Writing Alternative Text for the ITSM Knowledge Base

Similar documents
Client VPN OS Configuration. Android

How to Setup PureVPN Manually on Windows 7 (L2TP)?

UK TV ACCESS SET UP GUIDE

KE2 SmartGate. VPN Configuration. Q.5.25 June (pn 20695)

The two bullets below provide instructions that will guide you through the process of setting up and connecting to the ILG VPN:

Adding a VPN connection in Windows XP

How to use VPN L2TP over IPsec

SET UP VPN FOR WINDOWS 10

Residence Towers Network Access for Windows XP / 2000 Computers

EacStudent Wireless Access for Windows XP / 2000 Computers

Configure Point to Point Tunneling Protocol (PPTP) Server on RV016, RV042, RV042G and RV082 VPN Routers for Windows

Educational Technology York College / CUNY

Setting up L2TP Over IPSec Server for remote access to LAN

Secure Access Configuration Guide For Wireless Clients

July 9, Installation Guide

1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions).

APSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15

EacMonsterNet Wireless Access Windows XP Computers

How To Setup VPN On Windows 10

Creating a VPN connection for Windows XP (professional)

Educator Portal: Creating a Practice Formative Test Session

VPN Connection - Instructional Document

DFL-210, DFL-800, DFL-1600 How to setup IPSec VPN connection with DI-80xHV

Table of Contents A. Set up VPN Client...2. B. Connect to CUHK VPN C. Disconnect from CUHK VPN... 13

To Activate your Wireless Account

Instructions for Using the e-learning Module on Service-Learning for Students

V7610 TELSTRA BUSINESS GATEWAY

Connect to the Cambridge network

FileNET Guide for AHC PageMasters

Partner Side SMART Guide

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

How to Configure a Client-to-Site L2TP/IPsec VPN

Connecting to the NJITSecure wireless network.

FileNET Guide for AHC PageMasters

How to setup Remote VPN access using Windows Radius Server and Unifi USG/Controller

istorage Server and IP SEC

Using FileZilla to Connect to Your SFTP Account

Windows 2000 Pre-shared IKE Dialup VPN Setup Procedures

Securewireless Windows 7 Setup Guide

Using Blackboard Drive to upload/manage content in Blackboard Learn

Configuring WPA2 for Windows XP

Configuring 802.1X Authentication Client for Windows 8

L2TP Over IPsec Between Windows 2000 and VPN 3000 Concentrator Using Digital Certificates Configuration Example

802.1x Radius Setup Guide Working AirLive AP with Win X Radius Server

Windows 7 Configuration for ORU Wireless Networks

My IRIS Web Inbox Approving the Electronic Ledger Reconciliation

NetMotion Integration with GreenRADIUS - Quick Start Guide

Connecting the DI-804V Broadband Router to your network

Introduction. Preview. Publish to Blackboard

My Reviewers User Manual Series

Get Started with Blackboard For Instructors

Bidder s Guide for submission of online application for allotment of Coal Mines

Configure Wireless for Windows 7

Powerlink for WebCT CE 6/ Vista 4 User Guide (updated )

Wireless Installation Instructions for Windows Vista

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall.

Business NETVIGATOR Roaming

1. Installing the Drivers for Windows

Auburn Montgomery AUM Wi-Fi. Windows 7. User s Guide & System Documentation

Site-to-Site VPN with SonicWall Firewalls 6300-CX

University of Massachusetts

Manually Configuring Windows 8 for Wireless PittNet

NetIQ Advanced Authentication Framework - Extensible Authentication Protocol Server. Administrator's Guide. Version 5.1.0

Create Mailing Labels using SUPER and Mail Merge (Word 2010)

Business Connect Secure Remote Access Service (SRAS) Customer Information Package

HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

Web-based Configuration. First, setup motion detection windows in the web-based configuration of the camera.

How to: Set up TTUnet VPN in Mac OS X Leopard (10.5)

Workshop on Windows Server 2012

Downloading, Installing, and Configuring Blackboard Drive

Accessing and Setting Your Blackboard Interface Preferences

Open Respondus and confirm that the Current Personality dropdown is set to WebCT Vista/CE 8.x.

