Computing News
Transcription
Computing News
Computing News King's University College Information Technology Services Volume 1, Issue 1 Fall 2008 First Edition of ITS Newsletter Fall ITS Workshops GSS - Grade Submission System - November 17, 18, 20, 21, 11:30 -12:30 in W045 lab Content Management for Staff - December 8, 10:00-11:00am in W045 lab Content Management for Faculty - December 8, 2:00 - 3:00 and December 11, 10:0011:00 or 2:00-3:00 in W045 lab WebCT - December 9 and 12, 1:00-2:30pm in W045 lab Inside this issue: Backup Solutions for 2 a digital world Don’t be afraid of in- 2 class audio/visual equipment How to install the Microsoft Recovery Console 7 Google’s new shiny browser 5 PC or Mac - does it 8 really matter? Part 1 of a series... Internet/Extranet/ Intranet - Huh? 7 Welcome to the first edition of F1 , the King‟s Information Technology Services Newsletter. The submissions by ITS staff were quite verbose, so designing a layout for the newsletter was difficult. We settled on a conventional format with a few layout twists for fun and the newsletter has been distributed as a PDF file. Inside you will find a range of articles covering equipment use, product reviews, Internet terminology and operating system recovery techniques. duced in the ITS department. In an attempt to be environmentally responsible, no printed copies of the newsletter have been made. However, if necessary, they can be pro- Newsletter format, length and style are easily changed, so please let ITS know what you think. Send comments to [email protected] Future newsletters will concentrate on the status of IT projects and upgrades of interest to the College community. Phishing Scams Continue UWO mail system users are continually receiving messages asking for personal information. The UWO Anti-Phishing working group defines Phishing as a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Official email communication from UWO will never ask you to email your password or other personal information. clicking on an attachment or downloading and installing seemingly legitimate programs. Typically, these messages will appear to be from a legitimate source. Examples are UWO Web Admin, WebMail Support or the UWO E-mail Team. Be careful to ensure that antivirus or software upgrades are actually from the specified vendor. If you have any concerns, contact ITS at 4441. Other common phishing exploits involve the installation of malicious programs on your computer. These programs can be unknowingly installed by For more information about phishing, visit http:// wellness.uwo.ca. Technology Upgrades ITS is constantly improving computing services and the network infrastructure at the College. Over the summer, all 30 public computer lab workstations in W143 were replaced with new P4 dual-core systems. You may have noticed people installing antennas on the Wemple roof. This isn‟t to improve the radio reception in the cafeteria (although that would be helpful) , but is a new redundant connection to the Internet and UWO network resources. King‟s now has two connections to the Internet, but both run above ground using telephone poles on Epworth Avenue. In the event that a traffic accident severs one of these fiber lines, the dedicated wireless connection will automatically switch over and carry network traffic without interruption. The new College web site was launched in mid September and offers a content management system, print formatting and PDF creation, integrated forums and mailing features. Visit www.kings.uwo.ca to view! Page 2 Computing News ITS Mission Statement The mission of Information Technology Services is to provide innovative, contemporary and accessible technology within the service scope of efficiency, confidentiality and integrity to enable and engage the students, faculty and staff of King‟s University College in meeting their goals as a collaborative community. F1 Computing News Volume 1, #1 _______________ F1 Computing News is published by King’s University College Information Technology Services © King’s University College 2008. Contact: Tom Jory [email protected] Website: www.kucits.ca/cnews In-class audio/visual equipment: do not be afraid Every classroom at King‟s is equipped with a LCD projector, computer, DVD player, VCR and transparency projector. The larger classrooms are also equipped with a lapel microphone and PA system. The equipment is tested regularly and the computers are updated every two to three months. However, problems occasionally occur and, as a result, the ITS Department provides continuous in-class support for all A/V equipment whenever classes are in session (Monday to Thursday, 8:30 am to 10:00 pm, Friday, 8:30 am to 4:30 pm). If a professor arrives to find the equipment (or any part thereof) missing, malfunctioning or otherwise not working as it should, help is just a phone call away. Support for in-class equipment may be summoned by calling