Office 2013 will be the Campus Norm by Fall 2014


Microsoft Office 2013 is coming to campus! Some faculty and staff may already have the latest version of Word, Excel, PowerPoint, Access, and Outlook. Here are some links to videos about what’s new for each program:

The videos range between 2-4 minutes and cram in many of the new features. If the movie mentions a topic of interest, search for the topic at for more tips to utilize that feature.

If you don’t have Office 2013 yet, it is likely that you will by Fall 2014. 

Browser Toolbars out of Control?

InternetBasics, Security, Tips&Tricks

Here is a common conversation I have when helping people with their computers:

Me: “Wow, you have a lot of toolbars installed. Do you like having those?”
Them: “No.”
Me: “Do you know where they came from?”
Them: “No.”
Me: “Do you want me to remove those?”
Them: “Yes, please!”

If you can relate, roll up your sleeves and lets do some spring cleaning!
Step 1: Clean up your browsers
This article shows quite nicely how to remove toolbars from the most prominent browsers. (As of today, these methods worked–keep in mind browsers get updates and instructions might change in the future.)
Step 2: Don’t install more toolbars
Where do these toolbars come from? Chances are at some point you installed a program with a toolbar included. Toolbars aren’t always malicious–companies like you to see their name plastered where ever possible. For example, notice that when Yahoo!Messenger is installed, the Yahoo! Toolbar will also be installed: 
It’s all good if you want to have the toolbars installed. Just be aware of the choices that show up during installation and read through the installation process. Cancel and do some research if wording sounds at all fishy. 
Step 3: Become more knowledgeable/Dig deeper
Unfortunately, it is possible that just removing the toolbars isn’t enough. Some toolbars have bad intentions and can slow down the entire system. I found that Enigma Software Group has an extensive list and explanations of malicious toolbars.
Here is an article that delves deeper into what’s behind malicious toolbars, symptoms you may experience, and preventative actions you can take: Sneak Attack–Those Annoying Toolbars You Never Wanted

School Email Login Change


Google is streamlining their services which means students can expect some changes when logging into their school email. The old address,, will still work, but will no longer have the SCC look and feel. The login site will look the same as a personal Gmail account and can be also accessed at Most importantly, students will need to use their entire email address to login.

If you already have another Gmail account associated with your browser, you will need to add an account.

Working with Data in Tables

Excel, Tips&Tricks
One of the fastest way to get meaning from data in Excel is to insert a table. Here are some tips for getting started with Excel Tables. These tips will work for the 2007, 2010, and 2013 versions of Excel unless stated otherwise. 
1) Insert a Table:
  • Select a cell within your data area. Go to the Insert Tab on the Ribbon and select “Table”

  • Aside from the formatting there are two details to take note of:

2) Use the Table for fast data entry:
  • Normally in Excel, Tab moves the cell selector right and Enter moves the cell selector down. In a Table, Tab moves to the next cell in the Table. In other words, it will move right until the last column in your table, and then it will move down to the first cell in the next row. If you’re at the end of your data set, a new row is automatically added to the Table.

3) Get instant data analysis by adding a Total Row:
  • For this next part, a cell within your table must be selected. Go to the Table Tools Design Tab. Check the Total Row box. 

This example is shown in 2013, but you will still see the same option boxes in the previous versions.
  • Add formulas to the Total Row.

4) Switch a table back to regular cells.
  • Select a cell in your table. From the Table Tools Design Tab, click convert to range.

Formatting and Total Row stay put, but the other tools from the Table are removed.
As the Table Tools Design Tab suggests, Excel can do much more with Tables. Check out Microsoft’s Support site more helpful articles and videos. The search feature works rather well if you want help with something specific. For example, type “Excel Tables” or “Excel PivotTables” to continue learning about tables.

4102 Student Computer Lab

Other News
The 4102 Computer Lab, located in the lower level of the Library (Building 4000) houses 100 PCs and 5 Macs for students to use to complete classwork. Here are 3 ways you can improve your experience:
  1. Come to the lab with clean hands and do not bring food. For one thing, ’tis the season for germs to take hold. Also, although the keyboards and tables are cleaned periodically, crumbs in the keyboard or grimy keys from dirty hands can build up over time.
  2. Log into the computer using your student credentials, lock the computer when you step away, and log out when you are done. Using your student login allows you to save files to your profile, which follows you where ever you login. You will more likely be able to recover work if something terrible should happen while you’re in the middle of working. To lock your computer when you step away, use the keyboard: Windows Key + L. Locking when you step away and logging out when you are done keeps your information and files out of the hands of whoever sits down after you.
  3. Report any issues you come across. TSS strives to have computers and printers in good working condition. If something isn’t working for you, it could go unnoticed if you do not report it. If headphones don’t get sound, there’s a fix! Report issues to Erin Greenwood, the computer lab manager, or the TSS office. They will want to know the computer number and the problem.
This computer lab is a dedicated quiet, independent study environment. If you need to do group work, look into checking out one of the group study rooms offered by the library upstairs.

