TL8-3Larry The Teaching Librarian Volume 8/No. 3 9 MAKING WAVES Sharing Resources All users must share com- puter resources, giving pri- ority to more important work and cooperating fully with the other users of the equipment. If you are just browsing on a computer, and another student needs it for school work, log off and free up the computer. No matter how important your work may be, you are only entitled to one per- son's fair share of the com- puter access unless addi- tional resources are avail- able and appropriate per- mission has been granted. The Board only provides computer services for its own work, not for private use. Internet access is a privilege and does not automatically confer per- mission to use it for personal purposes or enter- tainment. Use Limited Resources Wisely All computer users should be aware that network capacity is finite and network usage costs money. Transmitting pictures through the network costs more than transmitting text. Real-time audio and moving pictures are even more expensive because they require a fresh file to be transmitted every few seconds, or even more often. The Internet is designed for communication from one computer to another. Unlike radio or TV, it does not easily provide a way for multiple com- puters to pick up the same signal at the same time. If a hundred students listen to a sound file, a hundred separate copies of that sound file may have to be transmitted through the Board net- work, overloading it. The inclusion of audio and video in official educational activities such as Web-based instruction or student reports may be appropriate but should be used judiciously. Passwords and Logons DO NOT share your password or logon. The cri- terion is not whether you trust the other person, but whether the Board has authorized the other person to have the same access. Passwords protect the Board's network, not just the individual machines to which they apply. Each account is to be used only by the person to whom it belongs, so that if problems are detected or abuse is alleged, the responsible person can be identified. Stealing Don't even try to guess or steal other people's passwords, or read their files, even if the com- puter permits this. Doing so would be like rum- maging through someone else's backpack or lock- er. Even if you can pick the lock, or even if there is no lock at all, you have no right to intrude. Respect the privacy of others.