The aim of this guide is to offer specific support for the use of features and tools within Blackboard. This guide includes information on:

Configuring the VPN Client

VI. Corente Services Client

Setting up VPN on Windows Vista (connecting to vp2.acu.edu.au)

Outside Interests Disclosure Form for Staff. IRIS Mobile through the Web

AT&T Global Network Client for Mac User s Guide Version 2.0.0

Implementation Guide for protecting Juniper SSL VPN with BlackShield ID

Building Block Installation - Admins

Application Scenarios of DG-NS5004 Cloud Storage Syncbox Feature

Table of contents. Zip Processor 3.0 DMXzone.com

3. Close the window and all open Internet Explorer windows, then run the session again. Page 1 of 6. Downloaded from

VPN Setup for CNet s CWR g Wireless Router

Double-clicking an entry opens a new window with detailed information about the selected VPN tunnel.

Viking VPN Guide Mac OSX RDP Usage

Approving the Outside Interests Disclosure Form Without Conflicts. Supervisor Level. IRIS Mobile through the Web

OneSecure VPN Remote User Installation & Configuration Guide

Apple Computer, Inc. ios

Lab 19: Excel Formatting, Using Conditional Formatting and Sorting Records

The MyCSF Administrator s Tool Guide

User Manual For. EFM I2File.net. September 26, 2017 Version 1.0

Connect to eduroam WiFi

Campus Solutions Faculty Guide Section 2 - Faculty Center

RU-VPN2 - GlobalProtect Installation for Mac

How to configure IPSec VPN failover

Let us know what you d like to do:

Connecting to the eduroam Wireless Network. 1. If you are using a PC, move the. 2. Next Click or Tap the Settings. Help Sheet Windows 8.

Directions for Setting up Remote Desktop Connection for PC:

Transcription:

Writing Alternative Text for the ITSM Knowledge Base What information does the image convey to the user? This is the question that needs to be answered with alt text. Whatever information a sighted user is meant to take from the image must be replicated as closely as possible in words for users who cannot see it. Most images for configuration instructions fall into one of three categories: Images that show the user what something looks like Images that help the user locate something Images that help the user confirm settings If you can t think of what information an image is conveying, it s possible the image is unnecessary! What is important to include in alt text: Full title of window, tab, heading, menu, or screen. This will help orient a screen reader user. Note: Avoid describing the visual location of things (e.g. upper-left ); instead, note which heading/step/menu the item falls under (e.g. Under the Content Area heading or Under Step 3 ) Terminology as accurate and universal/consistent as possible, e.g. Apple Menu, Menu Bar, Context Menu for the right-click popup menu, Radio Button, Checkbox, Charm Bar for the Windows 8 Start Menu alternative, etc. As few unnecessary words as possible. Avoid Screenshot of or Image of unless there is likely to be confusion over whether the image is a button or not. What should NOT be included in alt text: Instructions that already appear in the surrounding text (e.g. Click Next, Enter your NetID ). Descriptions of color, position, etc. (e.g. Red Button, upper-left ) Notes: An image should always display below the step it is describing, but as part of the same list item. Use Shift+Enter to add a line break without adding a new list item. Remember: there is no 100% established correct way to write alt text. NUIT is committed to continually raising our web accessibility compliance. We are not looking for immediate perfection, but best effort! Page 1 of 9

Images that Show the User what Something Looks Like 5. Click Submit a Paper. Screenshot of Submit A Paper button 4. In the drop down menu, click Delete. Item drop down menu. Delete is selected. An action bar refers to the purple buttons that are near the top of many pages in Blackboard. The two most important action bars are in content areas and the grade center. Content Area and Grade Center action bars. Content Area menus include Build Content, Create Assessment, and Add Interactive Tool. Grade Center menus include Create Column, Create Calculated Column, Manage, and Reports. 7. Check the check-boxes adjacent to the course materials that will be copied. Course Copy screen. Under 2. Select Copy Options, the Destination Course ID field is filled in. Under Select Course Materials, the checkboxes for desired materials to copy are checked. Page 2 of 9

