If you are seeking a list of boot arguments for use systems that are capable of running Apple’s Operating System, I would say look no further but this is only what I have used personally over the years so I may miss some new or have that is depreciated.
ketxlog-0xffff
Enables Debugging of Kernel Extensions.
maxmem=4096
Limits the amount of RAM that is detected to boot OS X
If you need to enable DRM, the below information should be helpful.
Chrome
To enable DRM in Google Chrome, search for “protected content” under chrome://settings and enable it. By default, it is enabled but an extension may have turned it off for your privacy.
Firefox
The Firefox browser will provide a one-click button for you to enable DRM so you do not have to hunt through all of the settings. To check to see if DRM is enabled, go to Amazon Prime Video and try to play any content.
The new Microsoft Edge is based on Chromium is old. 1-year-old to be exact. It was released (last year) on January 15, 2020. It is compatible with all supported versions of Windows, and macOS. Downloading the browser will replace the legacy version of Microsoft Edge on Windows 10 PCs. With speed, performance, best in class compatibility for websites and extensions, and built-in privacy and security features, Microsoft reports that it’s the only browser you’ll ever need.
I had the opportunity to work on a Xerox DocuMate 3220 over the years and here are some things that you need to keep in minds.
Jam on the Automatic Document Feeder
It is possible to have a jam on the Automatic Document Feeder (ADF) and it is usually caused by foreign material. The first time I supported a jam on the ADF was due to hole-punch dots that fell in from the overhead shelf which had the Xerox DocuMate 3220 underneath. The second and last time was due to a paperclip. As the user was not aware of the cause on the first incident, I told them on the second incident and encourage them to relocate the scanner which they happily agreed to. A year has passed and I have not been called back for any ADF issues.
Scanning to PDF
When scanning, you will, unfortunately, have to scan to a .BMP file by default but there is a trick to it. Install Adobe Acrobat and use the Create to PDF function. The Acrobat software will talk to your scanner and will then have all your pages scanned into one easy to share PDF file.
If the HP LaserJet 9050n printer does not turn on, there are six things to check but more than likely, it will be one of two things: The Formatter or the Power Supply Unit.
00:00 – HP LaserJet 9050n will not power up.
00:30 – Channel Intro.
00:37 – Reset the power module and test the wall outlet.
00:44 – Test the printer Power button or switch.
00:51 – Test the power with another compatible power cord.
00:58 – Test the power without the USB cable.
01:05 – Service the printer.
01:08 – Left view of the printer.
01:13 – Unplug power and ethernet cable.
01:41 – Rosewill Tool Kit.
02:15 – Phillips Head Bit.
03:21 – Formatter.
06:37 – A torn piece of paper.
07:55 – Power Supply Unit.
10:10 – Bad printer storeroom.
11:30 – Replacement PSU from the bad printer.
12:36 – 4 black power supply screws.
13:35 – Status of the power button.
13:52 – Fan noises mean it is fixed.
14:00 – Formatter is not yet installed.
14:45 – Pending print jobs that came out.
15:20 – The printer is working successfully.
I wanted to test the compatibility of some programs so I tried installing macOS Catalina on a Fennec Hackintosh System with the date in 2025. Naturally, it failed. I then had to use the workaround I implemented when I was installing OS X Mavericks.
1. I grabbed a copy of OS X from the Internet. (2 hours over Wi-Fi)
2. I followed the tips in creating a USB Installer. (20 minutes)
3. I then use the release date workaround to install successfully. (45 minutes)
4. I completed the Fennec Hackintosh System.
With Catalina now installed, this gave me access to download Big Sur.
If you are trying to download a legitimate copy of macOS and is stuck on Connecting to the Mac App Store, it is more than likely that you are attempting to do this from a Windows PC which will not have the App Store. You would need access to a desktop or laptop Mac.
Connecting to the Mac App Store..
To use the Mac App Store, you need Mac OS 10.6.6 or greater. For more
information, please click here.
Some people (I use the term loosely) will try and guess the password for your active accounts while others will try to guess (from your name) the active email address that you use. Luiz Eleotério falls in the secondary category and with an email address on a website that is disabled and redirects to Dan.com.
Hi, how are you?
My name is Luiz Eleotério and I am a managing partner of some very promising companies in Brazil.
I am contacting you through this email because I believe that our companies can contribute a lot to the Google My Business Provider program, can you help me with this or direct me to someone who can help me?
