Computer/Email Requirements

Computer Requirements for Students

Kettering students are expected to have reliable access to high speed Internet outside of their workplace. The following minimum hardware requirements: a Pentium processor with 512 MB of RAM, a CD/ROM drive, a printer, a color monitor with appropriate graphics card, speaker(s) and appropriate sound card, and a 56K modem, although a broadband internet connection is required for viewing streamed video. Software requirements include a word processing package, a spreadsheet package, a Microsoft PowerPoint viewer, Google Chrome is required for all KUO students. KUO students also require a webcam and microphone for courses. Students in some classes may be required to load software. Administrative computer access may be necessary. Students in the MS Engineering ECE-Advanced Mobility program must also have have an IPad or similar device with a stylus for some courses.

It is expected that students have their own computers and do not use a computer at their place of employment due to frequent limitations related to Firewalls.

KUO Programs are supported by Kettering University’s Online Blackboard™  (Bb) system and require a stable broadband internet connection for test administration.

E-mail: Notification/Obligation to Read

All students have the privilege of having a Kettering University Google Apps e-mail account. The Kettering e-mail account is one of the official ways Kettering University faculty and staff communicate to students. Email from private accounts will not be accepted and Kettering University will only communicate with students through this official email system. Students are responsible for required actions conveyed to them through this communication vehicle, whether or not they read the message. Kettering provides each student with unlimited e-mail server storage. Therefore, we strongly recommend that students do not auto forward to another e-mail service provider which may have less storage capacity, fewer features, and may hinder you to reply directly to the original email source.

Due to the proliferation of spam and phishing emails, be advised that you may receive emails that may request personal information such as usernames and passwords. Although it may look authentic, pretending to originate from a legitimate source such as Kettering, do not respond. Immediately delete it recognizing that a legitimate source such as the Kettering IT department would never ask you to provide information such as passwords. Be cautious regarding any unsolicited email as it may contain elements that would prove to be detrimental to your computer.

Questions: Contact Information Technology