This site provides information, training, and support on computer hardware, software and services at Nicholls State University. You will find answers to most of the common problems people encounter while using campus computers, as well as lots of specialized information.
- Academic Computing supports the mission of the University by providing student and faculty services that assist with all technological aspects of learning in a University environment.
- Management of the University Learning Management System (Moodle)
- Management of the University email for students (GMail)
- Providing highly available computer labs for students, and assistance for faculty to integrate course materials into the curriculum.
- Ongoing procedural and educational training of students and faculty.
- Provide accountability to University and State Auditors, the SGA, and to the University Louisiana System board.
- Management and technical support of the compressed video network and VBrick streaming video systems.
- Provide computing resources to the faculty.
- The managed labs allow students to complete reports and research necessary for course requirements. We have professional staff and trained students available to assist faculty and students in using University computing resources and multimedia classrooms.
- The technical support of the compressed video network is accomplished by working closely with office of Distance Education.
- Assessing Faculty and Student Computing needs.
- Academic Computing hosts web services for the department’s interactive pages.
|Peltier 120||L&Lit Writing Comp Lab||Languages & Lit||26|
|Peltier 131||L&Lit Writing Comp Lab||Languages & Lit||26|
|Peltier 165/166||Student Help & Training Lab||Dyslexia Lab||5|
|Peltier 206||L&Lit Writing Forgien Lang. Lab||Languages & Lit||26|
|Polk 125||Student Help & Training Lab||Teacher Ed Lab||2|
|Polk 142||Student Teacher Lab||Teacher Ed Lab||14||14|
|Polk 137 LRC||Students Learning/Training on WhiteBds||COE||1||21|
|Polk 262 Psyc Lab||PSYC Lab||PSYC Lab||4|
|Talbot 102||MACO Student Use Mini Lab||Maco Stud Macs||2|
|Talbot 103||MACO Lab||Maco Lab||19|
|Talbot 104||MACO Radio Station||Maco Lab||5|
|Talbot 106||MACO MultiMedia Convergence Lab||Maco Lab||17|
|Talbot 107||MACO TV Studio Video Editing Lab||Maco TV Lab||19|
|Talbot 204||Art – Photograph Lab||Art Photography||10|
|Talbot 207-A||Art – LU Lab||LU Lab||2|
|Talbot 208||Art – Graphics Art Lab||Art Adv. Graphics||14|
|Talbot 211||Music Lab w/ Notation & Marching Band||Music Lab||18|
|Talbot TBD||Student Publications Lab (Nicholls Worth Mag)||NW, Ads, LP||20|
|Ellender Library||Student Use||Open Lab (Floor)||16||18|
Guide sheet to utilizing the Technology Fee and explanation of scoring
Fee Definition and Authority
The Student Technology Fee (Tech Fee) is governed by Act no. 1450 of the regular session and is under supervision by each institution in higher education. This fee is considered a supplement to current funds allocated by the University and by grants. In October of 2012, the Nicholls State University Student Government Association voted unanimous approval for the assessment of a technology fee of $5.00 per credit hour, up to a maximum of $100.00 per semester, effective in the Fall 2013 semester. In a memorandum dated July 19, 1999, Mr. Bobby Jindal clarified fee expenditure guidelines that went into effect September 1, 1999. All Tech Fee requests must follow these guidelines.
Complying with guidelines issued by Mr. Jindal on July 19, 1999, the Student Technology Fee Committee is composed of nine (9) students and eight (8) faculty/staff members giving the students a majority. Student makeup is composed of the Student Government Association President (or designee) and Vice President, one (1) student from each college, for a total of five (5), and 2 students at large appointed by the SGA President. The faculty/staff makeup is composed of 1 faculty member from each college, for a total of five (5), one (1) from the library, one (1) from Student Affairs, and (1)1 from Student Life. The ex-officio members that do not have voting privileges include: Director of Academic Computing, Chief Information Officer, Member of University Administration, and all Instructional Technology Specialists and Computer Specialists from Academic Computing.
Scoring of proposals
Points are given for each section and represent a weighted average. Sections with higher point totals indicate sections that are given greater consideration. Proposals are scored on a cumulative basis and are ranked by the total cumulative score. Those proposals ranking highest have the highest chance of being undertaken. The overall constraint is the amount of budget available for projects. In the event of a tie and only one project can be undertaken, the Tech Fee Committee will determine who shall get funded.
Procedure for Funding
As per Mr. Jindal’s guidelines, Nicholls State University has instituted a Student Technology Fee Plan. Line items inserted into the fee plan are composed of proposals from University Colleges, Departments, and the students.
The committee is first required to pass an overall budget that outlines the major categories of expenditures. In lieu of a Technical Review Committee, Academic Computing serves in this capacity and ranks the technical merit of each proposal and determines whether it fits into the overall plan for technology at Nicholls State University. If a proposal fits the description of technology, Academic Computing determines whether it is technically sound and whether human resources are available to implement and maintain all current production.
After the technical review is complete, the proposals are then submitted to the Student Technology Fee proposal subcommittee for consideration. The subcommittee scoring process usually takes place during November. The subcommittee makes their recommendations to the full committee where a vote is held to decide which proposals will get funded and for what amount. Upon approval by the committee, the proposal is inserted as a line item into the Student Technology Fee Plan. Normally in December, after the vote, the chairperson of the proposal will receive a letter stating the outcome of the proposal. Minutes of these meetings are kept, which detail the discussion and debates on specific items and of the budget.
The selection subcommittee may request the applicant to give a 5-minute presentation to further explain their proposal. Applicant will be contacted by Ms. Kim Nannie if presentation is required.
Applicants must fill out a routing sheet that has the following signatures:
- Department head
- Dean of the College
The completed proposal request should be turned into the Administrative Assistant for Information Technology, Ms. Kim Nannie, in 156 Peltier Hall, by 2:00 PM on the first Friday of November. The completed request should be submitted in Microsoft Word format and emailed to Kim.Nannie@nicholls.edu. Additional paperwork should be included with document including any quotes and/or sources of pricing generated while working on the proposal, especially for specialty items.
