Substitute Teacher Handbook (2014 – 2015)

Total Page:16

File Type:pdf, Size:1020Kb

Substitute Teacher Handbook (2014 – 2015) !"#$%&&'(( )*+(( (( ,-%,./.-.0(.0"1!02,!! ! #03(4&2'(1/.4($05"2.60#.(&7(0$-1"./&#( $898:8*;(*)(!<=>;(1>?8@>A(( &))8BC(*)(!2(,BD**A(,<??*+@(E(,<F1C;@+>A( !"#$%&'(#)('**(+#"(,#-.%%'+#/%%0#"12# 3'%%4.56+#78#99:19# ;<9=>#?@"#A#2219# ,((BCDDEF,%%.EG65FGH%I# # # ## /*IG#1!J:19?# Office of HR School Support Peter Ianniello, PhD., Executive Director Pamela Conroy, Deputy Executive Director 2 Dear Colleague: Welcome to the exciting challenge of becoming a Substitute Teacher with the New York City Department of Education (NYCDOE). You have chosen a path that will be challenging but also highly rewarding. In addition, you are taking on a role that is being shaped to meet the increasing rigor and expectations required by New York City Public Schools. The New York City public school system is our nation’s largest: over 1.1 million registered students; more than 1,800 schools in operation, citywide; 80,000 Teachers and Teacher- related positions, assisted by over 23,000 Paraprofessionals, all of whom share the goal of improving outcomes for students. The role of a Substitute Teacher has evolved from being merely a coverage person, to one that provides quality classroom instruction in an on-going basis. You are an integral part of the student learning process. The same high standards and accountability expected from permanently assigned Teachers, are also expected from you. The following understandings and expectations should guide you as you take on assignments: • Continuation of student learning, along a continuum established by the permanent Teachers and school leaders, as your primary focus; • Establishment of your professional presence and exuding self-confidence in your role; and • Demonstration of effective instruction, consistent with school norms and classroom management. The Division of Human Capital has created this Handbook to: • Clarify processes; • Describe expectations; and • Introduce best practices for Substitute Teachers which will enable you to succeed in our schools. Ultimately, our goal is to provide you with on-going support, so that you can help our schools achieve the shared goal of improved learning outcomes for our students. On behalf of the City of New York, the Department of Education, parents and students, we appreciate your interest and thank you for your commitment to applying your expertise and skills to the position of Substitute Teacher. Peter Ianniello, PhD Executive Director Office of HR School Support, Division of Human Capital 3 TABLE OF CONTENTS Page No. Letter from the Executive Director, HR School Support………………………………………….………3 Supporting New York City Public Schools …………………………………………………….…………...5 General Responsibilities of a Substitute Teacher…………………………………………..….………..…6 SubCentral/SmartFindExpress System………………………………………………………………………9 • System Overview……………………………………………………………………...……………………..9 • Registration for SubCentral……………………………………………………………………….……...11 Code of Ethics………………………………………………………………………………………...