the King‟s Reception Desk and asking that IT Support be dispatched to the classroom. The Reception Desk can be reached by calling 519-4333491. It is highly recommended that problems be reported immediately. IT Staff can usually solve a problem very quickly and with minimal class interruption. If an issue is more severe, the equipment will be replaced as soon as possible to prevent further disruption. Equipment problems are uncommon and equipment failure requiring replacement is extremely rare. Please help the IT Department maintain in-class A/V equipment by reporting issues as soon as possible. Don‟t wait for someone else to report the problem. If you would like to begin regular use of the in-class A/V equipment at King‟s, or would like a refresher training session, please contact Corey Cooke at extension 4387 or via e-mail at [email protected]. Booking A/V Equipment If you would like to have access to the equipment on an irregular or occasional basis, please complete the IMS Request form at www.kucits.ca at least two business days prior to your class. This will ensure that the a/v cabinet is open and the equipment is set-up for you by an IT Staff Member a few minutes before your class begins. It is also recommended that professors inform their students about this procedure when they are scheduled to make an inclass presentation. Once the IMS Request form is submitted, the Media Specialist confirms the request via e-mail and provides other important information to the user. File Transportation to the Classroom All of the in-class computers at King‟s are equipped with a CD/ DVD-ROM drive, front USB ports and 3.5” floppy drives. When making a presentation at King‟s users may burn their file to a CD, e-mail the file to a webbased e-mail account (for example, Hotmail or UWO Webmail) and download the file on the classroom computer, or use a USB memory device. Using a floppy disk as a method of saving files is strongly discouraged. Corey Cooke LCD projectors. When using a laptop, users with a valid @uwo.ca e-mail account may access the wireless Internet within the classroom. The cable used to connect the laptop to the projector in each classroom includes a connection for audio as well. Attention Mac users In order to connect a Mac laptop to the LCD projector in the classrooms a 15-pin female VGA adapter is required. There are a number of different types of these adapters and they are specific to the Mac model. As a result, Mac users must provide their own VGA adapter. Contact If you have any questions about the equipment available in the classrooms at King‟s, please contact Corey Cooke, Media Specialist, [email protected] or call 433-3491, extension 4387. Using a Laptop Faculty and students are welcome to use their own laptop to make presentations in conjunction with one of the school‟s Backup Solutions – Invaluable Methods in a Digital World David Thuss The adage is that you don‟t know what you‟ve got „til it‟s gone. When it comes to data on your computer or laptop this can be a sad reality. It‟s also true that you don‟t know true loss until you realise the project you have toiled away with for months (or years) is now located on a hard drive that will not function – regardless of how loud you yell. The hard drive‟s announcement to you that it was about to die was a series of “bad” noises five seconds before it quit. When even throwing it in the freezer isn‟t going to bring the data back, you come to the realisation that the data and all those hours of work are gone. Continued on page 3... Page 3 Computing News Backup Solutions – Invaluable Methods in a Digital World From page 2 Those digital photos of your family trip are gone. Your calendar and all its appointments (including the reminder of your mother-in-law‟s birthday) are gone. That is unless you have a proper backup solution in place. You do have a proper backup solution in place, right? “The hard drive‟s announcement to you that it was about to die was a series of “bad” noises five seconds before it quit..” More and more we are moving toward a paperless society. This brings considerable benefits but often removes any hard copy of those files that represent personal toil. Replacing your files and documents in the event of a system failure need not be the shedding of a million tears and can be as easy as a few clicks. This column, over the next several editions of F1, will focus on data storage, data backup, and data recovery. Its overall intent is to reveal what data backup solutions each of us can utilise whether on campus or at home. Many of the solutions are cross-platform compatible while ranging range in complexity, reliability, and cost. You‟re right! Where can I start? Today‟s focus is on what to backup: what files are important, where these files are stored on your computer, and what is feasible to back up in terms of size and the ability to restore the data. What Files are Important? (And