I sincerely ask for your help, my companies help thousands of businesses every month throughout Brazil and I believe it can be a very promising partnership.
Upload items to archive.org (video, audio, text, images) Want to learn how? Click here!
Borrow a book on Open Library, a project of the Internet Archive
Write reviews of items on the Archive
Post questions and messages to Internet Archive forums
Create a list of favorites
Sign up for our newsletter
Sign up for our San Francisco Bay Area events list
We hope you’ll explore all that the Internet Archive has to offer. To get you started, check out the article 10 Ways To Explore the Internet Archive for Free .
For questions and helpful tips on how to use the Archive, please visit our FAQs page.
And finally, the Internet Archive can grow and thrive thanks to the generous support of our users. If you find our site useful, please chip in what you can.
When upgrading to macOS Big Sur from macOS Catalina or an earlier version, one thing that will come in handy for you is the macOS Big Sur Migration Assistant as it can save time Installing programs, their settings plus have your cookies from third-party browsers readily available.
Issues
Unfortunately, some users report that macOS Big Sur keeps doing Migration Assistant and after investigating, I see that it is caused by Apple (in their attempt to make things easy for upgrading users) and the user by not paying attention when installing as shown below.
These fake Zoom Hack emails are making their way around (with more formats expected) so don’t be fooled.
Email #1
Hello.
This will grab your attention. You have used Zoom recently, like most of us during these bad COVID times.
And I have very unfortunate news for you. I’ll give you some background on what happened. There was a zero day security vulnerability on Zoom app, that allowed me a full time access to your camera and some other metadata on your account.
I found a few interesting targets through random lookups. You were just unlucky to be on the list. After that, I did some creepy stuff and a few recordings, just for fun and to test a few things. And as you can imagine in your worst dreams, this happened. I have made a recording, where you work on yourself.
Please dont blame me or yourself for this, I didn’t have any bad intentions. I got very sick, lost my job, about to be evicted and have no money to survive. All of this because of the stupid virus. I’m sorry. I have no other choice. I do not want you to be the next Jeffrey Toobin. I’m sure you don’t want to be embarrassed. And I dont want to make this video public so your friends and colleagues can see it.
Let’s make a deal. You pay me $2000 in bitcoin, and nothing of this will happen. What happens next is up to you. I’ll give you 3 days to make the payment. After you send the money, I will delete the video and forget about you forever. The amount is not negotiable.
Send 0.18 Bitcoin (about 2k at current exchange rate) to my wallet [redacted]
P.S. Don’t try to report this to police, I use TOR and bitcoin can’t be traced. Do not email me back.
If you do something stupid, I will distribute the video.
Good luck! Don’t stress!
As they are desperate to get your funds, an email is sent again.
Email #2
Hello.
I’ll need your attention now. You have used Zoom recently, like most of us during these bad COVID times.
And I have very unfortunate news for you. I’ll give you some background on what happened. There was a zero day security vulnerability on Zoom app, that allowed me a full time access to your camera and some other metadata on your account.
I found a few interesting targets through random lookups. You were just unlucky to be on the list. After that, I did some creepy stuff and a few recordings, just for fun and to test a few things. And as you can imagine in your worst dreams, this happened. I have made a recording, where you work on yourself.
Please dont blame me or yourself for this, I didn’t have any bad intentions. I got very sick, lost my job, about to be evicted and have no money to survive. All of this because of the stupid virus. I’m sorry. I have no other choice. I do not want you to be the next Jeffrey Toobin. I’m sure you don’t want to be embarrassed. And I dont want to make this video public so your friends and colleagues can see it.
Let’s make a deal. You pay me $2000 in bitcoin, and nothing of this will happen. It’s your choice of what to do. I’ll give you 3 days to make the payment. After you send the money, I will delete the video and forget about you forever. The amount is not negotiable.
Send 0.18 Bitcoin (about 2k at current exchange rate) to my wallet [redacted]
P.S. Don’t try to report this to police, I use TOR and bitcoin can’t be traced.
Do not email me back. If you do something stupid, I will distribute the video.
Good luck! Don’t stress!
If they have not head from you, this is later sent even though they told you not to reply.
Email #3
In case you didn’t get the last email. Read this.
You have used Zoom recently. And I have very unfortunate news for you.
I’ll give you some background on what happened.
There was a zero day security vulnerability on Zoom app, that allowed me a full time access to your camera and some other metadata on your account.
Basically, you were hacked.
And as you can imagine in your worst dreams, I have made a footage with you as a main actor.