…………14 Course Credit Requirements for Uncertified Substitute Teachers…………………………….............16 . Full-Time Employment Opportunities……………………………………………………………………….18 Regulations of the Chancellor and Other DOE Policies………………………………………………….19 Overview of the School Day…………………………………………………………………………………..21 End of Day Reflections…………………………………………………………………………………………24 Unsatisfactory Performance………………………………………………………………………………….25 Employee Information: Payroll and Benefits………………………………………………………………27 Appendices………………………………………………………………………………………………………29 • Hints for Success………………………………………………………………………………………..…30 • Icebreakers ………………………………………………………………………………………………….31 • Contacts and Links…………………………………………………………………………...……………36 • Professional Resources…………………………………………………………………………………..39 • Additional Readings……………………………………………………………………………………….41 • City and State Contacts and Links……………………………………………………………………...41 • Chancellor’s Regulations and Related Resources……………………………………………………42 • Substitute Teacher Assignment Tracking Form………………………………………………………43 • SubCentral Tracking Form………………………………………………………………………………..44 NOTES………………………………………………………………………………………………….48 SubCentral Help Desk – (718) 935 – 4401 SubCentral/SmartFindExpress Automated Dial-In (718) 935 – 6740 Web Page: http://subcentral.eschoolsolutions.com SubCentral Help Desk E-Mail: [email protected] 4 &+H>;8`>@8*;(*)(@DC(#CN(4*+O(18@P(5<FA8B(,BD**A:( RC@@8;H(,@>+@CV( ,.2&#R(,1!&&G,K(,.2&#R(1&66-#/./0,\( ,<??*+@8;H(#CN(4*+O(18@P(5<FA8B(,BD**A:( T,*#7*U#8%'4#$N(5#O*BM'(0*6(#%R#VW&FM(N%6#;78$OXV>#NE#F%00N((*W#(%#U%'4N6H#F%..MS%'M(NI*.5#UN(,# BM'*6(E+#RM0N.N*E+#*W&FM(%'E#M6W#F%00&6N(N*E+#(%#N0B'%I*#E(&W*6(#MF,N*I*0*6(#M6W#*6E&'*#(,M(#*I*'5# F,N.W#H'MW&M(*E#R'%0#,NH,#EF,%%.#B'*BM'*W#R%'#F%..*H*+#M#FM'**'#M6W#M#R&(&'*#ME#M#F'N(NFM.J(,N64N6H#MW&.(G# PN(,#.M(N(&W*#R%'#N6W*B*6W*6(#W*FNEN%6J0M4N6H+#(,*#EF,%%.#E5E(*0#NE#%'HM6Na*W#UN(,#6N6*#;?>#VQ*F&(NI*# )&B*'N6(*6W*6(E# U,%# ,MI*# WN'*F(# %I*'ENH,(# M6W# E&B*'INEN%6# %R# H*%H'MB,NFM..5# F.&E(*'*W# EF,%%.E# M6W# '*B%'(# (%# (,*# $,N*R# ^FMW*0NF# XRRNF*'G# # T,NE# E('&F(&'*# E('*M0.N6*E# E&BB%'(+# S'N6HE# '*E%&'F*E# F.%E*'# (%# EF,%%.E#M6W#F'*M(*E#M#F.*M'#.N6*#%R#MFF%&6(MSN.N(5#R'%0#*MF,#F.MEE'%%0#(%#(,*#$,M6F*..%'+#U,N.*#S&N.WN6H (,*#FMBMFN(5#%R#EF,%%.#F%00&6N(N*E#(%#R%F&E#(,*N'#(N0*#%6#N6E('&F(N%6#M6W#N6F'*ME*#E(&W*6(#MF,N*I*0*6(G# _Mb%'#L6N(NM(NI*E+#M(#(,NE#(N0*+#N6F.&W*C# •# >%%$3$+1'$!?$1+2(2@!12A!02;'+&%'(,2# K'%INW*#N6F.&ENI*+#'NH%'%&E#N6E('&F(N%6#(%#*I*'5#F,N.W+#N6#M#EMR*+#U*.F%0N6H#M6W#MRRN'0N6H#*6IN'%60*6(G •# /1+'2$+(2@!B('5!=,<<&2('($;# L0B'%I*#*I*'5#F%00&6N(5ZE#*QB*'N*6F*E#UN(,#(,*#78$OXVC#*0B%U*'#RM0N.N*E#UN(,#M#E,M'*W#0NEEN%6# R%'#E(&W*6(#E&FF*EE#M6W#*Y&N(MS.*#%&(F%0*EG •# "<-3,.$$;!',!9$1%5!C&33!/,'$2'(13# $&.(NIM(*#M#.*M'6N6H#F&.(&'*#S5#IM.&N6H#M6W#W*I*.%BN6H#N6WNINW&M.E#M6W#(*M0EG## •# >A)12%$!"D&('.!(2!:%5,,3;! L6I*E(N6H#N6#,NE(%'NFM..5#&6W*'E*'I*W#F%00&6N(N*E#UN(,#'*E%&'F*E+#(N0*+#M((*6(N%6#M6W#WN'*F(N%6G# X(,*'#B'N%'N(N*E#N6F.&W*C#K'*Jc#R%'#^..+#$%00&6N(5#)F,%%.E+#*QBM6W*W#^R(*'J)F,%%.#K'%H'M0E#M6W#0%'*# N6(*6ENRN*W#B'%H'M0E#R%'#V6H.NE,#dM6H&MH*#d*M'6*'EG# ^E#M#)&SE(N(&(*#T*MF,*'+#5%&#B.M5#M6#N0B%'(M6(#'%.*#N6#E&BB%'(N6H#(,*#WMN.5#.NR*#%R#M#EF,%%.G##K'N6FNBM.E# 0&E(# S*# F%0R%'(MS.*# UN(,# (,*# )&SE(N(&(*# T*MF,*'E# U,%# (,*5# 6%0N6M(*+# ME# U*..