Writing Alternative Text for the ITSM Knowledge Base
|
|
- Ilene Rice
- 6 years ago
- Views:
Transcription
1 Writing Alternative Text for the ITSM Knowledge Base What information does the image convey to the user? This is the question that needs to be answered with alt text. Whatever information a sighted user is meant to take from the image must be replicated as closely as possible in words for users who cannot see it. Most images for configuration instructions fall into one of three categories: Images that show the user what something looks like Images that help the user locate something Images that help the user confirm settings If you can t think of what information an image is conveying, it s possible the image is unnecessary! What is important to include in alt text: Full title of window, tab, heading, menu, or screen. This will help orient a screen reader user. Note: Avoid describing the visual location of things (e.g. upper-left ); instead, note which heading/step/menu the item falls under (e.g. Under the Content Area heading or Under Step 3 ) Terminology as accurate and universal/consistent as possible, e.g. Apple Menu, Menu Bar, Context Menu for the right-click popup menu, Radio Button, Checkbox, Charm Bar for the Windows 8 Start Menu alternative, etc. As few unnecessary words as possible. Avoid Screenshot of or Image of unless there is likely to be confusion over whether the image is a button or not. What should NOT be included in alt text: Instructions that already appear in the surrounding text (e.g. Click Next, Enter your NetID ). Descriptions of color, position, etc. (e.g. Red Button, upper-left ) Notes: An image should always display below the step it is describing, but as part of the same list item. Use Shift+Enter to add a line break without adding a new list item. Remember: there is no 100% established correct way to write alt text. NUIT is committed to continually raising our web accessibility compliance. We are not looking for immediate perfection, but best effort! Page 1 of 9
2 Images that Show the User what Something Looks Like 5. Click Submit a Paper. Screenshot of Submit A Paper button 4. In the drop down menu, click Delete. Item drop down menu. Delete is selected. An action bar refers to the purple buttons that are near the top of many pages in Blackboard. The two most important action bars are in content areas and the grade center. Content Area and Grade Center action bars. Content Area menus include Build Content, Create Assessment, and Add Interactive Tool. Grade Center menus include Create Column, Create Calculated Column, Manage, and Reports. 7. Check the check-boxes adjacent to the course materials that will be copied. Course Copy screen. Under 2. Select Copy Options, the Destination Course ID field is filled in. Under Select Course Materials, the checkboxes for desired materials to copy are checked. Page 2 of 9
3 Images that Help the User Locate Something 5. Click Remove Users from Course. Users screen. The Remove Users from Course button is highlighted. 4. From the Upload drop down menu, select Upload Package. Upload drop down menu. Upload Package is highlighted. Optional: If you want to copy the list of users from a previous course to the existing course, check Include Enrollments in the Copy. However, it is recommended to leave the field unchecked. Course Copy screen. Under 4. Enrollments, the Include Enrollments in the Copy check box is highlighted. 2. Open Network Preferences by clicking on the Network icon. System Preferences window. Under Internet & Wireless, Network icon is highlighted. Page 3 of 9
4 Images that Help the User Confirm Settings 12. Enter northwesternvpn in the Key input box. Advanced Properties window, L2TP tab. The Use preshared key for authentication radio button is selected, and northwesternvpn is entered in the Key field. 2. Type your NetID into the NetID field and NetID Password into the Password field. Login screen. NUVPN is selected in the Group drop down menu. 6. In the L2TP/IPSEc PSK VPN screen: Select VPN name and enter Northwestern VPN. Select set VPN server and type vpnnu.vpn.northwestern.edu Select set IPsec pre-shared key and enter northwesternvpn Uncheck Enable L2TP secret Add L2TP/IPSec PSK VPN screen. Options are set as described in the list above. (Use only if there are many options/fields and they are all listed/described in the text.) Page 4 of 9