Where you work on yourself (perform sex act to be clear). Having fun is ok with me, but is not ok with your reputation.
Please dont blame me or yourself for this. You couldn’t know that the camera was working.
I’m sure you don’t want to be the next Jeffrey Toobin and get embarrassed in front of all your friends, family and colleagues.
You should get this very clear, I will send this video to all your contacts if I dont get paid.
Are you wondering how I got your contacts and emails? Through the same exploit, zoom app allowed me to extract all sensitive info from your device.
So here is what we will do. You pay me $2000 in bitcoin, and nothing of this will happen. You have 2 days to make the payment.
After I get the money, I will delete the footage and information about you. The amount is not negotiable.
Send 0.15 Bitcoin (about 2k USD at the current exchange rate) to my wallet [redacted]
Having trouble with buying bitcoin? Just google on how to buy it, it’s very easy to use and anonymous.
P.S. Don’t try to report this to the police, I use TOR and bitcoin can’t be traced. Do not email me back. If you do something stupid, I will distribute the video.
Good luck. Don’t stress.
I have had clients complain about Internet Explorer doing weird things and believe that over the years that I had seen it all but recently, I received a ticket saying that Internet Explorer’s InPrivate Browsing is not working.
Usually, when this incident occurs, it is by Chrome Users that are utilizing the CTRL + SHIFT + N keyboard combination for the Google Chrome browser instead of CTRL + SHIFT + P for the Internet Explorer and Legacy Edge browser.
Troubleshooting
To see if the issue was on their profile only, I switched to the local Administrator account and the issue was there as well. Using the tip to reinstall Windows Media Player when it has issues, I did the same for Internet Explorer by disabling it in the Control Panel but the issue returned once Internet Explorer was made enabled. My next step was to upgrade Windows 10 as it would install Microsoft Internet Explorer cleanly then import the previous settings but this could take hours and possibly import the anomaly that is causing the issue so I searched for a standalone version of Internet Explorer (for any versions of Windows 7) and was fortunate to find one which resolved the issue.
The Cause
So what caused the InPrivate function to break? The anomaly is currently unknown to me but I am attempting to recreate it randomly in my test laboratory. Some possible causes are addons/plugins, shutting down the browser or OS incorrectly, and malware.
Are you seeing a wall of text before your Clover appears? If you are using macOS High Sierra and later, you are bound to see it since APFS is becoming the new file system. In High Sierra, you can try and opt-out or not have it if using a HDD over a SDD as the boot drive but not so on Mojave.
If you update the Clover Boot Manager, the wall of text will go away but you could have other issues since Clover often introduces bugs so you will want to update the ApfsDriverLoader.efi file alone from an updated version.
It is pretty easy to Dual-boot macOS and Windows on separate drives but can you do it one one? Well, I can and i will show you how I get it done.
00:00 – Disk Utility app on macOS High Sierra.
00:05 – Dell Optiplex 9020 SFF.
00:10 – Creating Windows Partition manually.
00:30 – Windows Partition successfully created.
00:35 – Formatting partition as FAT32.
00:50 – Windows Partition successfully formatted.
00:55 – Using the USB2.0 port to avoid data loss.
01:05 – Rebooting the Dell Optiplex 9020 SFF.
01:10 – Pressing F12 repeatedly.
01:25 – Locating the Windows 10 USB Installer
02:10 – The Windows 10 Installer
02:30 – Custom for Clean Installation.
02:40 – Format Windows partition from FAT32 to NTFS.
03:30 – Install normally.
03:35 – Complete the install and restart.
04:00 – Booting to Windows 10 automatically.
04:10 – Configure Windows account.
04:45 – Windows 10 desktop.
04:50 – Reboot to the BIOS.
05:00 – Delete Windows Boot Manager.
05:00 – Make Boot Drive first.
05:05 – Restart to Clover Boot Manager.
05:10 – Palindrome Boot Manager Theme.
05:25 – Checking macOS High Sierra partition.
05:55 – Dual-boot macOS and Windows in Six Minutes.
Has your Ethernet connection stopped working when using macOS exclusively? Chances are, it’s not your motherboard, data cable, or Internet connection and is due to the kernel extensions that you recently installed. We discovered that IntelMausiEthernet.kext (not to be confused with IntelMausi.kext) was broken and thankfully knew how to correct it since the Intel-based Bluetooth/Wi-Fi combo card that was shipped from Dell lacked support for Wi-Fi under macOS.
