Preparing for Technology Proficiency Exam (TPA)
Students are required to take the Technology Proficiency Assessment (TPA) as part of the battery of assessment tests for new students. The test evaluates your ability to use the basic elements of Microsoft Word, Excel and Powerpoint, web browsing, and email. These are applications that you are expected to be familiar with as a student at Hebrew Theological College. You will be using them frequently throughout your career at HTC and beyond.
You are highly encouraged to review these applications before taking the Technology Proficiency Assessment. A collection of short tutorial videos below has been created to assist you.
A schedule that indicates when the TPA will be administered will be shared with you by the HTC office. You may bring headphones with you when the test is administered to refresh your memory by watching these videos again. You will not need any other technology. You will need your login/password for your student account for the school computers. You will also need to access your personal or HTC email.
After taking the test, your scores will be evaluated by the Computer Technology Liaison. In the event that there are gaps in your understanding of these technologies, you will be required to attend a one-hour refresher course.
If you have any questions, please feel free to contact Dr. Norman Eliaser at eliaser (at) htc.edu.
Sign up here for the Blitstein administration of the Technology Proficiency Assessment on August 31. Students who have not taken the TPA are required to attend one of the sessions. The test will take place in the Math Lab. More information for Blitstein students is available here.
eliaser.net/TechVid/HTC_TPA_Email.mp4
eliaser.net/TechVid/HTC_TPA_Excel.mp4
eliaser.net/TechVid/HTC_TPA_PowerPoint.mp4
eliaser.net/TechVid/HTC_TPA_Word.mp4
You are highly encouraged to review these applications before taking the Technology Proficiency Assessment. A collection of short tutorial videos below has been created to assist you.
A schedule that indicates when the TPA will be administered will be shared with you by the HTC office. You may bring headphones with you when the test is administered to refresh your memory by watching these videos again. You will not need any other technology. You will need your login/password for your student account for the school computers. You will also need to access your personal or HTC email.
After taking the test, your scores will be evaluated by the Computer Technology Liaison. In the event that there are gaps in your understanding of these technologies, you will be required to attend a one-hour refresher course.
If you have any questions, please feel free to contact Dr. Norman Eliaser at eliaser (at) htc.edu.
Sign up here for the Blitstein administration of the Technology Proficiency Assessment on August 31. Students who have not taken the TPA are required to attend one of the sessions. The test will take place in the Math Lab. More information for Blitstein students is available here.
eliaser.net/TechVid/HTC_TPA_Email.mp4
eliaser.net/TechVid/HTC_TPA_Excel.mp4
eliaser.net/TechVid/HTC_TPA_PowerPoint.mp4
eliaser.net/TechVid/HTC_TPA_Word.mp4
Technology in the Library
Technology available to Students and Faculty
A variety of technological tools are available through the library for students and faculty. Advance notice may be needed if you need assistance with using these items. By borrowing technology from the library, you agree to the Technology Lending Policy below.
Technology Lending Policy Agreement
A variety of technological tools are available through the library for students and faculty. Advance notice may be needed if you need assistance with using these items. By borrowing technology from the library, you agree to the Technology Lending Policy below.
- TEAMBoards (In Conference Room A & B, Room 5/6, Science Lab, Math Lab, Room 2, Art Room )
- Flip Camera
- Video Camera with Tripod
- Webcams
- Portable Speakers
- Laptop
- LCD Projector
- Digital Camera
- Digital Recorder
- VCR/DVD Monitors (In the Math Lab, Annex Room, and Computer Lab)
Technology Lending Policy Agreement
- You must be Hebrew Theological College student, faculty, or staff to check out the technology equipment and accessories.
- The first time you check out a piece of technology equipment, you must sign an agreement form to ensure that you understand your responsibility for these items while they are in your possession.
- Stolen, lost or damaged items will result in a replacement charge equal to the cost of the item. You are responsible for the safety and security of the item while it is in your possession. If an item is lost, damaged (even by accident), or stolen while in your possession, you will be responsible for the replacement cost.
- Equipment is available on a first-come, first-served basis. You can arrange to borrow video cameras by emailing Eti Berland to reserve them for specific dates.
- You must return the equipment.
- When the item is due back, be sure to return all of the cords, cables, chargers and cases that came with the equipment you checked out. Please return equipment fully charged.