# ME# (,%E*# E*6(# S5# (,*# ONINEN%6#%R#\&0M6#$MBN(M.G##X&'#E,M'*W#H%M.#NE#(%#F%I*'#F.MEE*E#UN(,#,NH,.5#Y&M.NRN*W#M6W#MBB'%B'NM(*# )&SE(N(&(*#T*MF,*'EG# •# K'N6FNBM.E#M6WD%'#(,*N'#W*ENH6**E#N6(*'IN*U#B'%EB*F(NI*#)&SE(N(&(*#T*MF,*'E#M6W#W*(*'0N6*#NR#(,*5#M'*# MBB'%B'NM(*#R%'#,N'*G### •# K'N6FNBM.E#0&E(#S*#MS.*#(%#%RR*'#B%(*6(NM.#)&SE(N(&(*#T*MF,*'E#M(#.*ME(#(U*6(5#;:1>#WM5E#%R#E*'INF*+# %I*'#(,*#EF,%%.#5*M'+#N6#(,*N'#'*EB*F(NI*#EF,%%.EG### •# K'N6FNBM.E#6%0N6M(*#(,*#B'%EB*F(NI*#)&SE(N(&(*#T*MF,*'#M6W#R%'UM'W#(,*N'#B'%RN.*#(%#(,*#ONINEN%6#%R# \&0M6#$MBN(M.+#U,NF,#W*(*'0N6*E#RN6M.#*.NHNSN.N(5G# % GENERAL RESPONSIBILITIES of a SUBSTITUTE TEACHER SubCentral Training: SmartFindExpress System • Quick Reference Guides are included in the Substitute Teacher orientation package, guiding you through the SubCentral process on a step-by-step basis. Copies may also be obtained at http://schools.nyc.gov/Offices/DHR/SubTeachers.html or by contacting the SubCentral Office. Additional details for use of the SubCentral System can be found on page 44 of this Handbook. Punctuality • You need to report for duty before the official start of the school day. • It is recommended that you arrive at school at least one (1) hour before the start of school in order to prepare the Classroom Teacher’s plan for the day. • Schools have different starting times. Therefore, you must be sure to make note of the time given in the assignment information, to know when to report. A Directory of the various neighborhoods supported by the NYCDOE can be found on your SubCentral System home page (after log-in) at https://subcentral.eschoolsolutions.com/. The two-page document contains a map of districts and a listing of neighborhoods. The beginning and ending times for Substitute Teachers will vary from school to school. • You must be certain to listen carefully to the start times provided by SubCentral. • You should call your assigned school the day before (unless the job offer was received on the morning of the assignment) to verify the start time and obtain directions to the school, if needed. Additional information about the school may be found on the NYCDOE school’s website. Consult online resources, e.g., https://www.google.com/maps for exact locations and/or directions for various modes of travel. • You can also call the Metropolitan Transit Authority (MTA) at (718) 330-1234 or visit them online at http://www.MTA.info Directions can be obtained at https://www.google.com/maps or through other online resources. Work Hours Substitute Teachers’ work day is fixed at six (6) hours and fifty (50) minutes, inclusive of lunch, Monday through Friday, regardless of a school’s professional development or parent engagement schedule. You may not leave the building before you have completed a full six (6) hour and fifty (50) minute work day, even if students have been dismissed. Substitute Teacher Schedule/6th Period Coverage • You are required to cover the schedule of the absent Teacher. In general, the regular schedule of any Teacher includes five (5) periods of teaching, one (1) lunch, one (1) preparation period and one (1) Professional Activity Assignment.