The Discovery
I have converted a few Windows laptops to HackBooks and to make things easy, I always swap out the internal Bluetooth and Wi-Fi combo card and while trying to turn a Wi-Fi router into a Wi-Fi repeater, I discovered that the Ethernet connection was no longer working.
The Solution
The best solution would be to downgrade to the last working version but since I had no clue when it happened as I was mainly on a wireless connection, the alternate thing for me now was to patch since a downgraded version would cause a constant notification from the Clover Configurator app that a newer version of the kext has been released and would cause me to accidentally download it again. Other alternatives are to make sure that FakeSMC.kext is updated (be sue to backup if there is a later version available or switch to IntelMausi.kext
The new name for Microsoft’s SkyDrive is OneDrive and Microsoft promises that it will remain the best place to store and share your content across all of your favorite devices. Please note that you may still experience some issues (Qt5Quick.dll prompts) which are relatively easy to troubleshoot and resolve.
Are you familiar with Popcorn Time? Popcorn Time is a free streaming service that allows the user to stream movies, shows, and anime right over the Internet to their handheld (iOS devices are not included) or desktop.
Currently, the best place to download the installer is from www.popcorntime.app as other sites may provide an installer that requires you to disable Safe Watch popup on Popcorn Time so that you can watch content on Android without any redirects and interruptions.
Do you need to know how to disable Safe Watch popup on Popcorn Time for Android? Well, you are not alone and unfortunately, if you decide to download and install the correct Popcorn Time app that does not have such a popup, it will not load anime when you click on that category. Below, I will show you a workaround to stop the annoyance and step-by-step written instructions.
Bypass or Disable Safe Watch Popup
01. Launch the Popcorn Time app.
02. Click Outside Share The Popcorn window.
03. Press the Square on the Nav Bar
04. Press the floating Icon for app
04. Choose PIN from the listed options.
That’s it! The Popcorn Time app is now pinned and will no longer redirect to the Android Market when the Popcorn Time app triggers the redirect. To stream/play any video or download for offline viewing, use the cancel option when it is shown. That will close the box and proceed with the streaming.
So, you are trying to install programs on Windows 10 Home in S mode and it is failing? Well, it is supposed to fail and congratulations on now owning an Apple iPad or iPhone as that is basically what all your Windows 10 devices are now.
Just like an Apple iPad or iPhone is restricted (unless jailbroken) in installing a program unless it is from the App Store and access to the App Store is restricted only to users with an active iCloud account, your Windows 10 devices are now required to have an active Microsoft Account to be able to remove the restriction and install programs not included from (HP, Dell, etc) the computer manufacturer. Once the restriction is removed, you may install any program that is designed with Windows 10 in mind or will be fine in compatibility mode.
Why You Should Disable
You will want to disable S mode if you need Google Chrome and Zoom Client for Meetings as these are not in the Windows App Store. Google Chrome (sort of) was once available from the Windows Store but was just an app that linked to Google’s servers to download the version that you see today. It was removed and banned by Microsoft as it is against their terms of service.
Why You Should Keep Enable
You should keep S mode enabled if the Windows 10 device will be used mainly for a child in your household. It will keep the device safer but note that if it is used for school, the child may have difficulty keeping up with their lessons if the class requires training software (or even Zoom) to be added. The child can even create their Microsoft account to bypass or ask their Academic IT Department to help them do so so talk to the child about proper internet use.
Removing the Restriction
To remove or disable the restriction, you will need Windows 10 to show you the warning window then click the “see how” link where it will provide a special link to the Windows App Store and to login with a Microsoft Account (which is required when you plan on installing Microsoft Whiteboard) and other programs. You do not have to have an account of your own and can borrow from a family member. I have had clients that do not yet want to create an account and I have used mine to remove the restriction. Just remember to sign out the borrowed account when done.
Enabling the Restriction
From what I have seen so far, it does not appear that there is a way to enable the feature once it is removed or disabled. This may change in the future but from what I can infer, it may be a deterrent to keep Windows 10 users from removing as they will feel that their system is now vulnerable. On Android devices, if it is rooted to install software, to remove the rooted feature, we must factory reset the Android device so this is one possibility to do on a Windows 10 device but you will incur data loss (including the programs) if the data is not backed up to free online storage before doing so.
Hello, I work as a Private Investigator.
Our agency received a case with an objective of hacking into your email, phone, cloud storage, network and collecting intelligence.
We work with hackers from China for tasks like that, and they are the best. As you can see, they did a good job. Your accounts and devices are compromised.