no, it‟s not “everything”) Important files are, quite frankly, those files that are not easily replaced. This may include documents, photos, email threads with colleagues, website bookmarks, or even a witty editorial comic – it‟s a personal decision. Deciding what files you want to back up should include an assessment of what programs you use on a regular basis, what files these programs generate, and what it would mean if these files were lost. If you use Microsoft Word then you‟re going to want to back up the .doc or .docx files that it generates; if you‟re transferring interviews from a device with Sony‟s SonicStage then you‟re going to want to back up the .OMG/.OMA audio files it uses. It‟s no consolation to realise you didn‟t back up something because you didn‟t know they were needed. I‟ve stated that you should focus on what files these programs generate because you cannot backup the software itself. Reinstalling Corel‟s WordPerfect will not make a corrupted .WPD file suddenly work. For better data integrity, software and the files they access are maintained separately – this makes your files useable on any computer without having to carry around entire software packages (and that‟s a good thing). Where are these Files located? Knowing what files you want to keep precedes the question of, “where are they located?” Generally programs will save their files in the default locations defined by the operating system (i.e. Windows 2000/XP/ Vista, Mac OS X, Ubuntu, etc.). As such, “My Documents” in a Windows environment becomes a haven for file formats of all kinds while the same can be said for your User directory (or “Home” folder) in a Mac environment. Understanding your operating system‟s folder structure will go a long way toward ensuring that no important file is overlooked while implementing a backup solution. Below is a discussion of those files types generally deemed “important” and where you will find them on your computer. Documents Within the Windows 2000/XP environment this folder is, by default, located in <root>:\Documents and Settings\user\My Documents\. In Apple‟s Mac OS 9, this folder is in <root>:\Documents\. Both Windows Vista and Mac OS X (versions Cheetah through Leopard) have adopted a Unixbased folder structure and so the documents folder is filed as <root>:\Users\user\Document s\. Be aware that the “My Documents” shortcut on your desktop in Windows 2000/XP is really just a shortcut; making sure that you‟re properly backing up your files means ensuring you know where the files really are located. Photos Windows 2000/XP stores your photos as a subdirectory of the “My Documents” directory. Within Windows Vista and Mac OS X, the pictures directory is within the <root>:\Users\user\ directory so it is important to include this particular folder in any backup solution. Some programs, such as those released by Kodak or Nikon, may place your photos in different areas of your computer when you transfer your photos from your camera such as <root>:\pictures\. It is important to check where the photos are being imported to ensure that you are properly backing them up. Email Messages, Address Books, and Calendar Information Backing up your emails can be a daunting task for most users as the email client in use determines where the files are stored and in what format they are saved. continued... Page 4 Volume 1, Issue 1 Backup Solutions – Invaluable Methods in a Digital World ...page 3 By comparison backing up your documents and photos can be child‟s play. Fear not! The following section covers those email clients that you are likely to be using. Now, there are three methods through which you may be interacting with your emails (beyond just saying good morning): web-based, Internet Message Access Protocol (IMAP), or Post Office Protocol version 3 (POP3). This section focuses on the third type, POP3, as the other two types do not transfer the messages from the email server to your desktop; your task of ensuring access to these emails is easy: trust that the complex sets of redundancy that ITS has in place to secure your email messages. Increasingly it is rare to only use our email clients to send emails. We also use them as repositories for our contacts, calendar information, tasks, and a place to find saved attachments. Just as with backing up files, you want to focus on what information is used by the software that you cannot afford to lose – this means that even if your email client access your emails via IMAP, there is still the matter of backing up your contacts and possibly your calendar. The most popular email clients are Microsoft Outlook (2003/2007/ Entourage for Macs), Microsoft Outlook Express (Renamed Windows Mail in Vista – with both to be succeeded by Windows Live Mail), Eudora, Mozilla Thunderbird, and Mail for Macs. Outlook Express, Windows Mail, and Mac Mail are all installed with the operating systems and generally have