 Good morning, everyone. Welcome to BC 314, our course on media and technology. Thanks to each one of you for connecting to the class. Let's take a moment to pray and then we will get started. Could somebody pray with a class, please? Go ahead. Dear God, thank you so much, love, for this hour and moment that we're together to learn more about technology in India, Lord. Thank you for this opportunity, God. As we have actually learned which we should do best in the knowledge world, Lord, we know that everything that we're learning is for the time and it is coming in for us to, like, to share your words through the technologies and through the medium books, God. Thank you, love, for best of our shoes. We pray for you, God, for you to lead him and guide him. And I also pray for my classmates, Lord, that you bless them and help them to grow his understanding of knowledge. And you pray, Amen. Amen. Thank you, everyone, for connecting and joining to the class today. So today would be, I think, our last lecture for this course. All I'm going to do is what we are going to do is go through the last lesson, which is on data protection. I'll just share a few thoughts on it. This will be very short. And then after that, we will just do a quick overview of the entire course. So we'll go through the whole course content. So the PDF for both of these have been put out in the classwork. So I'll just go through the whole PDF and have that. Keep that as a reference for your future use. And of course, we have to keep in mind that everything around us is changing. So the tools, the technologies are always evolving. New things are coming out. So while, you know, we've shared with you whatever is available today and what we're using today, six months down the road, things could be quite different. So it's, you know, it's important to look at what's available out there at that time. But if at any point down the road you need help, you can always reach out to us and we'll be happy to share with you whatever, you know, whatever we are using, whatever we are learning at that time so that we can help you, you know, to leverage these things in your ministry, whether you're doing church ministry or some other ministry, we'd be happy to share. So the last lesson I just want to bring our attention to is about data protection, confidentiality and privacy. So essentially, you know, as we're using these software tools, digital tools, software platforms, etc. One of the main objectives is to manage people's data. So if you have a congregation, several hundred people, of course, the objective is, okay, I need to keep managing the data. It'll help me in so many ways in engaging with the people. But along with that comes a huge responsibility and that's, I just want to bring our attention to that. The responsibility is that we, that is as a church or as a ministry, like any other organization are responsible for the data we collect or the data that is given to us by the people who engage with us. So we have to ensure the protection, the confidentiality and the privacy of that data. And over time, different regions, different countries around the world have understood this importance and they have come out with their own regulations. Now, some countries or some regions are much more strict and some parts of the world, you know, you can get away with a lot of things, but in some parts of the world, you cannot. You have to be very careful. So, you know, this whole thing is evolving in various countries and are in different stages of putting regulations in place. So wherever you are operating and now, you know, the fact is many ministries because we are online, in some sense, we are global, we'd be people having people from different parts of the world engaging with us. So we are accountable for the data we collect. Perhaps, and I think, you know, what's recognized as one of the most toughest and strictest regulations are the regulations put out by the European Union and you can go to their website, you know, just to get an idea. You don't have to study all of that, but just to be aware that they have what is known as the GDPR, the General Data Protection Regulation, which is one of the most comprehensive, strictest frameworks out there and which means that this is how you should handle data collected by people part of the European Union. But it's a good standard to look at and something that we could, you know, reference and do our best to deal too. So essentially, they want us to be, you know, whether it's the European Union or whether you're operating North America or any other part of the world, doesn't matter. We have to be accountable to people for their data, which they have entrusted to us. And so the guidelines put out, the regulations put out there by the European Union GDPR is a good framework to look at. So basically, what does it state? Seven principles. There's got to be, you've got to be fair and transparent when you're collecting the data, how you go about doing it. You know, there's got to be, there's nothing secretive, nothing unfair in the way we're collecting people's data. The purpose for which we're going to use the data must be made clear. You know, you're collecting data for this purpose. Okay, you're a church. You're collecting data in order to keep them informed about the activities of the church. Yeah, or what a church administrator, you're collecting data so that you could, you know, serve them better in these ways. So very clear. Collect only the data you need. So, you know, typically as a church, you don't need the critical data. You don't need other things, you know, just basically you may need their contact details may need their birthday or the anniversary so you can wish them on their birthday anniversary. That's it. So you collect the data that you need, nothing more, and keep the data up to date. And so when you collect the data, we're also responsible for keeping it accurate and keep it up to date. So that's part of it. Then storing, storing it only for the duration that you actually need to keep the data. Of course, if they're part of your congregation, you would keep their data with you while you're serving them. They also may have the option to say, hey, I'm moving away from the church or moving out to another part of the world so you can take me off or I would still like to be part of your database. So those flexibility, that option is there so that if people don't want to stay there in your database, they can leave and you keep the data only for the purpose and the duration that's needed. Sixth, you also have to make sure that their data is kept confidential, secure, and then number seven, that you are accountable. The organization holds themselves accountable and should be able to demonstrate that they're actually in compliance with these guidance, with this guidance. So those are seven principles of generally, this is what we want you to do with people's data. This is how you handle, process their data. So to sum it up, when we collect data, which we will be doing when you're