Top OIT Frequently Asked Questions
Q: | Should I turn my computer off before I leave work? |
A: | Yes, shutting down your computer daily releases all system resources and rebooting allows the operation system to repair itself if errors have occurred. |
Q: | What if I need additional software installed on my computer. |
A: | Lincoln University owns a site license for McAfee Antivirus and selected Microsoft applications, including Office, Word, Excel, Access, and others. Contact the OIT helpdesk to arrange installation of any of these programs. Other software may be purchased by your department; contact your supervisor to inquire about requisitioning. |
Q: | What if I need to move my computer to another location? |
A: | Relocation of equipment, including computers is handled by the Buildings and Grounds department. Please contact ITS before having your equipment moved. We will prepare the equipment for transport, and hook it up again in its new location. |
Q: | How do I reduce the size of my mailbox? (faculty) |
A: | The easiest way to reduce the size of your mailbox is to delete unnecessary email. OR You can also delete large file attachments. Contact the help desk at 573-681-5515 for details |
Q: | What is PII? |
A: | PII is an acronymn for Personally Identifiable Information. Please click here for more information. |
Q: | Why do I have to change my password every 6 months? |
A: | Passwords are the most frequently utilized form of authentication for accessing a computing resource. Due to the use of weak passwords, the proliferation of automated password-cracking programs, and the activity of malicious hackers and spammers, they are very often also the weakest link in securing data. Password use must therefore adhere to the password policy statement. |
Q: | Why does my password have to be so complex? |
A: | Passwords are the most frequently utilized form of authentication for accessing a computing resource. Due to the use of weak passwords, the proliferation of automated password-cracking programs, and the activity of malicious hackers and spammers, they are very often also the weakest link in securing data. Password use must therefore adhere to the password policy statement. |