5 Images that are Unnecessary/Should be Rethought 8. Click Submit. (Unrelated to step and unnecessary, should be removed.) (Information should be incorporated into surrounding text.) 7. The The connection is ready to use confirmation window will appear. Click Close. (Confirmation windows generally do not need an image unless there is a specific reason to include one.) Page 5 of 9
6 Example: How do I configure VPN on Windows 7? (Solution 230) 1. Open the Network and Sharing Center by clicking Start > Control Panel > Network and Internet > Network and Sharing Center. 2. Select Set up a new connection or network. Network and Sharing Center window. Set up a new connection or network is under Change your networking settings. 3. Select Connect to a workplace and click Next. Set Up a Connection or Network window, Connect to a workplace is selected. 4. Select Use my internet connection (VPN). Connect to a Workplace window. Under How do you want to connect? Use my Internet connection (VPN) is highlighted. Page 6 of 9
7 5. Enter vpn-nu.vpn.northwestern.edu in the Internet address field and Northwestern VPN in the Destination name field. Click Next. Connect to a Workplace window. vpn-nu.vpn.northwestern.edu is entered in the Internet address field. Northwestern VPN is entered in the Destination Name field. 6. Enter your NetID in the User name field and your password in the Password field. Click Create. Connect to a Workplace window. NetID is entered in the User name field, NetID password is entered in the Password field. The Domain (optional) field is left blank. 7. The The connection is ready to use confirmation window will appear. Click Close. Connect to a Workplace window. The message The connection is ready to use is displayed. The Close button is highlighted. Page 7 of 9
8 8. Using the Network icon within the System Tray on the desktop, click Network Connections. Right-click on Northwestern VPN and select Properties. Currently connected to: popup from the Network icon in the System Tray. Under Dial-up and VPN, Northwestern VPN is selected. The context menu is open and Properties is selected. 9. From the Northwestern VPN Properties window, select the Options tab. Under Dialing options, un-check Include Windows logon domain. Northwestern VPN Properties window, Options tab. Under Dialing options, the Include Windows logon domain box is unchecked. 10. Select the Security tab. Set Type of VPN to Layer 2 Tunneling Protocol with IPsec (L2TP/IPSec). Northwestern VPN Properties window, Security tab. Under Type of VPN, Layer 2 Tunneling Protocol with IPsec (L2TP/IP Sec) is selected from the dropdown. Page 8 of 9
9 11. Click Advanced Settings. 12. Enter northwesternvpn in the Key input box. Advanced Properties window, L2TP tab. The Use preshared key for authentication radio button is selected, and northwesternvpn is entered in the Key field. 13. Click OK. 14. Click OK to finish the configuration. 15. Delete the old NUVPN profile if it appears in your computer settings. Page 9 of 9
Client VPN OS Configuration. Android
Client VPN OS Configuration This article outlines instructions to configure a client VPN connection on commonly-used operating systems. For more information about client VPN, please refer to our documentation.
More informationHow to Setup PureVPN Manually on Windows 7 (L2TP)?
How to Setup PureVPN Manually on Windows 7 (L2TP)? Things to Consider: Before you begin, please make sure that: You have a working internet connection Windows Supported Device. A Premium PureVPN account
More informationUK TV ACCESS SET UP GUIDE
UK TV ACCESS SET UP GUIDE For technical support please contact us at: support@uktvaccess.com If it is a new set up you are having trouble with, please tell us which device and operating system you are
More informationKE2 SmartGate. VPN Configuration. Q.5.25 June (pn 20695)
Powered by Q.5.25 June 2013 thermsolutions RB201 1UAS-2HND-IN USB POE GIGABIT ETHERNET 1 2 3 4 5 FAST ETHERNET SFP ETH1 ETH2 ETH3 ETH4 ETH5 6 7 8 9 10 ETH6 ETH7 ETH8 ETH9 ETH10 (pn 20695) KE2 Therm Solutions
More informationThe two bullets below provide instructions that will guide you through the process of setting up and connecting to the ILG VPN:
ILG VPN Job Aid The two bullets below provide instructions that will guide you through the process of setting up and connecting to the ILG VPN: Before you can use the ILG VPN for the first time, you must
More informationAdding a VPN connection in Windows XP
Adding a VPN connection in Windows XP Open up the Control Panel by selecting Start, Settings, Control Panel (in Classic Menu view) or Start, Control Panel (in XP Menu view). Double click on Network Connections.