Rewarding of Winning Proposals
The money to purchase items awarded is from the current fiscal year’s budget; all attempts will be made to purchase prior to the June 30th purchasing deadline. However, projects funded should not anticipate delivery or completion prior to the start of the next semester. Academic Computing will set up a priority and distribution schedule. Completing all projects prior to the beginning of the Spring semester is impossible, as this does not give the staff of Academic Computing the necessary time to order, set-up, and test the equipment along with other time sensitive jobs already scheduled during that time. If these items are needed in a sensitive timeframe, please discuss with Academic Computing before the end of the semester to determine if it would be possible to be added to the schedule.
Inventory of Awarded Items
Items purchased for funded proposals will become the responsibility of the Department or College of the proposal. These items will be transferred to the appropriate inventory and any repairs after the end of the warranty period will be the responsibility of the Department or College. However, these items funded with Student Technology Fees must continue to adhere to the State’s Technology Fee guidelines, as they must be accessible for student use and must not be placed in faculty or staff offices.
How to Print to a Kiosk
Register with WEPA
Nicholls Students: WEPA accounts are automatically created and associated with your myNicholls ID and password. You will login with your same credentials as myNicholls and Moodle .
Other Users: Before printing to a WEPA kiosk, register at wepanow.com. You can also register directly at a kiosk by touching the Register Here button.
*A WEPA account is not required if using a USB drive to print directly from an kiosk.
Print to the WEPA Cloud
Printing from your personal computer: Download the WEPA print drivers from the WEPA website. Then, click the Print button in your application, select the WEPA printer (WEPA B/W or WEPA Color), and go to a WEPA Kiosk to pick up and pay. All WEPA printing on your computer goes to your WEPA account – keep this in mind if a friend uses your computer.
Printing from a Nicholls computer lab: Most Nicholls computer labs have WEPA print drivers installed, which allows you to select WEPA as the printer. In these labs, click the Print button in your application, select the WEPA printer (WEPA B/W or WEPA Color), enter your WEPA username and password, and go to a WEPA Kiosk to pick up and pay.
Printing using a USB drive at a WEPA kiosk: Press the “Print from a USB” option and insert a USB drive containing your files into the WEPA print kiosk and follow the on-screen instructions.
Printing from anywhere else: You can still print by uploading documents into your online WEPA account. This option works with a limited number of file types including Word, Excel, PowerPoint, and PDF. File size cannot exceed 20 MB.
Release a Print Job
Release Code: After you print from your computer, WEPA will give you a 6 digit release code. You can press the “Release Code” on the screen and you will be directed to that single print job. Select the print job and then select your payment option
Userid Login: After you have printed several jobs, you can print all of them at once by logging into your account at the Kiosk and hitting the “Select All” option, and then by selecting your payment option WEPA will print all of the selected jobs.
Here are a few instructional videos about using the WEPA printing kiosks found around campus to print documents. More information about WEPA can be found at www.wepanow.com.
How to print from a USB thumb drive
How to register for a WEPA Account at a kiosk
How to log in to your WEPA Account at a kiosk
How to login on www.wepanow.com to download computer print drivers
Direct Print Option
How to use a WEPA release code at a kiosk
Nicholls State University is now using WEPA as your campus printing solution. WEPA is a flexible solution for printing and offers a much higher quality output. WEPA offers the following advantages:
You can now print from the following locations:
- Brady Clubhouse – Lobby area, 1st floor
- Donald G. Bollinger Memorial Student Union
- Ellender Hall Dorm – Study Lab, 1st Floor
- Ellender Memorial Library – Room 125
- Ellendar Memorial Library – Room 244
- Peltier Hall – Room 136 – Student Engagement Center
- Polk Hall – 1st floor, LRC lab/Room 131
- Powell Hall – Room 109
The WEPA system uses a high quality paper and produces outstanding print quality.
You can now send email and attachments to any WĒPA™ kiosk. Whether you are using the iPhone, Android, or Blackberry you can download the WĒPA™ “app” from app member’s page and send documents to any WĒPA™ kiosk.
Coupons and More
Nicholls will be able to solicit vendor coupons and have them printed on the Kiosks at no charge to the students.
Use your Colonel Card or Credit/Debit card.
TELECOMM & NETWORKING
The Nicholls Wireless Network, NSUnwired, is available to all Nicholls students, faculty, and staff. Our wireless network provides all the conveniences of a regular wired connection without the need for cables. As a shared resource, wireless networking is intended primarily to supplement the campus wired infrastructure, not to replace it.
This site is designed to help wireless users get connected and find up-to-date information on the wireless network. Wireless networking at Nicholls is growing and it is continually evolving.
If you are having difficulty connecting to the wireless network review the instructions on these pages first, and if you need further help, please call extension 4419.
To connect to the wireless network you will need to have the following items and settings:
- 802.11b/g/n/ac compliant wireless card
- Network type: Infrastructure
- SSID: NSUnwired
- Encryption: off
- TCP/IP settings: DHCP
NSUnwired is for student, faculty, staff, and guest access.
802.11a/b/g/n/ac compliant wireless card
You will need an 802.11a/b/g/n/ac compliant card. When purchasing a wireless card, make sure the card is compliant or certified. Some wireless cards are 802.11a only, 802.11b only, 802.11g only, 802.11n only, or 802.11ac only, and some cards are a combination of the standards. If at all possible, choose a card that supports a combination of the three latest standards of 80.11b/g/n/ac. A wireless card that supports all standards will work in all wireless locations on campus. In addition, make sure that you install the latest drivers for compatibility
and to resolve any issues. Visit the manufacturer’s web site for information about obtaining the latest drivers.
The Wi-Fi Alliance is a nonprofit international association that certifies wireless products based on the IEEE 802.11 standard. Visit their web site at www.wi-fi.org to find out if your wireless adapter has been certified.
Network Type: Infrastructure
802.11 defines two types of network: infrastructure and ad hoc. An infrastructure type indicates that your wireless client will connect to the wired network via an access point. Ad Hoc, on the other hand, indicates a type of network where only wireless clients get to communicate among each other. You must use infrastructure in order to connect to the Nicholls wireless network.