some slight changes based on the version of the operating system you are using. Western‟s ITS department offers some very helpful pages on how to configure each of these email clients for use with UWO email addresses. The following list indentifies what files constitute your email messages, address book, and calendar. Some software, such as Microsoft Outlook, retains all of these items in one file which makes backup easier. Microsoft Office: All email messages, email contacts, and calendar items are retained in a “Personal Folders file” (.pst) by Microsoft Outlook. Outlook allows you to create multiple identities, each maintaining a separate .pst file. The default location for these files in Windows 2000/ XP is <root>:\Documents and Settings\user\Local Settings\Application Data\Microsoft\Outlook\. In Windows Vista they are stored in <root>:\Users\user\AppData\Local\Micro soft\Outlook\. Outlook offers a built-in archiving utility that can periodically backup your information. The downside to this tool is that the archived files are still stored on the same drive as your active data. A solution to this is the Personal Folders Backup utility that works for all recent versions of Outlook and is available as a free download from the Microsoft Website. Microsoft Outlook Express: Outlook Express does not retain all your messages in one folder. Rather they are separated according to your folder structure and have the file extension “.dbx” (i.e. inbox.dbx, outbox.dbx). In Windows XP, these files are stored in <root>:\Documents and Settings\user\Local Settings\Application Data\Identities\windows user identity number\Microsoft\Outlook Express\. Windows XP used the “Address Book” to maintain your contacts information; a program that can be used outside of Outlook Express. Address Book saves your contact information in .wab files that are located in <root>:\Documents and Settings\user\Application Data\Microsoft\Address Book\. Qualcomm’s Eudora: Eudora stores its address books, emails messages, and attachments all in one folder. In Windows 2000/XP this location is <root>:\Documents and Settings\user\Application Data\Qualcomm\Eudora\. In Windows Vista these files are located in <root>:\Users\user\AppData\Local\Qual comm\Eudora\. Eudora does not store all of the data related to your emails in one file. Rather it separates them into a few different files and folders. For our purposes we will focus on backing up mailboxes, folders, address books, settings (email account information), and attachments. Your mailboxes (i.e. your inbox, outbox, etc.) are all identified by name with the extension “.mbx”. You will also notice “.toc” files. To back up your mailboxes you will need to back up these pairs of files. Folders will have the extension “.fol” while your Eudora settings file is simply “eudora.ini” Finally, to save your attachments you should backup the entire “attach” folder located in the Eudora directory. On more recent versions of Eudora, the program automatically creates backup copies of your Inbox and Outbox within the Eudora folder. These are identified with a three digit extension such as “001”. A backup of your inbox will therefore be “in.mbx.001” and will have an accompanying .toc file. Continued on page 5... Page 5 Volume 1, Issue 1 Information Services Guide Back Up - What should I be doing? King's University College ITS - [email protected] Client Support W047 Chris Atkinson [email protected] David Thuss - [email protected] [email protected] Voice - 4441 From page 4 Mail for Macs (OS X): Similar to Outlook Express, Mail does not fully maintain your address book although it can access your contacts. The easiest way to back up your address book is to use the builtin backup utility. Within Address Book choose “Back up Address Book” from the file menu. The process will ask where you wish to store the backup. Beyond your contacts, there are two locations that contain the files needed to backup your Mail preferences and your messages. Your Mail preferences, such as email accounts, rules, signatures, etc. are contained in three files: com.apple.mail.plist, MessageRules.plist, and SmartMailboxes.plist. These files are located in <root>:\Users\user\library\pref erences\. In addition, the Signatures folder in the preferences directory contains any signatures you may have created. Your email messages are located in <root>:\Users\user\library\mai l\. To backup your messages, simply copy this entire folder. OK, but now what? Knowing where your files are located is only one part of the task of backing up your important files. In the next issue of F1, I will focus on those utilities that make backing up these files a snap. If you have any questions about the programs mentioned here or about other backup programs not mentioned, feel free to send me an email at [email protected] That‟s it for now and remember: every car can go forward but without backing up we‟d always be stuck in the garage. 