FAQ: ICT Services Help Desk FOR IIUM STAFF IIUM Announcement Guidelines Guidelines on Announcements through IIUM Email, Staff & Student Portals Q: How can I make an official announcement to IIUM staff and students? A: You can make announcements through these official IIUM channels:✔️ IIUM Email (announce@iium.edu.my)✔️ Staff Portal (my.iium.edu.my/staff)✔️ Student Portal (imaluum.iium.edu.my) General Guidelines ✅ Announcements must support academic, teaching, learning, research, or administrative services of IIUM.✅ Only important messages that require the attention of all staff and students are permitted.✅ Ensure your announcement is clear, grammatically correct, and under 1000KB (text format).✅ The announcer is responsible for replies, responses, and complaints about their announcement. ❌ No personal matters or advertisements❌ No announcements that discredit IIUM Where to Announce? Type of Announcement Channel University-wide academic/admin info IIUM Email Webinars, talks, workshops, competitions, retirements, greetings, etc. Staff Portal only Student-related announcements Student Portal only How to Submit an Email Announcement? 1️⃣ Send a request to announce@iium.edu.my2️⃣ Include:— Name, Department, Designation— Email & Telephone extension3️⃣ Only 1 image allowed (extra images via Google Drive link)4️⃣ Attachments must be shared via Google Drive (IIUM staff view only)Making an IIUM email Announcement Main Guidelines Other Important Guidelines Other important guidelines: It is recommended to put "Assalamualaikum" in writing or using Arabic Font instead of using an image of "Assalamualaikum" in arabic. Refrain using "Allahyarhamah" for deceased female and use either "Almarhumah" or just "Allahyarham" for both deceased male and female. It is recommended to just limit only 1 image per announcement. As the announcement after 12.00 pm will be announced the next day, kindly plan your announcement accordingly. Staff Portal New IIUM Staff Portal Creating ICT Services Help Desk Report Menu>Community Menu>MSD Microsoft Azure (Staff) SIS/CAM Entry Password Reset How to Print Class List . Online Resources 1. Log in to the MyIIUM Staff Portal . 2. From the left sidebar, click Online Resources. 3. Choose any resources you want to add. For example Policy Guidelines. 4. On the right top, click the button Add Documents. 5. Before adding the details of the document, please save the document on any platform such as Google Drive, One Drive, and others. Please make sure the document link is public. 6. Fill up the form. The URL refers to step number 5. 7. Click the button add document to save the details. Microsoft 365 FAQ: How to Check M365 Storage Usage In light of the recent communication regarding Microsoft M365 storage allocation at the University (15 GB for staff and 5 GB for students), we provide the following infographic to guide you through the process of checking your storage usage. ITD acknowledges the concerns of the IIUM community regarding the matter of M365 storage. In our unwavering commitment to ensuring quality service delivery, we remain dedicated to ongoing research efforts, striving to provide the best solutions for all. Rest assured, we shall provide updates from time to time. Should you have any questions or require further assistance, please feel free to reach out to the ITD Service Desk at 6666 or servicedesk@iium.edu.my Create IIUM Live Email to Access Microsoft CREATE IIUM LIVE EMAIL TO ACCESS MICROSOFT Microsoft LIVE IIUM email Info Microsoft Office Issues ( Activation Issues ) First of all, uninstall any other version of Microsoft Office from the pc/laptop. You can visit here for uninstall tool provided by Microsoft: https://support.office.com/en-us/article/uninstall-office-from-a-pc-9dd49b83-264a-477a-8fcc-2fdf5dbf61d8 Then login to www.office.com using your LIVE IIUM account and install the latest Microsoft Office 365 from the "Install Office" button.After that, open MS Word and sign in using your LIVE IIUM email account for automatic activation. Hope that helps. Thank you. How many devices can I install my staff version of Microsoft Office on? You can install Microsoft Office for free on up to 15 devices in total (five installations on Windows and MAC devices, five installations on smart phones and five on tablet devices). Please note, you are only able to install the applications on devices that you personally own. Manage Microsoft Onedrive Guidelines If you don't have OneDrive installed, download the latest version. Select the Start button, search for OneDrive, and then open it. When OneDrive Setup starts, enter your Microsoft account, and then select Sign in. Note If you already had an account signed in to OneDrive and you want to add another account, select the OneDrive cloud icon in the Windows taskbar notification area, select Help & Settings. In Settings, select Account, select Add an account, and then sign in. Important If you're using the OneDrive Mac Store app, uninstall it before installing the latest build of the sync app. Introduction to Microsoft Onedrive Training السلام عليكم ورحمة الله وبركاته Dear All Staff, Microsoft OneDrive is a cloud storage provided by Microsoft when you activate your LIVE IIUM email account. Microsoft OneDrive works similar to other well-known consumer cloud storage options, such as Dropbox, Google Drive and iCloud. Compared to other providers, the OneDrive storage for IIUM staff and students is currently 1TB per account. In view of this, the ITD has arranged an online briefing sessions as follows: DOWNLOAD THE RECORDING HERE! It is hoped that all staff can take this opportunity to learn the functionality of OneDrive and to take advantage of what it can offer. Note: Kindly activate your LIVE IIUM email account to access OneDrive. Click here to read the infographic. Any inquiries, please WhatsApp ICT Services Help Desk WhatsApp Hotline at 016-9832415 or email servicedesk@iium.edu.my. Thank you. Information Technology DivisionIntroduction to Microsoft OneDrive Training 02/2021 السلام عليكم ورحمة الله وبركاته Dear All Staff, Microsoft OneDrive is a cloud storage provided by Microsoft when you activate your LIVE IIUM email account. Microsoft OneDrive works similar to other well-known consumer cloud storage options, such as Dropbox, Google Drive and iCloud. Compared to other providers, the OneDrive storage for IIUM staff and students is currently 1TB per account. In view of this, the ITD has arranged an online briefing sessions as follows: DOWNLOAD THE RECORDING HERE! It is hoped that all staff can take this opportunity to learn the functionality of OneDrive and to take advantage of what it can offer. Note: Kindly activate your LIVE IIUM email account to access OneDrive. Click here to read the infographic. Any inquiries, please WhatsApp ICT Services Help Desk WhatsApp Hotline at 016-9832415 or email servicedesk@iium.edu.my. Thank you. Information Technology DivisionIntroduction to Microsoft OneDrive Training 03/2021 السلام عليكم ورحمة الله وبركاته Dear All Staff, Microsoft OneDrive is a cloud storage provided by Microsoft when you activate your LIVE IIUM email account. Microsoft OneDrive works similar to other well-known consumer cloud storage options, such as Dropbox, Google Drive and iCloud. Compared to other providers, the OneDrive storage for IIUM staff and students is currently 1TB per account. In view of this, the ITD has arranged an online briefing sessions as follows: DOWNLOAD THE RECORDING HERE! It is hoped that all staff can take this opportunity to learn the functionality of OneDrive and to take advantage of what it can offer. Note: Kindly activate your LIVE IIUM email account to access OneDrive. Click here to read the infographic. Any inquiries, please WhatsApp ICT Services Help Desk WhatsApp Hotline at 016-9832415 or email servicedesk@iium.edu.my. Thank you. Information Technology DivisionMICROSOFT 365 AND ONEDRIVE Information not updated at live account Student to update 365 profile or reset password for live account.Guide to Microsoft’s cloud storage UTILISATION OF ONEDRIVE FOR IIUM ECOSYSTEM Invalid User Close browser and restart again. Cloud storage allocation for Google Workspace and Microsoft 365 We are delighted to share the latest developments on cloud storage allocation for Google Workspace and Microsoft 365. Based on Mesyuarat MAPITA No. 1/2024 dated 5th March 2024, Jabatan Digital Negara (JDN) (formerly known as MAMPU) has subscribed to Google Services under the Government Hybrid Cloud Initiative. This subscription is valid from 1st March 2024 to 28th February 2028 (4 years). Effective 1st April 2024, staff members will have a storage allocation of 60GB, while students will receive 10GB under Google Workspace. Furthermore, the Ministry of Higher Education (MOHE) has renewed the subscription to Microsoft 365, valid from 1st August 2024 to 31st July 2027 (3 years). However, the storage allocation remains unchanged, with staff members allocated 15GB and students 5GB, effective 1st April 2024 for Microsoft 365. ITD acknowledges the need for additional storage capacity within the KCDIOM community. To address this, an email will be sent to KCDIOM administrators and IT coordinators, furnishing details about additional storage capacity for Microsoft 365 and Google Workspace by 25th March 2024.MS Teams: Public vs. Private Teams Microsoft Teams is a powerful tool for improving communication and teamwork. Private Teams offer more benefits than Public Teams, especially for protecting sensitive data. Therefore, ITD recommends that the IIUM community set Microsoft Teams to private for enhanced data security.Here’s why Private Teams are a better choice:Join a Teams meeting from the app Join a Teams meeting from the app Join a Microsoft Teams meeting from your calendar, or sign in as a guest on the web. Go to your Teams calendar. Find a meeting and select Join. From the pre-join screen: Turn on your camera Select Effects and avatars to choose a background effect. Choose your audio settings. Select Join now. Join a Teams meeting on the web Don't have the Teams app? You can still join a Teams meeting. In your email invite, select Join the meeting now. You can also use a dial-in number and conference ID from the email to call in. You have three choices: Download the Windows app: Download the Teams desktop app. Continue on this browser: Join a Teams meeting on the web. Open your Teams app: If you already have the Teams app, go right to your meeting. Type your name. Choose your audio and video settings. Select Join now. Depending on meeting settings, you'll get in right away, or go to a lobby where someone in the meeting will admit you How do I download Microsoft Office for free? Q: How do I download Microsoft Office for free?A: Sign in to office.com with your IIUM Live email. Go to Install Office to download for up to 5 devices. Can I access Microsoft Azure for learning? Q: Can I access Microsoft Azure for learning?A: Yes. Sign in via Azure Dev Tools for Teaching using your IIUM Live email.How do I set up my IIUM Live email for Microsoft 365? Q: How do I set up my IIUM Live email for Microsoft 365?A: Log in to my.iium.edu.my > Staff Portal > Subscribe to Microsoft Office 365. Note your Live email (format: username@live.iium.edu.my) and temporary password. Sign in to office.com to activate and download software. Can I install Microsoft Office on personal devices? Q: Can I install Microsoft Office on personal devices?A: Yes! Staff can install Office 365 on up to 15 devices (5 PCs/Macs, 5 smartphones, 5 tablets).How do I download free software via Microsoft Azure? Q: How do I download free software via Microsoft Azure?A: Log in to my.iium.edu.my/staff > My Apps > Administrative/University Strategic > Software Free Download. Register your IIUM Live email and access Azure Dev Tools for Teaching. What software is available? Q: What software is available?A: Includes Windows OS, Visual Studio, SQL Server, and more. See the Microsoft Azure Portal under "Education - Software".How to Enable 2SV for Microsoft 365 (Staff Live Email) How to Enable 2SV for Microsoft 365 (Staff Live Email) Step 1: Log in to Your IIUM Microsoft Account Go to account.microsoft.com. Sign in with your IIUM Live email (e.g., username@live.iium.edu.my). Step 2: Enable 2-Step Verification Click Security → More security options. Under Two-step verification, select Set up two-step verification. Choose a verification method: Microsoft Authenticator App (Recommended) SMS (Text Message) Alternate Email Follow the setup steps and confirm. What is Microsoft Azure Portal? (For IIUM Students & Staff) Microsoft Azure Portal is a web-based dashboard that allows users to access, manage, and deploy cloud services provided by Microsoft Azure. IIUM provides access to Azure for educational and research purposes, including free software, development tools, and cloud computing resources. Key Features of Azure Portal for IIUM Users 1. Free Software & Developer Tools Download Microsoft software (e.g., Windows Server, Visual Studio, SQL Server) via Azure Dev Tools for Teaching (formerly Microsoft Imagine). Access development tools for coding, AI, and data science. 2. Cloud Computing & Storage Create virtual machines (VMs) for projects. Use Azure Blob Storage for secure file storage. Deploy web apps and databases in the cloud. 3. Learning Resources Free courses on AI, cloud computing, cybersecurity (Microsoft Learn). Hands-on labs for students and researchers. 4. Research & Collaboration High-performance computing (HPC) for large-scale research. Share resources with team members securely. How IIUM Students/Staff Access Azure Portal Log in to Microsoft Azure Portal using: Students: username@live.iium.edu.my (IIUM Live email). Staff: username@iium.edu.my (Staff email). Navigate to: "Azure Dev Tools for Teaching" (for free software). "Virtual Machines" (for cloud computing). Need Help? ICT Help Desk: 03-6421 6666 Email: servicedesk@iium.edu.my Note: Azure resources are for academic use only—commercial projects are restricted. 🚀 Available Software Subscription for All IIUM Staff Adobe Creative Cloud How to register your IIUM Adobe Creative Cloud Software How to register your IIUM Adobe Creative Cloud Software 1 step. Request by sending email servicedesk@iium.edu.my or use I-First apps to request IIUM Adobe Creative Cloud Software. Step 2. You will receive e-mail from ITD ServiceDesk (shown below) and filled out Google Form Below: Assalamualaikum, Thank you for your interest in the Adobe Creative Cloud software subscription. Due to the large number of requests received for the account creation requests, please register through the following link for our further action: https://goo.gl/forms/NaHAevmsTKRJomgQ2 If you have already registered and received login credentials from us, kindly ignore this email. If you have forgotten your login credentials, kindly visit this link to learn how to retrieve your password. All registration will be processed in bulk every Friday.Microsoft Office 365 Windows 10 Microsoft Azure Portal Antivirus Premium License for IIUM Staff Microsoft Teams Microsoft Teams Introduction Quick Guide Download the PDF Microsoft Teams Admin Centre Training Microsoft Teams Admin Centre Training01/09/202110.00am to 11.30amDOWNLOAD THE RECORDING HERE!Workshop on Microsoft Teams for Academicians السلام عليكم ورحمة الله وبركاته Dear All Academic Staff, This is to inform you that the Ministry of Higher Education (MOHE) has subscribed Microsoft TEAMS for all public universities. TEAMS is a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage (including collaboration on files), and application integration. In relation to that, ITD has arranged a workshop exclusively for academicians. The workshop comprises of 2 modules:  Introduction to Microsoft TEAMS  Microsoft on Assignment/Class Notebook DOWNLOAD THE RECORDING HERE! It is hoped that all academicians can utilize this workshop to utilize Microsoft TEAMS as an online teaching and learning tool. Note: Kindly activate your LIVE IIUM email account before using TEAMS. Click here to read the infographic. Any inquiries, please WhatsApp ICT Services Help Desk WhatsApp Hotline at 016-9832415 or email servicedesk@iium.edu.my. Thank you. Information Technology Division How to record a meeting in Microsoft Teams Start recording In a Teams meeting, one person can record at a time. When you start recording a meeting, everyone will be notified automatically. You can also turn on live transcriptions and view them during the meeting. To start a meeting recording: Start or join the meeting. In your meeting controls, select More actions > Record and transcribe > Start recording . Notes: Meeting recordings won't capture: More than four peoples' video streams at once Whiteboards and annotations Shared notes Content shared by apps Videos or animations embedded in PowerPoint Live presentations Stop recording In the meeting controls, select More actions > Record and transcribe . Choose one of the following: Stop recording to stop the recording and live transcription. Stop transcription to stop the live transcription only. The recording will continue until you select Stop recording. Important: Teams meeting recordings are no longer saved to Microsoft Stream. All recordings are now saved to OneDrive for Business. If your organization still uses Stream, please note: After a recording stops, it's processed and saved to Stream. Then, it's ready to play. When a recording is available, the meeting organizer will receive an email. The recording will appear in the meeting chat or channel. If an admin has set a company policy for saving to Stream, accept it before recording. Find recordings Recordings are available in different places depending on the type of meeting. The recording is processed and saved in the meeting organizer's OneDrive for Business. The meeting recording shows up in the meeting chat or channel conversation (if you’re meeting in a channel). Note: For now, guests and external attendees can view the recording only if it's explicitly shared with them. Who can start or stop a recording? Anyone who meets the following criteria can start or stop a recording if the meeting organizer has their cloud recording policy setting turned on Attendance List You have to use Teams Client Desktop. During the meeting, click show "Participants" and click the "Download attendance List" option. If you click that, the file will be downloaded. The attendance will be show as above. Below is an excerpt from Microsoft Support page regarding Attendance List, please note that the attendance can only be downloaded while the Teams meeting is in session: How to Download an Attendance List from Microsoft Teams (IIUM Classes) For Lecturers (Meeting Organizers) If you host a Teams meeting (e.g., for lectures), follow these steps to download attendance: Method 1: During/After the Meeting During the Meeting: Click the "Participants" button (top-right). Select "Download attendance list" (available in some versions). After the Meeting: Go to the Teams Calendar → Open the meeting event. Click "Attendance" tab (if enabled). Select "Export to CSV" to download the list. Method 2: From Teams Meeting Reports Open Microsoft Teams → Go to "Meetings". Select "Past Meetings" → Choose your session. Click "Attendance" → "Download" (CSV/Excel). For Students (View Only – No Download Option) Students cannot download attendance lists but can: Check their attendance in i-Ta'leem (if the lecturer syncs it). Request a copy from the lecturer or Kulliyyah office. Troubleshooting ❌ No "Attendance" tab? Ensure the meeting was scheduled in Teams (not ad-hoc). Only meeting organizers can download attendance. ❌ File not downloading? Try Teams web version (teams.microsoft.com). Contact IIUM IT Help Desk (03-6421 6666). Need Help? ICT Help Desk: 03-6421 6666 Email: servicedesk@iium.edu.my Note: Attendance tracking must be enabled by the meeting organizer. 📊Zoom Education for IIUM Zoom Limit: Maximum Participants & Call Meeting Duration Zoom Participants limit When using a IIUM plan on Zoom, you can conduct meetings with up to 300 participants per meeting. Zoom Call Duration limit You can conduct meetings for as long as 30 hours. However, after 30 hours, Zoom will stop automatically. Zoom Meeting Host Training Recording Assalamualaikum wa Rahmatullahi wa Barakatuh Dear IIUM Community, Information Technology Division (ITD) cordially invites all IIUM staff to attend the Zoom Meeting Host Training with details as follows:Title: Zoom Meeting Host Training DOWNLOAD THE RECORDING HERE! Date : 06/09/2021Time : 10.00am – 12.00pm Contents: Part 1:Schedule your meeting Part 2:Customize your meeting option Part 3:Invite your attended Part 4:Other meeting scheduling options Part 5:Customize in-meeting features & functionality Part 6:Live streaming your meeting Part 7:Support Resource and Q&A Addition: Webinar Q&A Thank you, wassalam. INFORMATION TECHNOLOGY DIVISIONHow to Fix Zoom Microphone Issues Check Your Microphone is Connected If you’re using an external microphone (rather than a built-in microphone on your laptop or PC), then it may not be properly connected. For wired microphones, make sure that it is securely plugged into your computer. If it is, try using a different port to see if this makes any difference. For wireless microphones, ensure that your microphone has sufficient charge. You can try setting up and testing a microphone on Windows or fixing audio problems on Mac to see if this helps to fix Zoom microphone troubles. If you’re using a Bluetooth microphone, make sure that the Bluetooth radio is enabled on your PC or Mac. Join a Zoom Call with Audio When you first start the Zoom app, a pop-up will invite you to join with audio. If you dismiss this message, you won’t be able to use your microphone during your Zoom call until you join it with audio. To join a Zoom call with audio: Move your mouse anywhere on the Zoom screen. In the menu at the bottom of the screen, click Join Audio. If you want to automatically join with audio every time you use Zoom, check Automatically Join Audio by Computer When Joining a Meeting. Click Join with Computer Audio. Turn Off Mute in a Zoom Call One of the most common issues with Zoom calls is a muted microphone. There’s a Zoom setting that automatically starts each call with the microphone muted. This helps you to avoid accidentally saying something you shouldn’t when Zoom is starting up and you aren’t aware that others can hear you. Once you’re ready to speak, you can unmute your microphone. To unmute your microphone in Zoom: Move your mouse anywhere within the Zoom screen. In the bottom menu, click Unmute. Other participants should now be able to hear your voice. Check That You’ve Not Been Muted by the Host If you’re the host of a Zoom meeting, you have additional powers beyond those of the other participants. This includes the ability to mute anyone on the call, which allows you to turn off any unwanted background noise or distractions. If you can’t be heard on Zoom, it may be that the host of the meeting has muted you. You can send them an instant message in Zoom to ask if that is the case. To send an instant message in Zoom: Move your mouse anywhere on the Zoom screen. Click Chat in the bottom menu. You can send the message to everyone or click the drop-down to select the meeting host. Type your message at the bottom of the chat window and press Enter to send it. Select the Correct Microphone in Zoom If you have multiple audio devices set up with your computer, Zoom may be using the wrong microphone. You can quickly select which microphone you want Zoom to use from within the Zoom menu. To select your microphone in Zoom: Move your mouse within the Zoom window to bring up the menu. Click the arrow next to the Mute icon. Choose your microphone under Select a Microphone. Check Your Zoom Audio Settings Zoom has some advanced audio settings that may be causing problems with