But we do have an ethical protocol in place.
After checking the background of the person who paid for the hacking and investigation on you, I have decided to come forward and offer you to buy the information about that person (name, contacts, emails and other proof).
You will also get a report on yourself (including a list of compromised accounts, devices, logs, screenshots, photos and documents).
Normally, we do not disclose sensitive information about our clients, but in this case we will be.
Upon reviewing this case, I found that something illegal was planned against you.
The materials we have collected on you are very sensitive and can be easily used to blackmail you.
We usually address personal and corporate espionage cases, but this case is different.
We have received a prepayment of 50% for your case from that person (total agreed upon cost was 12500 USD).
However, I will give you a discount (without any profit for the agency), if you decide to buy this information.
After we get the payment, I will get back to you. You have 2 business days to make the transfer. It will cost you 40% of the unpaid balance.
We will process $2,500 payment through bitcoin. In case you have trouble with bitcoin, google how to fund it.
Send BTC to this wallet [REMOVED]
It will be up to you what to do after you get the information. We will delete all files. The original client will get nothing and will never know about our deal.
Please keep in mind, because I need to pay Chinese contractors, and if you decline this offer, I will have to go to the original client and send all intel to cover the costs.
But at least you know that now and have a free heads up of what’s coming.
Have you ever wondered how a Boot Pack for TransMac for Windows is created so that you can have a Hackintosh or HackBook in a few hours instead of months? Probably not. You may think that it is simple (and it is) but don’t forget that the creator has to take their time to have a working machine first then take the time to make it available for non-Mac users to utilize through Microsoft Windows.
The new Microsoft Edge is based on Chromium and was released (yesterday) on January 15, 2020. It is compatible with all supported versions of Windows, and macOS. Downloading the browser will replace the legacy version of Microsoft Edge on Windows 10 PCs. With speed, performance, best in class compatibility for websites and extensions, and built-in privacy and security features, Microsoft reports that it’s the only browser you’ll ever need.
Ready to start.
To continue we need to erase the disk at /Volumes/Yosemite.
If you wish to continue type (Y) then press return: Y
Erasing Disk: 0%… 10%… 20%… 30%…100%…
Copying installer files to disk…
Copy complete.
Making disk bootable…
Copying boot files…
Copy complete.
Done.
Ready to start.
To continue we need to erase the disk at /Volumes/GixxerUSB.
If you wish to continue type (Y) then press return: Y
Erasing Disk: 0%… 10%… 20%… 30%…100%…
Copying installer files to disk…
Copy complete.
Making disk bootable…
Copying boot files…
Copy complete.
Done.
One question that I am frequently asked by users in a corporate environment is how to locate Windows Media Center on Windows 10 and why it was not enabled by default.
Windows 10 v1703 and earlier
Regular users don’t seem to mind as much that Windows Media Center is disabled (or missing) on Windows 10 as they tend to want to have VLC installed instead since the VLC program is much better at streaming due to the included codecs. Corporate users, however, do not own their computer systems so they are limited in what they can install especially if the IT Department has not placed them in the local administrator group so that they can install or remove programs freely.
Windows 10 v1909 and earlier
In earlier releases of the Windows Operating System, it was included but was later removed. Using an installer, you could get it working again but in 2020 builds on Windows 10, the installer and program are now broken as shown below. To fix it, use Windows Media Center 8.8.5 and later.
Employees in educational institutions located in the United States are often required to take courses through SafeColleges Training. Your courses and categories (covering alcohol, the coronavirus, harassment, etc) will vary depending on the Human Resources department and below are some questions and answers that you can study to better familiarize yourself so that you can do well when you participate in the testing.
Americans with Disabilities Act Overview
Q: Title II of the ADA requires colleges and other public entities to make all of their facilities accessible to people with disabilities.
A: False
Q: Employers can’t deny a job to a qualified candidate with a disability on the basis of the disability.
A: True
Q: The ADA specifies exactly which impairments are covered.
A: False
Q: A major life activity under the ADA can include major bodily functions, such as those related to the immune system.
A: True
Q: An accommodation must be given even if it imposes an undue hardship.
A: False
Q: Academic institutions must give primary consideration to the auxiliary aid or service requested by the student with a disability when determining what’s appropriate for that student.
A: True
Q: For browser security, it’s important to minimize the number and usage of browser extensions and plugins.
A: True
Q: There’s no difference in security if you use a public PC or your own computer.