- Before returning the item, clear it of anything you've saved or created. Files will not be saved.
- Upon return, Library staff will inspect equipment to make sure that all pieces (including all cords, chargers, etc.) are present and in good working order. Allow a few minutes for the return inspection.
- Use of technology includes abiding by the HTC Technology Use Policy found in the Student Handbook
TI Tech Support
TI Tech Support is available to assist you when technological issues arise. Make sure to read the Technology Use Policy at the end of this page, which explains your responsibilities for using technology at TI. Your consent to and compliance with this Technology Use Policy is a term and condition of your being allowed into a computer lab. Failure to abide by these rules, posted signs, or to consent to any interception, monitoring,
copying, reviewing, and downloading of any communications or files is grounds for loss of computer privileges, and disciplinary action.
copying, reviewing, and downloading of any communications or files is grounds for loss of computer privileges, and disciplinary action.
Technology Assistance request form
The Technology Assistance Request Form is to be used by Faculty, Students, and Staff when any technological need arises.
There are two ways to submit this form.
1. Online (preferred)
For the online form please click here: https://docs.google.com/forms/d/e/1FAIpQLSdGzdSchoTsQgg_l7gbbh1mzovo-r16Wa3Z_r-uRLa4nIMGdg/viewform?usp=sf_link
2. Paper
There are paper forms on the Librarian's desk in the library and on the door of the Faculty office. Please fill out the form and then place in the inbox on the door of the Faculty Office (next door to the Math Lab).
There are two ways to submit this form.
1. Online (preferred)
For the online form please click here: https://docs.google.com/forms/d/e/1FAIpQLSdGzdSchoTsQgg_l7gbbh1mzovo-r16Wa3Z_r-uRLa4nIMGdg/viewform?usp=sf_link
2. Paper
There are paper forms on the Librarian's desk in the library and on the door of the Faculty office. Please fill out the form and then place in the inbox on the door of the Faculty Office (next door to the Math Lab).
PRINTER TROUBLESHOOTING
A. Ensure that you have selected the correct printer.
B. Check that the printer is on.
C. Check that the printer is loaded with paper.
B. Check that the printer is on.
C. Check that the printer is loaded with paper.
_HOW TO ADD A PRINTER
- Navigate to Devices and Printers (Start, Control Panel, Devices and Printers)
- Click Add a Printer
- Chose to add a Network printer (second option, if it comes up at all)
- It may try searching for printers but please disregard that and chose ‘The printer that I want isn’t listed’
- Chose ‘Select a shared printer by name’
- Enter \\aleph\ (these are backslashes, not forward slashes – you will find the backslash above the enter key)
- You may have to wait a minute but then a drop down list of printers should appear
- Find the printer you are looking for, click next, let it download the driver and then click finish
Names of Printers
1. HP M4345 Library Printer (Located in library)
2. HP LaserJet M4345 MFP PCL 6 (Located in 2606 Computer Lab)
3. Ricoh Africio (Located in Mrs. Mann's office)
4. TOSHIBA e-STUDIO205Series PCL6 (Located across of the math lab in 2600)
_Blitstein Institute Technology Use Policy
_
PURPOSE
The purpose of a Technology Use Policy is to establish clear and definite guidelines for all students’ use of technology. The computer workstations and labs at the Blitstein campus are meant to be used to enhance the educational opportunities of all students and staff. Any use of Hebrew Theological College technology is predicated by the requirements of
Halachic, ethical, legal, or moral behavior as dictated by Torah, local, state, national, or international law.
Hebrew Theological College will make every effort to protect students from any misuses or abuses of the information technology. All computers will have virus protection that is updated regularly. All users must be continuously on guard to avoid inappropriate and/or illegal interaction with the technology. Although some limitations are built into the system
itself, these restrictions cannot limit completely what an individual can do or can see. Each user is responsible for his/her own actions.
ACCEPTABLE USE
1. Technology systems are in place to facilitate your ability to efficiently and productively do your schoolwork. To that end, these systems are intended for school use. Limited personal use is allowed, provided workstations are available. Priority is given to students requiring the computers for legitimate school use.