your Zoom microphone. You can tweak these settings in the app to see if it will fix Zoom microphone problems. To change the Zoom audio settings: Launch the Zoom app. Click the Settings icon in the top-right corner of the window. Select Audio from the left-hand menu. Choose the microphone you want to use by default. You can click Test Mic to ensure this is working as expected. At the bottom of the screen, you can change some key settings. These include automatically joining with audio, starting each meeting on mute, and only being heard when you are holding down the Spacebar. Click Advanced. By default, these advanced settings are set to Auto. If they’re on a different setting, try setting them to Auto to see if this fixes your Zoom microphone issues. If not, try tweaking these settings to see if it makes any difference. Close Apps That Are Using Your Microphone If another app is making use of your microphone, this could stop Zoom from being able to use it. The first thing to do is to try closing any apps that may be using your audio devices. Apps such as Apple Music, Skype, or Microsoft Teams may all make use of your microphone. Closing these apps completely might fix your Zoom microphone issues. If this doesn’t work, try using the Mac Activity Monitor or Windows Task Manager to close any processes that could be using your audio devices. Ensure Zoom Has Permission to Use Your Microphone Apps need permission to use hardware devices such as webcams and microphones. If Zoom hasn’t been granted the correct permissions, it may not be allowed to access your microphone. You can change these permission settings with just a few clicks. To allow Zoom to access your microphone on Windows: Click the Start icon. In the Pinned apps, click Settings. From the left-hand menu, select Privacy & Security. Scroll down and click Microphone under App Permissions. Ensure that both Microphone Access and Let Apps Access Your Microphone are set to the On position. Scroll down and ensure that Zoom is also set to On. To allow Zoom to access your microphone on Mac: Launch System Preferences. Select Security & Privacy. Click the Privacy tab. Select Microphone from the left-hand menu and ensure that Zoom is checked. Update Your Device Drivers If you’re having issues with your microphone in Windows, you may need to check that your device drivers are up-to-date. Updating these drivers can often fix audio issues on Windows PCs. To update audio drivers in Windows: Open the Start menu. In the search bar, type Device Manager and select the Device Manager app. In Device Manager, open the Audio Inputs and Outputs category. Right-click your webcam and select Update Driver. Select Search Automatically for Drivers. If there is an update available, follow the instructions to install it. You may need to restart your computer for the changes to take effect. Restart Your Computer It may be a cliché, but for a good reason: if you’re having trouble with your computer, try turning it off and on again. Restarting your computer may help to clear any problems that are stopping your microphone from working with Zoom. It may also shut down any processes that are hogging your audio devices and not playing nicely with Zoom. Reinstall Zoom If none of the fixes above work, you may want to consider uninstalling Zoom and reinstalling it. This may fix any problems with your current installation. To uninstall Zoom on Windows: Open the Start menu. Select Settings. From the left-hand menu, select Apps. Click Apps & Features. Scroll down to Zoom and click the three dots icon. Select Uninstall. Once the process is complete, install the Zoom app again. To uninstall the Zoom app on Mac: Launch Zoom. Click Zoom.us in the menu bar. Click Uninstall Zoom. Confirm you want to uninstall the app. Zoom will uninstall. Once completed, reinstall the Zoom app. How to Record a Zoom Meeting (IIUM Students & Staff Guide) You can record Zoom meetings for later reference, but permission depends on host settings. Follow these steps: 📹 Method 1: Host Records the Meeting (Recommended) (Only meeting hosts or co-hosts can record to Zoom Cloud.) Step 1: Start Recording As the host, click "Record" at the bottom toolbar. Choose: "Record to the Cloud" (saves to Zoom Cloud, auto-generates transcript). "Record on this Computer" (saves locally as .MP4 or .M4A). Step 2: Stop & Access Recording Click "Stop Recording" when done. Cloud recordings: Processed in ~30 mins → Sent to host’s email + Zoom Cloud. Local recordings: Saved in: Windows: C:\Users\[Username]\Documents\Zoom Mac: /Users/[Username]/Documents/Zoom 📂 Method 2: Participants Record (If Allowed by Host) If the host enables "Allow participants to record": Click "Record" → Choose local recording. Note: Participants cannot save to Zoom Cloud. Hosts receive a notification when someone records. ⚠️ Important Notes ✅ Permission Required: Hosts must enable recording in Meeting Settings (zoom.us/settings). At IIUM, Cloud Recording is preferred for storage and security. ❌ Restrictions: Always inform participants before recording (privacy laws apply). Do not record confidential/sensitive discussions without consent. 🔧 Troubleshooting ❌ No "Record" button? Ask the host to grant recording access. Check if you’re on a mobile device (some features are limited). ❌ Missing recording after meeting? Cloud recordings take time to process (check email). Local recordings may fail if storage is full. 📞 Need Help? ICT Help Desk: 03-6421 6666 Email: servicedesk@iium.edu.my Always follow IIUM’s IT policies when recording meetings! 🎥🔐Wi-Fi Services How to Create an IIUM Wi-Fi Guest Account IIUM provides temporary Wi-Fi access for visitors/guests through the IIUM-Guest network. Here’s how to get access: Option 1: Self-Registration (For Short-Term Guests) Connect to "IIUM-Guest" Wi-Fi (no password required). Open a browser → You will be redirected to the IIUM Guest Portal. Register as a Guest: Fill in: Name Mobile Number (for OTP verification) Email Purpose of Visit (e.g., meeting, event) Agree to the terms & conditions. Verify via OTP (sent to your phone). Login with the provided credentials. ✅ Access granted for 24 hours (renewable if needed). Option 2: Sponsored Guest Account (For Long-Term Visitors) If you’re a guest speaker, vendor, or visiting researcher, an IIUM staff member must sponsor your account: The staff submits a request via: i-FIRST (Ticket category: Wi-Fi Access Request) Email ICT Help Desk (servicedesk@iium.edu.my) with: Guest’s full name, contact, and duration of stay. Reason for access (e.g., conference, collaboration). Once approved, the guest receives login details via email/SMS. Important Notes Guest accounts expire after the approved duration. Speed may be limited compared to student/staff Wi-Fi. Commercial use is prohibited (only for official visits). Troubleshooting ❌ Not redirected to the login page? Manually open: http://captive.apple.com (iOS) or any HTTP website. ❌ OTP not received? Check spam folder or request a resend. ❌ Account expired? Re-register or ask your IIUM sponsor to extend access. Need Help? ICT Help Desk: ☎️ 03-6421 6666 | 📧 servicedesk@iium.edu.my Walk-in: Level 1, ITD Building, Gombak Campus Note: Misuse of guest accounts may result in access termination. 🔐 Trouble-shooting Issues Related to WI-FI This is a general guideline to troubleshoot on why you cannot access wifi/internet at IIUM campus. Please follow each instruction step by step based on your own issue. ISSUE 1 If you can access iMaluum but cannot access wifi with your hp and laptop, please reset your iMaluum password. If it doesn't work, please try to reset it at least twice. To reset your password, follow below steps: First, set your hp number here (you just need to register once). https://apex.iium.edu.my/cpwd/self_reg_stu_mobile.php then reset your password here: https://apex.iium.edu.my/cpwd/self_reset_stu_pwd.php Note: If you did not receive any TAC, kindly request using the SMS service: send the following message IIUM TACREQ yourmatricnumber to 15888 . Example : IIUM TACREQ 202073 ISSUE 2 If you can access iMaluum and can access wifi through your hp, but cannot access wifi through laptop or vice versa, please follow below steps : Windows Notebook/Laptop 1.Try clearing your web browser history by clearing the cache and ALL the history.  2. Install other browsers such as Internet Explorer(IE) or Mozilla Firefox and use it to login instead of Google Chrome/ Microsoft Edge. 3. Removing the network adapter then installing it back(but remember do not uninstall the driver when asked to) : https://kb.wisc.edu/page.php?id=58029 4. If that does not work, then try installing malware cleaner, then run a full scan. : https://www.malwarebytes.com/adwcleaner/ 5. If all fails, please bring your device to ITD ICT Services Help Desk at your respective campus during office hours. Android Try clearing your web browser history by clearing the cache and ALL the history. Install other browsers such as UC Browser or Mozilla Firefox and use it to login instead of Google Chrome or default android browser. If all fails, please bring your device to ITD ICT Services Help Desk at your respective campus during office hours. ISSUE 3 You can access wifi through your hp and laptop but any third device failed to register or you get a message like "Your session limit has been hit." Answer: Students are allowed to connect two devices concurrently. Any third device you try to register will fail. If you want to register/change devices, logout from either the 1st device or the 2nd device then try again. Sometimes it may take a few minutes to a few hours (Usually four hours). ISSUE 4 You tried to change password but got an error message stating that only active students can change password. Answer: Please visit AMAD or ODDAIL to check and update your status. For other issues, you can contact ITD according to your campus location: IIUM Gombak Information Technology Division (ITD) International Islamic University Malaysia53100 Kuala Lumpur,Malaysia Tel : 603-6421 6666Fax : 603-6421 4888Email  : servicedesk@iium.edu.my Website: http://www.iium.edu.my/division/itd IIUM Kuantan Information Technology Department (ITD Kuantan)International Islamic University MalaysiaJ Jalan Sultan Ahmad Shah Bandar Indera Mahkota25200 Kuantan, Pahang Darul MakmurMalaysia.Tel : 609-570 4666Fax : 609-571 6774Email: helpdeskktn@iium.edu.myWebsite: http://www.iium.edu.my/office/ocd CFS Information Technology Department (CFS)International Islamic University Malaysia Gambang CampusAdministration BuildingJalan Gambang-Maran, 26300 Gambang,Pahang Darul Makmur, MalaysiaCFS Gambang general line : 09-5183400 ext(3435) during office hours  or email servicedeskcfs@iium.edu.my   Thank you. -- ICT Services Help Desk Information Technology Division International Islamic University Malaysia Jalan Gombak 53100 Kuala Lumpur How to forget SSID due to wireless maintenance How to forget SSID due to wireless maintenance Use the instructions below to forget an SSID (Wireless Network) on your device as part of troubleshooting or as needed. iPhone Go to settings > Wi-Fi Touch the blue “i” next to the Wi-Fi symbol of the SSID that you want to forget. When the next page comes up, touch “Forget This Network”. When the prompt comes up, touch “Forget”. Apple OS X Open "System Preferences" and open "Network". Select the Wi-Fi adapter - Not any other networking adapters, just the Wi-Fi. Click the "Advanced..." button. Make sure you disconnect from the SSID using the Wi-Fi icon at the top of your computer. In the "Preferred Networks" pane, look for the SSID. Select the SSID and click the "minus" button to delete it. Click “OK”, and at the next window, click “Apply”. Android device Touch “Settings” followed by “Connections”. Touch Wi-Fi. Touch the SSID under “CURRENT NETWORK”. Touch “FORGET”. Windows Machine Click on the Start menu, type “Settings”, and Press enter. Click on “Network & Internet”. On the left-hand side, click on “Wi-Fi”. Click on “Show available networks”. In the window that pops up in the lower right-hand corner, right-click on the SSID that you want to forget. Click on “Forget”. Remember that when your password expires, is changed, or you forget the SSID, you will have to enter your credentials again to login. When asked to trust certificate please make sure the domain is: iiumwifilogin2.iium.edu.my ⁠iiumwifilogin3.iium.edu.my For any inquiries, please contact the ITD Service Desk at extension 6666.Fix Wi-Fi connection issues Fix Wi-Fi connection issues. Log in and submit report to https://i-first.iium.edu.my/portal How do I connect to IIUM Wi-Fi? Q: How do I connect to IIUM Wi-Fi?A: Select SSID "IIUM-Student". Log in with your matric number and i-Ma’luum password. Q: What should I do if I experience Wi-Fi issues in my Mahallah?A: Report via i-FIRST: https://i-first.iium.edu.my.Are personal routers allowed in IIUM? Q: Are personal routers allowed in IIUM?A: No. Unauthorized devices (routers, switches, hubs) are prohibited and may result in disciplinary action.How do I connect to IIUM-Staff Wi-Fi? Q: How do I connect to IIUM-Staff Wi-Fi?A: Select SSID "IIUM-Staff". Use your IIUM email username (without @iium.edu.my) and email password. For first-time registration, connect to "IIUM-Staff_Registration" and follow browser prompts. How to Connect to IIUM-Student Wi-Fi To access IIUM-Student Wi-Fi, follow these steps on your device (laptop, smartphone, or tablet): Step 1: Select the Correct Wi-Fi Network Go to your device’s Wi-Fi settings. Look for the network: SSID (Network Name): IIUM-Student Security Type: Open (no password initially). Step 2: Log In with Your IIUM Credentials After connecting, open a web browser (Chrome, Safari, Edge, etc.). You will be automatically redirected to the IIUM Wi-Fi login page. If not, manually visit: http://captive.apple.com (for iOS) or any non-HTTPS site (e.g., http://example.com). Enter your login details: Username: Your matric number (e.g., G1234567). Password: Same as your i-Ma’luum password. Click "Login" or "Connect". ✅ You should now be connected! Step 3: Troubleshooting (If Connection Fails) ❌ No login page appears? Disable mobile data/VPN. Clear browser cache or try a different browser. ❌ "Authentication failed"? Reset your i-Ma’luum password at:🔗 https://passwordreset.iium.edu.my Contact ICT Help Desk if locked out. ❌ Limited/No Internet? Forget the network → Reconnect. Restart your device. Important Notes 📌 Valid only for IIUM students (staff must use IIUM-Staff).📌 Do not share your credentials – misuse may lead to account suspension.📌 Report dead zones via i-FIRST. Need Help? ICT Help Desk (Gombak): ☎️ 03-6421 6666 Email: servicedesk@iium.edu.my Walk-in: Level 1, ITD Building Enjoy seamless internet access across IIUM campuses! 🚀 What should I do if my device can’t find the Wi-Fi network? A:If your device can’t detect the Wi-Fi network, try the following steps: ✅ Ensure the Wi-Fi feature is turned on in your device settings. 📡 Check if the router is powered on and actively broadcasting the network. 📶 Make sure you are within range of the Wi-Fi signal. 🔄 Restart both your router and your device to refresh the connection. If the problem persists, please contact the ITD Service Desk for further assistance. 📧 servicedesk@iium.edu.my | ☎️ 03-6421 6666 | 📱 WhatsApp 016-9832415What is MYREN and its role in IIUM? Q: What is MYREN?A: MYREN stands for Malaysian Research and Education Network. It is a high-speed, dedicated network developed to support the research and education sectors in Malaysia. Q: Who manages MYREN?A: MYREN is managed by the Ministry of Higher Education (MOHE) in collaboration with the Malaysia Digital Economy Corporation (MDEC). Q: What is the purpose of MYREN in IIUM?A: MYREN provides high-speed internet connectivity to support research, teaching, learning, and collaboration within IIUM and with external institutions globally. Q: What institutions are connected through MYREN?A: It connects all public and private universities, polytechnics, community colleges, research institutions, and teaching hospitals across Malaysia. Q: How is MYREN connected internationally?A: MYREN is connected to other global research networks via TEIN4 (Trans-Eurasia Information Network), enabling international academic and research collaboration. Q: What is MYREN-X?A: MYREN-X is an enhancement initiative under MYREN that aims to provide advanced research computing services and support the development of cyberinfrastructure in education and research. Q: How is MYREN delivered across Malaysia?A: MYREN operates through 7 regional Points of Presence (PoPs) to ensure broad and reliable network coverage.GOOGLE (G Suite/Gmail) Google Meet limit: Maximum participants & call meeting duration Google Meet Participants Limit You can interact with up to 1000 participants during a meeting. Google Meet Time Limit You can conduct meetings for as long as 24 hours at a stretch.How to record a video meeting - Google Meet On your computer, in Google Meet, click Start or Join. At the bottom right, click Activities Recording. To record the meeting captions, select a language. In some cases, if the recording is played on Google Drive, the recording file might be ready a few hours before the captions are available. Click Start recording. In the pop-up screen, click Start. Wait for the recording to start. Participants get a notification when the recording starts or stops. Meetings can only be recorded for a total of 8 hours, then the recording stops automatically. To stop a recording, click Activities Recording Stop recording. In the pop-up screen, click Stop recording. Tip: The recording stops automatically when everyone leaves the meeting. An email with the recording link is sent to the meeting organizer and the person who started the recording. The recording is saved to the meeting organizer’s My Drive > Meet Recordings folder. For meetings created through: Google Calendar: The meeting organizer is the person who creates the meeting event on Google Calendar. The Google Meet homepage or another product such as Gmail or Jamboard: The meeting organizer is the person who launches the meeting or generates the code. Gmail Security: Turn on 2-Step Verification Two-step verification, also known as 2FA or two-factor authentication, is a security process in which a user provides two different authentication factors to verify their identity. The first factor is typically a password or PIN, while the second factor is usually something the user has, such as a mobile device or security key . 2FA adds an extra layer of security to your account and helps protect it from unauthorized access. If someone tries to log in to your account from an unknown device, they will need to provide the second factor in addition to your password. This makes it much more difficult for hackers to gain access to your account . Guidelines: Reset Email/Password Email for Staff Gmail asks user for phone number when signing in # When a G Suite user attempts to sign in to a new device, they may be greeted with: Verify it's youThis device isn't recognized. For your security, Google wants to make sure it's really you.Enter a phone number to get a text message with a verification code. This seems less like additional security and more like phone number harvesting, especially since the user has no preregistered number. Clicking "Try another way" leads to: Get a verification code sent to your phone.Get help Clicking "Get help" results in: Account recoveryEnter the last password you remember using with this Google Account Manage Google Drive Guidelines Google will no longer provide free unlimited storage starting from July 2022. We have also announced that each staff is provided with a maximum total storage quota of 15 GB (for all Google services under the IIUM domain). HOW TO CLEAR GOOGLE DRIVE STORAGE AFTER MIGRATION HOW TO CLEAR STORAGE THROUGH GMAIL ACCOUNT HOW TO CLEAR STORAGE GOOGLE PHOTO HOW TO MIGRATE AND SYNC FILES FROM GOOGLE DRIVE TO ONEDRIVE (OR ANY CLOUD STORAGE) HOW TO MANAGE GOOGLE DRIVE STORAGE HOW TO CHECK GOOGLE STORAGE QUOTA 21 Google Search Tips You'll Want to Learn Most of us use Google every day, but many have likely only scratched the surface of the search engine's power. Here's how to get better results from a Google search. 1. Refine Your Searches With Operators Google's search algorithm is remarkably adept at returning the information you are looking for—even when you aren't exactly sure yourself. But for those times when Google doesn't seem to be giving you exactly what you need, there are a few ways you can refine your search results with what are called operators. Use quotations (" ") to search for the exact phrase: If you search for Patrick Stewart young, you will get results that have all those words, but not necessarily in the order you search. By adding quotations and searching "Patrick Stewart young," you will get only results that include all those words in that order. Add a tilde (~) in front of a word to find synonyms: For when you want to search for a specific word and any synonyms for that word. If you search for iPhone ~cheap, you will also get results for "iPhone inexpensive," and so forth. Exclude terms with a minus (-) symbol: Use the minus symbol to exclude all the terms you don't want, e.g. best apps -android for results that omit roundups of top Android apps. Insert two periods (..) between numbers to search for a range: If you want to narrow results to a date or price range, use two periods in between the numbers. You could be looking for a computer within a certain price range, so you could search computer $500..$900 to only get results that fit into that range. Find one result or the other with OR: If you're looking for results that are about one topic or another, but nothing else, use the OR modifier to get more accurate results. For example, searching apple microsoft will surface results relating to either term, but searching "apple OR microsoft" provides you with separate links about Apple and Microsoft. Add site: to search a single website: If you want results from one specific website, use site: followed directly by the site URL you wish to use. You must include the site's domain, e.g. Google Photos tips site:pcmag.com, and not Google Photos tips site:pcmag. Search File Types: If you're looking for a specific kind of file on the internet, use filetype: to search only for uploaded files that match your query. For example, use filetype:pdf to find a PDF or filetype:doc to locate a Microsoft Office document. You can find a comprehensive list of searchable file types here(Opens in a new window). Search Related Websites: Search for similar websites by using the related: qualifier to show related results. Searching related:amazon.com brings up results including Walmart and Overstock. Searching related:google.com shows Yahoo and Bing. For a comprehensive set of search modifiers, check out this guide(Opens in a new window). 2. Perform an Advanced Search Don't want to learn all these modifiers? You can use them in an advanced Google search. From the Google results page, click the gear icon and choose Advanced search to open a new advanced search page. This feature allows you to enter keywords or phrases in specific fields instead of relying on specific modifiers. Results can be narrowed even further by language, region, last update, domain, term location, explicit content, file type, and usage right. Image searches can also be narrowed by image size, aspect ratio, color, and image type. While you can't create an advanced search on mobile, you can filter your image search. Tap the slider icon at the top of your image search to filter by most recent, GIF, HD images, images of products, color, and usage rights. 