Recommended publications
  • Disk Clone Industrial
    Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14
    [Show full text]
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • This Document Explains How to Copy Ondemand5 Data to Your Hard Drive
    Copying Your Repair DVD Data To Your Hard Drive Introduction This document explains how to copy OnDemand5 Repair data to your hard drive, and how to configure your OnDemand software appropriately. The document is intended for your network professional as a practical guide for implementing Mitchell1’s quarterly updates. The document provides two methods; one using the Xcopy command in a DOS window, and the other using standard Windows Copy and Paste functionality. Preparing your System You will need 8 Gigabytes of free space per DVD to be copied onto a hard drive. Be sure you have the necessary space before beginning this procedure. Turn off screen savers, power down options or any other program that may interfere with this process. IMPORTANT NOTICE – USE AT YOUR OWN RISK: This information is provided as a courtesy to assist those who desire to copy their DVD disks to their hard drive. Minimal technical assistance is available for this procedure. It is not recommended due to the high probability of failure due to DVD drive/disk read problems, over heating, hard drive write errors and memory overrun issues. This procedure is very detailed and should only be performed by users who are very familiar with Windows and/or DOS commands. Novice computers users should not attempt this procedure. Copying Repair data from a DVD is a time-consuming process. Depending on the speed of your processor and/or network, could easily require two or more hours per disk. For this reason, we recommend that you perform the actual copying of data during non-business evening or weekend hours.
    [Show full text]
  • Your Performance Task Summary Explanation
    Lab Report: 11.2.5 Manage Files Your Performance Your Score: 0 of 3 (0%) Pass Status: Not Passed Elapsed Time: 6 seconds Required Score: 100% Task Summary Actions you were required to perform: In Compress the D:\Graphics folderHide Details Set the Compressed attribute Apply the changes to all folders and files In Hide the D:\Finances folder In Set Read-only on filesHide Details Set read-only on 2017report.xlsx Set read-only on 2018report.xlsx Do not set read-only for the 2019report.xlsx file Explanation In this lab, your task is to complete the following: Compress the D:\Graphics folder and all of its contents. Hide the D:\Finances folder. Make the following files Read-only: D:\Finances\2017report.xlsx D:\Finances\2018report.xlsx Complete this lab as follows: 1. Compress a folder as follows: a. From the taskbar, open File Explorer. b. Maximize the window for easier viewing. c. In the left pane, expand This PC. d. Select Data (D:). e. Right-click Graphics and select Properties. f. On the General tab, select Advanced. g. Select Compress contents to save disk space. h. Click OK. i. Click OK. j. Make sure Apply changes to this folder, subfolders and files is selected. k. Click OK. 2. Hide a folder as follows: a. Right-click Finances and select Properties. b. Select Hidden. c. Click OK. 3. Set files to Read-only as follows: a. Double-click Finances to view its contents. b. Right-click 2017report.xlsx and select Properties. c. Select Read-only. d. Click OK. e.
    [Show full text]
  • (PI-Net): Facial Image Obfuscation with Manipulable Semantics
    Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics Jia-Wei Chen1,3 Li-Ju Chen3 Chia-Mu Yu2 Chun-Shien Lu1,3 1Institute of Information Science, Academia Sinica 2National Yang Ming Chiao Tung University 3Research Center for Information Technology Innovation, Academia Sinica Abstract Deepfakes [45], if used to replace sensitive semantics, can also mitigate privacy risks for identity disclosure [3, 15]. With the growing use of camera devices, the industry However, all of the above methods share a common has many image datasets that provide more opportunities weakness of syntactic anonymity, or say, lack of formal for collaboration between the machine learning commu- privacy guarantee. Recent studies report that obfuscated nity and industry. However, the sensitive information in faces can be re-identified through machine learning tech- the datasets discourages data owners from releasing these niques [33, 19, 35]. Even worse, the above methods are datasets. Despite recent research devoted to removing sen- not guaranteed to reach the analytical conclusions consis- sitive information from images, they provide neither mean- tent with the one derived from original images, after manip- ingful privacy-utility trade-off nor provable privacy guar- ulating semantics. To overcome the above two weaknesses, antees. In this study, with the consideration of the percep- one might resort to differential privacy (DP) [9], a rigorous tual similarity, we propose perceptual indistinguishability privacy notion with utility preservation. In particular, DP- (PI) as a formal privacy notion particularly for images. We GANs [1, 6, 23, 46] shows a promising solution for both also propose PI-Net, a privacy-preserving mechanism that the provable privacy and perceptual similarity of synthetic achieves image obfuscation with PI guarantee.
