ML20044F939

From kanterella
Jump to navigation Jump to search
ITS News.Spring 1993.Volume 9,Number 1
ML20044F939
Person / Time
Issue date: 05/01/1993
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V09-N1, NUREG-BR-56, NUREG-BR-56-V9-N1, NUDOCS 9306010231
Download: ML20044F939 (12)


Text

_ ____ __ -_______________ ______. _ _ _ _ _ _ _ _

SPRING 1993 un"k "*P Vol. 9, No.1 8

g g

NUREG/BR-0056

.3 m

m W

/

U.S. Nuclear Office of Information

[ ]lt information Technology Raourcu Management Regulatory Services Training laboratory 1 Qg"aael

..Y..

C, IT055513cS3; i

PS NRC-jff h,"7tp 'jRLICATICrJS

_M SVCS um The Laser Printer Cc m ss byKaren AkElyea,IRM Ahhough a laser printer is relatively technicians to perform the task of on a metal element that strikes the easy to use, a basic understanding of unpacking, removing intemal paper, the laser printer's character set its operation is important. Bis article packing materials, configurating is stored in memory as a font. Fonts focuses on the laser printer's basic software, and connecting to a PC or are sets ofletters, numters, symbols, features, memory limitations, LAN. his work is performed in and punctuation marks.

understanding its control panel, the complete compliance with the There are three types of fonts: (1) environment for the laser printer, manufacturer's guidelines. To mternal fonts are permanently mstalled prir,ter paper, and IRM support to overlook these guidelines may rn the printer, (2) cartridges contain include a preventive maintenance invalidate the vendor warranty.

additional fonts and are fitted into slots program. his is an oveniew and Careful handling is necessary to lift on the printer font panel beneath the touches briefly on features described the printer into position because of paper supply tran @ soft fonts are in detail in the user's manual for your the weight, over 50 pounds. In st red in the computer and down-particular model oflaser printer.

addition, special software drivers 1 aded into the printer's random access must be loaded for the mem ry (RAM) An requested.

ne introduction of the laser printer in microcomputer software or LAN 1984 was one of the most significant applications to work effectively with the printer.

Control Panel events m the development of microcomputer peripheral devices.

Befive the laser printer, personal The laser printer provides advanced computer (PC) users had two types of Laser Printer Basics technical features, such as optional accessories and a large variety of type printers: the impact and the dot-matrix he laser prin:er works by receivmg gg g

printer. The use of the impact printer electmnic signals through a series of g

g meant sacrificing graphics capabilities, bits. B ts are either a one or a zero, panel, and (2) through the software and the dot-matrix printer cou'd not each character being represented by application, which overrides the produce letter-quality text. Le laser 8 bits. Specific combinations of UST W W printer is capable of high-speed he o e

e ed printing of text and graphics.

currently offering classes to NRC staff in the use oflaser printer fonts and here are approximately 700 laser Information Interchange (ASCII).

s ware appcadons.

Rese ASCII codes are printers in NnC headquarters offices:

the majority are llewlett Packard electrostatically fused to the paper.

he laser printer displays status LaserJets. To use the laser printer to Graphics and text are converted into messages that indicate the printer's its fullest, a thorough understanding of rows ofdots, called bit maps. Bus, current operating condition, such as the application software, a knowledge by using these bit maps, ratter than a warming up or reset. There are also of the concepts of the printer's internal set of permanently embossed messages displayed that require the pmgramming language, and how characters, as do impact printers, the user's attention, such as paper jam or memory affects printer performance is laser printer is capable of producing toner low. Rese messages usually crucialinformation all types of shapes and text.

begin with the number 2,4,5,6 or 7.

^E I*E "**E "8 When new laser printers arrive at Unlike *he impact printer,in which NRC,IRM provides microcomputer each printable character is embossed (Continuedon Page 2, " Laser")

9306010231 930501 PDR NUREG ER-OOS6 R PDR

(%sev" Continuedfmmpage 1) some examples oisoftware-related

~

errors.

messages is printed in the applicable THE ISSUE AT HAND laser printer user's manual. The You may not be aware that your laser indication of" toner low"on the printer has an ozone filter. Some display panel requires redistribution llewlett Packard printers have ozone nie taser Printer 1

of the toner to extend the life of the filters. laser printers and cartridge or total replacement of the photocopiers emit measurable rcwoastaten Rebcanons 3

toner cartridge. Other signs that may amounts of ozone. Ozone is an C""vuier Secumy nandouis 4

signal the need for toner replacement irritant, and various regulatory now so tw perty Process and llandle sensitive are black streaks or smudging on the agencies have established limits as to printed paper. Each recycled toner the acceptable amounts ofozone to y

g g g, cartridge package includes which employees may be exposed.