2. Use of other organizations’ networks or computing resources must comply with rules appropriate to both networks.
3. Transmission of any material in violation of any Halachic, international, federal, state, or local laws is prohibited. This includes, but is not limited to: copyrighted material, threatening or obscene material.
4. Modifications, relocations, and/or additions to any technology equipment are not allowed at any time. Any cables attached to computers must stay attached to those computers. This includes network cables, mice, keyboards,
and monitors.
5. Failure of any computer equipment should be reported immediately to the Director of Information Technology, Mrs. Chaya Sarah Miretzky [email protected]. The best way to do so is to please fill out a Technology Assistance Request Form (see above for link) in either online or paper format.
6. The use of any personally owned software is strictly prohibited on Blitstein Institute equipment.
7. It is a violation to recklessly or maliciously interfere with or damage computer or network resources (network cables, hubs, and other equipment) or computer data or files. Additionally, misappropriation of data or copyrighted materials, including computer software, constitutes theft.
8. No food or drink may be brought into any lab.
9. Those using campus computers are advised to save their work on their own USB Flash drives. Files stored on the computers themselves will be deleted without notice. Files stored on server or shared storage space will be periodically deleted. Even if your instructor tells you to store something under Student Files on the server, it is advisable for you to back it up on a flash drive.
10. Personal computers are not allowed to be left in the computer labs for extended periods of time. Computers left in the lab over an extended period of time will be removed. All students must login to the network using their own login only.
11. Any student who does not have a login should contact Mrs. Miretzky. Do NOT login to the system using another student’s login.
12. Laptops may not be hard-wired into the network. Rules 2, 3 and 7 above apply to all laptops using the Blitstein WiFi network. Hebrew Theological and Blitstein Institute are
not responsible for virus protection, software, configuration or WiFi setup on personal computer equipment.
THE INTERNET
12. Internet access is provided primarily to support your educational requirements.
13. Downloading videos, games and music from the Internet is prohibited. All other files should only be downloaded with appropriate caution.
14. Misrepresentation of oneself or Hebrew Theological College is prohibited.
NETWORK ETIQUETTE
You are expected to abide by the generally accepted rules of network etiquette. These rules include, but are not limited to, the following:
15. BE POLITE. Never send, or encourage others to send abusive messages.
16. USE APPROPRIATE LANGUAGE. Remember that you are a representative of Blitstein Institute and Bnos Torah
everywhere. You may be alone with your computer, but what you say and do can be viewed globally! Never use any inappropriate language. Illegal activities of any kind are strictly forbidden.
17. Out of courtesy for others, please limit cell phone use while using the lab.
18. Chain letters, pyramid schemes, and unauthorized mass mailings are prohibited.
SECURITY
19. Never use another individual’s account, password, or give out your information or password. Everything that occurs on any account, no matter the actual user, is the responsibility of the account owner. Inappropriate use of the network can be traced to specific user accounts. In addition, printer access is allocated by user account, so it is
critical to remember to log out when leaving a workstation.
20. Network accounts are to be used only by the authorized owner of the account for authorized purposes Access will be denied if an account is found to be used by unauthorized users.
21. Any user identified as a security risk will be denied access to the computer lab.
VANDALISM
22. Vandalism is defined as (1) any malicious attempt to harm or destroy data of another user or networks that are connected to the system and (2) any unauthorized modifications or alterations in any technology equipment. This includes, but is not limited to, knowingly uploading or creating computer viruses. Any vandalism will result in the
loss of computer privileges, and further disciplinary action.
CONSENT
23. Your consent to and compliance with this Technology Use Policy is a term and condition of your being allowed
into a computer lab. Failure to abide by these rules, posted signs, or to consent to any interception, monitoring,
copying, reviewing, and downloading of any communications or files is grounds for loss of computer privileges, and disciplinary action.
PURPOSE
The purpose of a Technology Use Policy is to establish clear and definite guidelines for all students’ use of technology. The computer workstations and labs at the Blitstein campus are meant to be used to enhance the educational opportunities of all students and staff. Any use of Hebrew Theological College technology is predicated by the requirements of
Halachic, ethical, legal, or moral behavior as dictated by Torah, local, state, national, or international law.
