SlideShare a Scribd company logo
1
Computing Accounts
Teaching with Technology Laptop Pilot Program
Nancy Hopkins
ITC
2
Computing Accounts
 What is an “account?”What is an “account?”
 Types of accountsTypes of accounts
3
What is an “account?”
 Computing IDComputing ID
 PasswordPassword
 Access to defined set of resourcesAccess to defined set of resources
4
Your Computing ID
 Unique identifierUnique identifier
 User’s initials + 1 number + 1-2 charactersUser’s initials + 1 number + 1-2 characters
 xxxxxx
 xxx1xxxx1x
 xxx1xxxxx1xx
5
Your password
 Secret code associated with yourSecret code associated with your
Computing ID on a defined resourceComputing ID on a defined resource
Shhh!
6
Your access to a set of resources
 E-mailE-mail
 FilesFiles
 File storage spaceFile storage space
 UtilitiesUtilities
 ProgramsPrograms
 NetworksNetworks
 ComputersComputers
7
So many accounts!
 Central Mail Service (CMS)Central Mail Service (CMS)
 UnixUnix
 Home Directory Service (HDS)Home Directory Service (HDS)
 ToolkitToolkit
 DialinDialin
 WirelessWireless
 CorporateTimeCorporateTime
 OthersOthers
8
Central Mail Service (CMS)
 E-mail only!E-mail only!
 SimeonSimeon
 EudoraEudora
 OutlookOutlook
 Pine/upenelmPine/upenelm
 MulberryMulberry
 WebMailWebMail
 nlb5xnlb5x@n.mail.virginia.edu@n.mail.virginia.edu
9
Unix (blue.unix)
 E-mailE-mail
 NewsgroupsNewsgroups
 Web sitesWeb sites
 Unix applications (SAS, SPSS, etc)Unix applications (SAS, SPSS, etc)
 File storageFile storage
10
Unix (blue.unix)
 Using it for e-mail only?Using it for e-mail only?
 Switch to CMS! Save resources!Switch to CMS! Save resources!
 ITC will move your mailbox for you!ITC will move your mailbox for you!
 nlb5xnlb5x@unix.mail.virginia.edu@unix.mail.virginia.edu
11
E-mail Options
 Central Mail ServiceCentral Mail Service
 SimeonSimeon
 EudoraEudora
 OutlookOutlook
 Pine/upenelmPine/upenelm
 MulberryMulberry **
 WebMailWebMail **
 Unix - blue.unixUnix - blue.unix
 SimeonSimeon
 EudoraEudora
 OutlookOutlook
 Pine/upenelmPine/upenelm
** CMS only!CMS only!
12
E-mail clients not accounts!
 YourYour emailemail addressaddress is like youris like your phone numberphone number
 Unique address for people to reach youUnique address for people to reach you
 YourYour e-maile-mail client(s)client(s) is like youris like your phone(s)phone(s)
 Different way(s) to access the same callDifferent way(s) to access the same call
CordlessCordless
Touch toneTouch tone
RotaryRotary
13
Home Directory Service (HDS)
blue.unix.virginia.edu
 Utility to access files on blue.unix.virginia.eduUtility to access files on blue.unix.virginia.edu
 75 MB of file storage space75 MB of file storage space
 SecureSecure
 Daily backup by ITCDaily backup by ITC
 Protected from viruses & hackersProtected from viruses & hackers
 Easily accessibleEasily accessible
 PCs and MacsPCs and Macs
 On-Grounds and dialinOn-Grounds and dialin
14
Toolkit
toolkit.virginia.edu
 Set of toolsSet of tools
 Course managementCourse management
Class e-mail listClass e-mail list
Grade submissionGrade submission
Homework submissionHomework submission
 Web-accessible course materialsWeb-accessible course materials
SyllabusSyllabus
Electronic reservesElectronic reserves
Images, sounds, etcImages, sounds, etc
15
Dialin
 Remote access to University resourcesRemote access to University resources
 WebWeb
 E-mailE-mail
 Home Directory ServiceHome Directory Service
 LibraryLibrary
 OthersOthers
16
Wireless
 On-Grounds access to Internet andOn-Grounds access to Internet and
University ResourcesUniversity Resources
 Secures your connection to the wirelessSecures your connection to the wireless
network via encryptionnetwork via encryption
 Prevents outsiders from using our networkPrevents outsiders from using our network
17
CorporateTime
 Enterprise-wide scheduling softwareEnterprise-wide scheduling software
 Mange your calendarMange your calendar
 Schedule meetings with othersSchedule meetings with others
 Schedule resourcesSchedule resources
 Easily accessibleEasily accessible
 Client applicationClient application
 WebWeb
18
Others
 ISISISIS
 Information WarehouseInformation Warehouse
 OracleOracle
19
Need an account?
 ITC Accounts Web PageITC Accounts Web Page
 http://www.itc.virginia.edu/helpdesk/accounts/http://www.itc.virginia.edu/helpdesk/accounts/
 ITC Help DeskITC Help Desk
 924-3731924-3731
20
Forget your password?
 ITC Accounts Web PageITC Accounts Web Page
 http://www.itc.virginia.edu/helpdesk/accounts/http://www.itc.virginia.edu/helpdesk/accounts/
 ITC Help DeskITC Help Desk
 924-3731924-3731
21
Password Tips
 IncludeInclude
 CharactersCharacters
 DigitsDigits
 Special charactersSpecial characters
 First letter of each word in phraseFirst letter of each word in phrase
e.g. Rdd!3miate.g. Rdd!3miat
22
Computing Accounts

