Using Technology in Ministry Edward Braithwaite Seminary Student, NOBTS.

Slides:



Advertisements
Similar presentations
MY NCBI (module 4.5). MODULE 4.5 PubMed/How to Use MY NCBI Instructions - This part of the: course is a PowerPoint demonstration intended to introduce.
Advertisements

How Does the Internet Work? A Basic Introduction to the Worlds Biggest Computer Network.
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Johnson Logistics Solutions Office of Systems and Information Technology.
In this powerpoint I will show how the Manga comic company can make sure their computers are safe from anything that may harm them. I will make sure their.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Intro to Computer Networks DNS (Domain Name System) Bob Bradley The University of Tennessee at Martin.
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
Customer’s Choice Presented by: Keystone Computer Concepts.
Basics Dayton Metro Library Place photo here August 10, 2015.
Information about the computer By Sophia and Christina C.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Website on Computer Security By: Brittany Freeman.
Learning In A Techno World How Safe is Your Cyberspace?
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
SIG Leader: Mike Smith Host of the Mike Tech Show podcast
Websites 101 Technology Committee UPSOM. Web Class – Goals  Make a simple web page (or series of pages)  Upload that page to the internet  Feel comfortable.
Women’s Business Forum New Website How To: Free Members who have been receiving the WBF newsletter.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
How computer’s are linked together.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
IT for Brownies. hackers What they do b They illegally get into your computer and access anything on your computer. b Mr Gary Mckinnon got caught trying.
 Research on the best software that suits your preference. I recommend Adobe Dreamweaver as that is what I’m using to create my website.
Digital Citizenship Grade Create a map that shows all of the places your family goes online and with whom you connect With a parent, find three.
Networks.
1. What is desktop publishing software used for? 2.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
Small Business Security Keith Slagle April 24, 2007.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Ten Common Computer Problems That Can Easily Be Fixed By: Sam Merrifield.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
 What information can you get?  Where can you find this information?  How can you access to the content?  When would you be able to access?  Why would.
Windows Vista Configuration MCTS : Productivity Applications.
Web Page Design The Basics. The Web Page A document (file) created using the HTML scripting language. A document (file) created using the HTML scripting.
What they are and how to protect against them
Networks.
How And The Internet Work
Internet Safety.
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
NORTON CUSTOMER SUPPORT NUMBER. NORTON CUSTOMER SERVICE.
Modelling the internet
Modelling the internet
Network Hardware and Protocols
Read this to find out how the internet works!
Presentation transcript:

Using Technology in Ministry Edward Braithwaite Seminary Student, NOBTS

Topics for Session ListServes ( groups) Databases Networks Presentations Web Sites Other Neat Gadgets

Using in Ministry How much does it cost? How do I get all those addresses? What do I do with them now that I have them?

ListServes ( Groups) What is a ListServe? What kinds of lists are there? Where can I get one? How much do they cost? Yahoo Groups (FREE) injesus.com (FREE) Host your own list Lyris ($) What about SPAM? DON’T DO IT!!!

Very Important!!! Be sure to have a good anti-virus program running on the computer you using for sending . Also, keep the virus database updated regularly. McAffee Norton Anti-Virus PC-cillin TrendMicro.com

Databases A database is a storehouse for information. Keep up with student information Use for tracking events Picture Database Use for mail merges

Databases Access Paradox Approach Servant Keeper Software Church Membership System

Other Tips Use good security on your computers. Keep passwords a secret. If you have a live connection to the internet, use filtering software or some type of measures to limit access to the internet. Keep up to date with software patches and security fixes…especially if you are using Microsoft products !!!

Networks SOHO Networks Allow you to connect multiple computers together to share information and resources. Linux Networks Samba Servers can act as a Microsoft Domain Controller

Presentations PowerPoint Song Screen Digital Cameras/Video Cameras Newsletters

Websites This is a whole seminar topic!!! If you want to see some good examples of Collegiate Ministry web sites, check out student.org. It has links to many of the Collegiate Ministries around the country.

Other Neat Gadgets! Cable Routers PDAs Laptops PC-to-TV Converters

My Info… If you would like to contact me about anything covered in this presentation or for more information about these topics, me at: I plan to put this presentation with some additional links on my web site…(check after Monday!)