Math League at TMCC is a popular get-together for students to share calculating tips.
Math League at TMCC is a popular get-together for students to share calculating tips.
Fall shows in the galleries of TMCC present energetic works by students and faculty.
Friday, September 19
RDMT 122, Dandini Campus
Friday, September 19
RCB 102, High Tech Center at Redfield
Below are answers to IT's most commonly asked questions.
Another benefit to in-house software development is the level of support that application services is able to provide after the software has been implemented. Application services offers training and various forms of documentation, depending on what the user and user consultant determine is necessary.
To request a network account for any TMCC employee, the supervisor of the employee fills out the Network Access account application.
Please read the TMCC VPN instructions.
Visit the Network/Remote Login Web page for detailed information on accessing files from a remote location/the Internet.
Now that SCS has transitioned Financial Data Warehouse (FDW) to new, more secure servers, access from remote locations (on the road, at home) takes extra steps. SCS emailed: "These new servers are locked down more than previous servers. You have to be inside the NevadaNet network. If you have a VPN account at TMCC, establish that connection first, and then you should be able to get to the new server."
TMCC's Information Technology department has developed remote access for TMCC users using Citrix. This method has been tested on both Windows and Macintosh computers, including laptops, at TMCC and at home, and it works. First time access takes more time since your profile/Citrix must be established on your remote computer/browser connection; after that, entry is just a little slower than entry at work.
Follow these steps:
To gain access to the mainframe, you will first need to request access through the Network Application for Security Access (NASA).
Once you have been granted access:
Visit the Network/Remote Login Web page for detailed information on accessing/saving files on the network.
Click on the Faculty and Staff button (located at the bottom left-hand corner of the TMCC home page). Then, click on the "Check E-mail" button at the top of the next page. Enter your email user name and password and you will have access to your TMCC accounts.
Download the How to Download Software for Home Use instructions.
By default, the font for the text in all of your Windows icons is 8-point MS Sans Serif. If you find this font to be a little too small or hard to read on your computer, increasing it is simple. Right-click on the desktop and choose Properties. Click the Appearance tab and choose Icon from the Item drop-down menu. Under Font at the bottom of the box, try bumping the size up from 8 to 10. Click Apply to preview it, and see if the change helps.
See Network/Remote Login.
Your Windows operating system is a packrat. As you work, it collects a prodigious number of temporary files, and it does so for good reason: The \WINDOWS\TEMP, \WINDOWS\TEMPORARY INTERNET FILES and Recycle Bin files all exist to give you fast access to items you might need again. But there's a point of diminishing returns. And you can end up with hundreds of megabytes of these files, wasting space and decreasing performance as the operating system tries to wade through the rubbish. To keep the trash to a manageable minimum, periodically run Disk Cleanup from Start/Programs/Accessories/System Tools.
Each job is assigned a priority as it is called in. This priority is based on several factors, including the severity of the problem, number of people affected, and current work load. Given the amount of jobs we have and the amount of staff available to respond, the goal is a 7 working day turnaround for the 3E type calls.
2.0 FTE currently supports 500+ workstations covering all five TMCC college locations. The average work request takes approximately 1 hour for a technician to complete, which means that 60 work requests can normally be handled per week. However, each week we typically have anywhere from 75 to 125 jobs pending (with the assumption that the job can be done in one hour). For example, there have been occasions when the staff has already dedicated 20 hours of research into a problem and it still isn't resolved. Please be patient as we work to solve all the pending jobs.
Read through the Tips FAQs for information on how to help you operate your system with peak performance:
There are multiple ways to contact IT Customer Service:
IT Customer Service provides computer workstation technical support for administrative staff at Truckee Meadows Community College. In addition, we take work order requests for Academic Computing, network, and telephone problems as well as for Media Services (multimedia and Elmo, LCD or slide projector technical problems, and Information Technology software application or database problems). Once IT Customer Service receives the call, a work request is created and dispatched to the appropriate personnel.
Call or send an email to IT Customer Service. Try to have as much information about the problem as possible before calling, such as:
In many cases, we can help you fix the problem over the phone if we have enough information.
Visit the computer labs hours Web page.
All administrative computers are delivered with a package of supported software that includes everything needed to use the computer workstation effectively. Therefore, requests for additional software receive a lower priority when entered in the WorkFlow job queue. In addition, since TMCC does not have a blanket software license for all software, we will not install any software unless the customer has a valid license for it. Also, there are compatibility issues-we will not install software that is incompatible with the standard administrative software image for TMCC.
