Information Technology (IT) Services FAQ

  1. How to move your photos from your iPhone 6 to your computer?

    Several have asked me how to move their photos from their iPhone to their computer...

    I have an iPhone 6 – so not sure if it works for 4S, 5, or 5S – would love to know if it works on those

    I DO NOT have iTunes installed – if you do it may automatically pop up and you will want to cancel or tell it no to syncing if you do not want the photos in iTunes – if you want your photos in iTunes then these instructions are not for you

    1.       First, I created a Folder on my desktop computer called “iPhone Pics Jan 2015” {right click on desktop and select >NEW and then >Folder}
    2.       I plugged my iPhone in using the cable I charge it with into a USB Port on my computer
    3.       I went to My Computer (computer icon on the desktop)
    4.       Click on Apple iPhone
    5.       Then you will see on right hand side
    6.       Double Click on Internal Storage
    7.       You will see a Folder called DCIM – double Click on it
    8.       You will then see some file folders {with different Number Letters that name them} - Inside those folders will be icons that say Local Disk but you will also see your photos at the bottom of the list
    9.       You will select your photos by clicking on the first one hold down the shift key and click on the last one - You should now see all photos highlighted in Blue
    10.   Then you will be able to click and drag your photos to the Folder you created on your desktop computer (If you cannot see your folder that you created on the desktop – then your screen is maximized and you need to “Restore Down” by clicking on the icon in the top right corner this will allow you to see your desktop – just move that folder or the window around until you can see it.
    11.   Next step is optional – you can delete the photos using the same steps for selecting the photos and hit the delete key Or you can leave the photos on your phone and delete the photos on the phone directly if you feel more comfortable or you want to leave some of them.

    I DO NOT recommend deleting anything else in these folders

    I worried about losing resolution/quality, but I did not – I took a photo from what I copied and enlarged it up to a llX17 and no pixelating occurred

  2. How to post attendance and setup your grade book?
    Watch this short video

Office 365 SPAM Tool

  1. How do you find Quarantined and SPAM emails
    Follow directions below or go to
    SPAM-Quarantined Email

    Find and release quarantined messages:

    To access your spam-quarantined messages in the spam quarantine
    1-Go to the following URL in a web browser: https://
    2-On the sign in page, specify your valid Office 365 user ID (email address) and password.

    After you’ve signed in and been authenticated, you’ll be directed to the end user spam quarantine.

    By default, spam-quarantined messages are sorted from newest to oldest on the RECEIVED field. SENDER, SUBJECT, and EXPIRES values are also listed for each message. You can sort on any of these fields by clicking their headers. Clicking a column header a second time will reverse the sort order. A maximum of 500 messages can be displayed spam quarantine.

    You can view a list of all your spam-quarantined messages, or you can search for specific messages by specifying filter criteria (filtering can also help you reduce your result set if you have more than 500 messages). After searching for and locating a specific quarantined message, you can view details about the message. You can also release the message and report it as not junk to the Microsoft Spam Analysis Team.

    Use advanced search to filter and locate quarantined messages:

    You can filter your own spam-quarantined items based on several different conditions using advanced search. You can use these conditions separately or in combination with one another. The search will provide a list of messages that meet all your filter criteria.

    1-Click Advanced search   to open the Advanced search window.
    2-Select any combination of the following conditions. Select the associated check box in order to enable each condition. (Wildcards aren’t supported; i.e., *)
    a.  Sender email address Specify the email address of the person who sent the message.
    b.  Subject Specify the subject line text of the message.
    c.  Received - You can select that the message was received by the quarantine within the past 24 hours (Today), within the past 48 hours (Last 2 days), within the past week (Last 7 days), or you can select a custom time interval during which the message was received by the quarantine.
    d.  Expires You can select that the message will be deleted from the quarantine within the next 24 hours (Today), within the next 48 hours (Next 2 days), within the next week (Next 7 days), or you can select a custom time interval during which the message will be deleted from the quarantine.
    3-Click ok to start running the advanced search.

    After searching for messages, the results that match your specified criteria will display in the user interface. A maximum of 500 messages can be displayed in the spam quarantine.

Screen Timing Out on Teacher and Student Devices

  1. How do I change the timing out of my Teacher Laptop
    Right click on the desktop and go to Personalize and then click lock screen
    Right click on the desktop and go to  Personalize then lock screen then Screen timeout setting at the very bottom of the page
    Defaults to 5 minutes but go to the bottom and say never
  2. Student Desktops are timing out
    Log in as the teacher and then do the same steps you did for your laptop
    Right click on the desktop and go to  Personalize then lock screen then Screen timeout setting at the very bottom of the page
    Defaults to 5 minutes but go to the bottom and say never
    Make sure you log out and then log back in as a student

Software Resources 

  1. How do I add FasttMath to my iPad?


CIPA Compliance 

  1. Are we CIPA Compliant?

    ECBOE CIPA Compliance Checklist
    Schools and libraries that plan on receiving E-rate discounts on Internet access and/or internal connection services after July 1, 2002, need to be in compliance with the Children’s Internet Protection Act (“CIPA”). CIPA compliance means that schools and libraries are filtering their Internet services and have implemented formal Internet Safety Policies (also frequently known as Acceptable Use Policies).

    The Federal Communications Commission (“FCC”), charged with administering CIPA for E-rate purposes, has established only the broadest guidelines for interpreting the filtering and policy requirements of the Act. The following checklist is designed as a simple, but unofficial, guide for determining whether a school or library meets the CIPA compliance guidelines.

    Internet Filtering:

    Basic Requirement: CIPA requires the implementation of a “technology protection measure” – generally referred to as an Internet filter – to block access to visual depictions deemed “obscene,” “child pornography,” or “harmful to minors.” Filtering is required for all Internet-enabled computers whether used by minors or adults. For E-rate purposes, filtering for adult Internet usage can be disabled for “bona fide research or other lawful purpose.”

    Filtering Provisions:

    Filtering is incorporated with the service provided by the Internet Service Provider. Yes

    Filtering is provided locally for all Internet-enabled computers on a networked basis. Yes

    Filtering is provided individually on each Internet-enabled computer. Yes

    Internet Safety Policy:

    Basic Requirement: CIPA requires the public adoption and enforcement of an “Internet Safety Policy” covering the filtering discussed above. For minors, the policy must also address monitoring of online activities, the safety and security of all forms of direct electronic communications, unauthorized online access, and unauthorized disclosure of personal identification information.

    Policy Provisions:

    Filtering will be provided for all Internet-enabled computers used by students, patrons, and staff. Yes

    Filtering will be disabled only for bona fide research or other lawful purposes. Yes

    Minors will be educated, supervised, and monitored with regard to safe and appropriate online activities. Yes

    Safe and secure use by minors of direct electronic communications (including e-mail, chat rooms, and instant messaging) will be assured. Yes

    Unauthorized online access, including “hacking” and other unlawful activities, is prohibited. Yes

    The Policy was adopted with reasonable public notice and after at least one public meeting or hearing. Yes

    Unauthorized disclosure, use, and dissemination of personal identification information regarding minors is prohibited. Yes

    CIPA compliance requires a "Yes" in all of the Policy Provision boxes listed above.

    Meeting Type:  Regular Scheduled Board Meeting

    Meeting Date: June 2016

    Additional information on Internet Safety Policy requirements and provisions can be found in the CIPA Policy Primer available on the E-Rate Central Web site.

    Checklist Completed By: Barbara Burchard, Chief Technology Officer

    Checklist Certified By: Dr. Andre' Harrison, Superintendent