More informationHow to use VPN L2TP over IPsec
How to use VPN L2TP over IPsec Server/Client on TW-EAV510 AC Note: 1. Please make sure that both LAN side networks are in different subnet. 2. Just some OS support L2TP Tunnel authentication, like Android
More informationSET UP VPN FOR WINDOWS 10
SET UP VPN FOR WINDOWS 10 A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure
More informationResidence Towers Network Access for Windows XP / 2000 Computers
Residence Towers Network Access for Windows XP / 2000 Computers These instructions will help you set up your wired connection on campus. Before beginning, you need: An activated student account on Gila
More informationEacStudent Wireless Access for Windows XP / 2000 Computers
EacStudent Wireless Access for Windows XP / 2000 Computers These instructions will help you set up your wireless connection on campus. Before beginning, you need: An activated student account on Gila Hank
More informationConfigure Point to Point Tunneling Protocol (PPTP) Server on RV016, RV042, RV042G and RV082 VPN Routers for Windows
Configure Point to Point Tunneling Protocol (PPTP) Server on RV016, RV042, RV042G and RV082 VPN Routers for Windows Objective The Point to Point Tunneling Protocol (PPTP) is a network protocol used to
More informationEducational Technology York College / CUNY
How to Use itunes U ( A tutorial for Instructors) 1. Go to your course site, and click Control Panel. 2. Click Manage Tools under Course Options panel. 3. Click Building Block Tool Availability. 1 4. The
More informationSetting up L2TP Over IPSec Server for remote access to LAN
Setting up L2TP Over IPSec Server for remote access to LAN Remote clients: Android 5.0, ios v10.3, Mac OS v10.12.2 and Windows 7. Step 1. Log into the firewall. The default access to LAN is via https://192.168.10.1.
More informationSecure Access Configuration Guide For Wireless Clients
ProCurve Networking Secure Access Configuration Guide For Wireless Clients Secure Access Configuration Guide For Wireless Clients Introduction... 2 Configuration Scenarios... 2 Required Network Services...
More informationJuly 9, Installation Guide
July 9, 2017 Installation Guide This two-step installation guide will help you create a VPNconnection to our servers. This is only needs to be done once after you start using our service. Part 1: Create
More information1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions).
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More informationAPSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15
APSCN VPN Settings for Windows 7 2 1. Creating a VPN Connection 2 2. Disconnecting the VPN 6 3. Connecting to an existing VPN Connection 7 APSCN VPN Settings for Windows XP 8 1. Creating a VPN Connection
More informationEacMonsterNet Wireless Access Windows XP Computers
EacMonsterNet Wireless Access Windows XP Computers These instructions will help you set up your wireless connection on campus. Before beginning, you need: An activated student account on Gila Hank On-Line.
More informationHow To Setup VPN On Windows 10
How To Setup VPN On Windows 10 Windows 10 is up and running but obviously you will have to invest sometime getting acquainted to it. As for VPN, setting it up on Windows 10 is not a rocket science but
More informationCreating a VPN connection for Windows XP (professional)
The following instructions will help you connect your PC to the ACU network off campus. These instructions are applicable for a computer that has Windows XP Professional. If you have Windows XP Home edition,
More informationEducator Portal: Creating a Practice Formative Test Session
Educator Portal: Creating a Practice Formative Test Session Revision Date: March 6, 2014 Table of Contents About the Educator Portal... 1 Required Software... 1 Logging Into Educator Portal... 2 Resetting
More informationVPN Connection - Instructional Document
VPN Connection - Instructional Document INTRODUCTION PPTP or "Point to Point Tunneling Protocol" allows your computer to connect to the Pelco s Partner Integration Lab and access resources that are only
More informationDFL-210, DFL-800, DFL-1600 How to setup IPSec VPN connection with DI-80xHV
DFL-210, DFL-800, DFL-1600 How to setup IPSec VPN connection with DI-80xHV This setup example uses the following network settings: In our example the IPSec VPN tunnel is established between two LANs: 192.168.0.x
More informationTable of Contents A. Set up VPN Client...2. B. Connect to CUHK VPN C. Disconnect from CUHK VPN... 13
Connect to CUHK VPN on a Windows PC / Notebook (This user guide suits Windows 10 the best and is applicable to Windows 7 / 8.1 with slight difference.) Table of Contents A. Set up VPN Client...2 B. Connect
More informationTo Activate your Wireless Account
To Activate your Wireless Account Access to the WVU Wireless network will require you to have an active WVU Active Directory account. Activation involves authenticating your account and setting a password.