Ans Netwod Enmans 5

instmetions for toner cartridge Limits vary with exposure time, but A Tale ofConenerTemer 6

l replacement.

most regulations specify a maximum g

7 level of 0.1 parts per million of ozone Environrnent for matinmus exposure. The laser INIlCuy ChargesRedumd 7

printer is equipped with an ozone rum Achievemesccmrmate Awankd. 8 Special attention to the printer's filter that should be replaced every environment should be considered 50,000 pages. This replacement

, g, y

during the planning process for the adheres to the recommended I*'cenrm Acton Tracurig symem m delivery, moving, or the addition of guidelines for acceptable levels. The item interface implemented in SINET 9 laser printers. When choosing a ozone filter is routinely replaced in place for the printer, plan on a well-NRC laser printers as a part ofIRM's ventilated location with stable preventive maintenance program. In risTech Notes n

temperature and humidity. If addition to environmental conditions humidity and temperature outlined above, the ozone released by simultaneously exceed 80 percent laser printers should always be a and 80 'F, respectively, the printer consideration when placing a laser should be tumed off and the paper printerin a work environment. To ITS NEWS CREDITS stored for use in these printers should minimize ozone exposure:(1) do not be removed. Electrical connections install multiple laser printers in a should always include a surge confined area: (2) make sure proper

,,jh ["j""

    • P protector to prevent damage m the ventilation exists: and (3) do not direct

,,dudogy a the NRC. A is produced by event of a power spike. The printer the exhaust port directly toward staff.

the mafrof the NRC informa6on Technol-cable, ideally, should never exceed osy Services Training tatoratory in 10 feet if printing parallel (the exception is LAN printers), and the Paper

'*"J",n"'n " ' * ** M 8 0f5'* *f Perx net cable should be kept a good distance Paper storage, weight, packaging, and we welcome questions.cumments and from electronic equipment.

moisture content must adhere to vendor.

artides.

Printers throughout the NRC are specific requirements. Extremes in PI'***'*"'* **' D * " Y often used by several staff through or humidity came paper to

)

% %_m LAN printer sharing or print curl, resulting in a paperjam.

Mail or in Person: MNBB-7602 directors. Consideration for othersin The careful selectica oflaser.

Herbert Parcover,IRMTTSB this shared environment is important.

compatible paper that meets b'*"6" Edd '

For instance, removal or manufacturer guidelines must be craduate schootusnA replacement of a font cartridge considered. The most accurate Publication Coordination when the printer is on-line can method is to test a small amount of cause an error rnessage. Turning the paper before makinglarge Alvin Blunt,IRNB the printer off, reinserting the purchases. Avoid damaged, glossy, 8"

cartridge, then powering the printet heavily textured, or chemically Illustrations and Concepts by NRC on, will eliminate this problem.

coated paper. Do not force feed Automated Graphies section Sending incorrect messages to the paper that is too heavy through your contributon to regularitems are:

printer such as manual feed o" laser printer. Paper that falls within M. Holmes W.Madiaon.IlRWmson, P.

changing the printer menu while the 16 to 36 pound range reduces the W M'"E data, fonts, or macros are still resident in the printer memory are (Continuedonpage 3, " Laser")

ITS NEWS Page 2

rwer"continueehmpage2) laser printersin NRC Headquarters Personal Computer oflias. IRM provides preventive chance for misiecds, mis-stacking, maintenance (PM), on laser printers Work Station paperjams, poor toner fusing, poor as part of the senice to the NRC print quality, and excessive community at headquarters. A call Relocations mechanical wear. Because the print to the IRM Hotline (492-4160) by Patricia Lavins,1RM is actually toner fused to the paper at dispatches a qualified micro-high temperature, all preprinted computer technician to perform PM Management direction, organiz-image documents, forms, ink, or on your laser printer. This PM ational changes, and hiring of staff or paper should be heat resistant.

includes routine cleaning and acquisition of equipment frequently Hazardous emissions may result maintenance necessary to keep the initiates the installation and or move when some types of preprinted paper printer in top working condition.

of a personal computer (PC). This are subjected to the pnnter's fusing This cleaning includes replacement requires coordination between temperature,(200 *C (329 *F) for 0.1 of the toner cartridge if necessary, several different Oflice of seconds). In addition, the print replacement of the ozone filter, and Information Resources Management quality may be less distinct or sharp cleaning pad, as well as cleaning the (IRM) teams to ensure that all if the correct type of paper is not used transfer corona wire, and paper feed records regarding government guide. This preventive maintenance equipment inventory, software minimizes or in some cases assignments, local area network Memory-Enhancements ehminates the necessity for a service requirements, and telecom-and Limitations repair call.

munications needs are coordinated and documented as necessary. IRM The laser printer stores data sent IRM provides complete support for procedures are designed to enhance from the computer, as well as from all NRC laser printers. This suppon communication between all IRM soft fonts and macros,in its memory.

begins from the time they are organizations and to ensure an Soft fonts occupy anywhere f,om a purchased and set up at the eflicient operation. Advance few to more than 150 kilobytes (KB) w rkstation to the time they are scheduling between your ADP of printer memory. If you download bsolete and surplused. IRM should Coordinator and IRM staff will a few soft fonts to your printer before be notified each time a laser pnnter ensure that NRC's microcomputer you send a graphic image to be fans t function,is to be moved from needs are met. ADP Coordinators printed, the printer may not have ne 1 cation to another, or when should provide IRM with an advance enough memory left to store the further instructions are needed t notice of 10 working days for graphic image. Some older models execute pnnting.

individual requests and longer of the Laserjet Seiies 11 are equipped with 512 KB of built-in memory notice, depending on the complexity, standard, but later models, including Summary in multiple work station relocation the LasetJet Series III, have standard requests. Operationalproceduresto Follow all manufacturer recom-facilitate this process are 1 Megabytes (MB). With the mended gmdelines for the correct summarized below, exception of some very early models, type of paper and the conect expansion slots are standard. These environment for the printer. Call the PC Users' Responsibilities expansion slots accept an adapter IRM Hotline,492-4160, for technical providing additional 1,2, or 4 MBs support in software-related questions'

= Upon notification by ofmemory. Memory upgrade can be or t request installation,moing, management of a personal ordered on a NRC Form 530 through preventive mamtenance, upgrading' computer work station IRM. The installation of this adapter or repair oflaser printers in NRC relocation, notify your ADP requires precise steps to prevent headquarters offices. Call the LAN Coordinator. The ADP damage to the laser printer and to the Supp rt Hotline 492-4243 when the Coordinator will communicate memory board. This work should be problem appears to be confined t the required information to IRM accomplished by a qualified micro-the AUTOS LAN emironment.

in a two-step process:

computer technician. Mast NRC laser pnntersime been upgraded to inchde Make plans to attend training at the (1) A call is placed to the IRM fmm 2 to 4 MB ofmided memory.