A: False
Q: It’s okay to use just HTTP sites for online business and transactions.
A: False
Q: An important safe browsing fundamental is: only enable the features you need.
A: True
Copyright Infringemment
Q: Unless your school has a site license, you may not download software applications to your personal or school computer.
A: True
Q: One of the requirements for you to show a video/DVD or television program to your class is if all recorded or downloaded materials are of an instructional nature and support the curriculum.
A: True
Q: According to the Fair Use factors, you can copy sheet music if the copies are used for a performance when an emergency does not exist.
A: False
Q: By law, when a work is created, it has a copyright.
A: True
Q: If you’re unsure of an answer on an copyright question, refer to your institution’s policy for guidance.
A: True
Q: You can copy supplemental textbook materials, such as disposable student workbooks, as long as you put the textbook publisher’s logo on the copied pages.
A: False
Q: If you want to copy and use a selection from a work that is copyrighted, you can contact the copyright owner in writing to ask permission or you can follow the four Fair Use factors.
A: True
Coronavirus Awareness
Q: To find the most accurate and timely information about COVID-19:
A: visit the CDC and Prevention website
Q: COVID-19 usually starts with:
A: a fever and dry cough
Q: The current name of the disease that originated in Wuhan, China, in 2019 is called:
A: COVID-19
Q: COVID-19 spreads person-to-person through:
A: saliva or mucus
Q: Most people who contract COVID-19:
A: recover without the need for special treatment
Q: Most of us get infected with coronaviruses at some time in our lives.
A: True
Q: If you feel unwell:
A: all of these (stay at home and call your doctor or local health professional to discuss your symptoms, where you have been and whom you have been in contact with)
Q: Those at greatest risk for developing a severe or lethal case of the disease are:
A: the elderly
Q: Everyone infected with COVID-19 develops at least some symptoms.
A: False
Q: How long does it take symptoms of COVID-19 to appear after infection?
A: between two and fourteen days
Coronavirus: CDC Guidelines for Making & Using Cloth Face Coverings
Q: The cloth face cover is not a substitute for social distancing, so you should continue to keep about ______ between yourself and others.
A: 6 feet
Q: According to the CDC, cloth face coverings should:
A: All of these: fit snugty, be secured, include layers
Q: For a non sewn cloth face covering, it is recommended that you use:
A: T-shirt or bandana only
Q: Step 1 of the sewn cloth face covering method involves:
A: cutting out two 10-by-6-inch rectangles of cotton fabric
Coronavirus: Managing Stress and Anxiety
Q: Stress is your body’s way of responding to:
A: All of these: Physical, emotional and mental demands.
Q: Which of the following is NOT a common sign of stress?
A: Decreased use of alcohol, tobacco, or other drugs
Q: Which of the following actions can you take to help you cope with stress?
A: All of these: Take care of your body; connect, breaks
Coronavirus: Preparing Your Household
Q: Creating a household plan can help protect your health and the health of those you care about in the event of an outbreak in your community. A household plan, before an outbreak occurs, should include:
A: Discussing emergency planning with your neighbors.
Q: Which of the following is the best everyday preventive action that can help prevent the spread of respiratory illnesses such as COVID-19?
A: Washing your hands with soap and water for at least 20 seconds
Q: During a COVID-19 outbreak, you can protect yourself and others by:
A: All of these: Stay home, keep from the sick and take care of emotional health
Q: After a COVID-19 outbreak occurs, it is important to:
A: Share concerns and how you are feeling with others
Coronavirus: Transitioning to a Remote Workforce
Q: If an employee is unclear on their responsibilities during this time, they should reach out to which of the following?
A: Immediate manager
Q: Which of the following is a common mistake to avoid when working remotely?
A: Scheduling meetings without considering the time zones
Q: Clear, timely, and accurate communication from leadership is critical when transitioning to a remote workforce. Which of the following is a consideration for virtual availability?
A: All: Chat room for work, non-work and stand ups.
Q: Choose an area in which to work that is all of the following EXCEPT:
A: A public space
Cybersecurity Overview
Q: Malware is a type of software that is designed to destroy or access a computer’s information without the knowledge of the user.
A: True
Q: Phishing is the practice of tricking a user into giving up confidential information through a deceptive email message or website.
True
Q: End User License Agreements can allow highly invasive scans and data scrapes, which can put you and your organization at risk.
A: True
Q: To improve cybersecurity, it’s not necessary to protect your online activity or digital footprint.