running a church management system or something that you're taking a ministering to people, you're collecting the data. So it immediately makes its unsaid that we are responsible for storing their data, processing the data in a very secure way. We have to protect it from any unauthorized, unlawful misuse of their data and so on. So for example, as a church, we have intentionally, when we collect our data, we don't give it to anybody else. We don't use it for other than our own church ministry purposes. Just an example. So there was somebody in our church who was doing a business and they approached us, and this was many years ago. They knew that we had our database of all our congregation people. So then they approached saying, hey, can we, and they had a certain business, can we send an email or can they ask us? Can the church send an email, sharing what their business, whatever it is, with the congregation? We said, no, we can't do that. No, we will not be able to give you the data to use it. Neither are we going to send that. That means, hey, this data was given to us by our congregation. You are part of the congregation. You're running a business, but we will not use congregation data for that business purpose. So we had to be very clear. And any time, over the years, in the past, whenever people approached us, our response would be no. So now people are very clear. They don't even ask that they know the church has data, but we will not use it for those kinds of purposes. Also, sometimes even other Christian ministries would approach us in the past. You know, can you do this? Can you send, you know, promote this thing across to your people? They know we have the database. We have not only have database of our congregation, we have database of pastors across our country and even people outside the country. So we have that information. But when they want to, in the past, they would approach and our answer would be no. Sorry, we cannot do it. So even that has gone down. So people don't even ask these days because they know our policy. We're keeping everything confidential and we use it exclusively for, because they gave it to APC. They will use it only for APC purposes, not for other business purposes or other kinds of things. Right. Now, in addition to that, we have to be careful who can access the data. Right. So that's also, and I'll just come to that later. But when you talk about data protection, we are saying basically we shouldn't lose this data due to any kind of damage loss. So on, of course, for our own organizations benefit. So what do we do? We have daily backups every day. All our software systems are backed up. Right. So it's not once a week. It's every day. Things are being backed up. There's a backup of everything. Of course, because data is being updated on a daily basis. So there are, you know, a lot of things happening. So data is being updated on a daily basis. So there are backups on, and a lot of what we do is on the cloud. So there are backup stored redundant copies of other data and of all our software that's being stored in the cloud in a multi-cloud environment. So that means we're using separate cloud providers. So if at all, and this I don't suspect would happen, but, you know, if at all there is some disaster in some part of the world. First of all, the cloud providers themselves have a lot of redundancy built into their own service. Secondly, we are doing our own backups in a separate redundant storage. And which they're also having redundancy in their backup. So, you know, our data is available. So if something goes down, we can just bring it up from a different storage. So the data is protected from any kind of damage or potential loss. If or if there are any virus attacks and so on. So we've not suffered any serious, sorry, any serious problems. We've noticed there have been attempts, but no serious, you know, we've not had any break-ins into our systems or into our data. Secondly, so that's data protection, making sure the data is not damaged or lost. Secondly is confidentiality, which means only authorized people should be able to access the data. So of course, you build this into all our software systems would have the authentication process. That's one thing. Second, we are very applicable. We have role-based security. That means, you know, if you're an administrator, you can see these things. If you are a staff or a consultant, you will see only these things, right? So what you can see, what data you can see will vary depending on how you log in. So I personally would have admin access to all our systems. I can see everything, but our staff would not have that. Usually have a role that's associated with a staff or a consultant. They can see what they need to see. And then what actions can they do, right? So even that is controlled. Similar, it's kind of, you know, you can call it access controller. You can call it role-based control. But what they can do with the data is limited to the, is restricted to what they need depending on what work they are doing. And there are other verifications in place. Typically, we have a two-factor authentication setup for wherever it's needed, so that only those who have that can actually log in to the system. So we build confidentially. So you just need to think, all right? So as you are setting up your software system and your various applications for your church or ministry, think about this. I need to protect the data that is given to me and make it redundant so that in case of some disaster or some intrusion, I have access to the backed up data. Secondly, I need to make sure it's confidential. Only people who need to should access it. You know, you may have a lot of people serving in your church, but you only need a few people to look at that data depending on what work they are doing. And then privacy means it's about the individual. You don't want their name. You don't want their personal details to go out. So that's privacy. So you need to make sure that when you are pulling data out for certain use, for example, for the promotional campaign, you just need the mobile numbers or you just need the email IDs. But the other details of the person is not sent out to whoever is going to send the email or who is going to send a WhatsApp message or notification. So typically, we would call it de-identified data. That means you've got data, but there's no correlation with who it is. It's de-identified. So that way you handle data, especially when you're doing your campaigns, your promotions, the individual's data information is secure while you're making use of just the piece of information you need to run the campaign, run the promotion, all of those things. So you keep that private, the individual's information. The last point is that many countries and states who have these data privacy, data protection, confidentiality and privacy regulations in place also have something called a security breach notification. That means in case, for some reason, data that you've collected from people has been breached, broken