ITS Training Lab for advanced Hotline (492-4160) technical training in the use oflaser summarizing relevant IRM Support printer software applications and font information about the move "S E -

and identifying any equip-The Information Technology Suppon ment connected to a LAR Section,IRM, currently provides Be considerate ofothers when using hardware and software support to all a shared printer 3 (Continuedon Page 4, " Relocation")

ITS NEWS Page 3 f

lI

(" Relocation"fmmPage3)

IRM'S R:sponsibilities and will then be tested to ensure (2) The ADPCoordinator at it h operad at & new IRM contractor personnel will, location.

e documents the move the day before the move date, information and transmits prepare the PC and related

. IRM will assist those who the infonnfm to M peripheral equipment for moving.

experience problems and have electronically sia the LAN contacted the IRM Hotline.

or through the NRC mail Equipment will be moved on the e

system.

dateidentified bythe ADP We welcome suggestions to improve, Coordinator.

or clarify, these procedures in order Before the move, backup all e

to minimize any inconvenience to essential data stored on the hard Equipment will be reconnected e

drive to a diskette.

you and your office a

  • Do not disconnect computers and associated equipment.

[

Computer Security Handouts D

1RM must secure the da s e di f u d in the December 1,1992 was Computer Security Day. Some staff visited the

" Guide toOperations" software infonnation desks at Phillips and White Flint buildings and a reasonable box near your computer so that number attended the seminar, "How to Protect Your PC," presented by Lisa the disk drive read / write heads Camahan of the National Institute of Standards and Technology. Security can be " parked" before moving handouts were available as well as IBM Virus scanning software diskettes.

the PC. If you know how to If y u did not receive these materials and would like them, please call park your hard drive (C: DISK),

Emily Robinson at (301) 504-3490 and specify the materials, your name, and do so, and tape a note to the

    • D monitor stating " DRIVE H AS gg, BEEN PARKED."

IBM Virscan software diskette and instructions Assemble all relevant software documentation and pack it with

" Immunize YourselfAgainst Computer Viruses" other work station material for "NRC Computer User's Guide to Good Security Practices" moving to the new work station.

"NRC Local Area Network User's Guide to Good Security Practices" This material will be moved by NUREG'B R-0115, " Personal Computer User's Guide" the Office of Administration *s NUREG/BR-0152," General Secunty Requirements for Using LANs" "S" S**

Minimum Security Requirements for Information Processed by Automated

. Before the move, attach a layout Systems" (a matrix of 7 types of systems and all categories ofinformation at your new office showing S#C"'i'Y) placement of furniture and

" Security Policy for Processing and Handling Classified Information in the equipment. Please be aware that PC/ AUTOS /LAN Environment",1992 electrical and telecom-NIST Special Publication 500-170, " Management Guide to the Protection of munications connections may InfonnationResources" restrict placement.

Personal Computer Security, Nat. Computer Security Ctr.

  • Equipment will be tested by Floppy Disk Care and Keeping, GPO 1RM contmetor staff to ensure its operability at the new location.

Yid 1E However,in the esent of "The Cuckoos Egg", Cliff Stohl (1-1/2 hr) subsequent operational "Make the Commitment", OPM(14 min) problem (s), call the IRM Hotline on 492-4160 to report any Virus Talk by Tim Polk, NIST on 12/2/91 (I hr) problems. Explain that the immunize Yourself Against Computer Viruses, US Anny,1991 equipment has been recently relocated.

Your cooperation in adhering to Remember, you are the key to information security.

these procedures should minimize down-time associated with personal

~

11elp prevent unauthorized use. Safeguard your password.

computer relocations.

j

/

ITS NEWS Page 4

How to Properly Process and Handle Sensitive Unclassified Information in the AUTOS / Local Area Network Environment bylouis H Grosman. IRM We at the NRC are processing not currently logged on to the document to another document, various types of sensitive network. It is imperative to this negates the WP password for unclassified information (i.e.,

disconnect the computer from the document.