Hebrew Theological College will make every effort to protect students from any misuses or abuses of the information technology. All computers will have virus protection that is updated regularly. All users must be continuously on guard to avoid inappropriate and/or illegal interaction with the technology. Although some limitations are built into the system
itself, these restrictions cannot limit completely what an individual can do or can see. Each user is responsible for his/her own actions.
ACCEPTABLE USE
1. Technology systems are in place to facilitate your ability to efficiently and productively do your schoolwork. To that end, these systems are intended for school use. Limited personal use is allowed, provided workstations are available. Priority is given to students requiring the computers for legitimate school use.
2. Use of other organizations’ networks or computing resources must comply with rules appropriate to both networks.
3. Transmission of any material in violation of any Halachic, international, federal, state, or local laws is prohibited. This includes, but is not limited to: copyrighted material, threatening or obscene material.
4. Modifications, relocations, and/or additions to any technology equipment are not allowed at any time. Any cables attached to computers must stay attached to those computers. This includes network cables, mice, keyboards,
and monitors.
5. Failure of any computer equipment should be reported immediately to the Director of Information Technology, Mrs. Chaya Sarah Miretzky [email protected]. The best way to do so is to please fill out a Technology Assistance Request Form (see above for link) in either online or paper format.
6. The use of any personally owned software is strictly prohibited on Blitstein Institute equipment.
7. It is a violation to recklessly or maliciously interfere with or damage computer or network resources (network cables, hubs, and other equipment) or computer data or files. Additionally, misappropriation of data or copyrighted materials, including computer software, constitutes theft.
8. No food or drink may be brought into any lab.
9. Those using campus computers are advised to save their work on their own USB Flash drives. Files stored on the computers themselves will be deleted without notice. Files stored on server or shared storage space will be periodically deleted. Even if your instructor tells you to store something under Student Files on the server, it is advisable for you to back it up on a flash drive.
10. Personal computers are not allowed to be left in the computer labs for extended periods of time. Computers left in the lab over an extended period of time will be removed. All students must login to the network using their own login only.
11. Any student who does not have a login should contact Mrs. Miretzky. Do NOT login to the system using another student’s login.
12. Laptops may not be hard-wired into the network. Rules 2, 3 and 7 above apply to all laptops using the Blitstein WiFi network. Hebrew Theological and Blitstein Institute are
not responsible for virus protection, software, configuration or WiFi setup on personal computer equipment.
THE INTERNET
12. Internet access is provided primarily to support your educational requirements.
13. Downloading videos, games and music from the Internet is prohibited. All other files should only be downloaded with appropriate caution.
14. Misrepresentation of oneself or Hebrew Theological College is prohibited.
NETWORK ETIQUETTE
You are expected to abide by the generally accepted rules of network etiquette. These rules include, but are not limited to, the following:
15. BE POLITE. Never send, or encourage others to send abusive messages.
16. USE APPROPRIATE LANGUAGE. Remember that you are a representative of Blitstein Institute and Bnos Torah
everywhere. You may be alone with your computer, but what you say and do can be viewed globally! Never use any inappropriate language. Illegal activities of any kind are strictly forbidden.
17. Out of courtesy for others, please limit cell phone use while using the lab.
18. Chain letters, pyramid schemes, and unauthorized mass mailings are prohibited.
SECURITY
19. Never use another individual’s account, password, or give out your information or password. Everything that occurs on any account, no matter the actual user, is the responsibility of the account owner. Inappropriate use of the network can be traced to specific user accounts. In addition, printer access is allocated by user account, so it is
critical to remember to log out when leaving a workstation.
20. Network accounts are to be used only by the authorized owner of the account for authorized purposes Access will be denied if an account is found to be used by unauthorized users.
21. Any user identified as a security risk will be denied access to the computer lab.
VANDALISM
22. Vandalism is defined as (1) any malicious attempt to harm or destroy data of another user or networks that are connected to the system and (2) any unauthorized modifications or alterations in any technology equipment. This includes, but is not limited to, knowingly uploading or creating computer viruses. Any vandalism will result in the
loss of computer privileges, and further disciplinary action.
CONSENT
23. Your consent to and compliance with this Technology Use Policy is a term and condition of your being allowed
into a computer lab. Failure to abide by these rules, posted signs, or to consent to any interception, monitoring,
copying, reviewing, and downloading of any communications or files is grounds for loss of computer privileges, and disciplinary action.