More Related Content

Viewers also liked (8)

Amazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firmsAmazing facts about_big_4_accounting_firms
Amazing facts about_big_4_accounting_firms
 
10 critical questions you must ask yourself
10 critical questions you must ask yourself10 critical questions you must ask yourself
10 critical questions you must ask yourself
 
Pamukkale
PamukkalePamukkale
Pamukkale
 
Bluebeauty
BluebeautyBluebeauty
Bluebeauty
 
Quotes
QuotesQuotes
Quotes
 
Peace-Now
Peace-NowPeace-Now
Peace-Now
 
4 minutes office exercises
4 minutes office exercises4 minutes office exercises
4 minutes office exercises
 
I asked krishna
I asked krishnaI asked krishna
I asked krishna
 

Similar to Accounts

Work with Computer
Work with ComputerWork with Computer
Work with Computer
Jeewanthi Hettiarachchi
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinar
J. David Morris
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
EssaysREasy
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocWalmart Super Center
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
Jesse Wilkins
 
The (in)security of File Hosting Services
The (in)security of File Hosting ServicesThe (in)security of File Hosting Services
The (in)security of File Hosting ServicesMarco Balduzzi
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
Javier González
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
aptexx
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
mitali.ray
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
 
The World's Your Office: Realtime Collaboration: presentation ...
The World's Your Office: Realtime Collaboration: presentation ...The World's Your Office: Realtime Collaboration: presentation ...
The World's Your Office: Realtime Collaboration: presentation ...Videoguy
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
samirapdcosden
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Schipul - The Web Marketing Company
 

Similar to Accounts (20)

Work with Computer
Work with ComputerWork with Computer
Work with Computer
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinar
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.Doc
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
 
The (in)security of File Hosting Services
The (in)security of File Hosting ServicesThe (in)security of File Hosting Services
The (in)security of File Hosting Services
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
TCD Digital Collections
TCD Digital CollectionsTCD Digital Collections
TCD Digital Collections
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
The World's Your Office: Realtime Collaboration: presentation ...
The World's Your Office: Realtime Collaboration: presentation ...The World's Your Office: Realtime Collaboration: presentation ...
The World's Your Office: Realtime Collaboration: presentation ...
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 