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • January 2019 Edition
    Tunkhannock Area High School Tunkhannock, Pennsylvania The Prowler January 2019 Volume XIV, Issue XLVII Local Subst itute Teacher in Trouble Former TAHS substitute teacher, Zachary Migliori, faces multiple charges. By MADISON NESTOR Former substitute teacher Wyoming County Chief out, that she did not report it originally set for December at Tunkhannock Area High Detective David Ide, started to anyone. 18 was moved to March 18. School, Zachary Migliori, on October 11 when the When Detective Ide asked If he is convicted, he will was charged with three felony parents of a 15-year old Migliori if he knew that one face community service, and counts of distributing obscene student found pornographic of the girls he sent explicit mandatory counseling. material, three misdemeanor images and sexual texts messages to was a 15-year- Tunkhannock Area High counts of open lewdness, and on their daughter’s phone. old, he explained that he School took action right away three misdemeanor counts of The parent then contacted thought she was 18-years-old to ensure students’ safety, unlawful contact with minors. Detective Ide, who found because she hung out with and offers counseling to any This comes after the results after investigating that the many seniors. After being students who need it. of an investigation suspecting substitute teacher was using informed of one victim being Sources:WNEP, lewd contact with students a Snapchat account with the 15-years-old, Migliori said he WCExaminer, CitizensVoice proved to be true. According name ‘Zach Miggs.’ was disgusted with himself. to court documents, Migliori Two 17-year old females Judge Plummer set used Facebook Messenger also came forward, one of Migliori’s bail at $50,000.
    [Show full text]
  • S.Ha.R.K. Installation Howto Tools Knoppix Live CD Linux Fdisk HD
    S.Ha.R.K. Installation Tools HowTo • Linux fdisk utility • A copy of Linux installation CD • A copy of Windows® installation CD Tullio Facchinetti University of Pavia - Italy • Some FreeDOS utilities • A copy of S.Ha.R.K. S.Ha.R.K. Workshop S.Ha.R.K. Workshop Knoppix live CD Linux fdisk Command action a toggle a bootable flag Download ISO from b edit bsd disklabel c toggle the dos compatibility flag d delete a partition http://www.knoppix.org l list known partition types m print this menu n add a new partition o create a new empty DOS partition table p print the partition table q quit without saving changes • boot from CD s create a new empty Sun disklabel t change a partition's system id • open a command shell u change display/entry units v verify the partition table • type “su” (become root ), password is empty w write table to disk and exit x extra functionality (experts only) • start fdisk (ex. fdisk /dev/hda ) Command (m for help): S.Ha.R.K. Workshop S.Ha.R.K. Workshop HD partitioning HD partitioning 1st FreeDOS FAT32 FreeDOS must be installed Primary 2nd Windows® FAT32 into the first partition of your HD or it may not boot 3rd Linux / extX Data 1 FAT32 format data partitions as ... Extended FAT32, so that you can share Data n FAT32 your data between Linux, last Linux swap swap Windows® and FreeDOS S.Ha.R.K. Workshop S.Ha.R.K. Workshop 1 HD partitioning Windows ® installation FAT32 Windows® partition type Install Windows®..