Anti human-trafficking play coming to Shoreline

Arts & Letters

costly desiresFor Megan Becker, art is more than just … well, art.

Becker is artistic director of Drybones Artist Collective, a non-profit with the mission to inspire hope and engage audiences through art to make positive changes within their communities. Becker also teaches musical theater at Shoreline Community College and the confluence of the two jobs is creating an opportunity to bring a strong message to the campus and the community.

“’Costly Desires’ is a touring show about human trafficking that we are currently producing,” Becker said. The show is scheduled for 7:30 p.m., Jan. 10-11, at the Shoreline Community College Theater, 16101 Greenwood Ave. N. Shoreline, WA, 98133. Tickets are $15 general admission, $12 for groups of six or more and $10 for students and faculty. Tickets are available at the door or at

“Drybones donates 25 percent of all the money we make off of the show’s ticket sales to organizations that are helping to end human trafficking here in Seattle,” Becker said.

The multimedia performance piece incorporates theater, dance and original music. “Costly Desires” tells the story of Maria and Yen, two young women pulled into the world of sex trafficking through circumstances beyond their control, and John, a married man whose sexual addiction threatens his family, his career, and his way of life.

“I am very excited at the prospect of sharing this show with the students and faculty here at Shoreline,” Becker said. “I really love this school and community and think there would be an interest in this topic and in this show. This is a very important issue and educating people about it is a step toward ending the problem.”

In addition to the performance, Becker is working with a group called REST that works to assist victims of sex trafficking and support people who are involved in the sex trade in the Seattle area in finding ways out. “At our very first show we produced last November here in Seattle, we featured two organizations who work with victims,” Becker said. “After each of the shows at Shoreline, we’ll have panel discussions about human trafficking.”

Dell buyout saga is over…

Other News

Dell Inc. is no longer a publicly-traded company. It sealed a $24.9 billion buyout deal that will take the company private. Dell Inc. delisted from the NASDAQ at the close of Tuesday’s trading, as founder Michael Dell and private equity house, Silver Lake completed their controversial buyout of the struggling PC maker. Like its rivals, Dell got sideswiped by the speed of decline in PC sales globally in past years, as consumers increasingly chose to spend on ever-more powerful smartphones and ultra-light tablet computers.   click to read full article   source: CompTIA SmartBrief & Reuters News Agency

New Mac OS X Mavericks…

Other News

OS X Mavericks, which is version 10.9, was released by Apple on October 22, 2013 and is now available as a free download from the Mac App Store. You will need an Apple ID for this download. The operating system has hundreds of new features & several new technologies, such as App Nap & Compressed Memory – to name a few. It is an easy upgrade from OS X 10.6.8 or later versions. It has been reported to be compatible with most software applications such as Office for Mac 2011 and Adobe Creative Suite versions, but some minor issues are arising with other applications. For more details and product info visit

Google Chrome tip…

Other News

If you are a new user to the Google Chrome browser, here is a helpful tip. Clicking on the   button, which is the “Customize and control Google Chrome” button, in the upper right hand corner of the page – gives you several options and tools. For instance, you can open a new web tab, create and manage bookmarks, print, view source code (HTML, etc.), access Internet downloads, tweak some of your Chrome settings – like startup, appearance, and homepage, and do much more. 

If your personal information is stolen, 4 steps to take…

Other News

It’s important to protect your personal information, and to take certain steps quickly to minimize the potential damage from identity theft if your information is accidentally disclosed or deliberately stolen: 1) Place a “Fraud Alert” on your credit reports, and review those reports carefully. Notifying one of the three nationwide consumer reporting companies is sufficient. 2) Contact your bank or other financial institution(s) and close any accounts that have been tampered with or established fraudulently. 3) File a police report with local law enforcement officials. This is an essential step for protecting your rights. 4) Report your theft to the Federal Trade Commission, online, by phone, or by mail. Visit more information.   Source: SANS Institute