More from Dr Vijay Pithadia Director

Lecture 4 employee testing and selection
Lecture 4 employee testing and selectionLecture 4 employee testing and selection
Lecture 4 employee testing and selection
Dr Vijay Pithadia Director
 
Lecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm desslerLecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm dessler
Dr Vijay Pithadia Director
 
Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentives
Dr Vijay Pithadia Director
 

More from Dr Vijay Pithadia Director (20)

Lecture 6 training development
Lecture 6 training developmentLecture 6 training development
Lecture 6 training development
 
Lecture 5 interviewing candidates
Lecture 5 interviewing candidatesLecture 5 interviewing candidates
Lecture 5 interviewing candidates
 
Lecture 4 employee testing and selection
Lecture 4 employee testing and selectionLecture 4 employee testing and selection
Lecture 4 employee testing and selection
 
Lecture 2 job aanalysis
Lecture 2 job aanalysisLecture 2 job aanalysis
Lecture 2 job aanalysis
 
Lecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm desslerLecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm dessler
 
Performance management
Performance managementPerformance management
Performance management
 
Hr dev performanceappraisal
Hr dev performanceappraisalHr dev performanceappraisal
Hr dev performanceappraisal
 
Dessler hrm12e ppt_11
Dessler hrm12e ppt_11Dessler hrm12e ppt_11
Dessler hrm12e ppt_11
 
Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentives
 
Session plan
Session planSession plan
Session plan
 
Seminar presentation
Seminar presentationSeminar presentation
Seminar presentation
 
Processing cooperatives
Processing cooperativesProcessing cooperatives
Processing cooperatives
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
History of the cooperative movement
History of the cooperative movementHistory of the cooperative movement
History of the cooperative movement
 
Dairy cooperatives
Dairy cooperativesDairy cooperatives
Dairy cooperatives
 
Cooperative
CooperativeCooperative
Cooperative
 
Consumer cooperative
Consumer cooperativeConsumer cooperative
Consumer cooperative
 
Capitalism and socialism
Capitalism and socialismCapitalism and socialism
Capitalism and socialism
 
Banking cooperative
Banking cooperativeBanking cooperative
Banking cooperative
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Accounts