New Accounts: For customers who need to access the Citrix system, please complete a NASA form (available via Network Access). Then, contact IT Customer Service to determine if the printer is compatible to be used with the Citrix system.
To log into Citrix:
Citrix users must have a "Terminal Server" compatible printer as their default printer. Typically, this is a laser printer. Desk-jet/ink-jet printers are not configured for successful printing over a network and are not supported on the TMCC Citrix system. Redirection of your print job to a nearby Xerox printer works fine. Contact IT Customer Service to determine if your laser-printer is supported by Citrix.
Copyright is a form of legal protection provided by United States law (Title 17 U.S. Code) that protects an owner's right to control the use of, whether by reproduction, distribution, performance, display or transmission of a copyrighted work.
Any activity that violates these protections, such as downloading and/or sharing copyrighted works without the owner's explicit permission, is in violation of United States law and is not an acceptable use of the TMCC network.
Copyrights protect "original works of authorship", including:
If it comes to the attention of the college that an individual is using TMCC computer equipment and/or network access to violate copyright law, TMCC will take action to stop such activities, including removing network access.
In addition, violations of copyright law can lead to criminal charges and civil penalties. Under current copyright law, criminal cases of copyright violation carry a penalty of up to five (5) years in prison and a $250,000 fine.
The Higher Education Opportunity Act (HEOA) contains three general requirements on controlling unauthorized file sharing at colleges and universities. These requirements are:
Off-campus Internet Service Providers (ISPs) are not subject to the Higher Education Opportunity Act (HEOA). Instead, these companies are subject to the Digital Millennium Copyright Act (DMCA).
Off-campus ISPs can shut off internet service once they receive a copyright infringement notice. Students are liable for illegal copyright actions whether on-campus or off.
The single most common source of copyright violation notices are peer-to-peer (P2P) programs. It is important to understand that the vast majority of files shared using these programs are done so in violation of copyright law.
While P2P programs are not illegal in and of themselves, they can be used in illegal ways.
First, file sharing violates the TMCC user agreement. You run the risk of being blocked from using the TMCC network. If you are a repeat offender on the TMCC network, your dean will be notified.
If you are downloading copyrighted material without the owner's permission (music, movies), you are breaking the law. You could face steep fines and prison time.
Users connected to file sharing programs may unknowingly allow others to copy their files. Users unwittingly download viruses, spyware and malware. File sharing increases the risk that you may facilitate a security breach of the TMCC network. Since file sharing can allow hundreds of users to access your computing resources, your machine's operating speed suffers.
Both the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA) have web sites that list legal alternatives to illegal P2P.
Visit the http://www.whymusicmatters.com/ website for legal alternatives to P2P.
Please read the Google Apps concerns.
Dial 611 and you will be prompted on what to do to reset your voicemail password.
Make certain that your PDA, Smartphone, Blackberry, or other Mobile device is fully charged before setup.
Information regarding the various mobile devices, accessories, and plans is available through AT&T Wireless, Sprint or Verizon Wireless.
TMCC's Verizon Support representative is Chanin Mierau. To be eligible for the above discounts through Nevada System of Higher Education and for information regarding the type of PDA, Smartphone, or Mobile Device that is best for you, use the contact information below.
15% Service Discount on AT&T through "State of Nevada." Provide institution identification at a store to add this discount.
Selecting Merge in the Synchronization settings may cause duplicates. The data on the server combines with the data on your device. It is best to select Refresh. The data on the server replaces the data on the device.
Make certain that your wireless connection is disabled when not in use. If the wireless connection is enabled when not in use, your battery will run down quickly. You may also purchase a longer lived battery.
Your wireless connection is enabled. Disabling your wireless connection when not in use will prevent your PDA from continuously trying to connect with Wireless. Disabling the wireless connection will also prevent your battery from running down so quickly.
Passwords are one of the first lines of defense that users have to protect their systems. Unfortunately, people are not accustomed to remembering difficult passwords consisting of numbers and weird characters. The ever-increasing number of passwords required to work in today's world only makes this problem worse. Many people have compensated for this problem by writing down their password and keeping that information in an unsecured area, like stuck to a computer screen.
One of the first things a hacker will attempt to do against a system is run a program that will attempt to guess the correct password of the target machine. These programs can contain entire dictionaries from several different languages. In addition to words found in dictionaries, these programs often contain words from popular culture such as science fiction movies and novels.
Hackers like to attack people's weaknesses. One of the major weaknesses is the reluctance to remember several, long, difficult-to-guess words such as passwords. Therefore, once one is chosen, the likelihood that the same password is used for several accounts is very high. This is similar to the problem with default passwords because users have a tendency to keep the same password for a long period of time, thereby allowing the attacker that much more time to gain access to a system.