3. Set Time Restraints Looking for only the latest news about a subject or trying to find information relevant to a specific time frame? Use Google's search tools on desktop and mobile to filter your search results. When on desktop, click Tools under the magnifying glass icon. On mobile, swipe to the end of the list of Google search types and select Search tools. Select Any time to open a drop-down menu that can help you narrow results to the past hour, 24 hours, week, month, and year. Desktop users can select Custom range to enter specific dates. 4. Perform a Reverse Image Search Google supports "backward" image searches on most browsers. This function allows you to upload an image file and find information on that image. For example, if you uploaded a picture of the Eiffel Tower, Google will recognize it and give you information on the Paris monument. It also works with faces, and can direct you to websites where the image appears, identify a work of art, or show you images that are "visually similar." Go to Google Images and just drag and drop an image into the search bar. You can also click the camera icon to upload an image or enter an image's URL. (Here's how to do a reverse image search on your phone.) 5. Google Search Dark Mode Google now has its own dark mode option that can turn your search results black. From a search results page on the desktop, click the the Settings gear on the top right and select Dark Theme under Appearance. (On Google.com, you can also click Settings on the bottom right and select Search Settings > Appearance > Dark theme.) You can also select Device default so it matches your other theme settings. On mobile, select the hamburger menu in the top-left corner of Google's search results and choose Dark theme to toggle it on and off. 6. Do Math in Your Search Box Whether you want to figure out a tip on a meal or create a complex geographical rendering, Google search has you covered with the ability to do basic calculations directly in the search bar. For example, searching 34+7, 3 times 7, or 20% of $67.42 will prompt a calculator below the bar with the correct answer already filled in. Or just search "calculator" to input your own equations. Super math nerds can create interactive 3D virtual objects (on desktop browsers that support WebGL) by plugging in an equation that uses "x" and "y" as free variables. Or plug in different numbers along with some cos(x)s, sin(y)s, and tan(x)s and see what renders. 7. Convert Units With Google Google will also help you convert just about anything. You can search 38 Celsius in Fahrenheit, 10 ounces in pounds, and even 17.5 millimeters in light years. Google will serve up the answer and provide an interactive conversion calculator for further converting. Additionally, you can find up-to-date currency conversion rates without needing to know the official currency symbol ($, €, etc.) or ISO designator (i.e. USD for the US dollar or GBP for the British pound). Google's algorithm is able to discern sentence-style queries to provide an answer, interactive chart, and a calculator for further conversions. For example, a search for 38 dollars in Iceland returns the answer that (as of Jan. 24) $38 is equal to 4,890.60 Icelandic Króna. A search for 1 bitcoin in dollars reveals that it's worth almost $35K. The convertor table will also include other crypto coins, like Ethereum and Dogecoin. 8. Define Words in Google Search Ask Google search to define unfamiliar words (or two-word phrases) by typing the word followed by define/definition. This will prompt Google to return a card with the definition, pronunciation, and—when available—a detailed etymology. Sometimes Google will define the word inside the autocomplete box before you press Search. 9. Track Packages in Google Search Wondering where that delivery has gone? You can track (most) packages in your search bar. Just paste the tracking number into search and Google will recognize it and display the package's current status. A link will take you to the carrier's official tracking page for more details. 10. What's the Time in Tokyo? Calculating time difference is hard, so why not let Google do the work for you? Type time [any location], which could be the name of a country, city or (if it's in the US) a ZIP code, to return a card with the up-to-date local time of your search. It beats having to manually figure out how many hours ahead or behind you are. 11. Search for Sunrise and Sunset Want to know when the sun will rise or set in your neck of the woods? Search sunrise or sunset and Google will give you the answer based on your device's current location. You can also search for the sunrise/sunset times for other locations, as well. RECOMMENDED BY OUR EDITORS 25 Google Maps Tricks You Need to Try Study Smarter: 10 Essential Google Classroom Tips 22 Things You Didn't Know Your Google Chromecast Could Do 12. Search for the Weather Find out the weather in your area by typing weather. Autocomplete will likely give you today's current forecast as you type, but a full search will present an interactive card with weather information for the location of your IP address, courtesy of The Weather Channel. If you're traveling or just want to know what it's like elsewhere, search weather [any location], e.g. weather Toledo, OH or weather Kabul Afghanistan. 13. Real-Time Stock Quotes Type in any publicly traded company's ticker symbol and Google will present real-time price information on that company, e.g. GOOG (for Alphabet), AAPL (for Apple), or AMZN (for Amazon). Most of the larger exchanges are in real time, though Google offers a comprehensive disclaimer(Opens in a new window) for which exchanges are on a delay. 14. Check Flight Times If you're headed to the airport or picking up a loved one, type in a flight number and Google will return a card with up-to-date times and terminal/gate information. If you're looking to book a flight, check out Google Flights(Opens in a new window) to find the cheapest flights online. 15. Find Where It's Streaming It's almost impossible to keep track of what movies are streaming on which services, but Google does the valiant job of keeping track for you. Just search for the movie or show you wish to watch and a card will list all the video-streaming services that currently have it. Select the service and it will link you to the video on the web or in the app. To help you keep track of all the stuff you want to watch, choose Watchlist to save it for later. Then search my watchlist to see all the movies and shows you have yet to watch. 16. Play Games in Google Search Google has a host of built-in games and tools you can access by Googling them, including Pac-Man(Opens in a new window), tic tac toe, Solitaire, Minesweeper, and Snake. Search flip a coin and Google will do it for you; same thing with a die or spinner. There is also a built-in, metronome, breathing exercise, bubble level (on mobile) and a color picker. 17. Start a Timer Search timer to get a five-minute timer (or stopwatch to time something). To change the amount of time, click and enter your desired time. Press Start. The countdown will continue even if you navigate to a new tab; you'll get a warning if you try to close the tab with the timer by accident. The remaining time will show on your browser tab; once it's up, an alarm will sound and the tab will display an hour-glass icon until you click OK to silence it. 18. Spell Those Numbers How do you spell out 6,546,345,645? Google can tell you if you search [number]=english. A card will show you that it's six billion five hundred forty-six million three hundred forty-five thousands six hundred forty-five. 19. Create a Google Alert If you want to be notified whenever a keyword is published on the web, create a Google Alert(Opens in a new window). Add topics to track, then customize the alert by determining how often you should be notified, what sources, language, and region should be included, how many results will be shown, and to what email address it should be delivered. A preview will show you what the alert will look like with existing stories already indexed by the Google. From the main Alerts screen, you can manage all your results by having them sent at a certain time or all in one email. 20. Filter Explicit Content Have a kid using the computer? Protect them from explicit content with Google's SafeSearch feature(Opens in a new window). From a search results page, click the gear icon on the top right and toggle the Explicit results filter option to on. Though Google admits it's not 100% accurate, it's intended to filter out explicit links, images, or video that may be deemed inappropriate for an all-ages audience. For a more robust solution, check out our picks for the Best Parental Control Software. 21. I'm Feeling Something Else Remember Google's "I'm Feeling Lucky" button? On Google.com, type in a search term and click I'm Feeling Lucky to be immediately taken to the first search result. It's a good way to save time when you know exactly what you're looking for. However, Google added a new wrinkle that can help you find something else. Before you type anything into Google, hover over the I'm Feeling Lucky button and the wording will change. It may change to "I'm Feeling Adventurous," which will provide you with a coin to flip. "I'm Feeling Hungry" will Google nearby restaurants. "I'm Feeling Trendy" will show you recent Google trends. Every day there are new suggestions with different results. Bonus: Google Search Easter Eggs Engineers like to have fun, too, and on Google, there are a number of search-related Easter eggs. Here are a few words or phrases to search if you want a little surprise: Wordle: Capitalizing on the current Wordle phenomenon, Google wordle for a logo inspired by the web game on the top left. Anagram: Google will ask if you meant "Nag A Ram." Define anagram: Google will ask if you meant "nerd fame again." the answer to life the universe and everything: The answer is 42. Askew: Your screen will tilt. Bletchley Park: Google will decode the name under the Google Maps card. Blink HTML: The words "HTML" and "blink" will blink on the search page. Do a barrel roll or z or r twice: The screen will do a 360. Festivus: A Festivus pole is added to the left side of the screen. Google in 1998: Google will look like it did from back in the day. Google logo history: Take a tour through the different iterations of the Google logo. Marquee HTML: The number of search results will be displayed as a marquee sign. Recursion: Google will ask if you meant "recursion." Sonic the Hedgehog game: An animated sprite of Sonic will appear in the search card. Click him for a surprise. Super Mario. Bros. 1985: An animated sprite of a coin block will appear in the search card. Click it to grab a coin. Webdriver torso: The Google logo will turn into colored blocks. Migrate Your Google Account Google will no longer provide free unlimited storage starting from July 2022. We have also announced that each staff is provided. [PDF] HOW TO CLEAR GOOGLE DRIVE STORAGE AFTER MIGRATION [PDF] HOW TO CLEAR STORAGE THROUGH GMAIL ACCOUNT [PDF] HOW TO CLEAR STORAGE GOOGLE PHOTO [PDF] HOW TO MIGRATE AND SYNC FILES FROM GOOGLE DRIVE TO ONEDRIVE (OR ANY CLOUD STORAGE) [PDF] HOW TO MANAGE GOOGLE DRIVE STORAGE [PDF] HOW TO CHECK GOOGLE STORAGE QUOTA [PDF] HOW TO MOVE OR COPY MAIL FROM ONE GMAIL ACCOUNT TO ANOTHER [PDF] HOW TO IMPORT FROM GMAIL TO OUTLOOK [PDF] HOW TO  IMPORT YOUR GMAIL INTO OUTLOOK [PAGE] HOW TO TRANSFER GOOGLE PHOTOS TO ONEDRIVE [VIDEO] CLOUD MIGRATION - GOOGLE DRIVE TO ONEDRIVE [VIDEO] HOW TO IMPORT FROM GMAIL TO OUTLOOK [VIDEO] MOZILLA THUNDERBIRD SETUP FOR LIVE ACCOUNT Manage Gmail Guidelines HOW TO MOVE OR COPY MAIL FROM ONE GMAIL ACCOUNT TO ANOTHER Import Google Calendar into Outlook How to Import Google Calendar into Outlook Check Google Storage How To Fix Gmail Not Showing All Emails How To Fix Gmail Not Showing All Emails There are few reasons why your Gmail not showing all emails: Hidden by Label Settings Email is filtered Email was archived, deleted, or marked as spam Emails are being forwarded to another account Hidden by Labels Settings 1.Open your Gmail account from desktop. 2. On the dashboard, find “settings” icon at right-top. 3. The settings option will open a drop-down menu. Under “Quick settings”, click on “See all settings”. 4. A Settings pages will be opened. There will be listed multiple options. Find and click “Labels”. 5. Under “Labels”, a menu will be appeared. On “System labels” column, scroll down and find “All Mail”. Then click on “show”. 6. In no time, “All Mail” tab will be shown on left side bar menu. Now you can proceed to search your emails. Email was archived, deleted, or marked as spam Emails might skip your inbox if they were accidentally archived, deleted, or marked as spam. You can search all your emails, including those that aren’t in your inbox, by selecting Mail & Spam & Trash from the All Mail drop down If you have archived your email, and want to move it back to box, you can do it so now. If your emails still nowhere to be found, there is possibility that the email might be deleted or you may refine your search query. Email is filtered can be a reason Gmail not showing all emails You may have created a filter that automatically archives or deletes certain emails. You can check your filters by going to Gmail settings > Filters and Blocked Addresses tab > Look for filters that include the words “Delete it” or “Skip Inbox”. To remove a scheduled invitation from Google Calendar Open Google Calendar: Log in to your Google account and proceed to Google Calendar. Locate the Meeting: Find the meeting you want to cancel on your calendar. You can scroll through your calendar or use the search function if you have a busy schedule. Delete the Event: Click on the meeting to view its details. Look for options like “Edit,” “Delete,” or “Cancel.” Select the “Delete” or “Cancel” option. Confirm the action, and the meeting will be removed from your calendar and the calendars of all the guests. Remember that attendees will automatically receive a notification about the cancellation, so there’s no need to send a separate message. This helps manage your time better and ensures everyone’s calendars stay up to date!To trace the location of an email sender in Gmail Log into your Gmail Account: Open Gmail and sign in with your account credentials. Open the Email: Locate the email you want to trace and open it. View Email Header: Click on the three dots (located on the right-hand side corner) in the email interface. Select “Show original” from the dropdown menu. Find the IP Address: Scroll down in the new window that opens. Look for the word “Received” in the header information. Next to “Received: From,” you’ll find the IP address of the sender. Use an IP Tracking Service: Once you have the IP address, use an IP tracking service to find the sender’s location. Visit a website like IP-Tracker.org and input the IP address. Click on “Lookup IP Address” to get details such as the country, city, time zone, and internet service provider associated with that IP address. Remember that this method provides an approximate location based on the IP address.How to Find Lost Emails in Gmail If you’re missing emails in Gmail, here are some steps you can take to find them: Check Spam Folder: Start by looking in the Gmail Spam folder. Sometimes emails end up there accidentally. Archived Messages: If you use Gmail’s Archive feature, check the archived messages. Archived emails won’t appear in your regular Inbox or Sent folders. Trash or Bin Folder: Check the Trash or Bin folder. Deleted emails might be there. Use Gmail Search: Utilize the Gmail search feature. Enter relevant information from the missing email, such as the sender’s name or subject. Gmail Message Recovery Tool: If an email was deleted, you might be able to recover it using the Gmail Message Recovery Tool. Scroll through these folders and move the missing email back to your mailbox Remember that emails in the Spam or Trash folder are typically saved for 30 days. If you’ve checked these options and still can’t find your missing emails, consider reaching out to Gmail support for further assistanceHow to download the new Google Meet app Google Duo and Google Meet have been combined into a new Meet app for video calling and meetings. You can access your meetings in the new Meet app . You can uninstall Meet (original) after you migrate to the new Meet app . The original Meet app has been renamed to Meet (original) . The Duo app name and icon are now Google Meet . How to start or schedule a Google Meet video meeting ou can set up or start a new Google Meet video meeting from: Meet Gmail Google Calendar Google Chat (Mobile only) Another scheduling system Tip: To make sure you don't join a meeting with an expired code and to better plan for the future meetings you create, check when meeting codes expire. Learn about meeting codes in Google Meet. Start a video meeting from Meet ​Go to Google Meet. Click New Meeting. Select an option: Create a meeting for later: To share the meeting details for a future meeting, copy the meeting link and share with participants. To directly start the meeting with this link, paste the link into a browser; or enter the link into the “Enter a code or link” field click Join. Start an instant meeting: Create a new meeting and join the meeting directly. Schedule in Google Calendar: To schedule a meeting, you’re directed to Google Calendar. Tip: Google Workspace Essentials users can't schedule a meeting in Google Calendar. Start a video meeting from Gmail Open Gmail. In the Meet section, click New meeting. To send the meeting invite via link or email, click Send invite. To copy the meeting invite details, click Copy meeting invite . To send an email invite, click Share via email. When you’re ready to join the meeting, click Join now. Before you join your first meeting, make sure to allow permissions for your microphone and camera. Once you grant permission: To turn your microphone on or off, click Microphone . To turn your camera on or off, click Camera . To join the call, click Join now. To end the call, click Leave call . Learn how to start or join a video call in Gmail. Schedule a video meeting from Google Calendar When you create an event on Google Calendar, you can add a video meeting link. Google Workspace users: You can also add a dial-in number to the Calendar event. Google Workspace Essentials users: You can't schedule a meeting in Google Calendar. Important: Guests can forward the meeting link to other people. If an uninvited person tries to join, a meeting participant from your organization must accept their request. For meetings organized by a personal Google Account, only the meeting creator can admit these participants. In Calendar, create an event. Click Add guests. Enter the names or email of the people you want to invite. Click Save. To notify guests, click Send. How to Create a Group Email (Mailing List) in IIUM Gmail (Google Workspace) Since IIUM uses Google Workspace for Education, staff and students can create email groups (mailing lists) for easier communication. Here’s how: Create a Group: Navigate to Directory → Groups. Click "Create Group". Fill in: Group name (e.g., dept-name@iium.edu.my). Group email (must follow IIUM’s naming conventions). Description (optional). Access settings (choose who can send emails/post). Add Members: Under "Members", add: Individual emails (e.g., staff@iium.edu.my, student@student.iium.edu.my). Or upload a CSV file for bulk additions. Set Permissions: Decide if members can: Post messages (e.g., allow replies). View members (restrict if sensitive). Click "Create" → The group is now active. Option 2: For Students & Non-Admin Staff (Using Google Groups) If you don’t have admin access, you can create an unofficial Google Group: Go to Google Groups. Click "Create Group". Fill in: Group name (e.g., "MyClass2024"). Group email (will end with @googlegroups.com). Set privacy: Who can join/view/post (choose "Private" for restricted access). Add Members: Manually enter IIUM emails (@iium.edu.my or @student.iium.edu.my). Click "Create" → Members will get an invitation. ⚠️ Limitations: @googlegroups.com addresses are not official IIUM emails. Some IIUM systems may block external groups. How to Use the Group Email To send an email: Just address it to: Official IIUM group: group-name@iium.edu.my Google Group: group-name@googlegroups.com Manage members: Edit via Google Admin Console (staff) or Google Groups (students). Need Help? IIUM IT Help Desk: ☎️ 03-6421 6666 📧 servicedesk@iium.edu.my Walk-in Support: ITD Building, Gombak Campus Note: Official IIUM groups must comply with university policies. Misuse may result in termination. 🚀How to Create a Group Email in Gmail To create an email group in Gmail, follow these steps: Log in contact.google.com Log in with your preferred account Once logged in, click on the menu at the top left Click "create contact." The option will be expanded into two options: "create contact" and "create multiple contacts." Click create multiple contacts On top of the next window, you will find a label where you can add a name to that contact list. So if you are wondering how to create a group email in Gmail and label it with a name, here is how you set a label name. Click the no label text and set a preferred name for that email group. If you had already set up labels/groups, you would be given the opportunity to select from a list of created names. The next step is imputing names and addresses. To do so, you can either add each name and address individually or add them in bulk. To add individually, simply type in each user name and address separating each with a comma. You can either add only name or address or address and name together. To upload an email list in bulk into a group, you must first have it saved as a CSV or vCard file. If you do, at the bottom of the create multiple contacts, you will find import contacts. Once you are done importing or manually adding your contacts, simply click create at the bottom to save the email list. How to set up an email group in Gmail mobile app Since mobile apps are what most people use on a daily basis, you might be asking how to set up an email group in Gmail using the mobile app. The short answer is that you can't because the Gmail app is quite limited. However, there is also a way to get this done using an app. To do this, simply login to your Gmail mobile app and on the menu option look for contacts. On mobile, if you click on contacts, you will be redirected to a contact app on Google Play marketplace if you use an Android device or App Store for iPhone users. If the contact app is already installed on your device, it will simply pop up. The contact mobile app is where you can create an email group if you decide to create one using a mobile device. The method of creating a contact group on the contact app is the same as the steps above.How to Send Email to a Group in Gmail Without Showing Recipients When sending group emails on Gmail, without the proper settings, all list members will see the address of every other person in the group. This might not sit well with people who are conscious about their privacy. So, if you are wondering how to send email to a group in Gmail without showing recipients, here is how you can do this. When composing a mail, in the To field, type Undisclosed recipients followed by your own email address within angle brackets. For example, Undisclosed recipients myaddress@gmail.com After that, select the bcc field. If you can't find the bcc option, you can use the keyboard shortcut Ctrl+Shift+B (Windows) or Command+Shift+B (Mac) to display the Bcc field. Once done, you can add recipient emails by group or individually and then send. How to send a group email After attaining an understanding of how to create a group in Gmail contacts, the next step is how to send messages to groups/labels. To do this, whenever you want to compose a message, simply type in the set list name on either the To or Bcc field.Make your google account more secure How to Make Your Google Account More Secure Follow these steps to enhance the security of your Google Account: Step 1: Do a Security Checkup🔗 Google Security Checkup Add or update account recovery options Turn on 2-Step Verification Remove risky access to your data Turn on screen lock on your devices Step 2: Update Your Software Keep your browser, operating system, and apps updated to prevent vulnerabilities. Update your browser Update your operating system Update your apps Step 3: Use Unique, Strong Passwords Avoid using the same password on multiple sites. Create a strong, unique password for each account. Use a password manager to help manage your passwords securely. Step 4: Remove Apps & Browser Extensions You Don’t Need Install only necessary apps and trusted browser extensions. Avoid installing apps or extensions from unknown sources. Uninstall apps/extensions you no longer use to reduce risks. Step 5: Protect Against Suspicious Messages & Content🔗 Learn more Be cautious of suspicious emails, text messages, phone calls, or web pages. Avoid clicking on links or sharing personal information with untrusted sources. Report suspicious messages to Google or relevant authorities. For further ICT inquiries:📞 Tel: 03-6421 6666 | 📱 WhatsApp: 016-9832415 | 📧 Email: servicedesk@iium.edu.my How do I activate my IIUM Staff email account? Q: How do I activate my IIUM Staff email account?A: Apply online at https://apex.iium.edu.my:8443/staff/sso/reg/ using your staff ID. Follow the verification steps (IC/passport number required). How to Enable 2SV for IIUM Email (Google Workspace) 1. What is 2-Step Verification (2SV)? 