SSID stands for Service Set IDentifier, sometimes referred to as Network Name. This is simply a name used to identify a wireless network. An SSID can either be broadcast or hidden. When the SSID is hidden, the user must know what the SSID of the wireless network is in order to gain access. When the SSID is broadcast, the wireless network is available to anybody. The access points on the Nicholls wireless network are configured to broadcast their SSID. While on campus, if your wireless device says that it has found a “New Wireless Network NSUnwired, Would You Like to Connect?”, go ahead and connect. Some wireless adapters will allow you to leave the SSID field blank or enter the word “ANY”. This instructs the wireless clients to obtain whatever SSID is being broadcast by the access point. You can also set the SSID explicitly. If your wireless device fails to auto-detect “NSUnwired” and connect to the Nicholls wireless network, you can enter NSUnwired into the SSID field.
The 802.11 standard makes use of optional security mechanisms called WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access). Make sure encryption is turned off.
TCP/IP settings: DHCP
There are two ways of assigning an IP address to a network adapter: static or DHCP. Static assignment requires the use of a unique IP address that will only work on a particular subnet and must be entered manually. DHCP (Dynamic Host Configuration Protocol) on the other hand, refers to the automatic assignment of an IP address. No user intervention is required. The only thing the user is responsible for is to set the TCP/IP settings on the network adapter to DHCP.
Check the list below to see which specific indoor and outdoor areas have wireless coverage.
Wireless Coverage By Building
|Building||Location within Building||Standard|
|Ayo Hall||Full Coverage||802.11 A/G/N|
|Beauregard||Full Coverage||802.11 A/G/N|
|Candies||Full Coverage||802.11 A/G/N|
|Calecas||Full Coverage||802.11 A/G/N/AC|
|Century Club||Full Coverage||802.11 A/G/N/AC|
|Culinary||Full Coverage||802.11 A/G/N|
|Elkins Hall||Full Coverage||802.11 A/G/N|
|Gouaux Hall||Full Coverage||802.11 A/G/N|
|Ledet||Full Coverage||802.11 A/G/N/AC|
|Library 1st Floor||Full Coverage||802.11 A/G/N/AC|
|Library 2nd Floor||Full Coverage||802.11 A/G/N/AC|
|Library 3rd Floor||Full Coverage||802.11 A/G/N/AC|
|Millet||Full Coverage||802.11 A/G/N|
|Peltier Hall||Full Coverage||802.11 A/G/N/AC|
|Picciola Hall||Full Coverage||802.11 A/G/N|
|Polk Hall||Full Coverage||802.11 A/G/N/AC|
|Powell Hall||Full Coverage||802.11 A/G/N|
|Scholars||Full Coverage||802.11 A/G/N/AC|
|Shaver Gym||Full Coverage||802.11 A/G/N|
|Student Union||Full Coverage||802.11 A/G/N/AC|
|Student Union Ballroom||Full Coverage||802.11 A/G/N/AC|
|Talbot||Full Coverage||802.11 A/G/N/AC|
|White Hall||Full Coverage||802.11 A/G/N|
|Zeringue||Full Coverage||802.11 A/G/N|
|Student Union Outdoor Seating Area||802.11 A/G/N|
|Library Entrance Area||802.11 A/G/N|
|Talbot Hall Entrance Area||802.11 A/G/N|
|Powel/White Hall Courtyard Area||802.11 A/G/N|
|Baseball Field||802.11 A/G/N|
|Football Stadium||802.11 A/G/N|
Nicholls State University provides wireless internet connectivity for Academic and Residential computing. While not flawless, this service is reaching maturity and is seeing few failures due to service provisions.
Most often, wireless connectivity issues are not due to failed wireless services, but rather the user’s computers. This write-up will discuss several aspects of problematic wireless connectivity; after all, knowledge is power. This article is written for the end-user with MS-Windows based computers in mind; however, other operating system utilities may also be listed.
Low signal strength is often a reason for failed connectivity. Signal strength is often measured in “bars” for simplicity. Five (5) bars is an excellent signal strength and one (1) bar is a poor signal strength. You should be aware that you can still connect with 1 and 2 bars, however you may suffer from slow speeds and possible disconnects. 2 bars although low, will generally not have significant problems. Some computers allow boosting of the internal antenna’s power level. Doing so may allow for more bars. For instructions on this, please see this link.
When regarding wireless connectivity, terms like “Line-of-Sight”, “Barrier Interference”, and “Electrical Noise” have significant meaning. Line-of-Sight references a straight line between your computing device and the Access Point. It is always best to minimize the number of barriers between you and the Access Point. Barriers include walls and large objects especially metal objects, that may block or deflect wireless signal. Also, the electrical interference of other electronics such as blue tooth devices, phones, refrigerators, microwaves, and other computing devices can easily interfere with wireless connectivity quality.
Not all hardware providers use the best quality components. It is a simple fact that some built-in wireless adapters are inadequate. Purchasing and using a USB wireless adapter may in fact give you a much better connection than the built-in wireless adapter. Often changing from completely unable to connect situation to a 4 bar connection.
There are also tools available that can assist you with finding better signals. These are often called Wireless (or WiFi) Stumblers and Scanners. If you are an advanced user or are open to experiment, please Google this advanced topic. Stumblers written for Apple OSX often allow you to connect to specific signals found by the utility. OSX based stumblers include KisMac, AP Grapher, iStumbler, and Air Radar. Windows based stumblers tend to only display information, albeit very detailed information. Windows based stumblers include InSSIDer, Meraki, and NetStumbler. For Linux there is WiFi Radar and IWScanner.
One last wireless specific issue worth mentioning is regarding Ad-Hoc networks, which is basically other computers advertising wireless signals which are not internet Access Points. A big issue found recently is called Viral SSID’s. This is a host of computers pretending to be Access Points in lure of unsuspecting users to connect to them. Once connected, the user’s computer becomes one of the culprits, thus the term “Viral”, providing persistent advertisements of fake internet services. A very good article can be found here. Users should follow these instructions to delete or disable Ad-Hoc connections. Do not connect to “HP Setup” nor “Free Public WiFi”.
Another big issue with computers is due to malicious software. Malware, as it is called, can be the culprit of a wide range of computer problems including slowness, crashes, information theft and even network connectivity problems. Often, especially with windows based computers, failing connectivity is due to Malware and excessive background processes.