    [Show full text]
  • NETSTAT Command
    NETSTAT Command | NETSTAT Command | Use the NETSTAT command to display network status of the local host. | | ┌┐────────────── | 55──NETSTAT─────6─┤ Option ├─┴──┬────────────────────────────────── ┬ ─ ─ ─ ────────────────────────────────────────5% | │┌┐───────────────────── │ | └─(──SELect───6─┤ Select_String ├─┴ ─ ┘ | Option: | ┌┐─COnn────── (1, 2) ──────────────── | ├──┼─────────────────────────── ┼ ─ ──────────────────────────────────────────────────────────────────────────────┤ | ├─ALL───(2)──────────────────── ┤ | ├─ALLConn─────(1, 2) ────────────── ┤ | ├─ARp ipaddress───────────── ┤ | ├─CLients─────────────────── ┤ | ├─DEvlinks────────────────── ┤ | ├─Gate───(3)─────────────────── ┤ | ├─┬─Help─ ┬─ ───────────────── ┤ | │└┘─?──── │ | ├─HOme────────────────────── ┤ | │┌┐─2ð────── │ | ├─Interval─────(1, 2) ─┼───────── ┼─ ┤ | │└┘─seconds─ │ | ├─LEVel───────────────────── ┤ | ├─POOLsize────────────────── ┤ | ├─SOCKets─────────────────── ┤ | ├─TCp serverid───(1) ─────────── ┤ | ├─TELnet───(4)───────────────── ┤ | ├─Up──────────────────────── ┤ | └┘─┤ Command ├───(5)──────────── | Command: | ├──┬─CP cp_command───(6) ─ ┬ ────────────────────────────────────────────────────────────────────────────────────────┤ | ├─DELarp ipaddress─ ┤ | ├─DRop conn_num──── ┤ | └─RESETPool──────── ┘ | Select_String: | ├─ ─┬─ipaddress────(3) ┬ ─ ───────────────────────────────────────────────────────────────────────────────────────────┤ | ├─ldev_num─────(4) ┤ | └─userid────(2) ─── ┘ | Notes: | 1 Only ALLCON, CONN and TCP are valid with INTERVAL. | 2 The userid
    [Show full text]
  • Creating and Formatting Partitions
    Creating and formatting partitions Home Download Docs FAQ Forum Creating and formatting partitions SUNDAY, 14 NOVEMBER 2010 12:27 JAY Creating & formatting partitions in Porteus There are two ways to do things in Porteus. Using a GUI (graphical User Interface) or from a console prompt. If you prefer using a GUI then you can download a module called 'gparted' which takes care of creating and modifying partitions. Double click the module from within Porteus to activate it or place the module in the modules folder if you want it to be available automatically when you boot Porteus. Click here to get gparted. Once activated it should appear in your menu system and you can start it and create your partitions. If it does not exist in the menu then open a console and type: gparted Creating partitions from a console: There is a built in application to modify your partition table in Porteus. It is called cfdisk and gives you a CUI (console user interface) to manage your partition through. Simply open your console and type: cfdisk Another built in function for modifying partitions is called fdisk which also uses a CUI. The benefit of fdisk is that it can be called from a script. You should know the path of your USB device before using this option which you can get from typing: fdisk -l at console. Once you know the path of your USB device you would start fdisk by typing: fdisk /dev/sdb where sdb is the path of your usb. Don't include the number on the end (for example /dev/sdb1) as you will need to modify the entire devices partition table.
    [Show full text]
  • JES3 Commands
    z/OS Version 2 Release 3 JES3 Commands IBM SA32-1008-30 Note Before using this information and the product it supports, read the information in “Notices” on page 431. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1997, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii Who should use this document.................................................................................................................xiii Where to find more information................................................................................................................ xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv Summary of changes...........................................................................................xvi
    [Show full text]
  • Configuring Your Login Session
    SSCC Pub.# 7-9 Last revised: 5/18/99 Configuring Your Login Session When you log into UNIX, you are running a program called a shell. The shell is the program that provides you with the prompt and that submits to the computer commands that you type on the command line. This shell is highly configurable. It has already been partially configured for you, but it is possible to change the way that the shell runs. Many shells run under UNIX. The shell that SSCC users use by default is called the tcsh, pronounced "Tee-Cee-shell", or more simply, the C shell. The C shell can be configured using three files called .login, .cshrc, and .logout, which reside in your home directory. Also, many other programs can be configured using the C shell's configuration files. Below are sample configuration files for the C shell and explanations of the commands contained within these files. As you find commands that you would like to include in your configuration files, use an editor (such as EMACS or nuTPU) to add the lines to your own configuration files. Since the first character of configuration files is a dot ("."), the files are called "dot files". They are also called "hidden files" because you cannot see them when you type the ls command. They can only be listed when using the -a option with the ls command. Other commands may have their own setup files. These files almost always begin with a dot and often end with the letters "rc", which stands for "run commands".
    [Show full text]