Offi:ial Use Only, Proprietary, the LAN whenever sensitive

  • When transmitting a document Unclassified Safeguards). Sensitive unclassified mformation is that contains sensitive data or unclassified information is defmed in processed. This can be SGI, that is, to send a document NRC Manual Chapter 2101, Part I, accomplished by restaning and to another user on your LAN via and by Public Law 100-235 as any choosing any option other than WP Office Mail feature, send information for which the loss,

" Local Area Network"from the only those documents that are misuse,or unauthorized access to it main menu. If your computer would or could adversely affect the restarts and automatically begiis password protected. Choose encryption and security (label),

agency (NRC) mission or operation the network logon process, priority delivery, and auto-delete but which does not meet contact the IRM Hotline. They options. You may communicate classification criteria. There is will resolve the problem.

the document password to the unclassified safeguards information (SGI) for which confidentiality is the

  • When processing unclassified recipient by telephone since the pnmary concem;information about safeguards information (SGi),

file will be in the mail box for save the SGI file often and only only a shon time.

investigative, enforcement, to removable media (diskette or predecisional or legal actions for Bernoulli box), never to a fixed Upon receipt of a mail message which integrity of data is the primary contatmng sensmve data, read concern, with confidentiality a close disk. Change the location of the the message to determine the second; and other information such Wordperfect (WP) backup file name of the file containing the with the Location of Files feature as performance appraisals, persormel, document, and then retum to the

< Shift-FI,6> from the fixed disk financial, or contractual data, for main Mail Screen. Never read which confidentiality, integrity, and to the directory of the removable the document while connected to media that you are using to availability are all important.

the LAN. Using the Save feature process and store the SGI data.

(see Wordperfect Office Ref-NRC staff must adhere to administrative controls and, where

  • To prevent other users from erence, Mail,InBox/ Outbox possible, the use of technical printing or retrieving your files Options-SAVE), save the file to when processing sensitive data, your local hard drive orif the file rneasures to provide for use the WP file locking feature, contains SGl.save the file to confidentiality, integrity, and availability of sensitive unclassified using a password (see Locking removable media. Enter the full Files in WP manual) <Cnti-FS>.

path name for the file where you information especially when want the item saved (e.g.,

processed in the AUTOS /LAN

  • Utilize the WP header / footer BASGLMSG). Once the environment. The following feature t mark all printed pages document has been saved, procedures are directly applicable to au ma caUy wM ch disconnect from the LAN and the handling and processing of all markingsas"OE

' Wy" retrieve the document using WP categories of sensitive unclassified a eguardsh

  • D to ensure that the password i

information within the LAN n t print to a networkk protection is still intact. Ifyou emironment. In addition, ask your are prompted to enter a password LAN administrator about designated

  • Do not leave a document 1 access the document, then the private directories, NOVELL containing SGI or other sensitive password protection is in place.

NetWare "UserGroups,"or other unclassified information If you are not, the document can file protection features that can be unattended at a printer.

be password protected using the used for the processing and storage If a document is password WP password protection feature.

of sensitive data.

protected,only retrieve it onto a Delete the mail item as soon as

  • Access to a personal computer clear screen in order to presene you have saved the file, that has network capabilities is the WP locking feature. Never possible even when the user is append the password protected (ContinuedonPage 6. "Sensnire")

ITS NEWS - Page 5

(" Sensitive"continuedfrom Page5)

ATale of ComputerTerror

  • Avoid writing passwords by Elaine Tom. NRR anywhere. Try to commit them to memory. When you apply a An instructor noticed the acute 2-hour workshop, and nina people WP password to a document,it anxiety and even hostility that some were taught a sampler of computer cannot be retrieved without the students felt toward computers.

applicationsi More sessions were 7

password. Ifyou forget the Even students who had access to

/ added to the schedule; the instructor password, there is no way the computers earlier in their careers had was overwhelmed by the response.

document can be retrieved.

not necessarily become " computer literate." Worse, as a result of their His first thwght on entering die Employees have a responsibility to earlier experiences, some of them classroom on the first day was that assess the sensitivity of their data had come to dislike and distrust he was more terrified than the and to enne its security.

computers. As one student students. The students avoided his Ultimately, computer security is the explained,"In my office and school eyes and glanced nenrously at the u.;er's responsibility. You, the user, emironments, the computer was computers, which were on tables must be alert to possible breaches in dominated by a few experts. I never lining the walls of the room. He security and adhere to NRC's actually used it." When asked what instructor took a deep breath nnd established security regulations.

the " experts" did with the computer, announced the first exercise: Each As LAN technology advances, there although not the hoped-for answer student was required to ask a simple

""E

"'" ty features

( ord pmcessing, scientific question about computers. De designed for operatmg systems and simulations, programming), the question should be something that application software that will be answer was very revealing. "ney the student did not understand but easier to use. We will be evaluating pent most of their time dodging that everyone else in the world new products, and will advise asteroids and destroying alien seemed to know. He response was immediate; I8 pairs oflips pressed employees when new features are available.

interested, and I didn't understand together and 18 pairs of eyes focused t."

firmly on the floor. The instructor t k out apack ofindex cards and The NRC has a designated computer security staff to provide advice and in Spite of such unhappy memories, explained that, of course, they would guidance. If you have a computer many students expressed a desire to not have to ask their question out security question about this subject leam mme about computers. Yet, Imd but could write them on cards or any other computer security issue, they were reluctant to sign up for and pass them in anonymously.

even a basic course. One student please contact Louis Grosman at (301) 492-501) or Emily Robinson explained her reluctance this way: "I After a moment,s hesitation, they at (301)504-3490.a would be at a terrific disadvantage.

began to write. The cards came m, rm sure everyone else in that course hastily turned over to conceal the has used computers before. I would questions: "Whatissoftware?"

[

]

be terrified'"

"What is the difference between a word processorand a computer?"

You are the Key Terrified ea basic wmputer course?

whatisa fioppy dist?--Howdoes The most basic introductory coerse the document get from the screen to i

available wouldn't confuse the the printer? "What are K?"

i to NRC Security pe, son,3o is 3e, iia,,,o 3y computers. Nobody thought anyone The instmetor answered the would need another course to prepare questions, sticking determinedly to gik for it! Apparendy, what these plain English; Several questions

~C_

students needed was a pre-basic appeared on more than one card, N

course-a bridge between total causing several people to look 44" ignorance and the standard computer around the room and smile with Y

relief.

courses.