1This statement should be qualified; generally software does not fall under the normal routines of system backups. Programmer Todd Morrison - 4567 [email protected] Director Tom Jory - 4398 [email protected] Walk-in hours: 8:00-12:00 and 2:00-4:30 KUC Website http://www.kings.uwo.ca Web Admin Tim Bugler - 4480 [email protected] ITS Website http://www.kucits.ca Instructional Media Services Corey Cooke - 4387 [email protected] However, using disk cloning software such as Symantec Ghost, Apple Software Restore, or ODIN, one can create a disk image of their entire operating system that can be used in the event of complete system failure. <root> refers to the drive that your operating system is installed on. In most cases, this will be “C:\”; user references your 2 Computer Lab Reservations can be viewed at www.kucits.ca and arranged by calling 4441 username. For example, if you login with the username “jim”, replace “user” wilth “jim”. 3The folder that houses these files is marked as a hidden folder in Windows by default. To view hidden folders, click “Start”, and then click “Control Panel.” Within Control Panel go to “Appearances and Themes” and select “Folder Options.” Under the “View tab” select “Show hidden files and folders.” Google’s Chrome at Home: A Contemporary Web Browser Todd Morrison Google has done much to bring innovation, function and fun to the Internet. Aside from being the search engine of choice, Google offers many other technologies that enhance productivity and connectedness; examples of some of their excellent offerings include Google Maps, Google Docs and Gmail. Many had wondered if Google‟s innovation would ever manifest itself in the web browser strata. Would they dare compete in the browser wars? That time has come. After much research and development, Google released “Chrome” earlier this Fall. I can imagine you may be rolling your eyes and thinking “Just what the world needs… another web browser!” Such skepticism and disinclination are to be expected with the plethora of browsers available for download, in addition to the quirks and inconsistencies each bring to your desktop. However, Chrome is much different; it breathes new life into the browsing experience and truly feels like a contemporary browsing application. The virtues that Chrome espouses are many; it would be difficult to cover them all effectively in this column. While Internet Explorer and Firefox remain ideal choices for the workplace, Chrome is a perfect fit for home. Thus, I will cover some of Chrome‟s most interesting features with a perspective toward home-use. continued... Page 6 Computing News Google’s Chrome at Home: A Contemporary Web Browser Default page: When Chrome opens, it displays a “Most Visited” page that displays graphic thumbnails of your most-visited sites. By simply clicking on one of these thumbnails, the respective page will load. Why have one home page when you can have a page that contains your favourites, each conveniently accessible? Additionally, a search bar and recently accessed bookmarks are displayed on the page. Benefit at home: Shared computers tend to have a lengthy favourites list. Conveniently arranged graphic thumbnails provide quicker access to your favourite web content. Figure 1 - Default Page Most Visited Thumbnails Page tabs: While tabs have been a common feature in web browsers for some time (Opera was perhaps the first to offer a tabbed-view interface), Chrome takes page tabs to a new level. Each tab has its own address bar. Tabs can be “torn-away” from the Chrome application window to create their own window. Just click on the tab and drag it away from the Chrome window. Torn-away tabs can be re-attached to the Chrome window by reversing the operation. Another unique aspect of Chrome‟s utilization of tabs regards under-the-hood technology: each tab runs in its own memory space (“sandboxing”). Though this may seem like nerd-speak, the benefit of this isolation can be appreciated by all users. Have you ever had a series of tabs open in your favourite web browser and encountered a web page that caused your browser to crash, and thus lose all of your tabs containing carefully located web content? Chrome‟s sandboxing prevents misbehaving web pages from crashing the browser and destroying your tabbed pages. Benefit at home: If you share a computer at home and your kids/roommates/cats like to visit JavaScript or plug-in enhanced web pages, bad code will not kill your browser session and carefully ordered tabs. Incongito mode: Perhaps facetiously named, Incognito mode allows you to retain a level of security and privacy not necessarily available “out-of-the-box” in other web browsers. Incognito mode introduces an insulated browsing experience in that it prevents the browser from tracking your page history and from storing cookies generated during surfing. Benefit at home: If you share a computer at