In regards to Malware, there are quite a few cleaning utilities available. One of the most-recommended and free for personal use, is a utility called Malware Byte’s Anti-Malware. The free utility will not keep your computer protected in real-time, but it is among the best on-demand cleaners available. It will scan for and clean a vast number of malicious software.
It is also recommended that your Anti-Virus be fully functional and updated for real-time protection. No single anti-virus is 100% effective; however, they do provide a high level of protection. There are several free Antivirus and software suites available. Among the most popular providers are Avast, AVG, PCTools, BitDefender, Comodo, and Panda. When installing one of these products, it is prerequisite to uninstall the existing antivirus.
If your computer is known to be infected, SmitFraudFix may resolve some persistently odd infection issues.
Peer to Peer (P2P) applications, for example, Torrent Clients, etc. are known to diminish both the user’s internet connection and neighbors’ internet connections. Using these software applications for downloading and sharing files will significantly slow your connection and also slow the connections of others connected to the same access point. Please refrain from using P2P applications.
The effective management of information technology resources is crucially important to the success of the mission of Nicholls State University. Because of the inherent insecure nature of wireless communication, wireless networks require increased cooperation and coordination between campus entities to maximize the technology’s benefits to the students, faculty, and staff of the University, to allow connection to wireless networks in different campus buildings, and eventually, to facilitate the ability to roam from building to building without losing network connectivity. This document sets forth the policies for using wireless technologies and assigns responsibilities for the deployment of wireless services and the administration of the wireless radio frequency spectrum in a distributed campus network environment. This policy expands the University Computer Use Policy and the Student Computer Use Policy by including specific direction regarding wireless communications and the resolution of issues that may arise. This policy is subject to change as new technologies and processes emerge.
Student User Agreement Form
Student Wireless Access Form
Student Computer Use Policy
Electronic Email Policy
Lab and Network Usage Policy
University Computer Use Policy
Wireless Network means local area network technology that uses radio frequency spectrum to connect computing devices to college, department, or division wired networks and may connect to the Campus Network Backbone and the Internet.
Access Point means electronic hardware that serves as a common connection point for devices in a wireless network. An access point acts as a network hub that is used to connect segments of a LAN, using transmit and receive antennas instead of ports for access by multiple users of the wireless network. Access points are shared bandwidth devices and can be connected to the wired network, allowing access to the campus network backbone.
Wireless Infrastructure means wireless access points, antennas, cabling, power, and network hardware associated with the deployment of a wireless communications network.
Coverage means the geographical area where a baseline level of wireless connection service quality is attainable.
Interference means the degradation of a wireless communication signal caused by electromagnetic radiation from another source. Interference can slow down or eliminate a wireless transmission depending on the strength of the interfering signal.
Privacy means the condition that provides for the confidentiality of personal, student, faculty and staff communications, and institutional data transmitted over a wireless network.
Client hardware/software means the electronic equipment and software that is installed in a desktop, laptop, handheld, portable, or other computing device to provide a LAN interface to a wireless network.
This policy applies to all wireless network devices utilizing Nicholls State University IP space (including private IP space within University networks) and all users of such devices, and governs all wireless connections to the campus network backbone, frequency allocation, network assignment, registration in the Domain Name System, and services provided over wireless connections to the campus network backbone to colleges, departments, or divisions of Nicholls State University.
This policy is under the authority and oversight of The Division of Information Technology including the Department of Academic Computing under the direction of the Executive Vice President. Technical review of this document is under the direction and authority of The Division of Information Technology including the Department of Academic Computing under the direction of the Executive Vice President.
Wireless equipment and users must follow all network connection policies as set forth in the University Computer Use Policy and the Student Computer Use policy. All provisions of the ISO Minimal Security Requirements and Practices apply to this policy.
Interference or disruption of other authorized communications that result from the intentional or incidental misuse or misapplication of wireless network radio frequency spectrum is prohibited.
Wireless access points must abide by all federal, state, and local laws, rules or regulations pertaining to wireless networks.
Deployment and management of wireless access points is the responsibility of The Division of Information Technology as under the direction of Executive Vice President.
University colleges, departments, or divisions must register for the use of radio frequency spectrum with The Division of Information Technology including the Department of Academic Computing , prior to implementation of wireless networks.
The location of all wireless access points must be registered with the The Division of Information Technology.
Wireless access points shall require user authentication at the access point before granting access to campus or Internet services. Wireless network interfaces and end-user devices shall support authentication to access wireless networks that allow connectivity to the Campus Network Backbone.
Physical security should be considered when planning the location of wireless access point and other wireless network components.
Wireless networks must be designed and deployed to avoid physical and logical interference between components of different network segments and other equipment. In the event that a wireless device interferes with other equipment, The Division of Information Technology shall resolve the interference as determined by use priority.
The Division of Information Technology including the Department of Academic Computing will attempt to resolve any interference or security incidents by coordinating with the registered Point of Contact (POC) for the wireless network. If a POC is not available, the incident is resolved through administration of the network connection to the backbone.
The Division of Information Technology including the Department of Academic Computing is authorized to take whatever reasonable steps are necessary to ensure compliance with this, and other network related policies that are designed to protect the integrity and security of the campus network backbone.
Disconnect Authorization – Any wireless network on campus, which poses a security threat, may be disconnected from the campus backbone network. If a serious security breach is in process, The Division of Information Technology including the Department of Academic Computing may disconnect the LAN immediately. Every reasonable attempt will be made to reach the registered “Point of Contact” to resolve security problems. The Division of Information Technology has the authority to disconnect any wireless network from the campus network backbone whose traffic violates practices set forth in this policy, or any network related policy. It is the responsibility of the college, department, or division to be knowledgeable regarding the provision such policies.
Grievance matters with this policy or conflicts between The Division of Information Technology including the Department of Academic Computing and any University college, department, or student are directed to the Executive Vice President for resolution.
There are no guarantees that all brands of wireless networking equipment will work on the Nicholls State University network. Currently the only accepted standard is 802.11a, b, and g. These standards are subject to change as new technologies and standards evolve. Please check with The Division of Information Technology including the Department of Academic Computing as to the current recommendations.
Coverage is limited on campus and there are no guarantees to the amount of coverage on the campus.