{

l A few weeks later, the creative However, the hardest exercise was instructor posted a signup sheet for a still ahead. When it came to actually new course called " Computing for using the computers, the students the Terrified." The sheet filled up immediately. The course began as a (ContinuedonPage 7. " Terror")

ITS NEWS PaFe 6

_____._m___

more than $30,000. Some got so series of three-day courses on using

(" Terror"continuedfrompage 6) excited about this exercise that they and profiting from the product. To went on to try their own search leam more about LEVEL 5 OBJECT appeared convinced that something specifications. One complained contact Les Lancaster.

terrible would happen if they pressed about the absence of blond horn ne Odober training pmgmn the wrong key. He machine would players this oversight has since been Provided interested employees with a break, or explode,or the pmgan corrected.

would be destroyed. For this reason, common understandmg of AI and in the second exercise, the instructor In their final exercise, the students Expert System terminology and gave the students 5 minutes to make used a word processing program to applications. An instructor from a the computer explode by pressing the modify a personalletter, which the firm that specializes in the wrong keys. First prize was a free instructor had previously formatted development of new customized floppy disk, second prize was two and stored to send to a friend. When expert systems was selected to floppy disks. No winners were the letters were completed, they were provide instruction on Al found, and no prizes awarded.

printed along with the envelopes, so terminology, examples, and ways of.

that the students could mail them developing expert systems. The one-Gingerly at first, the students after class. ("

Dear Philip,

You're not day training was heavily attended approached the dreaded keyboards.

going to believe this, but I'm wtiting and additional sessions of the A timid click sounded as someone to you from my first computer training are being planned. If you j

pressed a Ley. More clicks followed.

class... ")

would be interested in attending l

Gradually the would-be saboteurs future training sessions in this grew bolder; one tiied pressing two At the end of class everyone was subject when they are scheduled, keys at once, then a handful. Fingers smiling,in pleasant contrast to the please callCarolyn Bassin on(301) moved from the safety of the letter grim fa s that prevailed at the 492-8526 or EMail (AUTOS) CBB.

keys to the hazardous tenitory of the beginning. Many students signed up special function keys. For the next for the next level (basic) class. "We if you would like tojoin AIUG, few minutes the air was filled with had a wor.derful time," they,

obtain more infonnation, or have any clicks and beeps, and the computer obviously surprised, told the questions, please call Les Lancaster screens were filled with words, instructor. "He course works.

on(301)492-3969. s menus, and strange error messages in We're not terrified of computers various colors.

anymore." a Try as they might, the students were unable to destroy the machines. At the end of the exercise, when the ArtificialIntelligence INEL Cray Charges instructor asked them to retum to the Reduced center of the room,he saw the first User Group sign of success: THE STUDENTS By les Lancaster, RG By Herbert M. Parcover, IRM DID NOT WANT TO LEAVE THE End Myn Rassin, OP COMPUTERS.

Effective January 11,1993, rates for the CRAY X-MP computer at the For the ress of the aftemoon,they The NRC ArtificialIntel19ence User Idaho National Engineering explored some of the things that Group (AIUG) met at the NRC's Laboratory,INEL, were reduced.

The new rate structure represents a computers can do. The exercises White Flint building on August 4, were arranged so that the students 1992, to discuss the accomplishment 37 percent reduction in CRAY did not have to enter lengthy text or of two important gmis obtamng an central processing unit (CPU) cope with complicated command Expert System shell called LEVEL 5 charges, and an elimination of all syntax. In a word processing OBJECT and having a one-day disk charges.

exercise, they did a global change, training session in October.

ne new rates are as listed below:

and a spelling check on a letter. In a spreadsleet exercise, they calculated LEVEL 5 OBJECT is a sophisticated Priority Cost / CPU llour ($)

how much they would have to earn commercial software package by to cover their expenses on a fantasy Information Builders, Inc. that is best PO (lowest).

. 63.39 weekend. In a database exercise, learned with hands +n experience, they searched the membership interactively working through several Pi (Default for Batch).

. 126.78 records of an imaginary orchestra to problems tint are part of the P2 (Default for Interactive).190.17 identify all the red-headed trombone documentation. Because ofits players over 6 feet tall who earn popularity, several places offer a P3 (Highest).

. 253.56 flS NEWS Page 7 1

iiii ar = -

TRAINING

-N D

ME \\ A/"

m m

W D

lNLVV First Achievement Certificate Awarded Francine Randolph is the first NRC others that cold, wintry moming) employee to earn the ITS Training braved the icy sidewalks, took the Laboratory's Wordperfect Certificate Silver Spring Red Line all the voy of Achievement. His program, first downtown and out again to Bethesda l ' ^ "

announced in the February-March Metro Station, and then walked the ITS Training Announcement,is half-mile to the Woodmont Building.

intended to encourage mastery of the She didn't think she had done

)

advanced features of Wordperfect anything special, and apologized for l

through 33 hours3.819444e-4 days <br />0.00917 hours <br />5.456349e-5 weeks <br />1.25565e-5 months <br /> ofrigorous being a little late. We think Francine y m,+

3 training. Francine has successfully is very specialindeed.

g)

I t

completed all nine courses. Her dedication to her career and her The Cenificate of Achievement will desire to master computer concepts be awarded to persons who have met is exemplified in this true story. On all prerequisites and taken all nine December 10,1992, there was a advanced Wordperfect courses.

f?

panicularly nasty ice and snow storm Besides the certificate Francine will 96 in the Washington area. Federal be the first name posted on the

?

workers were given liberal leave.

