Recent updates
-
Using Classroom Technology
Updated onArticleYou may have seen classroom technology "How-To" cards being circulated on campus. Below are more detailed instructions to supplement what is found on those cards.
Devices Classroom Technology Other
-
Common Phone Terminology
Updated onArticleBarge: The ability to add yourself to already established calls taking place between other people. Call: Using a telephone to reach another in order to have a conversation. Call Waiting: Your phone’s ability to alert you of incoming calls while you are already on the phone with another party. When call waiting is utilized, an incoming call will be indicated by a beeping sound while the party’s name and number appear on the phone screen. Conference Call: Phone calls which take place between several separate entities, each in a separate location and utilizing a separate phone. Cradle: The part of the phone’s external hardware where the phone rests when not in use. Handoff: When one party transfers a phone call and all the concerns and responsibilities thereof, to a different party. Handover: Synonymous with “handoff.” Hard keys: Buttons with actions that are consistent; the actions they perform when pressed do not change. Hook: An electronic toggle that indicates when your phone is hung up. It can be found near the top of your phone cradle. When the phone is absent from its cradle, the phone is said to be “off the hook.” A phone being “off the hook” is usually indicated by a fast-paced beeping sound when a third-party attempt to call the phone in question. Line: A telephone connection. Soft keys: Buttons that perform different actions when pressed, depending on the context. On your Cisco phone, the buttons of your soft keys will have their actions indicated by the touchscreen adjacent to the buttons.
Devices Campus Devices Phones
-
Remote Student Resources & FAQs
Updated onArticleThe resources and FAQs below will help you be successful in your remote courses. For additional help, contact the I.T. Service Desk at (208) 496-1411 or through their Live Chat.
Remote Technology Resources FAQs Remote Work Resources Remote Work FAQs
-
iSeries Installation Workaround
Updated onArticleUse the following URL to get to VDI: https://vdi.byui.edu/
Software BYU-Idaho Software VDI
-
Types of Viruses
Updated onArticleAdware: Adware is among the most troublesome of computer threats. It can hide in places such as downloads for songs, movies, etc. Once installed on your computer, adware creates a flurry of advertisements and sends them directly to your computer. They can embed even more advertisements within the text of articles. Boot: A boot sector virus is a line of code that affects the boot sector of your computer. It is transferred from one computer to another via USB drives. The boot virus can prevent your computer from starting up or make it impossible to locate its hard drive. If your computer has ever shown a blank blue screen, commonly known as the "Blue Screen of Death," you've probably been the victim of a boot sector virus. Bug: A bug is any kind of fault or flaw in a computer program that stops it from functioning correctly. Direct Action: Direct action viruses begin their work as soon as they are installed on your computer. Typically, direct action viruses are designed to immediately activate/replicate when someone performs a specific action on a computer. Directory: As its name would suggest, a directory virus attacks your computer by infiltrating its directory. (In computer terminology, a directory is just any big computer file that contains several smaller sub-files.) Typically, it will infect files with .EXE or .COM extensions. Invisible to the user, a directory virus changes the host file so that the virus activates with the host file. File Infector: File infectors are a classic virus; when someone refers to a generic virus, they are probably discussing these. These viruses spread from program to program by seeking out files to infect and then copying code into those files. Eventually, if left unchecked, file infectors can take over an entire system by compromising all of its files. Hijacker: Hijacker viruses alter your Internet browser settings, typically in order to force your browser to redirect you to a page specified by the virus. These redirect pages are usually designed to advertise a product or drum up publicity for something/someone. They also alter the home page of your browser, spam you with unwanted advertisements, and block you from viewing Internet content. Keylogger: Keyloggers place hidden software on your computer. This software keeps track of your keystrokes and takes note of the passwords you enter. Depending on what accounts you have, this can give hackers access to all kinds of private information. Macro: Macro viruses contaminate individual programs on your computer. When a macro virus infects a program, it triggers a series of actions that will happen whenever someone runs the program. Malware: Malware is any computer code that is designed to infiltrate a computer and damage it or its content. Overwrite: Overwrite viruses attack files/programs on your computer and make them unusable. They can also be extraordinarily dangerous to your computer. If left unchecked, they