2SV adds an extra layer of security to your IIUM account (email, iMa’luum, i-Ta’leem, etc.). After entering your password, you’ll need a second verification method (e.g., SMS code or authenticator app). 2. How to Enable 2SV for IIUM Email (Google Workspace) Step 1: Log in to Your IIUM Google Account Go to myaccount.google.com. Sign in with your IIUM email (e.g., username@student.iium.edu.my or staff@iium.edu.my). Step 2: Enable 2-Step Verification Click Security → 2-Step Verification → Get Started. Re-enter your password if prompted. Choose a second verification method: SMS (Text Message) – Receive a code on your phone. Google Authenticator App – Recommended for better security. Backup Codes – Save these in case you lose access. Follow the setup prompts and confirm. Step 3: Complete Setup Test the verification method (e.g., enter the SMS code). Click Turn On to activate 2SV. How to Import a Calendar to Microsoft Outlook (IIUM Staff/Student Email) You can import calendar events into Outlook (for IIUM email accounts) from ICS files, Google Calendar, or other email providers. Follow these steps: Method 1: Import an ICS File (e.g., from Google Calendar) Step 1: Export Calendar as ICS File From Google Calendar: Go to Google Calendar. Click ⚙️ Settings → Export calendars. A .zip file containing .ics files will download. From Other Calendars: Look for an "Export" or "Download as ICS" option. Step 2: Import into Outlook Open Outlook (Desktop App or Web). Go to Calendar view. Click Open Calendar → From File. Select the .ics file you downloaded. Choose the calendar to import into (e.g., your IIUM Outlook Calendar). Click Import. ✅ Done! Events should now appear in your Outlook calendar. Method 2: Sync Google Calendar with Outlook (Auto-Update) Step 1: Get Google Calendar’s Private iCal Link Go to Google Calendar. Click ⚙️ Settings → Settings. Under "Settings for my calendars", select the calendar you want to sync. Scroll to "Integrate calendar" → Copy the "Secret address in iCal format" link. Step 2: Add Google Calendar to Outlook Open Outlook (Desktop or Web). Go to Calendar → Right-click "Other Calendars" → Add Calendar → From Internet. Paste the iCal link from Google. Click OK. ✅ Synced! Google Calendar events will now auto-update in Outlook. Method 3: Import from Another Outlook Account (e.g., Personal Email) Open Outlook (Desktop App). Go to File → Open & Export → Import/Export. Select "Import from another program or file" → Next. Choose "Outlook Data File (.pst)" → Next. Browse and select the PST/ICS file → Next. Select Calendar → Finish. ✅ Done! The imported events will appear in your IIUM Outlook Calendar. Troubleshooting ❌ "Import Failed" Error? Ensure the file is in .ics/.pst format. Try Outlook Web (OWA) if the desktop app fails. ❌ Events Not Showing? Check filters/views in Outlook. Restart Outlook or re-import. How to Fix Gmail Not Showing All Emails (IIUM Student/Staff Accounts) If your IIUM Gmail (Google Workspace) is missing emails, follow these troubleshooting steps: 1. Check the "All Mail" & Other Tabs Gmail filters emails into categories. Click "All Mail" (left sidebar) – Shows every email, including archived ones. Check Promotions, Social, Updates, Spam tabs. Search for missing emails (use keywords/sender name). 2. Disable Gmail Filters Filters may auto-archive or delete emails. Go to ⚙️ Settings → See all settings → Filters and Blocked Addresses. Delete/disable any suspicious filters. 3. Check "Trash" & "Spam" Folders Trash: Emails deleted in the last 30 days. Spam: False positives may hide here. 4. Increase Gmail Storage IIUM provides 15GB for Google Drive + Gmail. If full, delete old emails or empty "Trash" & "Spam" permanently. 5. Sync Issues? Refresh or Reconnect Browser: Clear cache (Ctrl+Shift+Del) or try incognito mode. Mobile App: Pull down to force sync. Go to Settings → [Your Account] → Sync Gmail. 6. Check Forwarding & POP/IMAP Settings Go to ⚙️ Settings → Forwarding and POP/IMAP. Ensure emails aren’t being auto-forwarded or deleted. 7. Try a Different Device or Browser Test on Chrome/Firefox or the Gmail mobile app. 8. Contact IIUM IT Help Desk If emails are still missing: Call: 03-6421 6666 Email: servicedesk@iium.edu.my Walk-in: ITD Building, Gombak Campus Prevent Future Issues ✅ Avoid overusing filters/labels.✅ Regularly clean up storage.✅ Check "Spam" weekly. Note: IIUM staff/students use Google Workspace, so some features may differ from personal Gmail. 🚀How to Remove a Scheduled Invitation from Google Calendar (IIUM Account) If you’ve sent a Google Calendar invite and need to cancel or delete it, follow these steps: Method 1: Cancel the Event (Before It Starts) Open Google Calendar (calendar.google.com). Find the event → Click on it. Click "Edit Event" (pencil icon). Select 🗑️ "Delete" (or "Cancel Event" if it’s a meeting). Choose: "Delete this event" (only removes from your calendar). "Delete for all attendees" (recommended to notify guests). Click "Send Cancellation" to notify participants. ✅ Done! The event will disappear from all calendars. Method 2: Delete a Recurring Event Open the recurring event in Google Calendar. Click "Edit Event". Choose: "This event only" (deletes one instance). "All following events" (deletes future repeats). "All events in the series" (fully deletes it). Click "Delete" → "Send Cancellation". ⚠️ Warning: If you delete "All events", past instances remain in guests' calendars. Method 3: Retract an Invitation (If Not Yet Accepted) If the event is still pending: Open the event → Click "Edit". Remove all attendees from the "Guests" list. Click "Save" → "Send Updates". Now, delete the event (no cancellation will be sent). Troubleshooting ❌ "Delete" option missing? You may not be the event organizer. Ask the creator to cancel it. ❌ Accidentally deleted? Check Trash (left sidebar) → Restore within 30 days. Need Help? IIUM IT Help Desk: 03-6421 6666 Email: servicedesk@iium.edu.my Note: Canceling an event does not delete past emails about it. 🚀How Do I Use Google Scholar Effectively? Q: How can I find the most relevant and recent academic papers on Google Scholar? A: Google Scholar allows you to search for scholarly articles and access citations across various disciplines. Here are a few helpful tips to improve your search: 🔍 Finding Recent Papers Click “Since [Year]” on the left sidebar to filter by publication year. Use “Sort by date” to display newly added results in chronological order. Click the envelope icon to receive email alerts for new search results. 📄 Accessing Full-Text Articles While abstracts are freely available, full articles may require a subscription. To find full text: Click library links (e.g., “FindIt@IIUM”) next to the result. Look for a [PDF] link on the right-hand side. Click “All versions” to explore alternative sources. Use “Related articles” or “Cited by” to discover similar content. Note: If you are affiliated with a university and don’t see library links, contact your library to set up off-campus access or configure a proxy connection. 🧠 Getting Better Search Results New to the topic? Learn key terms from secondary sources like Wikipedia and use them in your search. If your results are too detailed, check the “References” in each article to find broader sources. If results are too basic, click “Cited by” to explore newer, more advanced work. 🧭 Tip: Keep Exploring There’s rarely one definitive answer. Use “Related articles,” “Cited by,” or search an author’s name to dive deeper into the topic.Application How to Print Class List in IIUM For Lecturers & Academic Staff Method 1: Via SIS (Student Information System) Log in to IIUM Staff Portal. Navigate to: Academic → Kulliyyah → Courses Schedule for Exam (or Classlist). Select: Semester and Course Code. Click: "Print Classlist" (PDF/Excel format). Method 2: Via i-Ta'leem (LMS) Log in to i-Ta'leem. Go to your course page → Admin → Classlist. Click "Export" (Excel/CSV). For Students Students cannot print official class lists but can: View classmates in i-Ta'leem under Participants. Request a class list from Kulliyyah office (for group projects, with approval). FOR IIUM STUDENTS Get the password to access ICT facilities such as WiFi, i-Ta’leem, i-Ma’luum, etc. You need to activate the temporary pin number that was given to you when you enrolled/registered. You can activate your pin number at the following website: For Undergraduate – http://prereg.iium.edu.my/pinno In the activation process, you have to set your own personal password. For PG students, you have to update your biodata first before activating your pin number. You can update your biodata at the following website: http://myapps.iium.edu.my/anr/pgbio Students’ matric numbers and activated pin numbers will be used to access most of the systems and applications in IIUM. Therefore, the first thing that you must do is to activate your temporary pin numbers. Get WI-FI services For students, connect to the IIUM-Student WiFi network, FireFox OR Edge and key in your username and password. Your username is your matric number and password is your own personal password which you have set when you activated your pin number.How to Fix IIUM Wi-Fi Connection Problems (Students & Staff) if you're unable to connect to IIUM-Student or IIUM-Staff Wi-Fi, follow these troubleshooting steps: Step 1: Basic Checks ✅ Ensure you’re in range of an IIUM Wi-Fi hotspot (Gombak/Kuantan/Gambang/Pagoh).✅ Restart your device (phone/laptop) and try reconnecting.✅ Turn Wi-Fi off/on or toggle Airplane Mode for 10 seconds. Step 2: Correct Wi-Fi Network & Login For Students SSID: IIUM-Student Username: Matric number (e.g., G1234567) Password: Same as i-Ma’luum password. For Staff SSID: IIUM-Staff Username: Staff email (without @iium.edu.my) Password: Staff email password. ⚠️ If login fails: Reset your password via: Students: i-Ma’luum Password Reset Staff: IIUM Staff Portal Step 3: Forget & Reconnect Network Go to Wi-Fi settings → Forget "IIUM-Student" or "IIUM-Staff". Reconnect and re-enter credentials. Step 4: Check for Blocked Devices If you see "Access Denied", your device may be blocked (e.g., due to multiple failed attempts). Wait 15 minutes or contact ICT Help Desk (03-6421 6666). Step 5: Update Device Settings For Windows Press Win + R → Type ncpa.cpl → Open Network Connections. Right-click Wi-Fi → Disable → Wait 10 sec → Enable. For Android/iOS Go to Settings → Wi-Fi → Advanced. Set IP settings to DHCP (not static). For macOS Go to System Preferences → Network. Select Wi-Fi → Advanced → TCP/IP → Renew DHCP Lease. Step 6: Report Persistent Issues If Wi-Fi still doesn’t work: Submit a ticket via i-FIRST. Contact ICT Help Desk: ☎️ 03-6421 6666 (Gombak) 📱 WhatsApp: 016-983 2415 📧 Email: servicedesk@iium.edu.my Common Wi-Fi Errors & Fixes Error Solution "Can’t connect to this network" Forget network & reconnect "Limited connection" Renew IP (DHCP) or restart router "Authentication failed" Reset password & check credentials "No internet access" Wait 5 mins or report to ITD Need Immediate Help? Visit ITD Help Desk (Level 1, ITD Building, Gombak). Check ITD Website for updates. Note: Using personal routers/hotspots is prohibited in IIUM—may disrupt campus Wi-Fi! 📡Reporting WI-FI Issues at Mahallah IIUM Gombak لسلام عليكم ورحمة الله وبركاتهDear IIUM Gombak students, please be informed that all problems related to the wireless at Mahallah IIUM Gombak must be reported in the new wireless support website. Please sign up and fill in the details as required. The website link is as below:https://wifisupport.iium.edu.my/support/loginBelow are several video related to the wireless at Mahallah IIUM Gombak:5 GHz Compatibility Check :  URL: https://youtu.be/r10oAwCGK2YHow to Connect to IIUM-Student Wi-Fi :     URL: https://youtu.be/diJv__fckGEHow to Raise Ticket through IIUM-WiFi Support Portal :      URL : https://youtu.be/KnBOmL7kBmsThe online manual can be found here: https://iium-wifisupport.freshdesk.com/helpdesk/attachments/61000648196 Thank you.Tips to fix IIUM Students WI-FI IIUM Student Wi-Fi not working? Here’s how to fix the problems IIUM e-mail address Registered students will get an IIUM e-mail address. All students will be assigned an IIUM Live e-mail address in the following format: username@live.iium.edu.my To check your IIUM e-mail address, login into i-Maluum (http://imaluum.iium.edu.my), then click on your photo at the top right corner, and then click on the “Profile” button. Here you will see your live IIUM e-mail address.Microsoft Office for free Registered students are eligible to download and install Microsoft Office 365 for free, for up to 5 devices. To download, first you must activate your IIUM live e-mail. Follow these steps: 1. Go to http://portal.office.com 2. Key in your username (your full IIUM live e-mail address) 3. Key in your password – for first time login, the password is “iium” for local students and “iium” for international students, i.e. iium followed by your IC number or iium followed by your passport number, without any space. Students who activate their IIUM Live e-mail account will get Microsoft Office for free. Students can download Office 365 and install it on their computers.Access to MSDNAA/Microsoft Imagine After you have activated your IIUM Live e-mail address, you will receive an e-mail from Microsoft Imagine, which will give you instructions on how to activate your account. https://imagine.microsoft.com/en-usSoftware are available for download Some of the software available are: · Windows 8.1 · Windows 10 · Microsoft Project · Microsoft Visio · Microsoft Access · Microsoft OneNote · Microsoft Visual Studio · and many moreMicrosoft Teams for Education. Quick Start guide for students. Download the PDF. IIUM Live Email Guidelines HOW TO CREATE IIUM LIVE EMAIL TO ACCESS MICROSOFT Microsoft LIVE IIUM email Info How many devices can I install my student version of Microsoft Office on? You can install Microsoft Office for free on up to 15 devices in total (five installations on Windows and MAC devices, five installations on smart phones and five on tablet devices). Please note, you are only able to install the applications on devices that you personally own. Trouble-shooting Microsoft Office Issues ( Cannot Activate) First of all, uninstall any other version of Microsoft Office from the pc/laptop. You can visit here for uninstall tool provided by Microsoft: https://support.office.com/en-us/article/uninstall-office-from-a-pc-9dd49b83-264a-477a-8fcc-2fdf5dbf61d8 Then login to www.office.com using your LIVE IIUM account and install the latest Microsoft Office 365 from the "Install Office" button.After that, open MS Word and sign in using your LIVE IIUM email account for automatic activation. Hope that helps. Thank you. Need help with the ICT facilities in IIUM ITD provides a one-stop ICT Services Help Desk located at the ground floor of the ITD Office. The ICT Services Help Desk provides a central point of contact for IIUM staff and students to report all IT problems, queries and service requests associated with the services provided by ITD.How to forget SSID due to wireless maintenance How to forget SSID due to wireless maintenance Use the instructions below to forget an SSID (Wireless Network) on your device as part of troubleshooting or as needed. iPhone Go to settings > Wi-Fi Touch the blue “i” next to the Wi-Fi symbol of the SSID that you want to forget. When the next page comes up, touch “Forget This Network”. When the prompt comes up, touch “Forget”. Apple OS X Open "System Preferences" and open "Network". Select the Wi-Fi adapter - Not any other networking adapters, just the Wi-Fi. Click the "Advanced..." button. Make sure you disconnect from the SSID using the Wi-Fi icon at the top of your computer. In the "Preferred Networks" pane, look for the SSID. Select the SSID and click the "minus" button to delete it. Click “OK”, and at the next window, click “Apply”. Android device Touch “Settings” followed by “Connections”. Touch Wi-Fi. Touch the SSID under “CURRENT NETWORK”. Touch “FORGET”. Windows Machine Click on the Start menu, type “Settings”, and Press enter. Click on “Network & Internet”. On the left-hand side, click on “Wi-Fi”. Click on “Show available networks”. In the window that pops up in the lower right-hand corner, right-click on the SSID that you want to forget. Click on “Forget”. Remember that when your password expires, is changed, or you forget the SSID, you will have to enter your credentials again to login. When asked to trust certificate please make sure the domain is: iiumwifilogin2.iium.edu.my ⁠iiumwifilogin3.iium.edu.my For any inquiries, please contact the ITD Service Desk at extension 6666.Google account for Student اتُه Dear IIUM Students, The Information Technology Division (ITD) would like to inform you that you can now start activating your Google Workspace for Education (GWFE) account to support your academic journey. With your GWFE account, you will have access to essential services like Gmail, Google Meet, and more. Please refer to the infographic below for detailed steps on how to activate your account and start using these features immediately. For any assistance or technical issues, feel free to contact the ITD Servicedesk at ext. 6666 or email servicedesk@iium.edu.my. Thank you and enjoy the benefits of your GWFE account! Get to Know Your i-Taleem (IIUM Learning Management System) Get to Know Your i-Taleem (IIUM Learning Management System) Follow these simple steps to access i-Taleem — the IIUM online learning platform: 🖥️ Step 1: Visit the i-Taleem Website🌐 https://italeemc.iium.edu.my/ 🔐 Step 2: Log in using your IIUM CAS Account Username: Your Matric Number Password: Your i-Taleem password ⚠️ If you forgot your password, please reset it via the portal or contact assistance. 📞 Need Assistance?For help or technical support:📱 WhatsApp: +6011-5649 1385 My i-Ma'luum account shows my student status as 'DEFER'. What should I do? Q: My i-Ma'luum account shows my student status as 'DEFER'. What should I do? A: The 'DEFER' status is not under ITD purview. Students are required to refer to their respective Kulliyyah or the AMAD/CPS Office for further action. Only once your status has been updated to 'Active', your access to University systems (such as i-Ma'luum) will be restored.ICT SERVICES HELPDESK ICT Services Help Desk ICT Services Help Desk The ICT Services Help Desk is the first point of contact for all IT-related support and assistance at IIUM. Below are the services and responsibilities handled by the Service Desk: Responsibilities of the ICT Services Help Desk ✅ Managing service requests, problems, and incidents✅ Addressing IT concerns of all departments and Kulliyyahs✅ Tracking and resolving customer issues✅ Assisting with employee onboarding (IT-related)✅ Monitoring and reporting service status Services Provided for IIUM Staff & Students 📶 Wi-Fi Access Assistance🛠️ Create & Manage Incident Tickets📧 University Email Support📞 Entertain Calls & Queries from Users💻 General IT-related Assistance How to Contact the ICT Services Help Desk 📞 ITD Hotline: 03-6421 6666📱 WhatsApp: 016-9832415📧 Email: servicedesk@iium.edu.myLocate Us| ITD Main Gombak Contact ITD Management & Branches INFORMATION TECHNOLOGY DIVISION, ITD International Islamic University Malaysia P.O. Box 10, 53100 Kuala Lumpur, Malaysia Tel : 603-6421 6666 Email (@iium.edu.my) : servicedesk Website: http://www.iium.edu.my/division/itd IT GOVERNANCE & CUSTOMER CARE  SECTION: Deputy Information Officer Tel : 603-6421 4889 Email (@iium.edu.my): Siti Zarina Muhamat ACADEMIC & STUDENT AFFAIRS SECTION: Deputy Information Officer: Hairul Laila Din Tel : 603-6421 4875 Email (@iium.edu.my): hairul_laila ADMINISTRATIVE SECTION: Deputy Director : Wan Surbani Wan Omar Tel : 603-6421 5430 Email (@iium.edu.my): Wan Surbani ADMINISTRATIVE APPLICATION SERVICES SECTION: Deputy Information Officer : Abu Hurairah Manaf Tel : 603-6421 4895 Email (@iium.edu.my): Abu Hurairah INFRASTRUCTURE SERVICES SECTION: Deputy Information Officer: Syed Mohd Hazrul Syed Salim Tel : 603-6421 4891 Email (@iium.edu.my): Syed Hazrul BUSINESS INTELLIGENCE,RESEARCH & COLLABORATIVE SECTION: Deputy Information Officer : Abu Hurairah Manaf Tel : 603-6421 4895 Email (@iium.edu.my): Abu Hurairah INFORMATION TECHNOLOGY DEPARTMENT (ITD Kuantan) Deputy Engineer : Abdul Naser bin Abdullah International Islamic University Malaysia Jalan Sultan Ahmad Shah Bandar Indera Mahkota 25200 Kuantan, Pahang Darul Makmur Malaysia. Tel : 609-570 4666 Fax : 609-571 6774 Email: helpdeskktn@iium.edu.my Website: http://www.iium.edu.my/office/ocd INFORMATION TECHNOLOGY DEPARTMENT (IIUM Medical Centre) Deputy Information Technology Officer : Mustakim bin Ahmad International Islamic University Malaysia Medical Centre (IIUMMC Jalan Sultan Ahmad Shah, 25200 Kuantan. Tel : +609 591 2500 Fax : +609 591 2699 Email : webmaster@iium.edu.my INFORMATION TECHNOLOGY DEPARTMENT (CFS) International Islamic University Malaysia Gambang Campus Deputy Director: Mohd Zahid Ridzuan Mohd Zulkifly Administration BuildingJalan Gambang-Maran,26300 Gambang,Pahang Darul Makmur,Malaysia Any matters related to CFS, please email to: cfs.enquiry@iium.edu.my LIBRARY (KNOWLEDGE MANAGEMENT) Library Management Services IIUM Dar al-Hikmah Library International Islamic University Malaysia P.O. Box 10, 53100 Kuala Lumpur, Malaysia Tel: 03-6421 4825 IIUM PAGOH Branch Campus Liaison Officer: Shahidah Mahbob International Islamic University Malaysia (IIUM) Pagoh Edu Hub KM 1, Jalan Panchor, 84600, Pagoh, Muar,Johor Darul Takzim,Malaysia Customer Service vs. Customer Support The difference between customer service and customer support is that customer support teams support a product, while customer service teams provide service to a customer.While both focus on helping customers, customer support is a specific type of customer service that involves documentation, product feedback, and technical problem solving. Customer Support The short answer is that customer support is important because support agents are key for helping resolve customer queries quickly and effectively and driving customer satisfaction. This ultimately impacts customer retention, customer lifetime value, and brand reputation. Customer Service Customer service refers to the assistance an organization offers to its customers before or after they buy or use products or services. Customer service includes actions such as offering product suggestions, troubleshooting issues, and complaints or responding to general questions. 