Owens FAQ
print  Print
Glossary

A
B
C
D
F
I
K
L
M
O
P
R
S
V
W
All

  • FAFSA
    Federal Financial Aid


     
  • FAFSA
    Financial Aid
  • IT System Status Page

    In the past, Owens has experienced IT outages that have left the college servers inaccessible. During these outages, we haven't had any way of communicating these issues to our users. Because of this, we have set up a remote site to host our emergency status updates. With the new status.owens.edu page, we are now able to broadcast outages over multiple social media platforms, even if we are experiencing a major outage.  




  • Kiosk
    Kiosks are computers located all across campus. They are intended for students and faculty to log into their Ozone accounts, check Owens e-mail, verify schedule/registration status, check account balances and use the other features in Ozone.
  • LDAP
    Stands for "Lightweight Directory Access Protocol." If you want to make directory information available over the Internet, this is the way to do it. LDAP is a streamlined version of an earlier directory standard called X.500. What makes LDAP so useful is that it works great over TCP/IP networks (unlike X.500), so information can be accessed through LDAP by anyone with an Internet connection. It is also an open protocol, which means directories can be stored on any type of machine (i.e. Windows 2000, Red Hat Linux, Mac OS X).

    To give you an idea of how an LDAP directory is organized, here are the different levels of a simple LDAP tree hierarchy:

    1. The root directory
    2. Countries
    3. Organizations
    4. Divisions, Departments
    5. Individuals
    6. Individual resources, such as files and printers

    Most LDAP connectivity is done behind the scenes, so the typical user probably won't notice it when surfing the Web. However, it is a good technology to know about.

    Tech Terms Dictionary March 2014. Per Christensson. http://www.techterms.com
     





     
  • LDAP Contextless Login
    The LDAP Contextless Login feature introduced with the Novell Client for Windows NT/2000/XP version 4.9 makes it easier for users to log in to the network because they no longer have to remember their context or tree name (depending on how you set it up). With LDAP Contextless Login, users simply enter their username and password in the Novell Login window - the Novell Client and LDAP Services for Novell eDirectory do the work of figuring out where the users are located and in which eDirectory tree. Administrators are free to move User objects around or change the organization's name, and the users will still be able to log in without any extra assistance. This saves you the costs associated with supporting users who have trouble remembering their tree/context information or who don't know how to change this information at login after modifications have been made in the tree structure.

    Several large Novell customers have used LDAP Contextless Login to facilitate the merging of several trees into one global tree. Because users no longer needed to enter their tree or context in order to successfully authenticate after the merge, these customers could make changes within the directory as often as necessary without incurring the costs associated with supporting user login problems.

    Novell Inc.Sep 2003. Nancy Cadjan Technical Writer. http://support.novell.com/techcenter/articles/ana20030901.html
     
  • Malware
    Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses, worms, trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers. It is unfortunate that there are software programmers out there with malicious intent, but it is good to be aware of the fact. You can install anti-virus and anti-spyware utilities on your computer that will seek and destroy the malicious programs they find on your computer.

    Tech Terms Dictionary 2014. Per Christensson. 28 February 2014. <http://www.techterms.com>

     
  • ONet
    Onet was the old system that Owens used to provide users with a storage location on the Owens network.  Instead of Onet, students can now access their OneDrive for cloud storage by logging in here: http://onedrive.owens.edu Or they can also useGoogle Drive (30 GB) for cloud storage which is associated with their Omail account


     
  • Ozone
    A source that all students can use to register for classes, view their schedule, pay their bill, view their financial aid, view tax information, view their grades, request/view transcripts, add money to their express card, access their student email, and much more.

    Employees can use this system to view their Outlook email, submit grades, view tax documentation, access the Intranet, view pay stubs, update their personal information, and view other important Owens documentation.

    This system is available anywhere you have Internet access.



     
  • Passphrase
    A unique code word or phrase that may be assigned by a student to each proxy he/she sets up. The passphrase is required when a proxy calls an Owens department and needs to have a conversation about the information they are viewing on a student. College administrators will validate the passphrase and access granted to the proxy before having conversations with a proxy about confidential information. This is done to protect the rights of the student.




  • PIN
    The acronym for Personal Identification Number

    PIN (Ozone Proxy Access)

    A “password” made up of numbers or letters that is used to login to Proxy Access.

