Computing Facilities
Students have access to several PC and Macintosh labs maintained by the Information Technology Services as well as two computer labs (Sun Labs) maintained by the program. A local usage guide describing how to get started using the Sun Lab machines is available. Peripherals such as highspeed printers, laser printers, plotters and scanners are also distributed in the labs. All machines are connected to a local area network and to the Internet. Mathematical software which includes calculus, algebraic, and graphing capabilities is provided as well as standard software packages such as word processors, database, spreadsheet, compilers and course-specific software. Additionally, students have access to an IBM mainframe and Sun workstations at the University Park campus. Each student is given an access account which provides Email services as well as a connection to the Internet from a home computer. The program also allocates space on a Web server for students to keep their own Web pages. Students are also encouraged to read the department’s policy on computer usage.
Microsoft Software
Current Math and Computer Science students and faculty are eligible to download Microsoft Programming Tools and Operating Systems for personal use. To access this program, follow these steps:
- Using an InPrivate or Incognito browser, go to the developer tools.
- Click on the blue “Sign In” button and enter your school-provided email address and hit “Next”. Note you will be redirected to PSU’s sign in page to sign in.
- Upon signing in, you may be asked to agree to the terms and conditions (for first time users). If not, you should see all the software titles available for download by searching the keyword “Education” and choose the “Education (preview)” from the list.
Once you’re on the Education Quick Start Pane, you’ll see the software title list under the ‘Software’ menu.
Policy on Ethical Uses of Computing Resources
The Penn State University Policy Statement on Computer and Software Misuse will apply to all users of Sun Lab machines on the Penn State Harrisburg campus.
The standards of ethical behavior as described in Penn State University policies apply to all resources (information, software, hardware), whether local or externally accessible via computer networks. Ethical standards apply even when information is left unprotected.
Because computing resources are limited, they should be used efficiently in order to minimize any adverse impact on others, e.g. game playing, web surfing and reading of news should not be excessive and must be avoided entirely whenever it negatively impacts the accessibility of computing resources. Compute-intensive processes that are expected to execute for an extended period should be run at low priority. The use of invasive software, such as “worms” and “viruses” destructive to computer systems is illegal. Misuse, waste and/or the disruption of the intended use of resources is prohibited (e.g., the flooding of other users with excessive and/or unwanted information).
The installation and use of any program that provides a service to others on the network, or prolonged connections to (or extensive use of) external network services (e.g., http daemons, connection-maintaining daemons, Internet Relay Chat (IRC) robots or those that appear to act in this manner) must be pre-authorized.
Random mailings, chain letters, and mass mailings of any kind are prohibited. Acts that are specifically prohibited include: posting an article or advertisement to more than ten newsgroups, posting off-topic messages to newsgroups or listservers, and sending unsolicited mail which results in complaints.
The content of web pages is subject to review by faculty and by Penn State University public information officers. Content that is specifically prohibited includes: any commercial content or advertising, any content that violates Penn State University policies on sexual or racial discrimination or harassment, and any content that causes a page or pages to be accessed excessively.
Hardware, software, manuals, supplies, etc. must not be removed from computing sites.
Adapted from the Iowa State University Computer Code of Ethics, the NSF Code of Ethics and the Internet Code of Ethics.