More informationInstructions for Using the e-learning Module on Service-Learning for Students
Instructions for Using the e-learning Module on Service-Learning for Students I. Accessing the e-learning module 1.1 Login to LEARN@PolyU (https://learn.polyu.edu.hk) with your NetID and password 1.2 Under
More informationV7610 TELSTRA BUSINESS GATEWAY
V7610 TELSTRA BUSINESS GATEWAY VPN Configuration Guide Date: Oct 16, 2015 Revision Num: 1.0 1 V7610 VPN Configuration Guide Rev1.0, October 2015 Revision History Date Release Author Description Oct 16,
More informationConnect to the Cambridge network
Connect to the Cambridge network You can connect to the University network from home or another location so that you can access files and use common software, for example Word, Excel, PowerPoint and CHRIS.
More informationFileNET Guide for AHC PageMasters
PageMasters have the permissions necessary to perform the following tasks with Site Tools: ACADEMIC HEALTH CENTER 2 Application Requirements...3 Access FileNET...3 Log in to FileNET...3 Navigate the Site...3
More informationPartner Side SMART Guide
Partner Side SMART Guide Table of Contents 1. Introduction... 3 2. Partner Registration Process... 3 3. Additional Form... 12 4. Scorecard... 13 5. View Buyer Profile... 14 Partner Side User Manual 31
More informationInstructions for connecting to the FDIBA Wireless Network. (Windows XP)
Instructions for connecting to the FDIBA Wireless Network (Windows XP) In order to connect, you need your username and password, as well as the FDIBA Root Certificate which you need to install on your
More informationHow to Configure a Client-to-Site L2TP/IPsec VPN
Follow the instructions in this article to configure a client-to-site L2TP/IPsec VPN. With this configuration, IPsec encrypts the payload data of the VPN because L2TP does not provide encryption. In this
More informationConnecting to the NJITSecure wireless network.
Connecting to the NJITSecure wireless network. 1. Start by going to the Start menu and selecting Control Panel 2. Your control Panel will most likely be in Category view, you will need to change it to
More informationFileNET Guide for AHC PageMasters
ACADEMIC HEALTH CENTER 2 PageMasters have the permissions necessary to perform the following tasks with Site Tools: Application Requirements...3 Access FileNET...3 Login to FileNET...3 Navigate the Site...3
More informationHow to setup Remote VPN access using Windows Radius Server and Unifi USG/Controller
How to setup Remote VPN access using Windows Radius Server and Unifi USG/Controller Prerequisites: Windows Server 2012 or newer Domain Controller Services running Unifi USG (Pro, XG or 3P) Administrative
More informationistorage Server and IP SEC
istorage Server and IP SEC Friday, May 28, 2010 KernSafe Technologies, Inc. www.kernsafe.com Copyright KernSafe Technologies 2006 2009. All right reserved. Table of Contents 1. iscsi Target Setting...