Chief Information Officer
Security and Identity Management Engineer
Administrative Program Specialist A
Director, Academic Computing
IT Systems Architect
Instructional Technology Specialist
Instructional Technology Specialist
Enterprise Information Systems
Director, Enterprise Information Systems
Information Equipment Operator 3
IT Programmer Analyst
IT Systems Administrator
IT Client Support Specialist
Director, Telecom & Networking
POLICY & PROCEDURE
Nicholls State University maintains certain policies with regard to the use and security of its Information Technology (IT) resources, including computer usage, computer systems and networks. Nicholls State University IT policies exist to maintain, secure, and ensure legal and appropriate use of the university’s information technology infrastructure. Security and privacy policies work together to provide the campus community with a high quality, trusted, and secure campus computing environment. They also help protect and secure property interests, data, and intellectual property. All users of Nicholls State University’s IT resources and facilities are expected to be familiar with and adhere to the Nicholls State University IT policies and will be subjected to the consequences of and/or penalties for violating University policies. Nicholls State University’s IT Policies apply to the entire Nicholls community, including faculty, staff, and students.
Password Reset Procedure
Various options are available to assist users with changing a forgotten or expired password. To make the process of resetting your password as smooth as possible, please make sure your personal information and security questions are always up to date in the Banner Self Service system.
myNicholls ID Password Reset Options:
Changing your myNicholls ID requires access to your Nicholls Google Email Account. If you are unable to login to your Google Account please see the Google Account Password Reset Options below.
To initiate a myNicholls ID password reset, navigate to the myNicholls ID password Self Service web page and follow the directions. You will need to provide your:
- myNicholls ID (ex: ctillou1)
- Your Nicholls Email Address
- Student Example: firstname.lastname@example.org
- Faculty Staff Example: email@example.com
Once the information is submitted, check your email and follow the instructions in the password reset email to reset your password.
Google Account Password Reset Options:
In the event you forget your Google Account Password you will need to contact IT support using one of the following methods below. Please be aware you will be asked to provide personal information in order to verify your identity.
If you are local to the Thibodaux, LA area, please visit the IT Department, located in Peltier Hall room 156 on the Nicholls’ campus. Present a valid identification card (must contain a photo), such as a driver’s license, state ID, Colonel Card, etc to verify your identity and a member of the staff will assist you with resetting your password.
If you are unable to visit in person you may request a password reset via phone at 1-985-448-4419. A staff member may ask you a number of personal questions to verify your identity. If you are able to successfully validate your identity the staff member will assist you with resetting your identity over the initial phone call. If you are unable to successfully answer all the validation questions the staff member may provide you with a temporary password to one of the email addresses or phone numbers on file.
You may send a password reset request via email at firstname.lastname@example.org or via FAX at +1 (985) 448-4421. Your request must contain:
- a copy of a valid photo identification card
- a signed note requesting your password reset, and
- an alternate email address or phone number where you can be contacted.
Once submitted, contact IT Support at +1 (985) 448-4419 to verify receipt of the fax and to reset your password.
Information Technology’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholls State University’s established culture of openness, trust and integrity. Information Technology is committed to protecting Nicholls State University’s employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of Nicholls State University. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations. Please review Human Resources policies for further details.
Effective security is a team effort involving the participation and support of every Nicholls State University employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly.
The purpose of this policy is to outline the acceptable use of computer equipment at Nicholls State University. These rules are in place to protect the employee and Nicholls State University. Inappropriate use exposes Nicholls State University to risks including virus attacks, compromise of network systems and services, and legal issues.
This policy applies to the use of information, electronic and computing devices, and network resources to conduct Nicholls State University business or interact with internal networks and business systems, whether owned or leased by Nicholls State University, the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at Nicholls State University and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with Nicholls State University policies and standards, and local laws and regulations. Exceptions to this policy are documented in section 5.2
This policy applies to employees, contractors, consultants, temporaries, and other workers at Nicholls State University, including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by Nicholls State University.
4.1 General Use and Ownership
4.1.1 Nicholls State University proprietary information stored on electronic and computing devices whether owned or leased by Nicholls State University, the employee or a third party, remains the sole property of Nicholls State University. You must ensure through legal or technical means that proprietary information is secured and protected.
4.1.2 You have a responsibility to promptly report the theft, loss or unauthorized disclosure of Nicholls State University proprietary information.
4.1.3 Employees are responsible for exercising good judgment regarding the reasonableness of personal use. If there is any uncertainty, employees should consult the Department of Information Technology.
4.1.4 For security and network maintenance purposes, authorized individuals within Nicholls State University may monitor equipment, systems and network traffic at any time, per Information Technology’s Audit Policy.
4.1.5 Nicholls State University reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
4.2 Security and Proprietary Information
The user interface for information contained on Internet/Intranet/Extranet-related systems should be classified as public, internal or confidential as defined guidelines, details of which can be found in this series of documents. Examples of confidential information include but are not limited to: student information (grades, transcripts, enrollment, identification numbers, etc.) financial information, identification information of employees, and research data, etc. Employees should take all necessary steps to prevent unauthorized access to this information.
Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited.
All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 30 minutes or less. You must lock the screen or log off when the device is unattended.
Postings by employees from a Nicholls State University email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Nicholls State University, unless posting is in the course of business duties.d not necessarily those of Nicholls State University, unless posting is in the course of business duties.
Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.
Use encryption of information in compliance with the Office of Information Technology Security’s Acceptable Encryption Use policy.
All hosts used by the employee that are connected to the Nicholls State UniversityInternet/Intranet/Extranet, whether owned by the employee or Nicholls State University, shall be continually executing approved virus-scanning software with a current virus database.
4.3 Unacceptable Use
The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services).
Under no circumstances is an employee of Nicholls State University authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Nicholls State University-owned resources.
The lists below are by no means exhaustive, but attempt to provide a framework for activities which fall into the category of unacceptable use.
4.3.1 System and Network Activities
The following activities are strictly prohibited, with no exceptions:
- Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by Nicholls State University.
- Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which Nicholls State University or the end user does not have an active license is strictly prohibited.
- Accessing data, a server or an account for any purpose other than conducting Nicholls State University business, even if you have authorized access, is prohibited.
- Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal. The appropriate management should be consulted prior to export of any material that is in question.
- Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.).
- Revealing your account password to others or allowing use of your account by others. This includes family and other household members when work is being done at home.
- Using a Nicholls State University computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the user’s local jurisdiction.
- Making fraudulent offers of products, items, or services originating from any Nicholls State University account.
- Making statements about warranty, expressly or implied, unless it is a part of normal job duties.
- Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access, unless these duties are within the scope of regular duties. For purposes of this section, “disruption” includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes.
- Port scanning or security scanning is expressly prohibited unless prior notification to Information Technology is made.
- Executing any form of network monitoring which will intercept data not intended for the employee’s host, unless this activity is a part of the employee’s normal job/duty.
- Circumventing user authentication or security of any host, network or account.
- Introducing honeypots, honeynets, or similar technology on the Nicholls State University network.
- Interfering with or denying service to any user other than the employee’s host (for example, denial of service attack).
- Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user’s terminal session, via any means, locally or via the Internet/Intranet/Extranet.
- Providing information about, or lists of, Nicholls State University employees to parties outside Nicholls State University.
- Commercial use of IT Systems and equipment for non-Nicholls State University purposes is generally prohibited, except if specifically authorized and permitted under University conflict-of-interest, outside employment, and other related policies. Prohibited commercial use does not include communications and exchange of ideas that furthers the University’s educational, administrative, research, and other roles, regardless of whether it has an incidental financial or other benefit to an external organization.
- Violations of Nicholls State University, University of Louisiana System, or Board of Regents policies, or local, state, or federal laws.
4.3.2 Email and Communication Activities
- When using University resources to access and use the Internet, users must realize they represent the University. Whenever employees state an affiliation to the company, they must also clearly indicate that “the opinions expressed are my own and not necessarily those of Nicholls State University”. Questions may be addressed to the IT Department
- Sending unsolicited email messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (email spam).
- Any form of harassment via email, telephone or paging, whether through language, frequency, or size of messages.
- Unauthorized use, or forging, of email header information.
- Solicitation of email for any other email address, other than that of the poster’s account, with the intent to harass or to collect replies.
- Creating or forwarding “chain letters”, “Ponzi” or other “pyramid” schemes of any type.
- Use of unsolicited email originating from within Nicholls State University’s networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise, any service hosted by Nicholls State University or connected via Nicholls State University’s network.
- Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam).
5. POLICY COMPLIANCE
5.1 Compliance Measurement
The Information Technology team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.
Any exception to the policy must be approved by the Information Technology team in advance.
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. In addition to University discipline, users may be subject to criminal prosecution under federal, state or local laws; civil liability; or both for unlawful use of any IT System.
6. RELATED STANDARDS, POLICIES AND PROCEDURES
- IT Audit Policy
- Acceptable Encryption Policy
- Acceptable Encryption Use policy
Nicholls State University email services support the educational and administrative activities of the University and serve as a means of official communication by and between users and Nicholls State University. The purpose of this policy is to ensure that this critical service remains available and reliable, and is used for purposes appropriate to the University’s mission.
This policy applies to anyone granted access to a Nicholls State University email account, including, but not limited to, employees, students, student employees, affiliates, contractors, emeriti, and retirees, and includes access to an individual or departmental account in the University email system.
Nicholls State University provides electronic mail (email) services to faculty, staff and students, and to other affiliated classes of individuals, including alumni and official visitors. Use of Nicholls State University email services must be consistent with Nicholls State University’s educational goals and comply with local, state and federal laws and university policies.
3.1 University Email Addresses and Accounts
Faculty and Staff
Email services are available for faculty and staff to conduct and communicate University business. Incidental personal use of email is allowed with the understanding that the primary use be job-related, and that occasional use does not adversely impact work responsibilities or the performance of the network.
With the exception of Retirees, Email services are provided only while a user is employed by the University and once a user’s electronic services are terminated employees may no longer access the contents of their mailboxes, nor should they export their mailbox to a personal account before departure. Retirees of Nicholls State University are granted lifetime access to Email Services at the discretion of University administration.
Faculty and staff email users are advised that electronic data (and communications using the University network for transmission or storage) may be reviewed and/or accessed by authorized University officials for purposes related to University business. Nicholls State University has the authority to access and inspect the contents of any equipment, files or email on its electronic systems.
Email services are available for students to support learning and for communication by and between the University and themselves. The services are provided only while a student is enrolled in the University and once a student’s electronic services are terminated, students may no longer access the contents of their mailboxes.
Student email users are advised that electronic data (and communications using the University network for transmission or storage) may be reviewed and/or accessed by authorized University officials. Nicholls State University has the authority to access and inspect the contents of any equipment, files or email on its electronic systems.
Alumni and Others
Individuals with special relationships with Nicholls State University, such as alumni or official visitors, who are neither employed nor enrolled at Nicholls State University, are granted limited email privileges, including an email address, commensurate with the nature of their special relationship. Nicholls State University is free to discontinue these privileges at any time.
3.2 Prohibited Use
The Nicholls State University email system shall not to be used for the creation or distribution of any disruptive or offensive messages, including offensive comments about race, gender, hair color, disabilities, age, sexual orientation, pornography, religious beliefs and practice, political beliefs, or national origin. Employees who receive any emails with this content from any Nicholls State University employee should report the matter to their supervisor immediately. Violation of Nicholls State University policies (including this one) may result in disciplinary action, up to and including termination. Examples of prohibited uses of email include:
- Intentional and unauthorized access to other people’s email, including sharing of account passwords.
- Sending “spam”, chain letters, or any other type of unauthorized widespread distribution of unsolicited mail;
- Use of email for commercial activities or personal gain (except as specifically authorized by University policy and in accord with University procedures);
- Use of email for partisan political or lobbying activities;
- Sending of messages that constitute violations of Nicholls Code of Conduct.
- Creation and use of a false or alias email address in order to impersonate another or send fraudulent communications.
- Use of email to transmit materials in a manner which violates copyright laws.
- Users are strictly required to delete spam, chain, and other junk email without forwarding.
3.3 Security and Privacy of Email
Nicholls State University attempts to provide secure, private and reliable email services by following sound information technology practices. However, Nicholls State University cannot guarantee the security, privacy or reliability of its email service. All email users, therefore, should exercise extreme caution in using Nicholls State University email to communicate confidential or sensitive matters.