5 strategies for delivering great customer support/service. Make support agents strategic students and staff. Ensure soft skills are just as important as “technical” ones. Support your support team. Be personable. Be fast. Service Desk Counter: Do’ and Don’t Service desk counter Do.’ Respect your customers. Be Honest Take Responsibility Always Put Yourself in The Customer’s Shoes Express Your Gratitude Service desk counter Don’t. Don’t Make Things Overly Complicated Don’t Be Indifferent Don’t Treat Customers as Transactions Don’t Ignore Customer Feedback Don’t Be Afraid of Complaints For Undergraduate Students with "TERMINATED" status Q: My student status shows as "TERMINATED." What should I do? A: If your status is "TERMINATED," you are required to contact the AMAD Office (Academic Management and Admission Division) or your respective Kulliyyah for further assistance.Please note that the ITD Help Desk does not have the authority to make changes or resolve issues related to academic status.Unable to Use i-Attend Q: I cannot use i-Attend. What should I do? A: Please follow these steps to resolve the issue: 1️⃣ Report the problem at the ITD Help Desk counter or contact us at 03-6421 6666.2️⃣ Our staff will assist you to:✔️ Verify your matric number✔️ Check your IIUM Live email account status✔️ Reset your Live account password through i-Ma'luum: https://imaluum.iium.edu.my/3️⃣ Create a new password and ensure the process is successful.4️⃣ Once reset, try logging in again to i-Attend until access is restored. Useful Links:🔗 i-Ma'luum: https://imaluum.iium.edu.my/🔗 i-Stack Guide: https://istack.iium.edu.my/link/630#bkmrk-https%3A%2F%2Fiattend.iium🔗 i-Attend Portal: https://iattend.iium.edu.my/What are the operational hours for the ICT Help Desk at Gombak Campus? Q: What are the operational hours for the ICT Help Desk at Gombak Campus?A: Monday–Thursday: 8:30 AM – 12:30 PM, 2:00 PM – 5:00 PM Friday: 8:30 AM – 12:15 PM, 2:45 PM – 5:00 PM Weekends: Closed How can I contact the ICT Help Desk? Q: How can I contact the ICT Help Desk?A: Gombak: Tel: 03-6421 6666 | WhatsApp: 016-9832415 | Email: servicedesk@iium.edu.my Kuantan: Tel: +609-570 4666 | Email: helpdeskktn@iium.edu.my Gambang: Tel: 09-5183435 | Email: servicedeskcfs@iium.edu.my Pagoh: Tel: +609-974 2601/2604/2607 | Email: servicedesk@iium.edu.my Contact ITD Website: https://division.iium.edu.my/itd Email: servicedesk@iium.edu.my ICT Help desk (Gombak): Level 1, ITD | Hours: Mon–Fri, 8:30 AM – 4:30 PM ICT Help desk (Kuantan): IT Department, Level 1| Email: helpdeskktn@iium.edu.my | Tel: +609-570 4666 | Hours: Mon–Fri, 8:30 AM – 4:30 PM ICT Help desk (Gambang): Information Technology Department (CFS) Administration Building | Email: servicedeskcfs@iium.edu.my  | Tel: +09-5183435 | Hours: Mon–Fri, 8:30 AM – 5.00 PM ICT Help desk (Pagoh): International Islamic University Malaysia (IIUM) Pagoh Edu Hub KM 1, | Email: servicedesk@iium.edu.my  | Tel: +609 974 2601/ 2604/ 2607 | Hours: Mon–Fri, 8:00 AM – 5.00 PM For further assistance, visit the ITD website or contact the Help Desk.. What services does the ICT Helpdesk provide? ✅ Wi-Fi Configuration AssistanceWe assist staff and students in logging into IIUM Wi-Fi and other official applications. ✅ Basic Software TroubleshootingWe help diagnose simple software issues and direct users to official IIUM resources when needed. ✅ Escalation of Technical IssuesComplex or advanced technical problems will be forwarded to ITD technical teams for further action. ✅ IIUM Email SupportWe assist users in creating, accessing, or troubleshooting their IIUM email accounts. What services are NOT provided at the ITD Service Helpdesk? 🚫 PC/Laptop Repairs or Software InstallationWe do not perform any hardware repairs or install unauthorized software. 🚫 Data RecoveryWe do not recover data from damaged or corrupted devices. 🚫 Virus or Malware RemovalWe do not handle virus cleaning or malware removal on user devices. 🚫 Device Damage or Warranty ClaimsWe are not responsible for any device damage or warranty issues. For Postgraduate Students with "TERMINATED" Status Q: My student status shows as "TERMINATED." What should I do? A: If your status is "TERMINATED," you are required to contact the Centre for Postgraduate Studies (CPS) or your respective Kulliyyah for assistance.Please note that the ITD Help Desk does not have the authority to make changes or resolve issues related to academic status.i-Ma'luum Access for New Students Q: I’m a new student. What should I do before visiting the ICT Help Desk counter? A: New students must register their matric number in the i-Ma'luum system before approaching the ICT Help Desk counter for assistance.Please complete your registration here: https://imaluum.iium.edu.my/ This ensures your student record is active and allows us to assist you efficiently.Access CAM Entry Issue: Lecturer Cannot Access CAM Entry Steps to Resolve: Browse MyApps PortalGo to myapps.iium.edu.my Reset or Forgot PasswordClick “Forgot Password” and follow the instructions to create a new password. Set New PasswordCreate a strong new password and ensure the reset process is completed successfully. Retry AccessOnce the password has been successfully reset, attempt to access the CAM Entry system again. Issue Resolved If the issue persists, kindly contact the ITD Service Desk:📞 Tel: 03-6421 6666 | 📱 WhatsApp: 016-9832415 | 📧 Email: servicedesk@iium.edu.my SFS Issue Already Closed Issue: SFS Issue Already Closed Important Information:For any SFS (Student Financial Services) issues that have already been Closed, students are required to refer directly to the KCA Office (Kulliyyah/Centre/Administration Office) for further assistance. ITD Note:The ITD Service Desk does not have the authority to reopen or handle closed SFS cases. Effective Date: January 2025 For general ICT inquiries:📞 Tel: 03-6421 6666 | 📱 WhatsApp: 016-9832415 | 📧 Email: servicedesk@iium.edu.my Reporting Phone Issues (For IIUM Staff) Reporting Phone Issues (For IIUM Staff) If you are facing issues with your office phone, please follow these steps: 📞 Step 1: Report the Problem Contact the ICT Services Help Desk and inform them about the phone set issue. 📝 Step 2: Report Submission The ICT Services Help Desk will create a report and submit it to the i-FIRST system:🌐 i-first.iium.edu.my 📬 Step 3: Action by Person-In-Charge (PIC) The PIC will receive the ticket via email. The PIC will review the report and take the necessary action to resolve the issue. For further ICT inquiries:📞 Tel: 03-6421 6666 | 📱 WhatsApp: 016-9832415 | 📧 Email: servicedesk@iium.edu.my iTa'leem Single Sign-On (SSO) Integration iTa'leem Single Sign-On (SSO) Integration — Effective Semester 2, 2023/2024 Starting Semester 2, 2023/2024, the iTa'leem Team has announced the integration of Single Sign-On (SSO) into the iTa'leem platform — making access simpler and more secure. 🔑 What is SSO (Single Sign-On)?SSO allows users to access iTa’leem using just one set of login credentials without needing to maintain a separate password. 👥 Login Credentials IIUM Staff: Use your IIUM email credentials(Example: username@iium.edu.my) IIUM Students: Use your i-Ma’luum credentials(Username: Matric No. | Password: i-Ma’luum password) 🌐 Access iTa'leem Herehttps://italeemc.iium.edu.my/ 📞 Need Assistance?For help or technical support:📱 WhatsApp: +6011-5649 1385What is Staff Clearance (Exit Clearance)? Q: What is staff clearance and why is it required? A:Staff clearance, or exit clearance, is a formal procedure carried out when an employee leaves the organization—whether through resignation, retirement, or termination. It ensures that: All assigned responsibilities have been completed All university property (e.g., ID card, laptop, access cards) has been returned All outstanding matters (financial, legal, or administrative) are properly resolved This process helps both the employee and the university maintain a clear, accountable transition.What does “Connected, no internet” mean? Q: Why does my device say “Connected, no internet”? A:This message means your device is successfully connected to the Wi-Fi router, but the router itself is not connected to the internet. Possible causes include: Issues with your internet service provider (ISP) Problems with the modem or router Temporary network configuration errors Recommended Actions: Restart your modem and router Check if other devices have internet access Contact your ISP if the issue persists What should I do if my student status is 'DISMISSED'? If your status is listed as ‘DISMISSED’, please consult with your Kulliyyah, Academic Advisor, or the Deputy Dean for Student Affairs (DDSA) of your Kulliyyah.This is because the readmission process falls under the jurisdiction of the Kulliyyah. ✅ Once your status has been successfully changed to ‘ACTIVE’, access to IIUM systems such as i-Ma'luum and others will be restored automatically. For further clarification, kindly reach out directly to your respective Kulliyyah.What should I do if I cannot access the internet on my laptop using my IIUM student ID? A: If your laptop is unable to connect to the internet using your IIUM student ID, please follow these steps to troubleshoot the issue: ✅ Step-by-Step Troubleshooting Guide: Check for Antivirus InterferenceSome antivirus or security software may block Wi-Fi access or interfere with network authentication. Temporarily disable your antivirus software and check if the connection works. If the issue is resolved, consider removing the antivirus via:Control Panel > Programs > Programs and Features → Select antivirus program → Click Uninstall. Check Wi-Fi Connection Disconnect from the Wi-Fi network and try to reconnect. Make sure you are connecting to the correct IIUM Wi-Fi (e.g., IIUM_Student). Enter your IIUM student ID and password correctly. Restart Your Device Restart your laptop to refresh network configurations. Try Another Device Test the Wi-Fi on another device (e.g., smartphone) using the same credentials to confirm the issue is with your laptop. Still Having Issues? Visit the ITD Service Desk for hands-on assistance. 📧 Email: servicedesk@iium.edu.my ☎️ Call: 03-6421 6666 (ext. 6666) ITD GO GREEN What is E Waste What is E-Waste E-waste is electronic products that are unwanted, not working, and nearing or at the end of their “useful life.” Computers, televisions, VCRs, stereos, copiers, and fax machines are everyday electronic products. The ongoing challenge of how best to dispose of used and unwanted electronics isn’t a new one and dates back at least to the 1970s. But a lot has changed since then, particularly the number of electronics being discarded today. We also have something else today: a term for this issue. After several terms got suggested, including “Digital rubbish,” a consensus formed around the simple word “e- waste.” List of Common E-waste Items: Home Appliances  Microwaves  Home Entertainment Devices  Electric cookers  Heaters  Fans Communications and Information Technology Devices  Cell phones  Smartphones  Desktop Computers  Computer Monitors  Laptops  Circuit boards  Hard Drives Ref : https://www.ewaste1.com/what-is-e-waste/E-WASTE CHAMPAIGN Green IT Awareness ICT TIPS & TRICKS 10 Essential Computer Maintenance Tips Today’s computers come in many different shapes and sizes, and each keeps us connected to our digital world at any given time. Whether you depend on your collection of devices for work or play, keeping them in impeccable, unblemished condition is of the utmost importance. From their cosmetic appeal to their operational functionality, a well-maintained computer looks good, lasts longer, and performs reliably. Keeping your PC in tip-top condition lengthens the life of your PC, both internally and externally. A glitchy operating system, overheating CPU, or fast-draining battery are avoidable computer woes that a bit of regular maintenance could defend against. Let’s take a look at these 10 essential maintenance tips, so your PC will see many more years of powerful performance and sleek appeal. 1. Protect with padding Everyone has been there; drops, bumps, and slips result in unsightly cosmetic dings that leave your computer looking less-than-loved. If you’re like most people who travel with their PC, safeguarding against accidents can feel next to impossible when packing your PC away into a carry-on. An exposed laptop is vulnerable to all of the elements of travel you likely want to protect it from. Whether you’re traveling business-class or to a classroom across campus, shielding your PC against the elements starts with a protective case. There are a few different styles of protection that offer differing levels of armor and functionality. These include: SKINS Functioning as a full-body laptop sticker, laptop skins are best for protecting the chassis from light damage and scratches. HARDSHELL SNAP-ON COVERS Polycarbonate, plastic, or rubberized hard shell laptop covers protect your PC while still granting easy access to ports, buttons, lights, and fans. SLEEVES A simple, soft, envelope-style pouch typically made of gentle materials like nylon, polyester, suede, or microfiber, laptop sleeves are lightweight protection. MESSENGER BAG A shoulder bag specifically designed to accommodate your laptop and necessary peripherals, the dedicated laptop messenger bag offers the most padded protection. 2. Organize cords The only thing more frustrating than dealing with long, confusing cables is getting them all mixed up and tangled in the process. Keeping your digital world connected is a must, so nixing the cables isn’t a feasible option. Taking the time to declutter and organize the snake-like mass of wires spawning from your power strip and PC ports is a great first step for both desktop and laptop users. Try these wire organization tips: A ROTATING POWER STRIP Traditional power strips offer a single line or panel of surge inputs. A rotating power strip gives you the freedom to modify the positioning of your many chargers, monitors, and docks. COLOR-CODING CABLES Computer cables tend to be two colors; black and white. Organizing your mess of wires may be as simple as color coding them with reds, blues, yellows, greens, and or using labels in distinguishable hues. CABLE CLIPS Wire management is made simple when you attach cable clips to your desk, wall, or floor. These small clips are designed to hold cables of all different sizes. ORGANIZER PANEL Functioning as a panel of cable clips, a wire organizer panel accommodates multiple wires. Stick it in place with an adhesive or keep it desk-side when you use a weighted panel. Pro tip: Be sure to keep your wires away from any footpaths. Tripping over wires could result in the toppling of your devices, doing more damage in an instant than years of use could ever do. 3. Update your operating system If you’re looking for basic computer maintenance, keeping your operating system up to date is one of the easiest solutions. Regardless of whether you’re a Windows, Mac, or Linux loyalist, updating your PC when new patches are available ensures your PC stays at the cutting-edge of performance power. Windows 10 is known for keeping users in-tune with once-a-day update checks. This automated scan occurs in the background and always notifies you if there are any important software or operating system patches that need to be made. The end goal is to optimize your PC performance, so when Windows suggests you update, you should do it. Pro-tip: Some updates take longer than others. Set aside time before bedtime or during a daytime break to let Windows do its thing without interrupting your workflow. 4. Unplug to avoid overcharging With heightened dependence on wireless devices, optimizing battery power is a top priority for many. There are few things more dreadful than a draining battery when you’ve got hours of work and play left on your day’s schedule. However, it’s better to resist the temptation of plugging in the moment your PC falls under 50% battery life. Unnecessary charging can lead to overcharging, which then leads to regenerative capability deterioration. This often looks like a laptop that can’t hold a charge as well as it could in its earlier days. Being shackled to the weight of a charger defeats the purpose of a laptop’s wireless portability. To avoid a bad battery fate, unplug your device after it reaches 100% charge, and don’t plug in until power is actually low. 5. Purge your system of junk files and programs Computers tend to show their age best in the number of unused files living on their hard drives. Useless programs and old junk files likely take up more space than you realize. From old versions of software to retired versions of your resume, your PC is sure to have its fair share of digital debris festering on your desktop or in your start menu. These programs and files can quickly turn into performance hogs if they continue to accumulate. Before your computer gets to a point where it’s begging for more storage space, use these PC purge tips to relieve your system. Uninstall trialware Run disk cleanup software Empty the recycle bin Delete temporary files Remove cache of offline web pages 6. Run regular antivirus scans Malware attacks can sneak up on you at any given moment, and in the event one does, having a savvy antivirus living on your PC will protect you against the damage viruses bring. Weekly antivirus scans ensure your computer is always clear of malicious software infections. A basic scan will examine your computer for any glaring dangers or outstanding activity. For those who are frequent web-users and download programs and files regularly, consider running a virus scan twice a week. It’s always better to err on the side of safety, especially when your personal data could be at risk. Malware infections can compromise the performance of your computer and expose your confidential information to third-party cybercriminals. Depending on the type of malware installed on your system, a virus could also: Slow web browser speeds Disrupt network connections Freeze or crash your system Alter computer settings Allow unauthorized access to system resources By running regular antivirus scans you can rest assured that nothing slips by. Be sure to choose an antivirus scan servicer that also scans all of your downloads, too. 7. Clean the keyboard and case You’d be surprised to see just how much dust and debris lives underneath your keyboard’s keys. From food crumbs and dog hairs to dust and dirt, and everything else that can fit in between the keys, a number of dirty particles can clog your keyboard. This usually results in sticky or difficult-to-press buttons. Clearing out these hard-to-reach parts of your laptop or desktop setup is most easily done with a compressed air canister, available from office supply stores, computer stores, and hardware stores. FOR EXTERNAL KEYBOARDS Unplug the keyboard from the USB port or power it off if it’s wireless. Tilt the keyboard upside down and shake any loose debris out first. Spray compressed air at an angle and approximately 1-inch away from the keys. Use a damp microfiber cloth to finish the job, removing any excess dust or grime. FOR THE LAPTOP USER Power your laptop off and unplug any USB or power supply inputs. Tilt the laptop upside down and gently tap it to encourage any loose debris to come out. Set the laptop down in its natural position and spray between keys from about 1-inch away. Spray in short bursts moving from one side of the keyboard to the other. If you find certain spots tougher to clean than others, use a cotton ball dipped in isopropyl alcohol as a great alternative. Alcohol evaporates more quickly than water which makes it the perfect solution for hardened debris. Pro-tip: When cleaning your laptop or desktop, absolutely avoid pouring any type of liquid onto the body. Water and electronic devices do not mix well and could result in extreme damage to your computer. 8. Update your passwords Believe it or not, updating your passwords is a task as crucial as backing up your data. Verizon’s 2017 Data Breach Investigations Report found that an alarming 81% of hacking-related breaches leveraged either stolen and/or weak passwords [1]. Poor password behavior encompasses everything from using the same password for every account to using simple, guessable passwords like “password” or “123456.” When it comes to basic computer maintenance, protecting your digital world against cybercriminals should always be at the forefront of your task list. No security system is perfect, and more today than ever before, consumers are realizing this on a large scale. If you’re overdue for a password update, consider using these strong password generation tips: Use at least 10 characters Use a combination of uppercase and lowercase letters Include both numbers and special symbols Add emoticons if possible (:O, :(, :D, :), T.T) A strong password safeguards all of your data against potential third-party hackers which is precisely why it’s such an essential part of computer maintenance. 9. Organize your data It’s easy to let your computer’s data organization run awry when your work and play lifestyle doesn’t leave much time for calculated file management. Whether it’s old music files from your garage band days or downloaded add-ons for your favorite simulation game, your PC’s many folders can grow crowded. If you can’t remember the last time you took a look through your downloads folder, you’re likely overdue for a visit. The same applies to the rest of your default folders (documents, photos, etc.). Dealing with a cluttered desktop or crowded computer folders may be a daunting task, but with these tips and tricks, you’ll be well on your way to a functioning system of files and folders. CREATE LARGE, MAIN FOLDERS Everyone uses their computers for different primary purposes. A freelance writer will likely have completely different main folder assignments than a professional gamer or a business owner. It’s important to narrow down your digital world into easy folder divisions to make your first round of organization a breeze, and your future rounds even easier. CREATE SMALL SUB-FOLDERS Within your larger primary folders, smaller sub-folders make your organization operation even smoother. Being able to categorize files by their functionality or content will help you access them whenever you need them. No search button necessary. EMPTY YOUR DOWNLOADS FOLDER Your downloads folder should function as a temporary cache for recently downloaded files. Get into the habit of placing recent downloads in their proper folders or deleting them once they’ve served their purpose. CLEAR YOUR DESKTOP When you power on your computer and saddle up for your day’s work or some light social media browsing, you want to be able to do so without the stress of clutter. Clear your desktop of any files, folders, or programs you don’t need readily available at every power-on. CHOOSE THOUGHTFUL FILENAMES If you’re frequently saving images, PDFs, and other common files, you know how easy it is to type in gibberish for a successful “Save As” operation. Instead of rushing through, take the time to come up with intentional file names so you always know what’s living on your hard drive and where it’s located. 