More informationUsing FileZilla to Connect to Your SFTP Account
Using FileZilla to Connect to Your SFTP Account 2016 17 Academic Year Changes Previously, Wyoming Transcript Center users connected to the National Student Clearinghouse (Clearinghouse) servers using the
More informationWindows 2000 Pre-shared IKE Dialup VPN Setup Procedures
Windows 2000 Pre-shared IKE Dialup VPN Setup Procedures Purpose The purpose of this paper is to help give an explanation on how to set up Windows 2000 for preshared IKE VPN. This paper is written for a
More informationSecurewireless Windows 7 Setup Guide
Securewireless Windows 7 Setup Guide 1. Click on the wireless icon in the lower right-hand corner of the taskbar and then click on Open Network and Sharing Center. 2. From the Network and Sharing Center
More informationUsing Blackboard Drive to upload/manage content in Blackboard Learn
Using Blackboard Drive to upload/manage content in Blackboard Learn Downloading and Installing Blackboard Drive 1. Login to Blackboard Learn, and click on the Utilities Tab. 2. Locate the Blackboard Drive
More informationConfiguring WPA2 for Windows XP
Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP Your wireless card must support 802.1x, AES, and WPA2. Your computer must have Windows XP service pack 2 installed and
More informationConfiguring 802.1X Authentication Client for Windows 8
Configuring 802.1X Authentication Client for Windows 8 1. At the Metro Screen, press the windows key on your keyboard together with the alphabets x to go to the Control Panel. Page 1 1.1 In the Control
More informationL2TP Over IPsec Between Windows 2000 and VPN 3000 Concentrator Using Digital Certificates Configuration Example
L2TP Over IPsec Between Windows 2000 and VPN 3000 Concentrator Using Digital Certificates Configuration Example Document ID: 14117 Contents Introduction Prerequisites Requirements Components Used Objectives
More information802.1x Radius Setup Guide Working AirLive AP with Win X Radius Server
OvisLink 8000VPN VPN Guide 802.1x Radius Setup Guide Working AirLive AP with Win2003 802.1X Radius Server Table of Content Secured Enterprise Wireless Environment Configuration Guide... 3 WHAT IS THIS
More informationWindows 7 Configuration for ORU Wireless Networks
Page 1 of 13 Windows 7 Configuration for ORU Wireless Networks Show hidden icons Wireless Signal Strength Indicator Figure 1 Windows 7 Documentation for the ORU- Employee wireless network Clicking the
More informationMy IRIS Web Inbox Approving the Electronic Ledger Reconciliation
My IRIS Web Inbox Approving the Electronic Ledger Reconciliation Steps to approve the electronic ledger reconciliation: 1. Access My IRIS Web: https://irisweb.tennessee.edu 2. Authenticate with your NetID
More informationNetMotion Integration with GreenRADIUS - Quick Start Guide
NetMotion Integration with GreenRADIUS - Quick Start Guide March 15, 2016 2016 GreenRADIUS. All rights reserved. Page 1 of 16 2016 GreenRADIUS. All rights reserved. Page 2 of 16 Contents 1 GreenRADIUS
More informationConnecting the DI-804V Broadband Router to your network
Before you begin Make sure that any existing Firewall Software/Devices are disabled and/or shutdown before beginning installation of your new D-Link DI-804V Broadband Router. Contents of Package DI-804V
More informationIntroduction. Preview. Publish to Blackboard
Introduction Once you create your exam in Respondus, you can preview, publish to Blackboard, or print the exam. Before publishing or printing an exam, it is highly recommended that you preview the exam.