Nicholls State University students and employees shall have no expectation of privacy in anything they store, send or receive on the company’s email system. Nicholls State University may monitor messages without prior notice. Nicholls State University is not obliged to monitor email messages.
Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including the termination of their contract or assignment with Nicholls State University.
Lab Environment. It is expected that all computer labs will maintain a quiet, library-like atmosphere so the patrons can use their time productively and with few distractions. Although students are sometimes required to work in groups for some class projects and need to talk among themselves, this must be done in a controlled manner. If there are groups in the lab doing projects, enforcing the quiet policy may be more difficult, but still needs to be done. In addition, groups of students are not allowed to remove chairs from operational workstations in order to gather around one computer.
Academic vs. Personal Use. Patrons may use the computers to check e-mail and to browse the Internet for personal use as long as computers are available for academic use. If computers are needed for academic use, patrons doing personal work will be asked to leave.
Student Accounts. All students are required to use their own student account in order to use any academic computer lab. All students are expected to safeguard their accounts and not divulge their passwords.
Entrance Policy. A Nicholls Faculty/Staff/Student ID is required for entrance into all open labs (Cenac, WAC, and Ayo). No exceptions will be made.
Lab Assist WorkStation. The lab assist workstation is to be used only by the lab assistant on duty. Only lab assistants are allowed behind the lab assist desk. Visitors or Computer Lab patrons are not allowed.
Audio Distractions. Listening to the radio, cassettes, or audio from CDs, with or without headphones, in any lab is strictly prohibited. The only exception is with regard to multimedia software on multimedia computers directly assigned by a Faculty member.
Food, Drinks, Tobacco Products. No food, drinks, or tobacco products are permitted in the labs at any time.
Telephones. The phones are not for the use of the general public or patrons except in emergencies or to call for a ride (especially after dark). All cellphone are to be turned to quiet mode while in the labs.
Game Playing. Game playing is not an appropriate academic usage of university resources and is prohibited in the academic computer labs. Anyone playing computer games in an academic lab will be required to discontinue the activity or vacate the lab. Further disciplinary action will be taken as deemed appropriate.
Excessive Network Usage. Playing real-time video or audio that is not directly assigned by a Faculty member is not an appropriate academic usage of university resources and is prohibited in the academic computer labs. Anyone playing real-time video or audio not directly assigned by a Faculty member in an academic lab will be required to discontinue the activity. Further disciplinary action will be taken as deemed appropriate.
Patron composition. No children shall be allowed in any of the academic computer labs, as these labs are considered an “extension of the classroom.”
Lab Printing Policies
All student printing is now done through the WEPA (Wireless Everywhere Print Anywhere) system. Instructions for using the WEPA system can be found here :
Computer Supplies. Under no circumstances will any Patron be allowed to leave with supplies. Supplies are to be handled only by ITS employees.
General Policy. Patrons are to help maintain a safe environment in the computer labs by not placing their book bags in the aisles.
Accidents. In the case of accidents that result in injury, regardless of how insignificant the injury may appear, patrons should contact the lab assistant immediately.
Unsafe Actions. Patrons shall not engage in any unsafe actions like horseplay or fighting. Patrons engaging in such unsafe activities will be asked to leave, or University Police will be called.
Alarms. Patrons should be able to recognize and evaluate the situation in relation to all alarms. If a fire alarm goes off or a bomb threat is reported, patrons will be asked to immediately stop working, to gather belongings, and to evacuate the lab immediately. Everyone must remain outside until told by someone in charge that it is safe to re-enter the building.
Nicholls State University has a specific policy that governs the use and abuse of the university’s resources. Students granted access to the university’s computing facilities are required to abide by the established policy for computer use.
The Computer Use Policy is a comprehensive policy dealing with aspects of computer abuse, whether physical or logical. It applies to all university computing facilities mainframes, minicomputers, microcomputers, and associated equipment and links, as well as software, whether developed by Nicholls or purchased. If abuse, actual or threatened, is suspected or detected, the matter will be referred to the appropriate law enforcement agency or university or authority for disciplinary action. Confirmed abuse can result in criminal prosecution, dismissal, loss of computer use privilege and other such remedies as provided by established laws and policies of the university.
In general, abuse is defined as any improper use or treatment of computing facilities including, but not limited to, acts which, by mischief or gross negligence, result in physical damage, defacement, or destruction of computing equipment; theft; unauthorized access or use; unauthorized alteration, substitution, or deletion of programs, command files, data files, documentation, or other material; wiretapping or any form of unauthorized signal interception; divulgence of confidential information or computer access methods to unauthorized persons; copyright or patent infringement; transmitting statements which are obscene or libelous according to law through or with computer systems; failure to safeguard computer systems in both their physical and logical aspects; and failure to notify management or security personnel of instances of abuse, either actual or threatened, or conspiracy to commit any of the above.
- User — Any employee, student, or other individual to whom computer access is granted.
- Computer equipment — Computer processors, memory, peripheral devices, communication links, communication equipment, supply lines, storage media, or any terminals, printers, modems, or any other ancillary equipment or devices connected to or in any way used in conjunction with the mainframes, minicomputers, microcomputers and word processing units owned, leased and/or operated by Nicholls State University. This is extended to include analog as well as digital devices.
- Software — Computer source and binary programs or modules, including intermediate or universal code, whether for system or applications use, command files, menu formats, and on-line manuals used with “help” facilities. This is extended to include firmware.
- Computer Facilities — Computer equipment and software, as defined above, considered as an entity.
Acts which, by mischief or negligence, result in damage to, defacement of, or destruction to computer equipment maintained by Nicholls State University.
The unauthorized use or taking for one’s own personal use of computer equipment or software.
Software Copyright Restrictions
- The use of computing equipment or communication facilities to make unauthorized or illegal copies of proprietary software or in any way to infringe upon copyrighted or patented material of any nature.
- NOTICE: WARNING OF COPYRIGHT RESTRICTIONS. The Copyright Law of the United States (Title 17, US Code) governs the reproduction, distribution, adaptation, public performance, and public display of copyrighted material.