10. Back up your data Part of owning a modern computer is to prepare for the unexpected. Sudden crashes, untimely glitches, and random hardware failure all have the potential to damage the data living on your PC. Backing up files is one of the most vital computer maintenance procedures PC users can do for themselves. That’s why we’ve ranked it at our final spot. Your computer is replaceable, but without a backup, your information is not. Full backups are usually done on storage-heavy external hard drives and on the cloud. By making duplicate copies of everything on your PC (actually having your data in 3 places is safest), all of your valuable data lives both on your computer and inside of the external drive or cloud. Check out our Knowledge Base guide for a comprehensive walkthrough on how to perform a full backup on your Windows 10 or Windows 8 PC.Maintain Your Desktop Physical CareComputers include various sensitive internal structures, and it’s important to protectthe physical wellbeing of your PC to maintain the internal components that make it run: • Regularly clean and dust. Make sure you take the time to clean your PC ofdust and debris on a regular basis. Most electronics stores carry cans ofcompressed air that are perfect for clearing out the dust and crumbs hidingunder the keys of your keyboard. Additionally, dust that collects in the airvents of your PC could cause overheating. Try to make it a monthly habit to clean your PC’s air vents, connection ports,and keyboard with compressed air. Additionally, you should wipe down yourmouse and computer casing with a cleaning cloth. However, do not useabrasive cleaners – a clean, dry microfiber cloth will do.• Inspect power supply and devices. You more than likely use surge protectorsor similar devices to power your computer. It’s crucial to make sure thesedevices stay in safe working order. You should regularly check your powersupply and power outlets and look for any signs of dust or moistureaccumulation – either could be serious hazards.Make it a point to check the power cords and other cables attached to your PCfor signs of damage or fraying. Such damage can interfere with your PC’sperformance and is a fire hazard. Internal PerformanceCleaning your computer internally means maintaining your system to ensure optimalperformance. Additionally, proper maintenance will help keep your files secure. Apoorly maintained or rarely updated system is more vulnerable to sophisticated hackingmethods.Try to make a few things part of your daily routine: • Run antivirus. Your computer may have vulnerabilities that you don’t noticeuntil it’s too late. It’s important to run your antivirus scan every day to makesure any changes you made or files you downloaded have not compromisedyour system. Additionally, some malicious programs embed into systemswithout warning and require specific actions to trigger. Scanning your systemdaily will help prevent this.• Scan hard disk files. Over time, your computer’s hard drive can slow down dueto cluttered files. When you scan your system for errors using a diskdefragmenter or similar program, you’re essentially eliminating wasted spaceand helping your PC run more efficiently.• Update data backups. You should have at least one method for backing upyour data, whether it is on a cloud storage server or an external hard drive.Make sure you take the time to update your backups every day. That way youwon’t have to worry about losing a day’s work in the event your PCunexpectedly crashes.• Clear your web browser. Every time you go online, the sites you visit storetemporary files such as cookies and browsing history. Clear these files outto help keep them from bogging down your system.• Shut down properly. At the end of the day, make sure you save your workbefore closing all your programs and shutting down your PC. Leaving your PCon when not in use for extended periods prevents it from cooling and canimpact the machine’s performance. If shutting down interferes with your dailyroutine or business requirements, put your computer into a low-power orhibernation mode instead. Energy Saving Tips to Reduce Workplace Energy Costs Establish energy-efficient practices: Depending on the utility company you are paying, they usually have off to high peak times during the day. Try your best to only use excess energy during the low or off-peak times. Encourage your employees to follow this same model and see how energy usage decreases with more initiative. Replace existing bulbs with CFL’s: CFL and LED lights consume less power and offer much longer lifespans. Commercial lights qualified by the Design Lights Consortium (DLC) or Energy Star can ever reduce energy consumption by up to 75% and increase the lifespan of your fixtures by 2-3 times. Use the hibernation feature of computers and laptops: Hibernate feature in laptops and desktops allows you to save your existing work as it is, and you can continue from the same point the next day. Schedule your workstation to switch to hibernate mode after working hours and during weekends. Buy energy-efficient devices: Energy-efficient devices cost more upfront, but over years of use, they’re going to save you money. This holds true for any equipment that runs on electricity – spending a little more can result in significant savings over the years. Use energy-saving features: Educate your employees regarding energy-saving features of air conditioners, printers and let them use those features to cut energy costs. Discard old gadgets if they don’t have it and buy energy-efficient peripherals. How to Keep Your Laptop Battery in Good Condition Here’s the best advice for keeping your laptop battery running as long as it can on its little pack full of chemicals. Don’t worry if you can’t swear an oath to them: like 8 cups of water a day, or 10,000 steps, they’re guidelines, and your life may have present exceptions. But following as many as you will yield. good results over years of use. Keep It Between 40 and 80 Percent Charge If You Leave It Plugged In, Don’t Let It Run Hot Keep It Ventilated, Store It Somewhere Cool Don’t Let It Get to Zero Replace Your Battery When It Gets Below 80 Percent Health Laptops are not good to keep on your lap. Because of their compact size and lack of large cooling fans, laptops can get quite hot, to the point of causing gradual skin burns, or “toasted skin syndrome.” If non- toasted skin weren’t incentive enough, the heat your thighs create by trapping heat and blocking vents is also killing the laptop battery.Analog vs. Digital Analog Digital Signal Analog signal is a continuous signal which represents physical measurements. Digital signals are discrete time signals generated by digital modulation.Waves Denoted by sine waves Denoted by square waves RepresentationUses continuous range of values to represent information Uses discrete or discontinuous values to represent information Example Human voice in air, analogue electronic devices. Computers, CDs, DVDs, and other digital electronic devices. Technology Analog technology records waveforms as they are. Samples analogue waveforms into a limited set of numbers and records them. Data transmissions Subjected to deterioration by noise during transmission and write/read cycle. Can be noise-immune without deterioration during transmission and write/read cycle. Response to Noise More likely to get affected reducing accuracy Less affected since noise response are analogy in natureFlexibility Analog hardware is not flexible. Digital hardware is flexible in implementation. Uses Can be used in analogue devices only. Best suited for audio and video transmission. Best suited for Computing and digital electronics. Applications Thermometer PCs, PDAs Bandwidth Analog signal processing can be done in real time and consumes less bandwidth. There is no guarantee that digital signal processing can be done in real time and consumes more bandwidth to carry out thesame information. Memory Stored in the form of wave signal Stored in the form of binary bitPower Analog instrument draws large power Digital instrument draws only negligible power Cost Low cost and portable Cost is high and not easily portableImpedance Low High order of 100 megaohmErrors Analog instruments usually have a scale which is cramped at lower end and giveconsiderable observational errors. Digital instruments are free from observational errors like parallax andapproximation errors. https://www.diffen.com/difference/Analog_vs_DigitalProtect Eye from Computer / Notebook Screen Can Screens Make Your Eyesight Worse? Digital Eye Strain (DES), or computer vision syndrome, is more common today than ever before. Realistically, virtually everyone uses a screen in their daily life, and screen time is higher than ever before. While not everyone spends every day looking at a computer monitor, most people do use smartphones at a minimum. Experts believe that DES occurs in around 50% of computer users. So, do screens make your eyesight worse? Well, the good news is that eye strain isn't a long-term problem. There's no evidence that strain makes your eyesight worse in the long run, but it can cause significant discomfort and often makes getting through a workday more difficult. How A Computer Screen Affects Your Eyes How exactly does the screen affect your eyes? There are several signs to look out for, and they vary slightly depending on whether you primarily use a computer or a smartphone. Let’s take a look at some of those complaints and explore how you can avoid them. The American Optometric Association recognizes the most common symptoms of eye strain as: Headaches Blurred vision Dry eyes In extreme cases, neck and shoulder pain. How To Protect Your Eyes From Computer Screens Your eyes aren’t designed to stare all day at something directly in front of you, especially a digital screen. With the 20/20/20 rule, you give your eyes a much-needed break during long and extended work days. The rule is as follows; if you look at the screen for 20 minutes, you must look at something at least 20 feet away from you for 20 seconds. However, the longer you look away from your screen, the better! Ensure Your Room Is Well Lit It may sound counterintuitive, but less light in your room is actually better for your eyes when you’re working on a computer. Offices shouldn’t be too bright, so when possible, close your curtains and reduce your use of fluorescent lighting. Aim to use lower voltage bulbs and make sure your ambient lighting is about half as bright as        the average office. Have Regular Eye Exams Regular eye exams with an experienced eye doctor help to keep your eye health in check and ensure any problems you might be having aren’t anything other than normal eye strain. It also provides you with an excellent opportunity to talk to an expert about your habits and eye health. Reduce Glare Glare on your computer screen can cause eye strain as it stops your eyes from adjusting as easily as they should to the content you’re trying to focus on. To combat this, use an anti-glare matte screen where possible (rather than glass-covered LCDs). If you wear glasses, make sure your lenses have an anti-reflective coating that will benefit you in front of a computer. Cyber Security Tips & Tricks: Prevent Phishing Attacks This awareness campaign emphasizes the critical importance of protecting yourself from phishing attacks. Phishing, often disguised as legitimate communication, poses a serious threat, leading to data theft, fraud, and unauthorized access to personal information. By staying vigilant and implementing simple security measures, you can significantly reduce your risk of falling victim to these scams. Remember, IT security is everyone’s responsibility. Artificial intelligence (AI) Artificial intelligence (AI) What is artificial intelligence (AI)?Artificial intelligence is the simulation of human intelligence processes by machines, especially computersystems. Specific applications of AI include expert systems, natural language processing, speech recognitionand machine vision. How does AI work?As the hype around AI has accelerated, vendors have been scrambling to promote how their products andservices use it. Often, what they refer to as AI is simply a component of the technology, such as machinelearning. AI requires a foundation of specialized hardware and software for writing and training machinelearning algorithms. No single programming language is synonymous with AI, but Python, R, Java, C++ andJulia have features popular with AI developers. In general, AI systems work by ingesting large amounts of labeled training data, analyzing the data forcorrelations and patterns, and using these patterns to make predictions about future states. In this way, a chatbotthat is fed examples of text can learn to generate lifelike exchanges with people, or an image recognition toolcan learn to identify and describe objects in images by reviewing millions of examples. New, rapidly improvinggenerative AI techniques can create realistic text, images, music and other media. AI programming focuses on cognitive skills that include the following: Learning. This aspect of AI programming focuses on acquiring data and creating rules for how to turnit into actionable information. The rules, which are called algorithms, provide computing devices withstep-by-step instructions for how to complete a specific task. Reasoning. This aspect of AI programming focuses on choosing the right algorithm to reach a desiredoutcome. Self-correction. This aspect of AI programming is designed to continually fine-tune algorithms andensure they provide the most accurate results possible. Creativity. This aspect of AI uses neural networks, rules-based systems, statistical methods and otherAI techniques to generate new images, new text, new music and new ideas.How do I check if my email is spam? Here are some additional tips to help you identify and avoid spam emails: Check the sender information: Verify that the email is coming from a legitimate source. If the sender’s email address looks suspicious or unfamiliar, it’s best to avoid opening the email or clicking on any links. Check the content: Look for any spelling or grammar errors in the email. Legitimate emails are usually well-written and free of errors. Check the links: Hover over any links in the email to see where they lead. If the link looks suspicious or leads to an unfamiliar website, do not click on it. Check the salutation and signature: Legitimate emails usually include a proper salutation and signature. If the email does not include these elements, it may be a spam email. Check the spam score: You can use an email checker tool to check the spam score of an email. This tool analyzes the email content, sender ID, SPF records, DNS settings, IP blacklisting, domain reputation, domain keys, DKIM, and PTR records to determine if the email is spam or not. I hope these tips help you stay safe online! How to Recover Permanently Deleted Files from Google Drive Google Drive is a cloud storage service, which becomes a popular online service that many peoples use it to sync data, back up and transfer. What if one day you delete your important files but you want to recover, how should you do? Don't worry, this post offers you 4 ways to recover permanently deleted files from Google Drive. Part 1: Is it Possible to Recover Permanently Deleted Files from Google Drive You may want to ask "Can you recover permanently deleted files on Google Drive". Yes. Deleted videos, photos and presentations are automatically added to Google Drive Trash, which can restore about 30 days. But how do I recover permanently deleted files from Google Drive after 30 days? If you empty the recycle bin, there are still other ways to recover permanently deleted files on Google Drive, such as using the third-party software. Part 2: 4 Ways to Recover Permanently Deleted Files from Google Drive Here are 4 ways to help you restore permanently deleted files from Google Drive no matter you have backup or not. Way 1: How to Recover Deleted Files from Google Drive Trash? The easiest way to retrieve permanently deleted files on Google Drive is by restoring it from the Trash folder. How long does Google Drive Trash keep deleted files? All erased files are temporarily stored in Trash within 30 days. Here are the steps to restore deleted files from Trash: Step 1. Just go to Google Drive.com, click the "Trash" option on the left side. Step 2. Select the files you need. Step 3. Right click the files and choose the "Restore" option. Way 2: Try Software to Restore Permanently Deleted Files Google Drive If you have installed Google Drive on computer before and have synced your files on computer to Google drive, then you can try to use the professional tool -Windows Data Recovery to retrieve deleted files by scanning the folder where Google Drive is placed on the computer. Step 1Launch Any data recovery software on your computer and choose a location where Google Drive sync your files. Click "Scan" to scan lost files Step 2After the scan is finished, you can check if the lost files are displayed in file view. Step 3Preview lost files and then click "Recover" button. And choose a location to save. Way 3: Contact Google Drive Support to Get Permanently Deleted Files from Google Drive This is another method of recovering permanently deleted files from Google Drive. You should use this method if you are having difficulty recovering your deleted files via other methods. 1. Open Google Drive website and click on the "?" icon. 2. Click on the "Send feedback". 3. Fill in the form stating your requirement and submit it. Google Drive support team will contact you later, and you can tell them you wish, they will help you recover the lost files Bonus Tip: How to Use Google's Backup and Sync Google has some applications that can performs a backup. Although these apps are not very professional, they can help users preserve the Google Drive data for an unlimited time period or back up Google Drive to an external hard drive. How to download your Google Drive folders with Backup and Sync Client? Here are steps: Step 1Go to Google drive website to download the Backup and Sync app. Step 2 Launch the app and log in with your Google account. Once you sign in successfully, a window will pop up, in which you can choose the folders to continuously back up to Google Drive. Then Click "Next" button. Step 3Click on the "Got it" button. Step 4Choose the option "Sync My Drive to this computer" Step 5Select a local folder to place your downloaded Drive files. Step 6Tick "Sync everything in My Drive" if you need to sync the whole Drive; If not, select "Sync only these folders" to back up selected folders. Step7Click the "START" button. After that, you can copy all the downloaded files and save in another folder or device. Conclusion There are 3 ways to restore permanently deleted files on Google Drive . You can get deleted files back from Trash, ask the administrator for help, or contact Google's support team. But if you have installed Google Drive on your computer, using Windows Data Recovery can help you recover permanently deleted files with ease. Tips: OtterPilot Meeting Awareness for Multi-Factor Authentication (MFA) This awareness campaign highlights the importance of Multi-Factor Authentication (MFA). MFA provides an additional layer of security beyond passwords, making it significantly more difficult for unauthorized users to access your accounts. Remember, adopting MFA and staying vigilant can greatly enhance your overall security. Cybersecurity Tips & Tricks: Security Guidelines for Using Public Wi-Fi This awareness campaign emphasizes the importance of secure Wi-Fi usage in public spaces. While public Wi-Fi networks offer convenience, they can expose users to significant security risks, including data theft and unauthorized access. By adhering to the best practices outlined in the infographic below, you can safeguard your personal information and ensure your privacy. Remember, staying vigilant and implementing simple security measures can dramatically reduce your risks when using public Wi-Fi. Cybersecurity Tips & Tricks: Awareness for Multi-Factor Authentication (MFA) Recognizing these common signs of a scam could help you avoid one. Four Signs That It’s a Scam Scammers PRETEND to be from an organization you know. Scammers often pretend to be contacting you on behalf of the government. They might use a real name, like the FTC, Social Security Administration, IRS, or Medicare, or make up a name that sounds official. Some pretend to be from a business you know, like a utility company, a tech company, or even a charity asking for donations. They use technology to change the phone number that appears on your caller ID. So the name and number you see might not be real. Scammers say there’s a PROBLEM or a PRIZE. They might say you’re in trouble with the government. Or you owe money. Or someone in your family had an emergency. Or that there’s a virus on your computer. Some scammers say there’s a problem with one of your accounts and that you need to verify some information. Others will lie and say you won money in a lottery or sweepstakes but have to pay a fee to get it. Scammers PRESSURE you to act immediately. Scammers want you to act before you have time to think. If you’re on the phone, they might tell you not to hang up so you can’t check out their story. They might threaten to arrest you, sue you, take away your driver’s or business license, or deport you. They might say your computer is about to be corrupted. Scammers tell you to PAY in a specific way. They often insist that you can only pay by using cryptocurrency, wiring money through a company like MoneyGram or Western Union, using a payment app, or putting money on a gift card and then giving them the numbers on the back of the card. Some will send you a check (that will later turn out to be fake), then tell you to deposit it and send them money. How To Avoid a Scam 1.Block unwanted calls and text messages. Take steps to block unwanted calls and to filter unwanted text messages. 2.Don’t give your personal or financial information in response to a request that you didn’t expect. Honest organizations won’t call, email, or text to ask for your personal information, like your Social Security, bank account, or credit card numbers. 3.If you get an email or text message from a company you do business with and you think it’s real, it’s still best not to click on any links. Instead, contact them using a website you know is trustworthy. Or look up their phone number. Don’t call a number they gave you or the number from your caller ID. 4.Resist the pressure to act immediately. Honest businesses will give you time to decide. Anyone who pressures you to pay or give them your personal information is a scammer. 5.Know how scammers tell you to pay. Never pay someone who insists that you can only pay with cryptocurrency, a wire transfer service like Western Union or MoneyGram, a payment app, or a gift card. And never deposit a check and send money back to someone. 5.Stop and talk to someone you trust. Before you do anything else, tell someone — a friend, a family member, a neighbours — what happened. Talking about it could help you realize it’s a scam. ICT KNOWLEDGE ChatGPT ChatGPT is an AI-powered language model developed by OpenAI. It’s capable of generating human-like text based on context and past conversations. It’s a version of the GPT model that’s been fine-tuned and optimized to generate human-like text based on the input it receives, making it ideal for chatbot applications. ChatGPT can be used for a variety of tasks such as teaching negotiation, planning trips, drafting thank-you notes, explaining code, training for a marathon, translating recipes, ranking dog breeds for a small apartment, planning fun dinner parties, and much more. You can now show ChatGPT images and start a chat. For example, you can troubleshoot why your grill won’t start, explore the contents of your fridge to plan a meal, or analyze a complex graph for work-related data. You can also create images simply by describing them in ChatGPT. ChatGPT is available on the web, iOS, and Android. There are different plans available, including a free plan and a Plus plan for $20 per month that gives access to GPT-4 (their most capable model), chat with images, voice and create images. You can find more information on the OpenAI website.Do’s and Don’ts of the Workplace Rules Everyone Should Follow The Do’s Do arrive early. Do be willing to help a co-worker. Do jump at the chance to complete a new task. Do dress appropriately for the office. Do be flexible. The Don’ts Don’t have personal conversations at your desk. Don’t bring your emotions into the office. Don’t be afraid to ask questions. Don’t be nervous, but also don’t overstep your boundaries. Don’t forget that at work socials, you’re still at work. What is 5G 5G is the 5th generation mobile network. It is a new global wireless standard after1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed toconnect virtually everyone and everything together including machines, objects, anddevices. 