can crash your computer entirely and prevent it from booting back up. If a file/program on your computer has been attacked by an overwrite virus, delete the damaged file. As this is the only way to remove an overwrite virus, it's wise to keep backups of your important files so you can delete them without trouble if necessary. Phishing Scam: Phishing occurs when you receive an email from a seemingly legitimate source asking for personal information like your Social Security Number or credit card number. Legitimate companies will never solicit this kind of information via email. If you receive an email asking for this information, delete the email immediately and report it to your system administrator. Resident: Resident viruses "make a home for themselves" by storing themselves within the memory of your computer. Since the virus is not attached to any one file, uninstalling it can be very difficult. Spam: The term "spam" refers to emails sent with the intent of advertising something or getting you to click a link. At their best, spam emails are simply nuisances that clutter your inbox, and they can be dealt with by dragging-and-dropping the spammy message into the recycle bin. At their worst, they can promote illegal products/activities or conceal malware. Spyware: Spyware is a form of malware that spies on your computer use. Spyware can take screen shots, capture data such as passwords and usernames, and collect other personal information. Keyloggers are just one example of spyware. Trojan Horse: A Trojan horse is a virus that hides inside of something to make itself look enticing and appealing. Virus: A virus is a type of malware that is designed to replicate and spread. Worm: A worm is a form of virus that can copy itself and spread from computer to computer. It is not downloaded or attached to any one program; rather, it tunnels through computer networks in order to spread. Check out the articles Antivirus Software Tips and Mac Viruses & Tips.
Wi-Fi & Security Wi-Fi & Security Antivirus & Malware
-
Remote Staff/Admin Resources & FAQs
Updated onArticleThe resources and FAQs below will help you be successful as you work remotely. If you need more help, contact I.T. Service Desk at (208) 496-1411 or through the Live Chat bubble.
Remote Technology Resources FAQs Remote Work Resources Remote Work FAQs
-
How to Manage Blocked/Quarantined Messages
Updated onArticleBefore opening, viewing, or releasing any of your blocked or quarantined emails, remember that there is a reason that they were marked that way and that you should use extreme caution to prevent any potential security risks.
Software Microsoft Software Outlook
-
How do I Access/Share a Zoom Recording from My Media?
Updated onArticleIf you choose to record a Zoom meeting to the cloud, your recording will be stored in BYU-Idaho’s video sharing platform, MediaSpace (a.k.a Kaltura). They are accessible through My Media in Canvas and on video.byui.edu. Shortly after finishing your recording, you will receive an email that looks like this:
Software BYU-Idaho Software Zoom
-
Information: Computer Standards for Students
Updated onArticleAcademic departments may have different or more advanced technology standards. Contact your department for additional information.
Software BYU-Idaho Software I-Learn
-
Zoom: Frequently Asked Questions
Updated onArticleHow do I share a recording from Zoom? You are able to share videos with a link or through embed code. Please refer to this help guide for more information on how to do this in MyMedia in Canvas. Where do I find the recording in Zoom? Zoom recordings are stored in Kaltura and can be accessed through MyMedia within Canvas. Please refer to this help guide for more information regarding MyMedia in Canvas. How long does it take for a recording to show up in MyMedia from Zoom? It can take up to 1 hour for a recording to show up in your account. If not, you can reach out to support at (208) 496-1411. Can I submit a recording from Zoom in Canvas for an assignment? Yes. You just need to get share the URL or use the tool within Canvas to embed it in your text box. Please refer to this help guide for more information regarding assignments submissions in Canvas. Why should I login with single sign-on for Zoom? Each student is provided a full-access courtesy license with features such as increased security, deep integration, better accessibility, and longer meetings. Please use this account to ensure an optimal experience in Zoom and MyMedia. Do browser extensions work with Zoom and MyMedia? Some extensions may prevent you from accessing MyMedia from within Canvas. If you are experiencing problems with MyMedia, try accessing it with the extensions turned off or in an incognito session. Are there any conflicts with antivirus software with Zoom and MyMedia? Some antivirus software prevents 3rd party cookies which are required by MyMedia to work correctly in Canvas. You will need to work with your antivirus software support to allow cookies to work with their software. What could happen if I get a virus or malware? This can prevent Canvas, MyMedia, or Zoom from working correctly. You would need to remove the virus or malware to verify if it’s the reason it’s not working.
Software BYU-Idaho Software Zoom