Honor Roll for Achievement at the The roads were covered with ice ITS Training Laboratory. m despite the heroic effon of road crews u ho had been spreading salt and other chemicals throughout the How to Participate early hours of the morning to make in the Wordperfect Achievement Program the roadways safer, Many Our objective in presenting the the ITS Training Lab of completion neighborhood streets were not advanced series of Wordperfect of all courses. We will confirm the negotiable. Major roads were ice-courses is to encourage mastery of completion when you apply for and car-covered. Cars were sliding some of the most productive features certification.

down hills sideways, using the in Wordperfect. Rose features give curbing like they were bumper cars.

the user a real advantage in the work

3. No advanced classes may be ITS Training instructors made it in place as he/she moves quickly and waived, and all prerequisites for time to begin teaching at 8:30, but efTonlessly through tasks and c utses must be honored.

one of them walked to get here.

develops effective, creative, Participants must preregister and On that day ofdays, Francine was attractive documents.

complete alllisted classes.

scheduled for an 8:30 a.m. class in ne following rules have been

4. This program does not give Wordperfect Columns and TaNes.

established for the Cenificate of c niinuing education credits (CEUs).

She managed to get to the Silver Achievement Program:

5. Courses may be takenin any order Spnng Metro Station and was planrung to take a bus into Bethesda.
1. All participants must have as long as prerequisites have been met, That bus though was one of several completed Wordperfect: ne Basics vehicles hung up on East-West and WordPerfectIntermediare. On A WordPerfectpassbook has been Highway, and Francine knew she rare occasions where then has been mailed to all those who have met the would have to alter her plans.

demonstrated ability to perform the prerequis tes for admittance into the functions taught in these classes, this Program. If anyone feels theyhave How easy it would have been for her requirement may be waived.

met the requirements and has not to call and cancel her class, get on received a passbook, please cortact Metro, and go to the White Flint

2. It is the responsibility of the the ITS Training Laboratory at (301) station. Instead, she (and several person taking the courses to notify 492-4744 to request one. m ITS NEWS Page 8 M

=- lisii: sila liiii:

SIGN ON M

mu--m--

,-m-

- see M

N mC WITH w man w musumma inspection Follow-up system (IFS)/ Enforcement Action Tracking System (EATS) Item Interface implemented in SINt-1 that are issued by the Agency.

System,orthe Enforcement Action IFS / EATS ITEM interf. ace TW System, please call Margie enhancements were implemented in When an item type of" Escalated Dimig on (301) 492-7047, or the Inspection Follow-up System Enforcement item"(EEI)is added in Willimn Usilton on (301)492-9739. m (IFS) on December 22,1992. These IFS, a corresponding " Enforcement enhancements provide the capability Action (EA) Case Number," which is to view violations m IFS that were available from the Office of i

sswo l

entered by the OfTice of Enforcement Enforcement, must be enteredinIFS.

(OE) through the Enforcement The procedures for obtammg the EA Action Tracking System (EATS).

Case Number have not changed.

The IFS / EATS ITEM interface also provides the added benefit of Should you have questions allowing the IFS to more accumtely concerning the IFS / EATS ITEM Mormon NeTwom(

account for the number of violations interface, the Inspection Follow-up EXSIS ByJohn Bearry,IRM The Executive Shared Information repons, color coding, filtenng, and Plant inspection Hours other features. EXSIS facilitates Comparison Chart System (EXSIS) provides entical infonnation related to key NRC management understanding, and Inspecnon anHW Gynematk action.

issues, such as plant safety. Infor.

mation is presented in a focused and Described below are examples of the ro ce)in o at on have efficient manner, through " drill-infonnation that is available in been growing areas in EXSIS. The down" techniques (selecting with a EXSIS, and tips on how to better Plant Inspection Hours Comparison mouse and viewing a second layer of

& system.

(Contmued onpage 10. "EtSIS")

data), trend analysis, exception Figure 1 Figure 2 fl tesYe he i n ses WD iltes EM IIWeral IM M 3 ammaarve UM3 I IING 3 II#

21m Pt2 Mt g3 gggg

!#1M PI 3 ISIM P!3 50 TDR5 50 TDRt 2 51 a

m33 sc g

Giam Cattel 2

mm ampuuuuuuuuuuuuuuuum-mua.

2500 3221 3600 WID 800 12W 1651 2tRu 35m 1821 3200 3600 G $00 123) 1600 2 310 2G mcs ampummaussuumanumuummea m3 total tetaal be (Last 12 nseths) e mM S I tetts is lite; 35 RN RB Litu ! EM RM"E e to,tal ktaal tre (Last 12 Resths)

EB B 1 Balts is tite: 3M Em 33 tigg i m 3m ITS NEWS Page 9 l

sitekNs

!aa E

e ma f:

lt/71/f1 kI "

c"$r [il ht. et turnst hvid flapsd: T Can Ir$:Ib Ibl/11 Cvele: b

Ili Ab3 Cetle; r

I

_ tas

--Anni saa Pyri.a saa g,umat,6gt gj.t saa hris!,,jg, ya ing,,td gj,8.s-b

'"*d**

g treo m mr in enuting d

1 1

8 hscretionars 5.o, em,t., *2,e2 qwm t

4 4

istal:

