University Crest CS Dept Logo CMS logo

[ University home | SCMS home | Computer Science Dept home | COMP123 home ]

Laboratory Information

This document contains a variety of information relating to the Part I Laboratories used by Part I Computer Science students (RG.07, RG.10 & RG.11)



The facilties provided for Part I Computer Science students are located in the ground floor of R_Block. Laboratory use is allocated by course.
RG.10 & RG.11 hosts COMP103A, COMP104B, COMP123 and COMP134B. RG.10 also hosts COMP223 and COMP278. RG.11 also hosts COMP124.

Laboratory Map

Laboratory Access:

The Part I Computer Laboratories are available to enrolled students Monday to Friday 8 am to 8 pm. A schedule of the laboratory hours of use will be posted on the laboratory doors.

Prior to 8 am, after 8 pm and at weekends, a 'Swipe' activated Student ID card will be required for access. Students found in the laboratory at these times without a valid card will be removed. Information on activating your ID card will be made available during the laboratory sign up period in week one.

The 'Swipe' is an individual electronic key which uses a magnetic strip to activate the lock. Your Student ID card contains the magnetic strip on the back and can be activated for all those areas which a student is entitled to use. Instructions for card use are on the Cardax locked doors. The card should not be viewed as a 'ticket to enter'. In the past groups of students have allowed one person to swipe while the rest of the group entered. Although it may be tedious for a group of students to swipe in one at a time it is important that each individual does so. In the case of fire, the swipe record will provide the fire service information on how many people are in the building. Remember - swiping is to your benefit.

The card is issued for your use only, and allowing others to use your card, or access with your card will result in your access being disabled, and disciplinary action taken.

Please note that the University is not obliged to supply after hours access. This is provided in response to student request, on the basis that machine availability cannot be guaranteed. (There is no callout provision in the event of server, printer, or machine failure).

Laboratory Use and Behaviour

The University has clear rules regarding behaviour, and the Computer Science department takes a serious view of breaches of those rules. See the Computer System Regulations and the Discipline Regulations in the University Calendar.

By your enrolment you have agreed to abide by the conditions set in the regulations. We don't like to have to reprimand people, but the regulations are there for the benefit of the whole University community, which includes you. Unfortunately in the recent past we have had to take action for cheating and other problems - mostly these cases have been minor, but some offenders have been dealt with by the Dean and in one case, by the Vice Chancellor.

Abusing the system can take a number of forms relating to your work, the facilities provided, and the people in the laboratory environment. Therefore, as noted above, the work you hand in should be your own. Submission for assessment of work which is not your own is a serious breach of University regulations because this runs totally counter to the objectives of the University.

For your benefit we point out that the computer account(s) provided by the Computer Science department are for your Computer Science courses only. Use of that account (or accounts) for other courses or purposes, or by people other than yourself, is not permitted. You may not use the Part I Laboratory facilities for any other courses. The resource constraints do not allow any provision for other courses. If you need to type up an essay/report/assignment see the lecturer of the course concerned as to which facilities you should use. Any student found working on material for other courses will be removed from the lab, and the material deleted. Only access accounts or facilities which you have been authorised to use. Do not remove or use printouts belonging to other students. Access will only be permitted for the duration of the course. At the end of that time, the account and disk space used will be removed.

The Part I Laboratory is a secure laboratory, meaning that all facilities required are supplied, and bringing other computing equipment or software into the laboratory will be taken as showing an intention to misuse the facilities. Any material (software or hardware) related to misuse will be removed from the system.

Practical consideration should be given to the environment in which you work. The lab is a working environment, and appropriate behaviour is therefore expected. Interaction is encouraged so feel free to discuss the work with the people around you, but people huddled in groups around a computer are a distraction and will be asked to leave the laboratory. Be considerate to those around you keep noise to a reasonable level - restrict games to after hours - give up your workstation if you're not working and there are no others free. People should be able to work without harassment of any kind. Note the University policy on this.


The Part I Laboratories are a secure lab, meaning that all facilities required are supplied, and bringing other computing equipment or software into the lab will be taken as showing an intention to misuse the facilities. Any material (software or hardware) related to misuse will be removed from the system.

The software required for the course is preinstalled. Do not install any other software on the system (this includes from CD, email, disk, or any other source). The reasons for this include:

No food or drink is permitted in the laboratory

Vending machines are currently situated in the printer room. These are provided so that you can eat or drink during breaks away from the computer. Seating has been provided in the foyers for this purpose. Do not take any food or drink into the labs. Such items are potentially dangerous to the laboratory environment. If you have foodstuffs with you, they should be left outside, or kept in a closed bag and the bag should be kept on the floor. This includes water bottles (they leak too). The consumption of food and drink is prohibited in the computing laboratories.

Persons found with food and drink visible in the lab will have their details (name and ID) sent to the Dean and will be evicted from the laboratory for the remainder of the day.


The software available on the network does include games. These are provided on the basis that they will be used responsibly. Failure to abide by these conditions, or other abuse of the games will result in their being made unavailable on the network.

Emergency Procedures:

Instructions on emergency procedures will be given in your first laboratory session. You should however, note the following:

Fire or other Evacuation:

The University's general instructions are as follows:

"In the event of the continuous ringing of alarm bells, or sounding of sirens all occupants of the building must evacuate by the nearest exit to an area away from the building and clear of any roadway and not re-enter the building until the all clear is signalled by the Fire Service or the Building Warden. (Note that the alarm bells being turned off is not the all clear signal).
Occupants should leave the building in an orderley manner (avoid panic and do not run) and should not attempt to carry cumbersome equipment or personal belongings. Elevators must not be used during an evacuation." (Guide to Fire Safety and Evacuation of Buildings)

During working hours, CMS staff members will be on-hand to direct the evacuation. The Building Warden (Harry Johnston) can be identified by a yellow vest. The Floor Warden can be identified by a red vest. After-hours, security staff will arrive as quickly as possible. Follow their instructions at all times.

Part I Computing Laboratory users should exit through the fire door at the south end of the floor. Do not use the main entrance as people from upper floors will be evacuating down the stairwell. Evacuees should gather on the grassy knoll between G and I blocks. Stay clear of the roadway to allow Fire Service access.

Burgler Alarms:

In addition to the fire sirens (situated in the R_Block hall), the labs are equipped with burglar alarms on all the computer equipment. In the event of these being activated, a loud horn will sound in the lab. This has the potential to damage your hearing, so you are recommended to leave the lab as quickly as possible. Staff will advise you when the alarm has been cleared and you can return to the lab.

See Also

Web-administrator, Department of Computer Science, University of Waikato, Hamilton, New Zealand