Images that Help the User Locate Something 5. Click Remove Users from Course. Users screen. The Remove Users from Course button is highlighted. 4. From the Upload drop down menu, select Upload Package. Upload drop down menu. Upload Package is highlighted. Optional: If you want to copy the list of users from a previous course to the existing course, check Include Enrollments in the Copy. However, it is recommended to leave the field unchecked. Course Copy screen. Under 4. Enrollments, the Include Enrollments in the Copy check box is highlighted. 2. Open Network Preferences by clicking on the Network icon. System Preferences window. Under Internet & Wireless, Network icon is highlighted. Page 3 of 9

Images that Help the User Confirm Settings 12. Enter northwesternvpn in the Key input box. Advanced Properties window, L2TP tab. The Use preshared key for authentication radio button is selected, and northwesternvpn is entered in the Key field. 2. Type your NetID into the NetID field and NetID Password into the Password field. Login screen. NUVPN is selected in the Group drop down menu. 6. In the L2TP/IPSEc PSK VPN screen: Select VPN name and enter Northwestern VPN. Select set VPN server and type vpnnu.vpn.northwestern.edu Select set IPsec pre-shared key and enter northwesternvpn Uncheck Enable L2TP secret Add L2TP/IPSec PSK VPN screen. Options are set as described in the list above. (Use only if there are many options/fields and they are all listed/described in the text.) Page 4 of 9

Images that are Unnecessary/Should be Rethought 8. Click Submit. (Unrelated to step and unnecessary, should be removed.) (Information should be incorporated into surrounding text.) 7. The The connection is ready to use confirmation window will appear. Click Close. (Confirmation windows generally do not need an image unless there is a specific reason to include one.) Page 5 of 9

Example: How do I configure VPN on Windows 7? (Solution 230) 1. Open the Network and Sharing Center by clicking Start > Control Panel > Network and Internet > Network and Sharing Center. 2. Select Set up a new connection or network. Network and Sharing Center window. Set up a new connection or network is under Change your networking settings. 3. Select Connect to a workplace and click Next. Set Up a Connection or Network window, Connect to a workplace is selected. 4. Select Use my internet connection (VPN). Connect to a Workplace window. Under How do you want to connect? Use my Internet connection (VPN) is highlighted. Page 6 of 9

5. Enter vpn-nu.vpn.northwestern.edu in the Internet address field and Northwestern VPN in the Destination name field. Click Next. Connect to a Workplace window. vpn-nu.vpn.northwestern.edu is entered in the Internet address field. Northwestern VPN is entered in the Destination Name field. 6. Enter your NetID in the User name field and your password in the Password field. Click Create. Connect to a Workplace window. NetID is entered in the User name field, NetID password is entered in the Password field. The Domain (optional) field is left blank. 7. The The connection is ready to use confirmation window will appear. Click Close. Connect to a Workplace window. The message The connection is ready to use is displayed. The Close button is highlighted. Page 7 of 9

8. Using the Network icon within the System Tray on the desktop, click Network Connections. Right-click on Northwestern VPN and select Properties. Currently connected to: popup from the Network icon in the System Tray. Under Dial-up and VPN, Northwestern VPN is selected. The context menu is open and Properties is selected. 9. From the Northwestern VPN Properties window, select the Options tab. Under Dialing options, un-check Include Windows logon domain. Northwestern VPN Properties window, Options tab. Under Dialing options, the Include Windows logon domain box is unchecked. 10. Select the Security tab. Set Type of VPN to Layer 2 Tunneling Protocol with IPsec (L2TP/IPSec). Northwestern VPN Properties window, Security tab. Under Type of VPN, Layer 2 Tunneling Protocol with IPsec (L2TP/IP Sec) is selected from the dropdown. Page 8 of 9

11. Click Advanced Settings. 12. Enter northwesternvpn in the Key input box. Advanced Properties window, L2TP tab. The Use preshared key for authentication radio button is selected, and northwesternvpn is entered in the Key field. 13. Click OK. 14. Click OK to finish the configuration. 15. Delete the old NUVPN profile if it appears in your computer settings. Page 9 of 9