More informationMy Reviewers User Manual Series
My Reviewers User Manual Series Version 4.1 Student Guide Table of Contents Getting Started... 2 Logging in to the My Reviewers tool... 2 Navigating the site... 2 Uploading a Document... 3 Viewing Teacher
More informationGet Started with Blackboard For Instructors
Get Started with Blackboard For Instructors Log in to Blackboard... 2 View a Student Roster... 3 Upload a Syllabus... 4 Upload Files... 5 Set up a Discussion... 6 Create an Assignment... 7 Preview a Course
More informationBidder s Guide for submission of online application for allotment of Coal Mines
Bidder s Guide for submission of online application for allotment of Coal Mines (The following section is meant only to provide guidance to bidders about the bidding process on the website of MSTC. These
More informationConfigure Wireless for Windows 7
Configure Wireless for Windows 7 There are two main procedures for configuring Windows 7 to access McGill's wireless network. You can also add the steps at the bottom if you don't want your username and
More informationPowerlink for WebCT CE 6/ Vista 4 User Guide (updated )
Powerlink for WebCT CE 6/ Vista 4 User Guide (updated 9.20.05) Contents Introduction Installation & Configuration 3 Restricting Access 6 Allowing Access for Multiple Accounts 6 Turnitin Assignments Adding
More informationWireless Installation Instructions for Windows Vista
1 Click the Windows Orb. 2 Click on Control Panel. 3 Click on Classic View. 2 4 Locate and double-click Windows Firewall. 5 Click on Turn Windows Firewall on or off. 6 In the User Account Control window,
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall.
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall Overview This document describes how to implement IPsec with pre-shared secrets
More informationBusiness NETVIGATOR Roaming
Business NETVIGATOR Roaming Quick User Guide Step 1. Installing the Roaming Application Download & install the application from: For Business Broadband Customers: http://www.biz.netvigator.com/support/ro/biznet_business0607.exe
More information1. Installing the Drivers for Windows
For Ralink chipset products, please kindly refer to the following steps. 1. Installing the Drivers for Windows 1. Power on your PC, let the operating system boot up completely, and login as needed. 2.
More informationAuburn Montgomery AUM Wi-Fi. Windows 7. User s Guide & System Documentation
Auburn Montgomery AUM Wi-Fi Windows 7 User s Guide & System Documentation November 2018 WiFi Windows 7 For: Student Campus Fac Staff AUM WiFi // Windows 7 User s Guide Page 1 Table of Contents Overview
More informationSite-to-Site VPN with SonicWall Firewalls 6300-CX
Site-to-Site VPN with SonicWall Firewalls 6300-CX Skill level: Expert (requires knowledge of IPSec tunnel setup) Goal To build an IPSec tunnel through the 63xx router's WAN internet connection, and use
More informationUniversity of Massachusetts
You should verify the following minimum desktop requirements before logging on to the HR Direct Application. It is recommended that you have the minimum requirements listed below to ensure the HR application
More informationManually Configuring Windows 8 for Wireless PittNet
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Manually Configuring Windows 8 for Wireless PittNet If you are not able to connect to Wireless PittNet using our automated wizard, you
More informationNetIQ Advanced Authentication Framework - Extensible Authentication Protocol Server. Administrator's Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Extensible Authentication Protocol Server Administrator's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Support
More informationCreate Mailing Labels using SUPER and Mail Merge (Word 2010)
Create Mailing Labels using SUPER and Mail Merge (Word 2010) For this example we will be using a 4-H club to generate labels for a mailing to the members. First we will extract the names and addresses
More informationBusiness Connect Secure Remote Access Service (SRAS) Customer Information Package
Business Connect Secure Remote Access Service (SRAS) Customer Information Package Table of Contents 1.0 Introduction... 1 1.1 Overview... 1 1.2 Scope and Audience... 1 1.3 Design Deliverables... 1 1.4
More informationHOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP
HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP 1. Go to the Start Menu, choose Programs, Accessories, Communications, and open the Network Connections
More informationMWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router
MWA Deployment Guide Mobile Workforce Architecture: VPN Deployment Guide for Microsoft Windows Mobile and Android Devices with Cisco Integrated Services Router Generation 2 This deployment guide explains
More informationWeb-based Configuration. First, setup motion detection windows in the web-based configuration of the camera.