4:42 14c En2 WW ENO[iEn"t$leiEN, m idat hwd as tCunni w>

3,ig3 n-I asmas 1

  • m aras s atus a*sr am

+ tsamarstencrancms maans a+srem Figure 3 Figure 4

("EXSIS*from page 9) and areas ofemphasis. "R.I."in when looking at a screen. Often it is figure 3 stands for" Regional pssible to"drilldown"togreater Chart, created at the request of Initiatwe." He chart in figure 4 is detail by selecting an active area of a Region III, allows you to view a h,st reachec!by" drilling down"on a screen, such as a unit name or event of nuclear power reactor units or particular SALP functional area number. Button cells always turn j

sites, for a particular time period, name in the chart in figure 3. he blue when you move the mouse's sorted by total inspection hours.

chart in figure 5 is a breakdow12 of screen pointer over them.

Figure I shows the total inspection the hours in the chart in figure 4.

hours for all SALP functional areas, Let EXSIS know what printer you for all units, for the last fiscal year.

are using by utilizing the " Select Figure 2 shows total inspection Daily Power Level Trends Printer" button on the EXSIS main hours and SALP ratings (for the last To get a quick idea of what has been menu. You only do this once, and SALP period), for the Operatims going on at a particular nuclear EXSIS remembers what kind of SALP functional area, for all one-powe,. reactor unit, this socoobe-Printer you are using. His then unit sites, for the last 12 months.

released chart (figure 6) shows a allows you to press the " Print Due to the potentially large number trend line of the daily power level for Screen" key on your keyboard and of units / sites, this chart has several the last one hundred twenty days.

print a selected chart, in shades of buttons to allow scrolling.

He data is obtained from tne Daily gray, on your default (LPTI) printer.

Plant Status Reports produced by inspection Hours by SALP AEOD.

Participation Requested Functional Area pP, Your ing,ut is needed and greatly Figures 3,4, and 5 illustrate several appreciated! Ifyou have questions screens in EXSIS that show how Alwap be on the lookout for button or suggestions, please contact John inspection hours have been planned cells on EXSIS screens. Hey are Beatty, at (301) 492-4164, or the for particular SALP functional areas not always immediately obvious SINET Hotline at (301) 492-4222. m Figure S Figure 6 k!s:Y b: 12/31/M NUJ NI' y.

b 80E!

n Con W

~

Generis tem bsional laitiattw 75 bsional Reactin Allegataos Islieme g

bsisaal team heaJsarters team 14fets !ssues h O

Otire battin U lio 350 tid 660 710 6 1 s 0 12!)0 1240 g

ENNIYt.N!,IENetheid)manacrmma._"'I "I

"d"" "'""' "

a se h Powe (nrnetd te ers Cater) marmi s.m

. mars. =e.s ITS NEWS PaFe 10

N

=N TECH "T"r" P M

mum imms w

lCO Book Reviews mental issues. They examine "what the application of computing to social INEL

/w Emily Robinson,1RAI processes actually means for the The NRC Library has two new books rights and freedoms ofordinary The CYBER-based tape on ethics in computing:

citizens." Their intent is to question management system TRS/KRS was the assurances for a democratic replaced in September 1992 by

1. "EthicalConflictsin society in a computerized world. e Reelibrarian, a UNIX-based tape Information and Computer management system on the CRAY Science, Tahnology, and X-MP/216. While every effort was Business" by Parker, Swope and Computer Tr,,a m

made to make the transition from the Baker, QED Information

(

old to new system as transparent as Sciences,1990.

Do you know that blackouts, possible in tenns of mounting tapes

2. " Computer Ethics-brownouts, and other power outages on the CRAY, some differences have are the #1 ENEMY of computer Cautionary Tales and Ethical Dilemmas in Computing" by equipment. " Clean" alternating been found. Refer to the "INEL Exchange", December issue for Fonester and Morrison, MIT current can be seen as the classic differences and the October issue for sine wave, but in the real world Press,1990.

Reelibrarian commands.

environments, perfect power is hard to come by. The degradations in In the first book, the authors cover Long-term media storage is now commercial power have several available in vaults that are fireproof professional standards, obligations, and provide secure magnetic media accountability, property ownership, names dependmg on size and duration: " TRANSIENTS"are storage for backup material. They piracy, copyrights, confidentiality of have controlled humidity and information, personal privacy, temporary oscillations that occur contracts, and conflict ofinterest as it because of a sudden change of temperature.

relates to the world of computers and voltage orofload:" SPIKES" are General contingency vault storage is networks. The study focuses on the fast, sharp increases in voltage;

" SURGES" are like a spike but.

about half the cost of the Tape Library.

way advancing technology has If you need this service, call changed the relationships between lastinglonger: and" SAGS" are a 20 Michelle Johnson at (208) $26-9340.

individuals and organizations.

percent or more reduction in voltage.

