Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 12 Current »

When studying online with Moore, you will be using a computer to access learning materials, prepare assessments and communicate with tutors and other students.

The following are recommendations about the technical requirements of accessing online learning.

06.4.1 Internet Connection

To access online lecture content and assessment, you will require access to Broadband Internet (LAN, Cable or DSL). Many libraries offer fast internet.

06.4.2 Computer (Recommended)

For a PC the following specifications are recommended:

  • Processor: Intel Core 2 Duo

  • RAM: 4 GB

  • Available Hard Drive Space: 1 GB

  • Operating System: Vista, Windows 7, 8 or 10

For a Mac the following specifications are recommended:

  • Processor: Intel Core 2 Duo

  • RAM: 4 GB

  • Available Hard Drive Space: 1 GB

  • Operating System: 10.7 or better

 

While some parts of the course can be completed on other devices, they are not guaranteed to work in all areas. To that end, students will need to have access to a PC or Mac-based computer system to complete the coursework.

 

06.4.3 Software for PC and Mac

For PC the recommended software is as follows:

  • Office Suite: MS Office 2007 or newer. The college will provide each student with Office 365 (Word, Excel, PowerPoint, Outlook)

  • Browser: The most recent version of the following: Chrome, Firefox, Internet Explorer or Microsoft Edge

 

For Mac the recommended software is as follows:

  • Office Suite: MS Office 2011 or newer. The college will provide each student with Office 365 (Word, Excel, PowerPoint, Outlook)

  • Browser: The most recent version of the following: Chrome, Firefox or Safari

  • Plug-Ins: The most recent version of Adobe Reader and Java

 

Most of your online learning will be accessed within your web browser. Since there is audiovisual material, you will also require a set of speakers or headphones.

Certain assessment tasks will require you to compose an assignment using the word processor of your choice (we recommend and provide each student with Microsoft Word). You will then need to save/export your major assessment items as PDF documents for online submission.

 

06.4.4 Computer Skills

The following computer skills are required in order to successfully undertake the course:

  • Use of word processor and web browser

  • Sending and receiving emails

  • Ability to communicate on a social media platform like Microsoft Teams

  • Upload documents in your browser

  • Copy and paste

 

06.4.5 IT Help Desk

Unfortunately, the IT department is not able to help students with individual computer problems.

However, we are able to help you if the problem is with one of the College systems  by emailing helpdesk@moore.edu.au)

06.4.6 College Web Sites

06.4.7 Maintaining Online Security

Cybersecurity is crucial for all people accessing online environments. Online threats can compromise your personal information and that of others. To stay safe and secure online, students are advised to follow these guidelines. In doing so, you’ll significantly reduce the risk of falling victim to cyber threats and maintain your online security and safety throughout your academic journey.

  1. Use Strong and Unique Passwords: Create strong passwords for all your online accounts, including those for your college Master Password. Avoid using easily guessable information like birthdays or common words. Additionally, use different passwords for each account to minimise the impact of a potential breach. Password management software may be used to support you in using strong passwords, and not losing track of them. There are free versions of some of these available- others are low cost.

  2. Don’t share passwords: you should not allow others to know your passwords.

  3. Enable Two-Factor Authentication (2FA): Wherever possible, enable 2FA for your accounts. This adds an extra layer of security by requiring a second verification step, such as a code sent to your mobile device, or an authentication app, when logging in. (Also called multi-factor authentication)

  4. Beware of Phishing Attempts: Stay vigilant against phishing emails or messages asking for your personal information. Never click on suspicious links or provide sensitive data without verifying the sender’s legitimacy. Even if you know the name, the senders account may have been compromised.

  5. Keep Software and Devices Updated: Regularly update your computer, phone, and other devices with the latest software patches and security updates. These updates often include fixes for known vulnerabilities, keeping your devices more secure.

  6. Secure Your Wi-Fi Connection: If using public Wi-Fi, avoid accessing sensitive information, such as online banking or college accounts. Instead, use a Virtual Private Network (VPN) to encrypt your data and protect it from potential eavesdroppers.

  7. Be Cautious on Social Media: Limit the personal information you share on social media platforms. Adjust your privacy settings to control who can see your posts and avoid accepting friend requests from strangers.

  8. Regularly Back Up Your Data: Create backups of your important files and coursework regularly. In case of ransomware attacks or device failures, you can recover your data and avoid losing valuable academic work. One option is to use cloud storage such as OneDrive provided with your college Office 365 account, or removable storage (making sure that you have at least two offline copies).

  9. Be Wary of Online Downloads: Only download files and software from trusted sources. Malicious software (malware) can be disguised as legitimate downloads, so be cautious before installing anything.

10.  Respect Copyright and Intellectual Property: Avoid using copyrighted material without proper permission or attribution, both in your academic work and on social media. Plagiarism and copyright violations can have serious consequences.

11.  Log Out and Lock Your Devices: Always log out of College accounts and lock your devices when not in use. This simple step prevents unauthorised access if your device is left unattended.

  • No labels