- Under certain conditions specified by the law, nonprofit libraries are authorized to lend, lease, or rent copies of computer programs to students on a nonprofit basis and for nonprofit purposes. Any person who makes an unauthorized copy or adaptation of the computer program, of redistributes the loan copy, or uses the loan copy for monetary gain, or publicly performs or displays the computer program, except as permitted by Title 17 of the US Code, may be liable for copyright infringement.
Unauthorized alteration, substitution, or deletion of programs, command files, data files, documentation, or other material is illegal. This shall include the use of Trojan horses, spoofs, computer viruses (as defined in the common literature), or any other device, material, logical or physical, to obtain these ends. This also includes the use of computer facilities to gain unauthorized access to systems external to Nicholls and use of command files to add to, delete or modify any education record as defined by the FERPA.
By design or neglect allowing computer logos, passwords, encryption keys, or any other access methods to be obtained by unauthorized entities is illegal. This includes failure to safeguard computer equipment in both their physical and logical aspects from abuse. Further, this includes the failure to notify management or security personnel of instances of abuse either actual or threatened.
Unauthorized Use of Data
Using sensitive or confidential information with which one is entrusted for personal gain or interest; dissemination of such information, or by design or neglect allowing unauthorized access to or use of such information.
Using the electronic mail or other communication facilities to transmit statements of an obscene, libelous, or threatening nature as defined under current judicial definitions.
Use, Rights, Privileges
The University’s computing facilities are provided for the use of students in pursuing the ends of academic endeavors. By keeping in good standing with the University, a student will be allowed computing privileges. These privileges entail certain rights to privacy and security.
It is the student’s responsibility to ensure that his/her account password is kept confidential. If abuse or threatening messages occur due to allowing other students to access the account, the student who owns the account will be held accountable. Students are charged with special responsibilities for safeguarding the facilities with which they are entrusted. Failure to adequately and conscientiously safeguard these facilities from misuse will subject a student to being denied access to and use of the facilities. Furthermore, any damage to or infringement of copyrighted material or confidential data resulting from negligence may additionally subject the student to disciplinary action commensurate with the loss including dismissal or legal prosecution in accordance with University policies and local, state and federal laws.
Physical Damage, Abuse, Theft, and Logical Abuse
Acts of physical damage, abuse, and threats of such abuse will be handled in accordance with previously established procedures including criminal or civil prosecution and discipline under the University Code of Student Conduct, where applicable. Logical abuse, such as copyright infringement, software piracy, alteration of accounting, academic, and other databases for personal gain or mischief, plagiarizing, gaining or permitting unauthorized access, and the like will be handled in accordance with applicable criminal, civil, or university procedures.
Acts of abuse which constitute a violation of local, state, or federal criminal or civil statutes will be referred to the appropriate law enforcement agencies. Nicholls State University, at its discretion, will pursue whatever legal and University avenues it deems necessary for achieving reparations.
Using the computer to gain unauthorized access to instructional material for personal gain or profit, or to gain unauthorized access to another student’s assignments, or for the purpose of sharing work in an unauthorized manner will be considered a violation of the University’s Code of Student Conduct. In addition to the sanctions provided under that policy, a student may also be denied access to computing facilities and be subject to other legal or academic discipline as appropriate.
All students should recognize that information obtained through electronic methods may be protected by copyright laws of the United States (Title 17 U.S. Code), the Digital Millennium Copyright Act (H.R. 2281), and the World Intellectual Property Organization (WIPO). As such, any student in violation may be prosecuted under the terms of the law. It is the student’s responsibility to understand the laws pertaining to copyright infringement. A guide of how the law affects a student will be made available in the Library and in the Office of Academic Affairs.
Oracle will soon be ending support for Oracle Forms 11gR2, which is utilized by our Banner 8 system. The upgrade delivers a number of important enhancements, including a modern user interface, enhanced navigation and process management tools, and new functionality across the student platform. It will also allow us to run Banner on any browser and on mobile devices. There is no need to learn a new application, just the new interface.
Benefits of Banner 9
The following keyboard shortcuts have changed from Banner 8 to Banner 9:
|Action||Banner 8||Banner 9|
|Next Block or Section||CTRL+Page Down||ALT+Page Down|
|Previous Block or Section||CTRL+Page Up||ALT+Page Up|
|Open Menu Directly||F5||CTRL+M|
|Select on a Called Page||SHIFT+F3||ALT+S|
|Rollback or Clear Page||SHIFT+F7||F5|
The following keyboard shortcuts are new to Banner 9:
|Expand/Collapse a Drop-down Field||ALT+DOWN ARROW|
|Change MEP Context||ALT+SHIFT+C|
|Open Related Menu||ALT+SHIFT+R|
|Open Tools Menu||ALT+SHIFT+T|
|Page Tab 1|
Page Tab 2
and so on…
and so on…
|Sign Out (Application Navigator)||CTRL+SHIFT+F|
|Display Recently Opened Pages (Application Navigator)||CTRL+SHIFT+L|
|Open Search (Application Navigator)||CTRL+SHIFT+Y|
|Toggle Accessibility Mode for current session||CTRL+B|
|Toggle Multi/Single Records View||CTRL+G|
|Open Help (Application Navigator)||CTRL+M|
|Open Menu (Application Navigator)||CTRL+Y|
The following keyboard shortcuts remain the same from Banner 8 to Banner 9:
|Action||Banner 8 and 9|
|Cancel Page, Close Current Page, Cancel Search/Query, or Exit||CTRL+Q|
|Down/Next Record||DOWN ARROW|
|Duplicate Selected Record||F4|
|Search/Open Filter Query||F7|
|Next Page Down||PAGE DOWN|
|Previous Page Up||PAGE UP|
|Clear One Record||SHIFT+F4|
|Clear All in Section||SHIFT+F5|
|Up/Previous Record||UP ARROW|
Bookmarks and Favorites
For quick access to Banner 9, please bookmark the myNicholls website. The myNicholls website is the central location for all Nicholls State University single sign-on compatible applications.
Query Mode Sticking
If you see a “query mode only” message in a Banner page you should be able to make entries to, try exiting to the menu. Accessing a page from another page often results in the restrictions or permissions from the initial page “following” you.