home, Incognito mode may come in handy while shopping online for gifts for your loved-ones: your shopping history will exist only for the duration of your use of Incognito mode; or until you close the browser. Figure 2 - A web page with "broken" elements. Chrome displays the page without crashing; broken elements are identified by the black areas containing the "unhappy face" plug-in icon. The features I‟ve highlighted are only a few of the many Chrome has to offer. I have been using Chrome at home for almost two months now, and I‟m a fan. Why not give it a spin? It may become your favourite browser. More information and the download for Chrome can be found at www.google.com/chrome. Chrome is available for Windows XP/Vista; a Mac version is in development and is expected to arrive on desktops before the end of 2008. Page 7 Volume 1, Issue 1 Internet, World Wide Web, Extranet, Intranet, Portal...What is all this stuff?! Many people use the terms Internet and World Wide Web (aka. the Web) interchangeably, but in fact the two terms mean two completely different things. The Internet and the Web are two separate but related things. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols. The World Wide Web, or simply the Web, is a way of accessing information over this medium known as the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use HTTP to allow applications to communicate in order to exchange business logic, use the the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video. The Web is just one of the ways that information can be disseminated over the Internet. The Internet, not the Web, is also used for e-mail, which relies on SMTP, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused. Now that we have that cleared up, let‟s take a moment to chat about intranets, extranets and portals. Again, these are terms which are often used synonymously, but in actual fact are very different things. You could almost think of an intranet as your own personal Internet. Like the Internet, an intranet is a computer network that uses Internet protocols and network connectivity to securely share any part of an organization's information or operational systems with its employees. The difference being that an intranet is private, only accessible by the organizations employees and is not accessible via the Internet (in most cases). Some- times the term intranet refers only to the organization's internal website, but often it is a more extensive part of the organization's computer infrastructure and private websites are an important component and focal point of internal communication and collaboration. An extranet is a private network that uses Internet protocols, network connectivity, and possibly the public telecommunication system to securely share part of an organization's information or operations with suppliers, vendors, partners, customers, employees or other businesses. An extranet is usually accessible via a secured authentication (username / password) via the Internet, like King‟s faculty and staff extranet. And last but not least, a web portal. A web portal is a web site that provides a single function via a web page or site. Usually a web portal is a point of access for information on the World Wide Web. A web portal is more than just a search engine, often offering other services such as email, news, stock prices and other features. Portals provide a way for enterprises to provide a consistent look and feel with access control and procedures for multiple applications, which otherwise would have been different entities altogether. Generally speaking, most of the Tim Bugler sites we refer to as Search Engines (i.e. Google, Yahoo or MSN) are in actual fact Web Portals. So now that I have made everything clear as mud and filled your heads with evenmore IT jargon, I‟m going to really simplfy things: Internet: Really big network of networks of computers. Any computer connected to the Internet can communicate with another computer connected to the Internet. World Wide Web: Simply put, an easy way to access information over the Internet. Intranet: Internal private network – not accessible to anyone outside the organization. Extranet: External private network – available via the Internet, but only accessible by authenticated users. Web Portal: One-stop shopping for all your Internet / World Wide Web needs (email, news, infotainment) such as Google. I hope you were paying attention; your next web update may require you to answer a skill testing question! How to Install the Recover Console for Windows XP Chris Atkinson To recover your operating system when your computer does not start correctly or does not start at all, you may want to install and use the Windows Recovery Console. However, Microsoft recommends this method of system recovery for advanced users only. Also, learn about the Recovery Console command prompt, command actions, rules, how to