Remember: If you allow others such as a friend or colleagues to use your account you are:
The following table is provided to give you an idea of your password's security.
|Characters In Password||Probability of Guessing the Password|
|1||1 in 10|
|2||1 in 100|
|3||1 in 1,000|
|4||1 in 10,000|
|5||1 in 100,000|
|6||1 in 1,000,000|
|7||1 in 10,000,000|
|8||1 in 100,000,000|
As you can see, the longer your password is the harder it would be to guess. Passwords on our systems are encrypted so even the staff cannot determine what your password is. If you forget your password we cannot retrieve your old one. The best we can do is issue you a new password. If you have forgotten your password contact IT Customer Service.
Mix numbers and letters. Mnemonics and numbers in a word can be your best friend. A mnemonic is a formula or rhyme to help you remember. Examples of mnemonics are:
Try substituting letters for numbers (or vice versa), such as : E equals 3, I equals 1, O equals 0 (zero), for equals 4, two equals 2, B equals 8, see or sea equals C, etc. For example:
It is important to remember though, that any password can be guessed if given enough time. Therefore, it is important to change your password within the amount of time it would take an attacker to guess it. For example, with the previous examples it may take an attacker 60-days on a very fast computer to guess them. In order to ensure your system's safety then, you must change your password before those 60-days come to an end.
To check on an existing service request, choose a department, then press the "Home" button and scroll down the page a little; your work request and the status of each one you've submitted will be displayed here. To view the details of a service request, click on the text located in the title area.
After choosing a department, select the drop down list arrow next to the "My Request" box found above your displayed request. You can sort your request by: My Request, My Active Request, My Completed Request, Departmental Request, My Request in all Workspaces, and Global Instances.
To submit a new service request, choose a department and click the "New Request" button. Fill in or confirm the information the required fields. Press the save button to submit your request.
Global Incidents are incidents that are currently affecting other users. If you are experiencing the same incident, you can subscribe to the Global Incident and be notified when the incident is updated and resolved. To view the details of a Global Incident, click the title. To subscribe to a Global Incident, select "Subscribe".
p>Customers can use the Knowledge Base to view, search, and report on solutions in the Knowledge Base. The Knowledge Base provides solutions to common problems, answers to frequently asked questions, patches, documents, and more. By searching the Knowledge Base before submitting a Service Request, the customer has the opportunity to find the information he or she needs quickly and without waiting for a response from the support team.
The following sections detail how customers can find Solutions in the knowledge base.
Note: the Knowledge Base button will only be available in workspaces that have a Knowledge Base activated and populated with information.
You may choose from three pre-defined reports: My Active Request, My Organization and All Solutions. Reports can be viewed in three different styles or exported to a .txt file.
To receive new service or change an existing service, a IT Customer Service Request is needed. To determine your needs, you may contact IT Customer Service.
In your request, please provide the following details:
If clarifications are needed, our telephone technician will contact you directly. There will normally be a standard 5 working day turn around on most orders. If you are expecting a large move or change please notify us in advance as soon as possible.
You must fill out a Network Application for Security Access (NASA) form online.
The best process is to purchase a calling card with pre-billed minutes from a local store.
Contact IT Customer Service and provide the following information:
Please follow the instructions in the Faculty/Staff Password Reset Instructions document.
Please follow the instructions in the Faculty/Staff Password Reset Instructions document.
To set up a phone conference call for more than 3 participants, you must contact IT Customer Service. IT needs at least a one day advance notice unless you need specialized equipment (i.e. a dedicated conference phone), in which case we need at least 3 days notice to ensure the room when the phone conference will occur has the correct type of port.
Contact IT Customer Service with updated information.
Download and follow the instructions to receive Antivirus software.
Please note: software is available for full/part-time faculty or staff only (not students or student employees)
Contact IT Customer Service with specific questions.
For current information on long distance billing, please see our Billing and Fees page.
You may not have noticed that you can put an Address Bar on your Taskbar by right-clicking on the Taskbar and selecting Toolbars, Address. With an Address Bar on your Taskbar, you can open any Web page at any time merely by typing the URL and hitting Enter. Windows will automatically launch your browser and open the page. You can also browse files on your computer using the Address Bar.
For example, type:
and you'll see a list of all the files and folders on your C: drive. If you like, you can scroll through these files using the scroll bar on the right edge of the Address Bar, and open the file and folder of your choice by clicking on it.