5G wireless technology is meant to deliver higher multi-Gbps peak data speeds,  ultralow latency , more reliability, massive network capacity, increased availability, and amore uniform user experience to more users. Higher performance and improvedefficiency empower new user experiences and connects new industries.What are the differences between the previous generations ofmobile networks and 5G? The previous generations of mobile networks are 1G, 2G, 3G, and 4G.First generation - 1G1980s: 1G delivered analogue voice.Second generation - 2G Early 1990s: 2G introduced digital voice (e.g. CDMA- Code Division MultipleAccess). Third generation - 3GEarly 2000s: 3G brought mobile data (e.g. CDMA2000).Fourth generation - 4G LTE 2010s: 4G LTE ushered in the era of mobile broadband.1G, 2G, 3G, and 4G all led to 5G, which is designed to provide more connectivitythan was ever available before 5G is a unified, more capable air interface. It hasbeen designed with an extended capacity to enable next-generation userexperiences, empower new deployment models and deliver new services.With high speeds, superior reliability and negligible latency, 5G will expand themobile ecosystem into new realms. 5G will impact every industry, making safertransportation, remote healthcare, precision agriculture, digitized logistics — andmore — a reality.Information and Communication Technologies (ICT) The meaning of Information Technology & CommunicationInformation and Communications Technology (ICT) is the use of computing andtelecommunication technologies, systems and tools to facilitate the way information iscreated, collected, processed, transmitted and stored. It includes computing technologieslike servers, laptop computers and software applications. History and Evolution of ICT The concept of ICT can be traced back to the 19th century with the development of thetelegraph and the telephone. These two inventions revolutionized the way people workedand interacted socially by making it possible for one person to communicate with anotherperson in a different location in real or near-real time. Information and communication technology includes a wide range of information,telecommunication and support tools and services that work together to facilitate. This includes: JAVA What is Java? Java is a popular programming language, created in 1995. It is owned by Oracle, and more than 3 billion devices run Java. It is used for: Mobile applications (specially Android apps) Desktop applications Web applications Web servers and application servers Games Database connection And much, much more! Why Use Java? Java works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc.) It is one of the most popular programming languages in the world It has a large demand in the current job market It is easy to learn and simple to use It is open-source and free It is secure, fast and powerful It has huge community support (tens of millions of developers) Java is an object oriented language which gives a clear structure to programs and allows code to be reused, lowering development costs As Java is close to C++ and C#, it makes it easy for programmers to switch to Java or vice versa Java Install Some PCs might have Java already installed. To check if you have Java installed on a Windows PC, search in the start bar for Java or type the following in Command Prompt (cmd.exe): If you do not have Java installed on your computer, you can download it for free at oracle.com. Ref : www.w3schools.com/Differences Between Macs and PCs 1. User One thing that both Mac and Windows PC fans have in common is passion for the brands themselves. Get a diverse group of computer users together and introduce the subject of Macs versus PCs and watch the sparks fly! Mac users will bring up concepts like security, usability and design. PC owners will counter with price, software compatibility and choice. It can get really ugly really fast (but it's fun to watch). In 2011, an unscientific online study showed that the popular "Get a Mac" ads from the 2000s featuring John Hodgman and Justin Long as a PC and a Mac, respectively, were generally accurate representations of their stereotypes. Hodgman's PC was the boring, all-business machine, while Long's Mac was the more fun and creative computer. Although Windows PC users often bring up the so-called "Apple tax" — Apple computers generally appear to cost more than PCs on store shelves, it appears that Apple computers, phones and tablets have become a sort of status symbol. Owning an iPhone or wearing AirPods says something about you. For one reason or another, it looks like perception and politics will continue to play roles in the choice of devices to buy for years to come. 2. Operating System The operating system has been a long-standing difference between Mac and PC; currently, Mac computers are preinstalled with the latest version of Mac OS, while most PCs come with the latest Microsoft Windows. In the 2000s and 2010s, Apple's computers used Intel's processors, which let consumers run both Mac OS and Windows on their machines. This was especially helpful for people who needed both operating systems for their daily work. Apple upended that model in the 2020s, however, with the advent of its M1 processor. As of this writing, Windows will not run on these machines, forcing consumers to choose between the two — or buy one of each. But while Apple is moving away from Windows compatibility, it is moving toward compatibility with its own popular mobile devices running iOS and iPad OS. Apple's processor plans may make it possible to run the same apps on computers as it runs on higher-powered tablets and phones. Windows, of course, runs on computers and tablets, but it dropped its dedicated phone OS in 2017 in favor of Windows Mobile. Microsoft is unlikely to let Google and Apple have all the fun, though, and will continue finding ways to operate between computers, tablets and phones. The Microsoft Surface, a PC with a slim, light and tablet-like form factor is proof of that. 3.Choice Perhaps the most obvious difference between a Mac and a PC is the number of configurations available for each brand. Currently, Apple offers just five computer lines: the MacBook Air, the MacBook Pro, the Mac mini, the iMac and the Mac Pro. Even if each configuration of these models is counted individually, as of this writing Apple only offers 20 unique computers. This limited selection is not a sign of weakness, but a part of the company's "less is more" approach to marketing. PCs, on the other hand, come in a wide variety of shapes and sizes. Consumer Reports reviews 12 distinct brands of Windows-based computers, including familiar names such as Acer, Asus, Dell, Gateway, HP, Hyundai, Lenovo and Samsung, each offering numerous configurations of desktop and laptop models. Many consumers see this large selection as a benefit because they're more likely to find a computer that meets their exact needs. 4.Price One of the most frequently cited differences between Macs and PCs is price. Few Mac products sell for less than $1,000, while there are many PC models that fall within that price range. However, this doesn't necessarily mean that Macs are more expensive than PCs with similar specifications. Rather, in general, Apple has chosen to build its Mac line around higher-end computers with better — and more costly — components. The company has said on many occasions that it can make less-expensive computers, but that would affect the customer experience and Apple won't allow that. The problem with comparing prices between Macs and PCs is that the computers are rarely comparable. Even if you did find two computers with the same processor speed, RAM, hard-drive capacity, graphics, memory, number of USB ports, and so on, each machine would be preinstalled with vastly different software packages. The user may have to purchase additional software for whatever computer he or she chooses, like a virus program for a PC or Microsoft Office for a Mac. The bottom line is this: The relative value of a Mac or PC really depends on the consumer's needs. If you just need a computer to perform basic functions like web surfing or word processing, it might be hard to justify buying a Mac. There are plenty of PC choices out there that are less expensive. This is where Linux fans can chime in — even someone unfamiliar with the Linux operating system can buy a cheap computer, install a simple Linux distribution and access basic computer functions. And this also explains the jump in Chromebook sales, as they're inexpensive computers meant to handle everyday tasks. 5. Design One of the most frequently cited differences between Macs and PCs is price. Few Mac products sell for less than $1,000, while there are many PC models that fall within that price range. However, this doesn't necessarily mean that Macs are more expensive than PCs with similar specifications. Rather, in general, Apple has chosen to build its Mac line around higher-end computers with better — and more costly — components. The company has said on many occasions that it can make less-expensive computers, but that would affect the customer experience and Apple won't allow that. The problem with comparing prices between Macs and PCs is that the computers are rarely comparable. Even if you did find two computers with the same processor speed, RAM, hard-drive capacity, graphics, memory, number of USB ports, and so on, each machine would be preinstalled with vastly different software packages. The user may have to purchase additional software for whatever computer he or she chooses, like a virus program for a PC or Microsoft Office for a Mac. The bottom line is this: The relative value of a Mac or PC really depends on the consumer's needs. If you just need a computer to perform basic functions like web surfing or word processing, it might be hard to justify buying a Mac. There are plenty of PC choices out there that are less expensive. This is where Linux fans can chime in — even someone unfamiliar with the Linux operating system can buy a cheap computer, install a simple Linux distribution and access basic computer functions. And this also explains the jump in Chromebook sales, as they're inexpensive computers meant to handle everyday tasks.What are Radio Frequency bands and its uses? What are Radio Frequency bands and its uses? What is Radio Frequency?RF is the lowest portion of the electromagnetic spectrum, familiar as amedium of analog and modern digital wireless communication systems. Itspreads in the range between 3 kHz and 300 GHz. All known transmissionsystems work in the RF spectrum range, including analog radio, aircraftnavigation, marine radio, amateur radio, TV broadcasting, mobile networks,and satellite systems. Let’s take a look at each of the Radio Frequencybands and their uses. Extremely Low Frequency (ELF)Frequency starting from 3Hz to 3 kHz is known as Extremely LowFrequency or ELF range in the electromagnetic spectrum. According toIEEE band designation, these ranges are divided into three sub-bands:ELF – Extremely Low Frequency, ranging from 3Hz to 30Hz.SLF– Super Low Frequency, ranges from 30 to 300Hz.ULF – Ultra Low Frequency, ranging from 300 to 3000Hz (3 KHz).This range is highly vulnerable to disturbance and easily distorted byatmospheric changes. Designing a system in this range is challengingbecause the larger wavelengths require long antennas, which arepractically impossible to achieve.Scientists use this frequency band in seismic studies to understand naturalactivities in the Earth’s atmosphere and communication with submarines. Very Low Frequency (VLF) Very Low Frequency is the starting range of RF and practical radiotransmission systems which span from 3 kHz to 30 kHz. However, thedesign and implementation of the antenna system are extremelycomplicated due to the wavelength.It has been used in submarines and still using in time radio stations whichsynchronizes clock signals between two remote locations. Low Frequency (LF)Low frequency is in the range of 30 kHz to 300 kHz. One of the importantproperties of LF signals is that they will get reflected by the earth’sionosphere and thus, it is suitable for long-distance communication. Sinceit’s a long wavelength and less attenuation from big terrains like mountains,it is generally called a ground wave.Amateur radio operators use low-frequency signals; it is one of the mostimportant sources of information transfer when another kind ofcommunication source fails during some situations like natural disasters.Other areas are military applications like submarines, RFID tags in near-field communication, and some low-frequency radio broadcasting. Medium Frequency (MF)Medium frequency was one of the most popular frequency bands since thebeginning of wireless radio transmission in the early nineteenth century. MFoperates in the range of 300 kHz to 3 MHz.  The transmitters, receivers,and antenna design is relatively less complex than other high-frequencytransmission bands.Medium Frequency has been widely used in AM radio transmission,navigation systems for ships and aircraft, emergency distress signals, coastguards, and other experimental applications. High Frequency (HF) High-frequency signals range between 3 MHz and 30 MHz. This frequencyband is also known as a short wave. It also gets reflected by the earth’sionosphere, and it is one of the suitable bands for long-distancecommunication. ConclusionRF is a broad spectrum, and many of its characteristics have not beenexperimented with yet. It has a lot of possibilities in medical applicationslike MRI technology (even up to 12 Tesla for medical research),seismography, and oceanic studies. RF transceivers are significantcomponents in interplanetary missions such as the Mars exploration. Ourfuture digital communication systems may rely on high-frequency bands ofthe RF spectrum since they can support higher bandwidthVoIP Advantages and Disadvantages (IP phone) VoIP Advantages Being VoIP providers ourselves at Nextiva, it would be fair to say we know a thing or two about VoIP. Here’s a detailed guide to its pros and cons:  Lower costs  Increased accessibility  Complete portability  Higher scalability  Advanced features for small and large teams  Clearer voice quality  Supports multitasking  More flexibility with softphones VoIP Disadvantages Here are the downsides associated with the VoIP service you need to be aware of:  Needs a reliable internet connection  Susceptible to network jitter  Limited location tracking for emergency calls  Compatibility issues with some traditional alarm systems  Security concernsE-Waste & its Negative Effects on the Environment Electronic waste, also known as e-waste, is any electronic product, or product containing electronic components, that has reached the end of its usable life cycle. Unbeknownst to many consumers, electronics actually contain toxic substances - therefore they must be handled with care when no longer wanted or needed. If a product is outdated, consumers can donate it to someone who might still find it valuable. Many retailers also offer trade-in programs or incentives for people looking to upgrade electronics that require the surrender of an older model; the retailers are able to reuse or repurpose the older models. However, if a product is totally unusable or broken, instead of just being thrown in the garbage, it must be thrown away by a certified e-waste hauler or recycler, or taken to a designated drop-off at a government building, school or organization as e-waste can potentially cause harm to humans, animals and the global environment if disposed of improperly. The consequences of improper e-waste disposal in landfills or other non-dumping sites pose serious threats to current public health and can pollute ecosystems for generations to come. When electronics are improperly disposed and end up in landfills, toxic chemicals are released, impacting the earth’s air, soil, water and ultimately, human health. The Negative Effects on Air Contamination in the air occurs when e-waste is informally disposed by dismantling, shredding or melting the materials, releasing dust particles or toxins, such as dioxins, into the environment that cause air pollution and damage respiratory health. E-waste of little value is often burned, but burning also serves a way to get valuable metal from electronics, like copper. Chronic diseases and cancers are at a higher risk to occur when burning e- waste because it also releases fine particles, which can travel thousands of miles, creating numerous negative health risks to humans and animals. Higher value materials, such as gold and silver, are often removed from highly integrated electronics by using acids, desoldering, and other chemicals, which also release fumes in areas where recycling is not regulated properly. The negative effects on air from informal e-waste recycling are most dangerous for those who handle this waste, but the pollution can extend thousands of miles away from recycling sites The air pollution caused by e-waste impacts some animal species more than others, which may be endangering these species and the biodiversity of certain regions that are chronically polluted. Over time, air pollution can hurt water quality, soil and plant species, creating irreversible damage in ecosystems. For instance, an informal recycling hub in Guiyu, China that was formed by parties interesting in extracting valuable metals from e-waste, and subsequently has caused the region to have extremely high lead levels in the air, which are inhaled and then ingested when returned to water and soil. This can cause disproportionate neurological damage to larger animals, wildlife and humans in the area. The Negative Effects on Soil When improper disposal of e-waste in regular landfills or in places where it is dumped illegally, both heavy metals and flame retardants can seep directly from the e-waste into the soil, causing contamination of underlying groundwater or contamination of crops that may be planted near by or in the area in the future. When the soil is contaminated by heavy metals, the crops become vulnerable to absorbing these toxins, which can cause many illnesses and doesn’t allow the farmland to be as productive as possible. When large particles are released from burning, shredding or dismantling e-waste, they quickly re-deposit to the ground and contaminate the soil as well, due to their size and weight. The amount of soil contaminated depends on a range of factors including temperature, soil type, pH levels and soil composition. These pollutants can remain in the soil for a long period of time and can be harmful to microorganisms in the soil and plants. Ultimately, animals and wildlife relying on nature for survival will end up consuming affected plants, causing internal health problems. The Negative Effects on Water After soil contamination, heavy metals from e-waste, such as mercury, lithium, lead and barium, then leak through the earth even further to reach groundwater. When these heavy metals reach groundwater, they eventually make their way into ponds, streams, rivers and lakes. Through these pathways, acidification and toxification are created in the water, which is unsafe for animals, plants and communities even if they are miles away from a recycling site. Clean drinking water becomes problematic to find. Acidification can kill marine and freshwater organisms, disturb biodiversity and harm ecosystems. If acidification is present in water supplies, it can damage ecosystems to the point where recovery is questionable, if not impossible. The Negative Effects on Humans As mentioned, electronic waste contains toxic components that are dangerous to human health, such as mercury, lead, cadmium, polybrominated flame retardants, barium and lithium. The negative health effects of these toxins on humans include brain, heart, liver, kidney and skeletal system damage. It can also considerably affect the nervous and reproductive systems of the human body, leading to disease and birth defects. Improper disposal of e-waste is unbelievably dangerous to the global environment, which is why it is so important to spread awareness on this growing problem and the threatening aftermath. To avoid these toxic effects of e-waste, it is crucial to properly e-cycle, so that items can be recycled, refurbished, resold, or reused. The growing stream of e-waste will only worsen if not educated on the correct measures of disposal. Ref : https://elytus.com/AI in Education Benefits, Challenges, and Best Practices Benefits of AI in Education Artificial intelligence brings with it a wealth of opportunities in online course designand delivery, among them:Efficiency in Content Creation: AI can produce and update educational contentquickly, freeing educators from laborious tasks. This not only saves time but alsoensures that content remains current and relevant. Task Automation Enhanced Student Engagement Visual Learning Aids Support for Special Needs Virtual TutorsChallenges of AI in Education  Technical Expertise Some educators may struggle with a lack of technical expertise, spending anexcessive amount of time and effort trying to adapt AI tools to their needs.  Cost Implementing AI-powered solutions can be financially demanding, making it achallenge for institutions with budget constraints.  Ethical Concerns Privacy, security, plagiarism, inequity, and the potential disruption of the jobmarket are among the ethical concerns that need careful consideration whenintegrating AI in education.  Quality Concerns Maintaining high standards and ensuring AI-generated content aligns witheducational objectives is critical. An over-reliance on AI tools may lead to adecline in quality and richness of educational content, with the risk ofperpetuating inaccuracies or biases present in the training data of the AImodel.  