remove the Recovery Console, and how to install it during an unattended installation. Microsoft recommends that you use the Recovery Console only after Safe mode and other startup options do not work. The Recovery Console is recommended only if you are an advanced user who can use basic commands to identify and locate problem drivers and files. Additionally, you must be an Administrator to use the Recovery Console. Directions for installing the Recovery Console are far too lengthy to detail in this newsletter, but ITS has posted the procedures at www.kucits.ca/recovery. If you have any questions, contact Chris Atkinson at [email protected]. Page 8 Computing News PC or Mac - Does it really matter? In the late 70‟s I began the process of building an Apple II computer. There were no „how to‟ guides or FAQ‟s, and while I located the majority of parts, there were a few that seemed impossible to get. Fortunately while in California, I met the owner of a Sony television assembly facility who took an interest in helping me find the missing pieces. When it was all together, and after some interesting visits to the back rooms of computer stores on College Street where you could get the necessary code burned into an E-PROM for very little money, I had a fully functional Apple II. The computer, and many that followed it, was based on the extremely inexpensive Motorola 6502 processor which resulted in the home computer revolution of the 1980s. Apple stayed with Motorola into the Macintosh days, but when the IBM PC with its Intel 8088 processor arrived, it quickly became a huge commercial success and eclipsed the competition, and my interest in the 6502 based computers. Not a week goes by when I am not asked for my opinion on what platform a student or faculty member should purchase. Obviously I‟ve been using PC‟s for many years and other than limited use of the Mac Mini in the ITS office, I had little Mac experience. I wanted to offer a more unbiased voice in the Mac vs. PC debate, so I ordered an Apple iMac directly from the on-line Apple store. “The machine itself is beautiful with an excellent monitor and an aluminum frame around the computer and keyboard.” Ordering was easy. There are few options for the iMac beyond CPU speed and monitor size, and shipping was extremely fast. The package contained the computer with integral monitor, keyboard, mouse, power cord, operating system disks and a small instruction book. Tom Jory Setting up the iMac was also easy. The USB mouse connects to the keyboard which connects to the computer, then plug in the power cord and turn it on. On its initial start you are prompted for user information and you have the option to create accounts for additional users. Once it‟s up and running, you are greeted with many unique and fun pre-installed applications. The Safari browser performs well and the iMac seems quite fast with regular tasks. The machine itself is beautiful with an excellent monitor and an aluminum frame around the computer and keyboard. All the ins and outs are available on the rear and the optical drive reads and writes to cd and dvd. Apple now includes right-click functionality and the included mouse has two buttons, but the feature is not turned on by default. Another issue was “control” button on the keyboard could not be used for shortcuts – you must use the “command” key. Once these two items were recognized, use of the iMac was reasonably similar to a PC. The next test was to see how the iMac performed in a real environment, so I packed it up and took it home for the kids to use. Since the iMac looks really impressive, their initial response was “cool!” However, until some of the mouse and shortcut issues were ironed out, there were many complaints. It‟s only been home for a few days now, so the next part of this article will detail how the iMac continues to fare in a household of Windows users. I now have a little more information for the next time I‟m asked what platform I would recommend. However, it‟s too early to suggest one over the other, but since students are normally looking to spend as little as possible, the iMac appears to be an expensive solution. Check out the Apple vs. Dell comparison on this page and I‟m sure you will agree that while the iMac is an impressive machine, it is considerably more expensive than the PC equivalent. For a student, surfing the net or composing an essay will be accomplished on either platform with the same results. Part II of this evaluation will include a more detailed comparison of the hardware and a closer look at the included applications. Apple iMac 24” monitor 2.8Ghz Intel Core 2 Duo CPU 6Mb L2 cache 2Gb ram 800Mhz DDR2 320Gb 7200 rpm hard drive ATI Radeo HD2600 PRO video OS X v10.5 Leopard $1799 Dell Vostro 200 Desktop Samsung 24” monitor Intel E8400 Core 2 Duo CPU 6Mb L2 cache 2Gb ram 800 Mhz DDR2 320Gb 7200 rpm hard drive Intel 3100 video Windows Vista Basic $818