All urgent issues should be reported to your Technical Coordinator so they can contact the HelpDesk.

Mapped network drives are not showing under My Computer … –Reboot your machine. Remove all external drives. There are no icons in my NAL window… –Log off your machine and make sure that workstation only is not checked in the Novell login screen. Your computer will not shut down … –Hold in the power button for approximately 5 seconds until power drops. You lose your folders in GroupWise … –In GroupWise go to View and select Folder List. This will restore a folder listing to the left. You have exhausted your grace login after being prompted to reset your password … –Contact either your Tech Coordinator or the HelpDesk to have your password reset. There is an icon in my NAL and I would like that software. –As long as the icon is showing in your NAL simple double click to install the software. What to do when …

Resetting Password Every 90 days all WCPS employees are required to reset their Novell and GroupWise password. –This password will need to be at least 8 characters or digits long and contain two unique characters or symbols. –After entering in your new password you will get a Windows log in screen that will still recognize your old password. Check the box in the lower right hand corner that states you would like to synchronize your Novell and Windows accounts. –The next log in will recognize your new password and you will only have to enter it once.

Why Do I Have to Do a Backup? To secure a copy of your documents in case your hard drive goes bad or something else happens to your computer. It also allows you to transfer important files from one computer to another or re-imaged computer and retain important document files. YOUUser files are in various locations and only YOU, the user, know where your files are stored. WCPS network computers are already backing up the My Document folders to each users’ H: or Network Home Directory. If this is the case with your computer, you may consider only backing up desktop files, Internet Favorite files and those saved in other locations.

What you “Can” do: 1. Use all technology tools and equipment as per the Washington County Public Schools Acceptable Use Policy as outlined in the “Washington County Public Schools Handbook and Guide” or at under Board Exhibits, Section I, Exhibit IIBH-E. instruction 2. Use the laptop for schoolwork, , research and WebPages – basically anything related to instruction. 3. Ensure that your laptop is updated with the latest security and operating patches by plugging it into the WCPS network at least once a week. 4. Install and access instructionally appropriate acceptable licensed software. 5. If temporarily leaving your laptop on and unattended, log out for your own privacy and safety. Password-protect your grade book and other confidential files. 6. Keep all cords and accessories with the laptop at all times. 7. Be careful when plugging in projectors and other devices not to bend the pins in the plug. Laptop Use and Guidelines

What you can “Not” do: WCPS property should only be used for educational purposes. 1. Use the laptop as your personal computer. WCPS property should only be used for educational purposes. 2. Use the laptop for business or personal gain. 3. Use your laptop for chat rooms, private , or gaming. 4. Send any personal information about yourself. 5. Send any that is abusive, obscene, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. 6. Use another user’s login or . Laptop Use and Guidelines

Maintenance and upkeep: 1. Do not leave laptop unattended in an unlocked room at school or while traveling. 2. Don’t expose the laptop to extreme temperatures for an extended period (in the classroom, home or vehicle). 3. Don’t put heavy objects on top of the laptop. 4. Don’t remove any identification tags from the laptop or case. 5. The laptop should be turned off and placed in its closed position any time that it is to be moved. Always put the computer in its carrying case before transporting it. 6. Do not expose the laptop to any magnetic fields that could damage the contents of the hard disk. 7. If the laptop is damaged, lost or stolen, be sure to report the incident accordingly as soon as possible to the Technology Department 8. If damage to the laptop or laptop components occur due to misuse by the user and not covered by the manufacturer’s warranty, it is to be replaced at the user’s expense. 9. Clean the screen and other parts with a damp soft cloth. Use water only. Tissues or paper towels are not acceptable. 10. Keep food and drinks away from the laptop. Laptop Use and Guidelines

Securing Wireless Networks Only WCPS issued wireless access points are permitted in our schools. How do wireless networks work? Wireless networks rely on radio waves rather than wires to connect computers to the internet. A transmitter, known as a wireless access point or gateway, is wired into an internet connection. This provides a "hotspot" that transmits the connectivity. Computers that have a wireless card and have permission to access the wireless frequency can take advantage of the network connection. Some computers may automatically identify open wireless networks in a given area, while others may require that you locate and manually enter information such as the SSID (service set identifier). What can you do to minimize the risks to your wireless network? 1. Restrict access - Only allow authorized users to access your network. 2.Protect your SSID 3. Maintain anti-virus software - You can reduce the damage attackers by keeping your virus definitions up to date.

Feel free to me directly if you have any questions Questions