Computer education now begins in sometimescalled" brownouts;" All of these can affect and potennally All CRAY users now have the grade school, and computers have

" * "" " " " " E'*C# "'

8#

telephones. He authors address the (e.g., telephones, computers, copiers, s e ding t ce set of requirement =: at least six need for a written code of ethics to and fax machines). Any total power deal with computer and telecom.

outage of 15 milliseconds or longer muni ati ns technology, and the has the potential to conupt or destroy pa n ene i

must contain at least one alpha and p ssibility that the ethical principles computer data. Be sure you have a one numeric in positions 2 - 5 applied to millions of computer users power stnp surge protector as part of cannot use the user-ID for which it is m y efTectively bemme the equimlent ymr PC setup. Computers and the password,must differ from your four previous passwords, cannot have whether changing technological overnight or over a weekend, unless any character that is the same as the s phistication raises new ethical m use. If a complete power outage mr issues remain cuant oce We sg a N, turn n and preceding character, and must be clanged every 6 months (the system other equipment off until the power reminds you). In the event a user In the second book, the authors returns-a surge when electricity forgets hisher password,INEL discuss true and hypothetical retums can damage your data.

Computer Registration can assign a scenarios of computer crime.

During electrical storms when temporary one-time log on password hacking, virus penetrations, spikes, surges, and sags are and the user will be prompted to unreliable computers, invasion of occurring, turn your equipment off select a new password. s privacy, and workplace emiron-after saving your file. a ITS NEWS Page i1 l

l W

NUCLEAR REGULATORY COMMISSION Computer Services Directory ITS NEWS COMMUNICATIONS TRAINING LABORATORY FACILITY Herbert Parcover, MNBB-7602, (301)492-8699 Ixication:

3rd Floor, Woodmont Building, W-306 8120 Woodmont Avenue Bethesda, Maryland 20814 iTS SUPPORT CENTER FACILITIES Phone: (301) 492-4744

- Locations:

taboratory flours: 7:30 a.m. to 4:30 p.m. M-F Phillips Building, Rm P-358 One White Flint North,3C-12 7920 Norfolk Avenue 11555 Rockville Pike Class llours: B:30 a.m. - 3:30 p.m.

Full Day Classes Bethesda, Maryland 20814 Rockville, Maryland 20852 8:30 a.m. - 11:30 a.m. Half-day Morning Classes 1:00 p.m. - 4:00 p.m.

Half-day Afternoon Fhones:

Classes (301) 492-4160 (301)$04-2353 g.

I Three classrooms for formal ADP training pmviding

  • hands-on*
  • #"#"E" #"

"*

  • 8 'I" *** *
30

-4 5 p.m. M F Note: The Training Laboratory is operated by the Graduate Services:

School /USDA under contract, and managed by the Office of Microcomputer assistance (telephone and walk-in),

Personnel, to provide training in end-user computing for the NRC demonstrations, ADP Technical Library, and staff. Te-hnical guidance is pmvided by IRM. NRC Pmject computer / video-based tutorials.

Manager, Carolyn Bassin; GS/USDA Training Manager, Mary Holmes.

NRC END-USER COMPUTING SERVICES Micncomputer liardware/Softwart Acquisition. Upgrades:

NUDOCS Users ids: Mike King, MNBB-7103,001) 492-7338

'^

Dawn Oliver, P-530, "301) 492 2665 AUTOS Program: James Schacfler, P-532,001) 492-9832

(

hhm RdMm-Data General and INEL User Support:

Please cornact your kwal ADP Coordinator to initiate this action.

Ernay Mmson,3C-14,001) NM OWFN (301) 504 2353; Philhps (301) 4924160 Data Gmeral Systems Problems:

Micncomputer llarttware lustallation and Maintenance:

Judy Secherman, P-600,(301) 492-9687 OWFN 001) 504-2353; Philhps 001) 4924160 IBM 9370: Kay Moses, (301) 492-4167; Micntomputer Softu arv lastallation:

Dave Barmw, P-600, (301) 492-8308 Softwere support Desk, P-550, (301) 492-8317 IBM 3270 Envirmaneet: Beth DeWoody, P-600. (301) 492-4832 Wortl Pncessor, Other ADP Rducation and Maintenance:

Dcctronics Records Support:

Beth DeWoody, P-600. (301) 4924832 Brenda Shehon, MNBB-7714,001) 4924132 Modem and Data line Problans: P410,001) 492-4666 Modean and Data line Acqumtion:

Automated Graphics Support: Al Blunt 2G-40,001) 504-2216 Stan Wood. P-626, 001) 492-7723 Commerrial Database Support: Eileen Chen, P-160, (301) 4924501 Computer Room: Phillips, 001) 492-7713 Scicatific Code Distribution:

White Flint, (301) 504-2885 Herbert Parcover, MNBB-7602,001) 4924699 u s Groma n, M BB-7602,(301) 492-5019 Shared Infonnation Network (SINET) Developmaut:

Wil Madison, P-801B, 001) 492-7781 Timmharing Accessf!Ds:

EXSIS: John Beatty, P-712, 010) 492-4164 Herbert Parcover, MNBB-7602,001) 492 8699 Systems Desdopment and Modiracation:

l AUTOS Ildpline: (301) 49-AUTOS Bill Unihon, P-712, (301) 4924322 IRM llott;ne: 001) 492-4160 or 001) 5002353 Diek Hartfield, P-712. 001) 4924328 LAN Ilotline: 0 01) 492-4243 George Mathews. P-712. 001) 4924415 NUIMX'S liotline: 0 01) 4924603 SINET llothne: 001) 4924222 Scheduling for ITS Training Moratory:

Te4ccomm lidp Dak:0 01) 492-4666 Eduardo Cunnirgham, W-306, (301) 492-4744 POST THIS COMPUTER SERVICES DIRirrORY FOR READY REFERENCE

__s______-m.__.-d--

- - - - - - - - - - - - - - - - " - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ^ - - - - -

"-^