A: False
Q: There is little risk involved when speaking openly about security and answering questions over the phone with a stranger.
A: False
Diversity and Inclusion: Faculty and Staff
Q: ______________ may be formed from stereotypes, social norms or the expectations of those around you.
A: Bias
Q: Which of the following is a proactive strategy for faculty and staff?
A: Recognize and maintain what works instead of only responding to reported issues.
Q: Which of the following is a misconception about what diversity entails?
A: Just treat everyone the same.
Q: Which of the following is true about microaggressions?
A: Taken singularly or together, microaggression can form a hostile environment.
Q: Discrimination can be based on:
A: all of these: ethnicity, sexual orientation, gender identity.
Q: Which of the following is a proactive strategy for helping create a non-discriminatory environment?
A: Monitor your own bias
Q: A hostile work environment is created when ________ in a workplace commits a type of harassment.
A: anyone
Q: ___________ is the condition of having or being composed of differing elements, especially the inclusion of different types of people – such as people of different races or cultures – in a group or organization.
A: Diversity
Q: Cultural competence is:
A: a set of congruent behaviors, attitudes, and policies that come together in a system, agency or among professionals and enable that system, agency or those professions to work effectively in cross-cultural situations.
Q: _________ is prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair.
A: Bias
Email and Messaging Safety
Q: Messages with poor grammar and sudden threats of legal action are potential indicators of phishing emails.
A: True
Q: Email encryption is crucial for safe professional or private communications that are conducted through email.
A: True
Q: It’s a good idea to open and view fraud emails.
A: False
Q: The best defense against phishing emails is to recognize them and delete them.
A: True
FERPA: Confidentiality of Records
Q: Under FERPA, parents have a right to obtain only directory information for their child.
A: True
Q: Education records are only made available for inspection when classes are in session.
A: False
Q: Sharing sole possession records, or personal notes, in a way that makes them accessible by others, makes them education records.
A: True
Q: Colleges that violate FERPA law run the risk of losing federal funding.
A: True
Q: Alumni records are considered educational records according to FERPA law.
A: False
Q; Under FERPA law, colleges may disclose, without consent, a category of data called directory information.
A: True
Q; FERPA rights end once the student graduates or leaves the institution permanently.
A: False
Q; Research data for a third party that’s easily traceable to a particular student can still violate FERPA law.
A: True
Q: Students have the right to request that schools correct education records that are inaccurate or misleading, including grades.
A: False
Q: Colleges should notify students of their rights under FERPA every two to three years.
A: False
Implicit Bias and Microaggression Awareness
Q: Only offering history courses on developed nations or through the lens of a country’s dominant ethnicity is an example of ethnocentrism.
A: True
Q: Well-intentioned people don’t have implicit biases about certain groups.
A: False
Q: Microaggressions, by their nature, don’t do much harm.
A: False
Q: Interacting with members of an “out group” can ideally change or at least challenge biases.
A: True
Q: Implicit bias is a fairly new phenomenon.
A: False
Q: The narratives told about certain groups continue to influence how we view them.
A: True
Q: Implicit bias is a direct reflection of how we’ve been socialized, whom we interact with, what we’ve seen and what we’ve been told.
A: True
Q: Sociologists acknowledge that there’s a social hierarchy in the United States that allows us to justify why certain people are in positions of power and others are not.
A: True
Q: Asking students of color to “represent” their entire race in class discussions in an example of explicit bias.
A: False
Q: When you see or hear something that’s a microaggression, say something.
A: True
Q: Microaggressions are explicit statements about another person that are intended to invalidate or demean the individual.
A: False
Q: Explicit bias refers to the beliefs and attitudes that affect our understanding, actions and decisions in an unconscious way.
A: False
Q: Ethnocentrism means making judgements about other societies or groups based on one’s cultural bias and/or beliefs.
A: True
Password Security Basics
Q: One of the best ways to keep your password secure is to memorize it.
A: True
Q: A _________ is a password technique that helps make create words that look familiar, but can’t be found in a dictionary.
A: number-letter substitution
Q: An important part of password safety is to not write passwords down.
A: True
Q: A strong password should contain uppercase letters, lowercase letters, numbers and symbols.
A: True
Q: Combining nonsense words with number-letter substitutions is a good way to create complex passwords.
A: True
Q: For stronger passwords, it’s best use a single word instead of a phrase.
A: False
Q: You don’t need to change your passwords.
A: False
Stress Management
Q: You can reduce stress by building resilience.