If you're navigating through folders and you realize that you want to move a file, you can always drag and drop it to an open folder. However, if your desktop is particularly cluttered with open windows, there's a little trick to dragging a file to a desired window. Drag it to the Taskbar window and hold the file in place. After a second, the corresponding window on your desktop moves to the top of the pile, and you can just drop the file in place.
With many types of files, you're given an option called Quick View when you right-click the item. Quick View allows you to get a quick look at something without having to open the potentially cumbersome application associated with it. If you wish to be given the Quick View option for a specific kind of file, you need to designate it as such in the File Types box. In any folder, go to View, Folder Options and click the File Types tab. Select the kind of file you want to use Quick View for, and click Edit. Check the Enable Quick View For box, and then click OK twice.
Ever open the Windows folder? The number of files in there is absolutely staggering, and can be hard to sort through. If you have an idea what you're looking for in any folder, you can jump to a file just by typing in the name. Type "P" to jump directly to the P's, without having to use the scroll bar. And if you type a sequence of letters, Windows will move to the file that matches, if any.
If you have a Web page that you access constantly, such as a ticker with stock information, you can put a link to that page directly on your Taskbar so that it's visible whenever you connect to the Internet. Right-click your Taskbar and select Toolbars, New Toolbar. Type the complete Internet address into the box that appears, and click OK. A tiny version of the Web page appears on your Taskbar.
If you really need to find a file on your computer, but can't for the life of you remember what you named it, you can always try searching for it by date. As long as you have a rough idea of when you were working on the file, you probably won't have any trouble. To search for files by date, press Windows Key-F to open the Find box. Then click the Date tab. Click the Find All Files button and select Modified, if you want to search for the file based on when you last remember modifying it. Click Between and fill in the date range you want to look for, and then click Find Now.
How do you get the items in your Start menu's Programs Folder to appear in alphabetical order? Every time you add a new program, after all, it's added way down at the bottom of the list. It's a good trick to know, and one you can also use to alphabetize your Favorites menu. Just click Start, Programs and then, with your cursor in the Programs area, right-click and select Sort By Name. All your programs and program folders will be arranged alphabetically.
Want to minimize an open window without reaching for the mouse? A keyboard shortcut should do the trick. Just press Alt-Spacebar, then N, in just about any program, and the currently selected open window closes.
Dial into your voicemail box. At the Main Menu prompt, press [ 5 ] to enter Change Availability and Location sub-menu. Within this sub-menu, pressing [ 1 ] announces your current availability and location, [ 2 ] through [ 9 ] changes your location, and [ # ] toggles your availability between Available and Unavailable.
Enter the voicemail system, enter your current password. You are now at the main menu.
The greeting that callers hear is controlled by your location as set in the voice mail system. Please see the FAQ: "How do I change my location and availability?" for instructions on how to check and change your location and availability.
Dial into your voicemail box. At the Main Menu prompt, press [ 8 ] to check your current availability and location.
At the dial tone, press * 5 from your telephone (or your mail button on a 12 button telephone). If you are calling from another telephone on campus, dial 5-8200. This will put you directly into the Call Courier Voice Messaging System. Press #, enter your mailbox number, and follow the prompts. From off campus dial 775-673-8200.
If you are using a 12 or 30 button telephone, the voice mail button will light up.
To create the a distribution list:
An extended absence greeting is enabled through the greeting override feature. The first step is to record your extended absence greeting. You have the option of recording up to 9 different greetings. The default greeting you recorded when you set up your mailbox is greeting number 1. You will record a new greeting and identify it with a number.
Enter the voice mail system, enter your password. You are now at the main menu.
Enter the voice mail system, enter your current password. You are now at the main menu.
Warning: Messages are only stored in the Deleted Messages folder for 7-days.
To get a copy of your replies or messages, add yourself to the destination list. For distribution lists, you can include yourself on the list.
To skip a message while leaving it's status the same (i.e. unread messages are still marked as unread), press [#] while listening to the message. To skip a message and mark it as Read, press  while listening to the message.
The read receipt is called a delivery report on this system. Please keep in mind that this feature was designed to report on messages delivered to many individuals. Some of the options seem a bit odd when applied to only one recipient.
Your mailbox number is your 5-digit telephone number (begins with a 5).
Your temporary (default) password is used the first time you access voice mail. This temporary (default) password is your 5 digit telephone number. After you enter this temporary (default) password, you will be prompted to enter in your own secret password. DO NOT FORGET YOUR PASSWORD! Otherwise, you will be unable to access your voice mail until you call IT Customer Service and request that it be reset.