Human-AI Collaboration There may be resistance to adopting AI in education due to concerns aboutjob displacement. However, AI is not a replacement for human creativity.Educators and learners contribute unique perspectives and creative thinkingthat AI cannot replicate. Instead, AI serves as a valuable tool to augmenthuman capabilities.The Importance of Data Back-Up The Importance of Data Back-Up Backing up collected data is an important part of data management. Backups protect againsthuman error, hardware failure, virus attacks, power outages and natural disasters. Whenthese errors occur, backups save time and money. What is Data Backup?Data backup is making copies of scanned data and other business information in case thedata becomes corrupted, deleted or lost. You can then use the backup copy to restore orrecover your data for business continuity and disaster recovery.Many IT departments create multiple backup copies, keeping one copy on site for quickrecovery and a second copy off-site, or in the cloud. This typically occurs if the onsite copy isdamaged due to a natural or man-made disaster.Early common methods of backing up data involved downloading data from the computer’shard drive onto a set of small diskettes, which were stored in physical containers.Since then, the emergence of technology has made it possible to back up data remotely anddownload huge amounts of data to small portable devices. Cloud services and relatedoptions facilitate remote data storage, so that data is secure if an entire facility or site iscompromised, while RAID, or mirroring technologies provide automated backup options. Why is backing up computer data important?1. To protect against cyber attacksCyber-attacks have become more common in recent years, so having a data backup andrecovery solution is paramount.2. To save moneyMissing data can be costly, especially if you must recreate the lost data from scratch. Inaddition, the downtime caused by lost data can also negatively impact your businessefficiency and customer trust.3. To reduce outages or downtimeData loss can be very disruptive to your business. However, with data backups, youcan easily restore recent copies of your data, so there’s no need to interruptoperations to redo lost work. High-end data backup solutions ensure fast recoverytimes for critical data to maximize uptime. The Most Common Data Backup Methods CloudCloud storage is a great way to create online backups. This service can store files, photos orany other type of data. The Cloud can be used as a primary or secondary backup for amonthly fee. You can then use this space to store your backups. Most providersoffer encryption services so that your data is secure when stored in the Cloud.You can access your backups in from any computer or mobile device with an internetconnection.  You can use cloud storage providers such as Google Drive, iCloud, Dropbox,Back blaze, iDrive and Microsoft OneDrive. Network Attached Storage (NAS)If your data is valuable, invest in a network attached storage (NAS) device. NAS is adedicated server that provides storage and file sharing for your home or small businessnetwork. Unlike an external hard drive plugged into your router, a NAS is designed tobe always on and connected so you can access your data anytime and from anywhere. Online Backup ServiceYou can back up your data using an online backup service  Encrypting your files. Scheduling regular backups. Storing backup files in a secure location.They offer security features such as file encryption and password protection. Most onlinebackup services also allow you to store your backup files in a secure location to ensure yourdata is safe and protected.5 Example How AI Is Already Used in Our Everyday Life 1. Open your phone with face IDOne of the first things many people do each morning is to reach for their smartphones. And,when your device gets unlocked using biometrics such as with face ID, it's using artificialintelligence to enable that functionality. Apple’s FaceID can see in 3D. It lights up your faceand places 30,000 invisible infrared dots on it and captures an image. It then uses machinelearning algorithms to compare the scan of your face with what it has stored about your faceto determine if the person trying to unlock the phone is you or not. Apple states the chanceof fooling FaceID is one in a million. 2. Social mediaAfter unlocking their phones, what's next? Many people check out their social mediaaccounts, including Facebook, Twitter, Instagram, and more, to get updated on whathappened overnight. Not only is artificial intelligence working behind the scenes topersonalize what you see on your feeds (because it's learned what types of posts mostresonate with you based on past history), it's figuring out friend suggestions, identifying andfiltering out fake news and machine learning is working to prevent cyberbullying. 3. Send an email or messageEvery day most of us will send an email (or several). Tools such as Grammarly and spellcheck activate when you compose your email to help you draft messages free from errors.These tools use artificial intelligence and natural language processing. On the receiving endof your messages, spam filters use artificial intelligence to either block emails that aresuspected as spam or identify an email as something your recipient would like to receive intheir inbox. Anti-virus software uses machine learning as well to protect your email account. 4. Google searchMost of us can’t go a day without searching Google for an answer or a product we can’t livewithout. Search engines couldn’t scan the entire internet and deliver what you want withoutthe assistance of artificial intelligence. Those ads that seem to follow you around? Yep,those are enabled by AI, are based on your search history and are personalized to you withthe goal of getting items in front of you that the algorithms believe you will value. 5. Digital voice assistantsFrom getting directions to your lunch spot to inquiring about the weather for your weekendgetaway, digital voice assistants are quickly becoming our can’t-live-without co-pilots throughlife. These tools from Siri and Alexa to Google Home and Cortana, use natural languageprocessing and generators driven by AI to return answers to you.Things you should do before get our service at ICT Services Help Desk What is the Difference Between Next-Generation Antivirus (NGAV) and Traditional Antivirus? Q: How does Next-Generation Antivirus (NGAV) differ from traditional antivirus?A: NGAV goes beyond traditional signature-based detection by incorporating advanced technologies such as behavioral analysis, machine learning, and artificial intelligence (AI). These allow NGAV to detect and prevent both known and unknown threats in real time. 🔒 Key Differences: Traditional Antivirus:Relies on signature-based detection, which identifies threats based on known malware files. NGAV:Uses behavior-based detection, AI models, and real-time analytics to stop evolving and zero-day threats. 🛡️ Benefits of NGAV: Real-time threat prevention Greater scalability for enterprise environments Adaptive defense against modern cyberattacks Reference : https://jamcyber.com/blog/cyber-insights/next-generation-antivirus-vs-traditional-antivirus/What is MyDigital ID in Malaysia? A: MyDigital ID is Malaysia’s secure national digital identity platform designed for safer online transactions and easy access to government and private services. It provides a single sign-on (SSO) feature to simplify digital interactions, reduce the risk of identity fraud, and strengthen security through the use of cryptography and device-specific certificates—not by storing personal data. The service is accessible via a mobile application and is being integrated into platforms such as MyJPJ and MyBayar PDRM. Soon, the use of MyDigital ID will become mandatory for these services to ensure secure and uninterrupted access.5 Pros and Cons of AI in the Education Sector 5 Pros and Cons of AI in the Education Sector What teachers need to know about artificial intelligence in the classroom ❓ What are the main cons of using AI in education? 1. Bias AI is only as fair as the data it learns from. If trained on biased information, it may produce unfair or discriminatory outputs. For example, an AI grading tool might unintentionally disadvantage students based on race, gender, or background. 2. Errors AI tools are not always accurate. They may provide outdated, misleading, or factually incorrect information. Teachers and students must verify AI-generated responses before relying on them. 3. Cheating Students may use AI to complete essays, quizzes, or homework dishonestly. While AI-detection tools exist, they are not perfect and can sometimes falsely flag original student work as AI-generated. 4. Isolation Overreliance on AI could reduce human interaction. If students engage more with software than with teachers or peers, they may feel disconnected, less motivated, and at higher risk of dropping out. 5. Job Concerns Some educators worry that AI may eventually replace certain teaching roles. While AI is unlikely to replace teachers entirely, it could reshape traditional roles and responsibilities. ❓ What are the main pros of using AI in education? 1. Assistance AI can save teachers time by helping with lesson planning, quiz creation, and generating project ideas. This allows educators to focus more on engaging directly with students. 2. Speed AI provides instant help when students get “stuck.” Whether solving math problems or improving essay writing, AI can give immediate feedback and guidance outside class hours. 3. Individualization AI can adapt materials to different needs—translating text into another language, simplifying complex instructions, or tailoring projects to different grade levels. 4. Contextual Learning AI can make learning more engaging. For example, it can simulate conversations with historical or literary figures, helping students explore deeper meanings and perspectives in creative ways. 5. Personalization By analyzing student performance, AI can identify who needs extra support and suggest tailored strategies to help them succeed. This enables more student-centered learning experiences. ✅ Bottom Line for Teachers:AI is a powerful tool, but not a replacement for human educators. Teachers remain essential for critical thinking, emotional support, and ensuring fairness in the classroom. Used wisely, AI can enhance—not replace—the learning experience.i-FIRST What is i-FIRST? Q: What is i-FIRST?A: A centralized system to submit/track complaints, feedback, or inquiries. Access via https://i-first.iium.edu.my. Student Email Accounts How do I activate my IIUM Google email? Q: How do I activate my IIUM Google email?A: Username: matricno@student.iium.edu.my Default password: Uia_IC/PassportNo (e.g., Uia_890102201234). Log in and change your password. How do I activate my IIUM Live email (for Microsoft 365)? Q: How do I activate my IIUM Live email (for Microsoft 365)?A: Log in to i-Ma’luum (https://imaluum.iium.edu.my). Under My Services, click Office 365 – Self Register. Note your Live email (format: username@live.iium.edu.my). i-Ma’luum & ITa’leem How do I reset my i-Ma’luum password? Q: How do I reset my i-Ma’luum password?A: Visit i-Ma’luum > SSO ID Password Reset. Verify credentials (matric no., IC/passport no., registered mobile). What is my first-time ITa’leem password? Q: What is my first-time ITa’leem password?A: Format: M (e.g., Matric: G1839073, DOB: 16 Nov 1984 → M841116G1839073).Staff Portal & Systems How do I reset my SIS/CAMSYS password? Q: How do I reset my SIS/CAMSYS password?A: Forgot password: Go to Staff Portal > Academic > Kulliyyah > SIS Reset. Expired password: Use SIS Password Change if you remember the old password. How do I add resources to the Online Resources section? Q: How do I add resources to the Online Resources section?A: Log in to my.iium.edu.my/staff > Online Resources. Click Add Documents and provide a public link (e.g., Google Drive). Facilities How do I book the ITD Smart Multipurpose Room? Q: How do I book the ITD Smart Multipurpose Room?A: Contact ICT Help Desk (Tel: 03-6421 6666) at least 3 working days in advance. Capacity: 20 pax | Equipment: Smartboard, 4K camera, microphones. What are the operational hours for the BYOD Lab? Q. Where is BYOD Lab (Gombak) located and Operating Hours? A. BYOD Lab (Gombak): Level 1, ITD | Hours: Mon–Fri, 9:00 AM – 4:30 PMWhat is the ITD Training Lab? Q: What is the ITD Training Lab?A: The ITD Training Lab is a dedicated facility for staff training sessions, workshops, and software demonstrations. It is equipped with up-to-date technology to support academic and administrative functions.Where is the ITD Training Lab located? Q: Where is the ITD Training Lab located?A: Location: Level 1, Information Technology Division (ITD), IIUM Gombak Campus. How can I book the ITD Training Lab? Q: How can I book the ITD Training Lab?A: Contact ICT Help Desk: Phone: 03-6421 6666 WhatsApp: 016-983 2415 Email: servicedesk@iium.edu.my Provide details: Date and time of training. Software requirements (if any). Expected number of participants. Is there a deadline for booking the Training Lab? Q: Is there a deadline for booking the lab?A: Yes! You must verify software setup at least 3 working days before your training session. Q: Can I walk in and use the lab without booking?A: No. The lab is only available by prior reservation to ensure resources are prepared for your session.What equipment is available in the Training Lab? Q: What equipment is available in the Training Lab?A: Computers: Pre-installed with standard and specialized software. Projector/Smartboard: For presentations and interactive sessions. Internet Access: High-speed Wi-Fi (IIUM-Staff network). Q: Can I request specific software for my training?A: Yes! Inform the ICT Help Desk during booking. ITD will verify software compatibility and install if feasible.What are the ITD lab’s operating hours? Q: What are the lab’s operating hours?A: Monday–Friday: 8:00 AM – 5:00 PM Weekends/Public Holidays: Closed Q: Can I use the lab outside operating hours?A: No. All sessions must align with the lab’s official hours.Are there rules for using the ITD Training lab? A: Yes: No food/drinks near computers. Report issues immediately to ITD staff. Restore the lab to its original condition after use. Q: Who can use the lab?A: Primarily for IIUM staff conducting official training. Student sessions may be allowed if sponsored by a department.What if I face technical issues during my session? Q: What if I face technical issues during my session?A: Contact the ICT Help Desk (Ext. 6666) for immediate assistance. For pre-session concerns, email servicedesk@iium.edu.my. What is the BYOD Lab? Q: What is the BYOD Lab?A: The Bring Your Own Device (BYOD) Lab is a flexible workspace where IIUM students and staff can use their personal devices (laptops, tablets) with access to IIUM Wi-Fi, power outlets, and IT support.Who can use the BYOD Lab? Q: Who can use the BYOD Lab?A: Open to all IIUM students and staff with a valid IIUM account.Do I need to book the BYOD Lab? Q: Do I need to book the BYOD Lab?A: No, it operates on a first-come, first-served basis (no reservations required).How do I connect to Wi-Fi in the BYOD Lab? Q: How do I connect to Wi-Fi in the BYOD Lab?A: Select "IIUM-Student" (students) or "IIUM-Staff" (staff). Log in with your matric number (students) or staff email (staff) and password. Q: What if I can’t connect to Wi-Fi?A: Visit the ICT Help Desk (Level 1, ITD) for assistance. Submit a ticket via i-FIRST. Rules & Policies in the BYOD lab Q: Are there restrictions on device usage?A:✅ Allowed: Laptops, tablets, smartphones (for academic/administrative work).❌ Not Allowed: Gaming, torrenting, or illegal downloads. Connecting unauthorized routers/hotspots (violates IIUM’s ICT Security Policy). Q: Can I eat or drink in the lab?A: No, to prevent damage to devices and facilities.Adobe Cloud What is Adobe Creative Cloud? Q: What is Adobe Creative Cloud?A: Adobe Creative Cloud (CC) is a collection of professional software for graphic design, video editing, web development, photography, and more. It includes popular apps like: Photoshop (image editing) Illustrator (vector graphics) Premiere Pro (video editing) InDesign (publishing/layout design) Acrobat Pro (PDF editing) 20+ other creative tools Q: Is Adobe CC free for IIUM users?A: Yes! IIUM provides free access to Adobe Creative Cloud for staff and students under its institutional license.How do I get Adobe Creative Cloud? Q: How do I get Adobe Creative Cloud?A: For Staff: Request access via ICT Help Desk (email servicedesk@iium.edu.my). Install via IIUM’s Software Portal (if available). For Students: Access through ITD’s free software program (check i-FIRST for announcements). Q: How many devices can I install Adobe CC on?A: Typically 2 devices per user (e.g., laptop + desktop). Q: Can I use Adobe CC on personal devices?A: Yes, but you must log in with your IIUM-licensed Adobe account.How do I log in to Adobe CC? Q: How do I log in to Adobe CC?A: Open any Adobe app (e.g., Photoshop). Sign in with: Email: Your IIUM email (e.g., username@iium.edu.my). Password: Your IIUM email password (or Adobe-specific password if provided by ITD). Q: What if I get a "License Expired" error?A: Contact ICT Help Desk to renew your access.Are all Adobe apps included? Q: Are all Adobe apps included?A: Most apps are included, but some specialized tools (e.g., Substance 3D) may require separate licensing. Q: Is cloud storage included?A: Yes, but with limited space (usually 100GB). For larger storage, use IIUM OneDrive/Google Drive. Q: Can I use Adobe Fonts (Typekit)?A: Yes! All fonts in the Adobe Fonts library are free to use for IIUM projects.Policies Q: Can I use Adobe CC for commercial work?A: No. The license is only for academic/non-commercial use. Q: What happens when I graduate/leave IIUM?A: Access expires. Backup your files before leaving!Anti-Virus How to Get Started: Installation of Anti-Virus Is antivirus software provided for personal devices? Q: Is antivirus software provided for personal devices?A: Yes! Free antivirus software is available for staff-owned devices. Contact ITD for installation.Who to Contact for Admission Matters Who to Contact for Admission Matters For any inquiries or issues related to ADMISSION, please contact the appropriate office below for further assistance: 🎓 Undergraduate Admission📌 Academic Management and Admission Division (AMAD)🌐 Visit AMAD Website 🎓 Postgraduate Admission📌 Centre for Postgraduate Studies (CPS)🌐 Visit CPS Website Note: The ITD Service Desk does not handle admission-related matters. Please liaise directly with the respective offices listed above. Cybersecurity Cybersecurity Cybersecurity - Multi Factor Authentication(MFA) MFA FAQ & Guide: How to Enable Multi-Factor Authentication (MFA) for Microsoft 365 FAQ & Guide: How to Enable Multi-Factor Authentication (MFA) for Microsoft 365 What is MFA? Multi-Factor Authentication (MFA) requires you to provide two or more verification methods to access your account, adding extra security beyond just your password. Why is MFA important? MFA helps protect your account from unauthorized access, even if your password is compromised. When will MFA be enforced? Starting 28 January 2026 MFA will be mandatory for all IIUM Microsoft 365 @live users. How to set up MFA on your Microsoft 365 account: Step 1: Install Google Authenticator Open the Google Play Store (Android) or Apple App Store (iOS) on your mobile device. Search for “Google Authenticator”. Select Google Authenticator by Google LLC. Tap Install and wait for the installation to complete. Once installed, open the app to begin the MFA setup process. Video Guide:For a step-by-step video on installing Google Authenticator, please refer to:https://youtu.be/Aoe1HvtWCKs?si=xjubS-wN1HJnrpkyStep 2: Sign in to your Microsoft 365 account Go to https://mysignins.microsoft.com/security-info Enter your IIUM @live email and password. Step 3: Begin MFA registration You will be prompted to start the MFA setup process. Step 4: Choose Your Preferred Verification Method You can select from the following options: Google Authenticator App (Recommended) Open the app and tap “+”. On the Microsoft 365 setup screen, click “Set up a different authentication app.” Select “Scan a QR code.” Scan the QR code displayed on the screen. Enter the 6-digit code shown in the app to complete the setup. Email Verification Use your IIUM email address for verification: Staff: @iium.edu.my Students: @student.iium.edu.my Phone Number (Text or Call) Enter your mobile phone number and choose to receive a verification code via SMS or phone call. Step 5: Complete the setup Follow the on-screen instructions to verify your chosen method. Confirm setup by approving a test notification or entering a code. Step 6: You're done! Your account is now protected with MFA. You will be prompted for the second verification each time you log in from a new device or browser. Tips and reminders: The Authenticator app provides the best security and ease of use. Keep your phone accessible when signing in. Update your phone number or authentication method anytime via https://mysignins.microsoft.com/security-info Contact ITD Support if you lose access to your authentication method. Also don’t  forget to update your password regularly to further enhance account security SSO MFA User Manual Click here for the PDFPELAKSANAAN AGIHAN LESEN GEMINI FOR GOOGLE WORKSPACE DAN NOTEBOOKLM ENTERPRISE KEPADA PENGGUNA DI UNIVERSITI AWAM In wording: Berikut adalah kompilasi topik FAQ Pelaksanaan Gemini & NotebookLM: No. Kategori Soalan Jawapan 1. Pengaktifan & Bilakah lesen akan Semua lesen akan dimuatkan pada 1 Februari 2026. Garis Masa Activation & Timeline diaktifkan secara rasmi? When will the license be officially activated? Pentadbir universiti boleh mula menetapkan lesen bermula 2 Februari 2026. All licenses will be uploaded on 1 February 2026. University administrators may begin assigning licenses starting 2 February 2026. 2. Bilakah tarikh akhir Tarikh akhir adalah sebelum pada 25 Januari 2026. menghantar senarai nama pengguna? The deadline is before 25 January 2026. When is the deadline for submitting the list of usernames? 3. Apakah sasaran kadar Sasaran penggunaan aktif adalah 80% setiap bulan penggunaan (adoption rate)? bagi tempoh kontrak 12 bulan. What is the target adoption rate? The target active usage rate is 80% per month throughout the 12-month contract period. 4. Pengurusan & Adakah pengagihan lesen Kriteria KPT (seperti Master/PhD) hanyalah Agihan terhad kepada kriteria tertentu? cadangan. Universiti mempunyai kebebasan mutlak untuk menentukan agihan sendiri. Management & Distribution Is the distribution of licenses limited to specific criteria? The KPT criteria (such as Master’s/PhD) are only suggestions. The university has full discretion to determine its own distribution. 5. Bolehkah lesen Boleh. Pentadbir UA boleh re-assign Gemini dipindahkan (re-assign) jika tidak aktif? secara terus , manakala NotebookLM perlu melalui Awantec. Can a license be transferred (re-assigned) if it is inactive? Yes. UA administrators can re-assign Gemini directly, while NotebookLM must go through Awantec. 6. Adakah terdapat SLA untuk Garis masa belum dimuktamadkan oleh Awantec dan agihan semula NotebookLM? Is there an SLA for the redistribution of NotebookLM? KPT buat masa ini. The timeline has not been finalized by Awantec and KPT at this time. 7. Ciri & Akses Features & Access Adakah langganan ini memberikan storan tambahan? Tidak. Ia menggunakan kapasiti storan sedia ada. No. It uses the existing storage capacity. Does this subscription provide additional storage? 8. Bagaimanakah cara pelajar mengakses NotebookLM? How can students access NotebookLM? Melalui akaun Google universiti menggunakan satu URL berpusat, notebooklm.mohe.gov.my. Through the university Google account using a centralized URL: notebooklm.mohe.gov.my. 9. Privasi & Adakah kandungan Tidak. Hanya statistik aktiviti Pemantauan Privacy & Monitoring (content) pengguna boleh dilihat? Can user content be viewed? (metadata) dipantau untuk KPI. Kandungan adalah sulit dan tidak direkod. No. Only activity statistics (metadata) are monitored for KPIs. The content is confidential and not recorded. 10. Bagaimanakah universiti Melalui Adoption Dashboard memantau penggunaan? How does the university monitor usage? (view-only) yang disediakan oleh pihak Awantec. Through the Adoption Dashboard (view-only) provided by Awantec. 11. Apakah kriteria untuk Perlu melakukan minimum 4 aktiviti sebulan. dianggap pengguna "Aktif"? What are the criteria for being considered an "Active" user? Contoh: 4 prompts di aplikasi GWS (Gemini) atau 4 aktiviti seperti memuat naik sumber/mencipta nota (NotebookLM). A minimum of 4 activities per month is required. For example: 4 prompts in the GWS (Gemini) app, or 4 activities such as uploading resources/creating notes in NotebookLM. 12. Sokongan Support Adakah terdapat talian sokongan teknikal? Is there a technical support line available? Ya. Pentadbir boleh e-mel gws.team@awantec.my. Yes. Administrators can email gws.team@awantec.my