  • 1. 1 Computing Accounts Teaching with Technology Laptop Pilot Program Nancy Hopkins ITC
  • 2. 2 Computing Accounts  What is an “account?”What is an “account?”  Types of accountsTypes of accounts
  • 3. 3 What is an “account?”  Computing IDComputing ID  PasswordPassword  Access to defined set of resourcesAccess to defined set of resources
  • 4. 4 Your Computing ID  Unique identifierUnique identifier  User’s initials + 1 number + 1-2 charactersUser’s initials + 1 number + 1-2 characters  xxxxxx  xxx1xxxx1x  xxx1xxxxx1xx
  • 5. 5 Your password  Secret code associated with yourSecret code associated with your Computing ID on a defined resourceComputing ID on a defined resource Shhh!
  • 6. 6 Your access to a set of resources  E-mailE-mail  FilesFiles  File storage spaceFile storage space  UtilitiesUtilities  ProgramsPrograms  NetworksNetworks  ComputersComputers
  • 7. 7 So many accounts!  Central Mail Service (CMS)Central Mail Service (CMS)  UnixUnix  Home Directory Service (HDS)Home Directory Service (HDS)  ToolkitToolkit  DialinDialin  WirelessWireless  CorporateTimeCorporateTime  OthersOthers
  • 8. 8 Central Mail Service (CMS)  E-mail only!E-mail only!  SimeonSimeon  EudoraEudora  OutlookOutlook  Pine/upenelmPine/upenelm  MulberryMulberry  WebMailWebMail  nlb5xnlb5x@n.mail.virginia.edu@n.mail.virginia.edu
  • 9. 9 Unix (blue.unix)  E-mailE-mail  NewsgroupsNewsgroups  Web sitesWeb sites  Unix applications (SAS, SPSS, etc)Unix applications (SAS, SPSS, etc)  File storageFile storage
  • 10. 10 Unix (blue.unix)  Using it for e-mail only?Using it for e-mail only?  Switch to CMS! Save resources!Switch to CMS! Save resources!  ITC will move your mailbox for you!ITC will move your mailbox for you!  nlb5xnlb5x@unix.mail.virginia.edu@unix.mail.virginia.edu
  • 11. 11 E-mail Options  Central Mail ServiceCentral Mail Service  SimeonSimeon  EudoraEudora  OutlookOutlook  Pine/upenelmPine/upenelm  MulberryMulberry **  WebMailWebMail **  Unix - blue.unixUnix - blue.unix  SimeonSimeon  EudoraEudora  OutlookOutlook  Pine/upenelmPine/upenelm ** CMS only!CMS only!
  • 12. 12 E-mail clients not accounts!  YourYour emailemail addressaddress is like youris like your phone numberphone number  Unique address for people to reach youUnique address for people to reach you  YourYour e-maile-mail client(s)client(s) is like youris like your phone(s)phone(s)  Different way(s) to access the same callDifferent way(s) to access the same call CordlessCordless Touch toneTouch tone RotaryRotary
  • 13. 13 Home Directory Service (HDS) blue.unix.virginia.edu  Utility to access files on blue.unix.virginia.eduUtility to access files on blue.unix.virginia.edu  75 MB of file storage space75 MB of file storage space  SecureSecure  Daily backup by ITCDaily backup by ITC  Protected from viruses & hackersProtected from viruses & hackers  Easily accessibleEasily accessible  PCs and MacsPCs and Macs  On-Grounds and dialinOn-Grounds and dialin
  • 14. 14 Toolkit toolkit.virginia.edu  Set of toolsSet of tools  Course managementCourse management Class e-mail listClass e-mail list Grade submissionGrade submission Homework submissionHomework submission  Web-accessible course materialsWeb-accessible course materials SyllabusSyllabus Electronic reservesElectronic reserves Images, sounds, etcImages, sounds, etc
  • 15. 15 Dialin  Remote access to University resourcesRemote access to University resources  WebWeb  E-mailE-mail  Home Directory ServiceHome Directory Service  LibraryLibrary  OthersOthers
  • 16. 16 Wireless  On-Grounds access to Internet andOn-Grounds access to Internet and University ResourcesUniversity Resources  Secures your connection to the wirelessSecures your connection to the wireless network via encryptionnetwork via encryption  Prevents outsiders from using our networkPrevents outsiders from using our network
  • 17. 17 CorporateTime  Enterprise-wide scheduling softwareEnterprise-wide scheduling software  Mange your calendarMange your calendar  Schedule meetings with othersSchedule meetings with others  Schedule resourcesSchedule resources  Easily accessibleEasily accessible  Client applicationClient application  WebWeb
  • 18. 18 Others  ISISISIS  Information WarehouseInformation Warehouse  OracleOracle
  • 19. 19 Need an account?  ITC Accounts Web PageITC Accounts Web Page  http://www.itc.virginia.edu/helpdesk/accounts/http://www.itc.virginia.edu/helpdesk/accounts/  ITC Help DeskITC Help Desk  924-3731924-3731
  • 20. 20 Forget your password?  ITC Accounts Web PageITC Accounts Web Page  http://www.itc.virginia.edu/helpdesk/accounts/http://www.itc.virginia.edu/helpdesk/accounts/  ITC Help DeskITC Help Desk  924-3731924-3731
  • 21. 21 Password Tips  IncludeInclude  CharactersCharacters  DigitsDigits  Special charactersSpecial characters  First letter of each word in phraseFirst letter of each word in phrase e.g. Rdd!3miate.g. Rdd!3miat