How do I record motion using IP surveillance? To schedule video recording with motion detection, you must first enable this feature on the Internet camera. This can serve as a security device by recording
More informationHow to: Set up TTUnet VPN in Mac OS X Leopard (10.5)
Print How to: Set up TTUnet VPN in Mac OS X Leopard (10.5) Details: 1) Access System Preferences by choosing it from the Apple menu. 2) Click Network. https://www.askit.ttu.edu/portal/app/portlets/results/friendlysolutionview.jsp?solutionid=110923122046093&stoken=678130c238c1422a22e9e1fdfc91e3cf
More informationWorkshop on Windows Server 2012
Workshop on Windows Server 2012 Topics covered on Workshop DHCP Scope Splitting. A Dynamic Host Configuration Protocol (DHCP) split-scope configuration using multiple DHCP servers allows for increased
More informationDownloading, Installing, and Configuring Blackboard Drive
M06-Downloading, Installing, and Configuring Blackboard Drive Blackboard Learn: Moving Content This handout contains the exact same information as the corresponding Blackboard Learn Moving Content videos
More informationAccessing and Setting Your Blackboard Interface Preferences
Accessing and Setting Your Blackboard Interface Preferences Version 1.00.10132005 Francis Tuttle Technology Center elearning Department TABLE OF CONTENTS Purpose and Objectives.....................................
More informationOpen Respondus and confirm that the Current Personality dropdown is set to WebCT Vista/CE 8.x.
R03-Moving Assessments Using Respondus Blackboard Learn: Respondus This handout contains the exact same information as the corresponding Blackboard Learn Respondus videos which are available at http://www.youtube.com/playlist?list=plhnbpaq59j3htgpjmbxrmzb0a4zxkj1yi.
More informationThe aim of this guide is to offer specific support for the use of features and tools within Blackboard. This guide includes information on:
Blackboard Guide for Students The aim of this guide is to offer specific support for the use of features and tools within Blackboard. This guide includes information on: What is Blackboard Accessing Blackboard
More informationConfiguring the VPN Client
Configuring the VPN Client This chapter explains how to configure the VPN Client. To configure the VPN Client, you enter values for a set of parameters known as a connection entry. The VPN Client uses
More informationVI. Corente Services Client
VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...
More informationSetting up VPN on Windows Vista (connecting to vp2.acu.edu.au)
Page 1 of 9 Setting up VPN on Windows Vista (connecting to vp2.acu.edu.au) 18 February 2008 (Draft Version 1.1) Page 2 of 9 Setting up VPN on Windows Vista(Buisness) Requirements: 1. These instructions
More informationOutside Interests Disclosure Form for Staff. IRIS Mobile through the Web
Outside Interests Disclosure Form for Staff IRIS Mobile through the Web The Outside Interests Disclosure Form is for the University of Tennessee faculty and staff to disclose outside interests as required
More informationAT&T Global Network Client for Mac User s Guide Version 2.0.0
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationImplementation Guide for protecting Juniper SSL VPN with BlackShield ID
Implementation Guide for protecting Juniper SSL VPN with BlackShield ID Copyright Copyright 2011, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationBuilding Block Installation - Admins
Building Block Installation - Admins Overview To use your Blackboard Server with Panopto, you first need to install the Panopto Building Block on your Blackboard server. You then need to add Blackboard
More informationApplication Scenarios of DG-NS5004 Cloud Storage Syncbox Feature
Application Scenarios of DG-NS5004 Cloud Storage Syncbox Feature To automatically sync & update a specific drive/ data folder on a PC to a NAS:- * Once the syncbox Server is loaded on NAS, it will be displayed
More informationTable of contents. Zip Processor 3.0 DMXzone.com
Table of contents About Zip Processor 3.0... 2 Features In Detail... 3 Before you begin... 6 Installing the extension... 6 The Basics: Automatically Zip an Uploaded File and Download it... 7 Introduction...
More information3. Close the window and all open Internet Explorer windows, then run the session again. Page 1 of 6. Downloaded from
Add the 3 Intermountain domains to the Compatibility View settings in Internet Explorer 9 11 Doing this avoids the majority of HELP2 browser errors & issues Accessing Compatibility View settings in Internet
More informationVPN Setup for CNet s CWR g Wireless Router
VPN Setup for CNet s CWR-854 802.11g Wireless Router The instructions below are for getting an IPSec client to connect CNet s wireless broadband router CWR-854(F) with VPN capability. The VPN feature can
More informationDouble-clicking an entry opens a new window with detailed information about the selected VPN tunnel.