    PIN (Financial Aid)
    A Federal Student Aid PIN is a 4-digit number or 6-character alphabetic code that is assigned to a student or parent to access Federal Student Aid Web sites and to sign a Free Application for Federal Student Aid (FAFSA). (http://www.fafsa.ed.gov/).

    PIN (Taskbar)
    The act of attaching a program icon to the task bar.  The program icon will stay in that location until removed by the user. 



     
  • Private Browsing
    This feature allows a user to browse the Internet without saving any information about the sites and pages the user has visited.

    Warning: Private Browsing doesn't make you anonymous on the Internet. Your Internet service provider, employer, or the sites themselves can still track what pages you visit. Private Browsing also doesn't protect you from keyloggers or spyware that may be installed on your computer.
  • Proxy
    The user being granted Ozone Proxy Access to a Student's Ozone account.




  • Proxy Access
    This service provides an opportunity for Owens students to grant online access to their student information. This consent is necessary to comply with the Family Educational Rights and Privacy Act (FERPA). FERPA is a federal law that protects the privacy of students and prohibits institutions of higher education from disclosing any student information, including financial information, without the explicit authorization of the student. In accordance with the FERPA, Owens Community College has established guidelines regarding access to and release of educational records. In short, FERPA allows Owens to release “directory information” without the consent or knowledge of the student, unless the student has notified Owens in advance that such information is not to be released. Owens students can grant others access to view certain pieces of information in Ozone. This is called granting proxy access, and the other person is referred to as the proxy. The most common scenario is granting a parent or spouse access to a student’s information. Access is granted by email address, so a student uses the email address of the proxy to grant the access. Questions regarding Proxy Access can be sent to: proxy_access@owens.edu




  • Ransomware
    Ransomware is a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed. Some forms of ransomware encrypt files on the system's hard drive, while some may simply lock the system and display messages intended to coax the user into paying.

    Ransomware typically propagates as a trojan like a conventional computer worm, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program will then run a payload: such as one that will begin to encrypt personal files on the hard drive. More sophisticated ransomware may hybrid-encrypt the victim's plaintext with a random symmetric key and a fixed public key. The malware author is the only party that knows the needed private decryption key. Some ransomware payloads do not use encryption. In these cases, the payload is simply an application designed to restrict interaction with the system, typically by setting the Windows Shell to itself, or even modifying the master boot record and/or partition table which prevents the operating system from booting at all until it is repaired.

    Wikipedia. April 2014. http://www.wikipedia.org/
  • RSS
    Stands for "RDF Site Summary," but is commonly referred to as "Really Simple Syndication." RSS is method of providing website content such as news stories or software updates in a standard XML format. Websites such as The Wall Street Journal and CNET's News.com provide news stories to various RSS directories that distribute them over the Internet. RSS content can be accessed with an RSS-enabled Web browser or other programs designed for retrieving RSS feeds.

    Tech Terms Dictionary. April 2014. Per Christensson. http://www.techterms.com
     

     
  • Spyware
    As the name implies, this is software that "spies" on your computer. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet. So how does spyware get on your computer? Just like viruses, spyware can be installed when you open an e-mail attachment containing the malicious software. It can also be installed when you install another program that has a spyware installer attached to it. Because of the insidious nature of spyware, most people don't even know when spyware is on their computer.

    Tech Terms Dictionary 2014. Per Christensson. 28 February 2014. <http://www.techterms.com>

     
  • Student Access Rules
    Persons in the student role will be granted the following access to Owens' systems;

    1. Banner Self Service
    2. Blackboard
    3. Ozone
    4. Student network
    5. Remote access to student network files
    6. Omail+ account
      1. Access through Ozone link  
      2. Students and Alumni will have a “@student.owens.edu” email address.


  • Virus
    Computer viruses are small programs or scripts that can negatively affect the health of your computer. These malicious programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. In fact opening an infected e-mail attachment is the most common way to get a virus.

    Tech Terms Dictionary 2014. Per Christensson. 28 February 2014. <http://www.techterms.com>


     
  • Worm
    A computer worm is a type of virus that replicates itself, but does not alter any files on your machine. However, worms can still cause havoc by multiplying so many times that they take up all your computer's available memory or hard disk space. If a worm consumes your memory, your computer will run very slowly and possibly even crash. If the worm affects your hard disk space, your computer will take a long time to access files and you will not be able to save or create new files until the worm has been eradicated.

    Tech Terms Dictionary 2014. Per Christensson. 28 February 2014. <http://www.techterms.com>



     

Previous Next →
1 2