A: True
Q: Most of us work more efficiently when under stress.
A: False
Q: Rubbing your ears can help you relax and reduce stress.
A: True
Q: Stress has both physiological and psychological health effects.
A: True
Q: Because sleep is important to keeping ahead of stress, sleep experts recommend two or three glasses of alcohol before bed.
A: False
Q: Exercise is one of the best things you can do to reduce stress.
A: True
Q: Adjusting our self-talk will help minimize stress.
A: True
Q: Stress can cause you to overreact to petty annoyances.
A: True
Title IX and Sexual Harassment
Q: Title IX of the Education Amendments of 1972 protects people from discrimination based on sex in any federally funded, education-related programs and activities.
A: True
Q: Sexual misconduct can be perpetrated by, as well as against, individuals of any sex.
A: True
Q: Failure to comply with Title IX regulations can result in inequitable educational opportunities for your students and financial penalties for your school.
A: True
Q: Postsecondary institutions are permitted to retaliate against an employee for filing a Title IX discrimination complaint.
A: False
Q: Three categories of employees have special duties regarding Title IX: responsible employees, confidential employees and a Title IX Coordinator.
A: True
Q: All campus employees are considered to be “confidential employees” under Title IX.
A: False
Q: Your institution has a duty to investigate reported cases of Title IX discrimination promptly, fairly and impartially.
A: True
Title IX and Sexual Harassment Prevention for Employees
Q: A teacher threatening to fail a student unless the student agrees to date the teacher qualifies as what form of sexual harassment?
A: quid pro quo
Q: Sexual harassment, as defined by the current Title IX regulations, includes which of the following?
A: All of these: sexual assault, dating violence, stalking
Q: It’s important to investigate a sexual harassment claim before reporting it to your Title IX office.
A: False
Q: Whether or not you’re a designated official with authority to address the disclosure of sexual harassment, which of the following is your role if someone confides in you?
A: share resources for medical, advocacy, legal and counseling options
Q: Title IX covers students, but doesn’t pertain to faculty and staff.
A: False
Q: According to the Office for Civil Rights, sexual harassment can take which of the following forms?
A: All of these:
Q: When a student discloses to you, it’s your responsibility to get them to tell you as many details as possible about the incident.
A: False
Q: When someone starts disclosing an incident of sexual assault to you, it’s best to let them finish their story before informing them about your reporting obligations and level of confidentiality.
A: False
Q: An employee telling lewd jokes could qualify as which form of sexual harassment?
A: Hostile environment
Q: As an informed employee under Title IX, which of these should you have a basic understanding of?
A: a student’s rights to file reports and use the campus grievance process
Q: Domestic violence, dating violence, sexual assault and stalking are defined collectively as what under Title IX?
A: sexual harassment
Q: Under current Title IX regulations, which of the following qualifies as sexual harassment?
A: quid pro quo harassment
Title IX and Sexual Misconduct
Q: A responsible employee is any employee who has the authority to take action to redress the harassment.
A: True
Q: Title IX of the Education Amendments of 1972 protects people from discrimination based on sex in any federally funded, education-related programs and activities.
A: True
Q: Sexual misconduct can be perpetrated by, as well as against, individuals of any sex.
A: True
Q: All campus employees are considered to be “confidential employees” under Title IX.
A: False
Q: Failure to comply with Title IX regulations can result in inequitable educational opportunities for your students and financial penalties for your school.
A: True
Q: Three categories of employees have special duties regarding Title IX: responsible employees, confidential employees and a Title IX Coordinator.
A: True
Q: Postsecondary institutions are permitted to retaliate against an employee for filing a Title IX discrimination complaint.
A: False
Q: Your institution has a duty to investigate reported cases of Title IX discrimination promptly, fairly and impartially.
A: True
Are you planning on buying or leasing a vehicle along with parts and accessories? Here are a few thing that you should know.
Paycheck
A weeks paycheck should be able to cover your monthly payments on the vehicle. If not, put down a good deposit or buy a vehicle where the prices are affordable as you will still have to maintain and insure the vehicle and the cost to insure is often about the same as the vehicle payments but typically no more that 10 months of the year.
Dealership
Go with a dealership where you can get a loaner when you have to do repairs that will take more than few days. Keep in mind that AFNA Motors may want you to return the vehicle with the same amount of fuel or battery level to avoid a surcharge.
I am always working to improve your experience on my website. Part of this involves using cookies to collect anonymous data for statistics and personalization. Learn more