The Barracuda NextGen Admin VPN tab provides information on all VPN connections that are configured on the Barracuda NextGen Firewall F-Series. Selecting the icons in the ribbon bar under the VPN tab takes
More informationViking VPN Guide Mac OSX RDP Usage
Viking VPN Guide Mac OSX RDP Usage Table Of Contents 1 : What is RDP 2 : Enabling RDP on your Office PC 3 : Installing the RDP client on your Home Mac 4 : Connecting to your Office PC from your Home Mac
More informationApproving the Outside Interests Disclosure Form Without Conflicts. Supervisor Level. IRIS Mobile through the Web
Approving the Outside Interests Disclosure Form Without Conflicts Supervisor Level IRIS Mobile through the Web The Outside Interests Disclosure Form is for the University of Tennessee faculty and staff
More informationOneSecure VPN Remote User Installation & Configuration Guide
OneSecure VPN Remote User Installation & Configuration Guide 3/11/2015 CONTENTS Download Client Software 02 Install Client Software 03 Enable Client Software 07 Configure the Connection 08 WELCOME Welcome
More informationApple Computer, Inc. ios
RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 15, 2012 Product Information Partner Name Apple Computer, Inc. Web Site www.apple.com Product Name Version & Platform 5.1
More informationLab 19: Excel Formatting, Using Conditional Formatting and Sorting Records
Lab 19: Excel Formatting, Using Conditional Formatting and Sorting Records () CONTENTS 1 Lab Topic... 2 1.1 In-Lab... 2 1.1.1 In-Lab Materials... 2 1.1.2 In-Lab Instructions... 2 1.2 Out-Lab... 9 1.2.1
More informationThe MyCSF Administrator s Tool Guide
The MyCSF Administrator s Tool Guide January 2016
More informationUser Manual For. EFM I2File.net. September 26, 2017 Version 1.0
User Manual For EFM I2File.net September 26, 2017 Version 1.0 1 Table of Contents Registration... 3 Register a Firm Account... 3 Register a Self-Represented Account... 5 Login... 8 Forgot Password... 8
More informationConnect to eduroam WiFi
Connect to eduroam WiFi List Procedure for Windows 10... 2 Procedure for Windows 8... 4 Procedure for Windows 7... 6 Procedure for Mac... 11 Procedure for iphone, ipod Touch and ipad... 15 Procedure for
More informationCampus Solutions Faculty Guide Section 2 - Faculty Center
Financial Management Human Resources Campus Solutions Campus Solutions Faculty Guide Section 2 - Faculty Center Updates Date Action Page(s) 04/13/12 Created 05/14/12 Entire document updated. all 05/15/12
More informationRU-VPN2 - GlobalProtect Installation for Mac
RU-VPN2 - GlobalProtect Installation for Mac Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software called
More informationHow to configure IPSec VPN failover
How to configure IPSec VPN failover This scenario shows how both firewalls can be configured IPSec VPN failover between two WAN links. Either of WAN links is broken, all VPN traffic will be on-line redirected
More informationLet us know what you d like to do:
Thank you for registering your new Co-operative Energy online account. Your new online account has a fresh new look and brings home energy management right to your fingertips. Below you will find a guide
More informationConnecting to the eduroam Wireless Network. 1. If you are using a PC, move the. 2. Next Click or Tap the Settings. Help Sheet Windows 8.
Connecting to the eduroam Wireless Network Help Sheet Windows 8 October 2013 This Help Sheet assists Windows 8 users to access the eduroam Wireless Network. 1. If you are using a PC, move the mouse to
More informationDirections for Setting up Remote Desktop Connection for PC:
Directions for Setting up Remote Desktop Connection for PC: BEFORE YOU BEGIN, MAKE SURE YOU HAVE: COMPUTER NAME USERNAME TEMPORARY PASSWORD 1 4/19/2016 Creating a Shortcut to your Concourse Hosting remote
More information