into, somebody has wrongly gained access to it, then you need to notify people. So let them know, hey, this has happened. We're sorry about it, and this is going to protect you. This is the actions we're taking. So that means if something has happened, hopefully nothing, it shouldn't happen, but in case it happened, then you notify the people, hey, this has happened. This is a reason why, and of course you apologize for it, and then immediately you're saying this is how we are taking care of your data. So that's a security breach notification to the people who have given you the data. So you're being accountable to them. Now, we've not had to do this, but this is a requirement, regulation that's in place. Should anything happen, we need to be able to notify people. So keep these thoughts in mind as you are working with people's data in your church and ministry. This is just being accountable to the people for the data they've given and doing your best to keep their data secure, confidential, private, and being accountable to them. Let me pause here before I get into a review of the course. Let me pause to see if there are any questions on this, any thoughts, any comments? Any questions? Sri Kumar, go ahead. Thank you, sir. So I want to know about, in case, is it possible of the church website can be hacked? And second thing, especially when it comes to the offering part, how we make it more, how we say that it's secured, the data is what we are putting that input, the credit card numbers and all. How it is secured, like how these things are stored in some places or is it how I just want to know about these details. Thank you. So I'm just speaking in general terms and I'll speak specifically here. Can any software system be hacked? In theory, yes. Any software system you build can be hacked. People are trying to find loopholes to be destructive or be malicious, do something hurtful, harmful. Could things be hacked? Yes, attempts can be made. So from that perspective, the answer is, yeah, any software system people may try to attempt to hack into it. Now, for our church website, we are using a content management system. Could people try to hack it? Yeah, they can. We've seen attempts in the past. But we've taken whatever actions I've described. We have taken actions to protect our own websites, multiple websites. Typically, we use very strong passwords. We use, like you said, two-factor authentication, especially the administrative control of the website. And then, of course, they could do other ways, like through their attempts to hack. They could try to intrude, especially in queries that go to the database. They could try to put in their own queries and try to do that. So we've tried to protect as much as possible and so far we've not had any successful attempt. But in theory, answer to answer the question, in theory, yes, people tried to. People could, but we need to keep our defenses up as much as possible. Secondly, how, you know, credit card information. Now, we as a church, we as a church, we don't collect people's credit cards in credit card information. So basically, people make the contributions through direct bank transfer. That is the majority of the people. That means it comes from their bank to our bank. Some people use the UPI, the payment gateways. So that is, again, in one way it's going from their app through the bank to our bank account. So there again, we don't collect any information. So basically, I'm speaking in general terms, I'm sorry, specific for us as a church. We don't collect any bank information. We don't store any, we don't have any bank financial information of our donors. Nothing. Speaking in general terms, do organizations store credit card information? Yeah, you can. You know, of course, you do that with the approval of whoever's making the contribution. You know, just to make it easy for them to come back and when they want to make recurring contributions or payments, you can store it. But then, you know, the final step, authentication always requires, if you're using credit card CVV or sometimes you also have another level of authentication, which is the, you know, we call it the OTP that goes to the phone. So you have typically, in addition to credit card, you'll have two other levels of authentication. So that's one thing. And usually the credit card itself is stored in an encrypted form. So nobody from the back end. Of course, you can decrypt it, but generally speaking, a person viewing the database where this is stored will not be able to read that directly because it's in an encrypted form. So to answer your question, now, we don't do this because we don't store any financial information, their credit card bank details. But I'm just saying in general, credit card information will always be stored. In an encrypted form. So nobody can read it directly. Then you also have other levels of authentication that are typically required to make a transaction to have a successful transaction on the card, which includes the CVV number and also an independent OTP number in most cases. In India, it's strict. International, the OTP is not very strict. It depends on the settings of the card and banks as well. So that OTP is not always there. So yeah. So that's in general terms. For us specifically, we don't store any credit card information. Thank you, sir. Thank you very much. Okay. Any other questions? All right. So let's do a quick run through of the entire course. Just to review, you know, what we have attempted to cover in this course starting from the beginning. All right. So, of course, 314 media and technology. We started, we started by talking about the trends of what we are seeing globally. The fact is that the younger generation and generations that are coming are what we would refer to as digital natives. They're born, you know, they've started life with, you know, the digital all around them. And so we said, look, this is something we have to be aware of. We have to, you know, be aware, we need to know what's happening. And we need to be able to relate to these generations that are engaging in this manner. But while we do that, well, we, there are benefits, of course, and, you know, making use of these current tools and methods. But while we do that, we have to have some guidelines when we put out these simple guidelines. Stay relevant. Don't compromise the message. Stay pure in your motives, blameless in your conduct. Have you use it and look for lasting fruit, not just something that gets people excited. So then we started looking at various areas of ministry and how that has changed over time. So we talked about how things have changed in the way people minister the Word of God. We looked at a couple of examples here and, you know, and delivery style and attire and so on. And the place of preaching. We talked a little bit about the gathering place, you know, nowadays where people meet, how that has gone from the temple to the synagogue to the homes to the church buildings to huge, you know, venues today. Satellite churches, live streamed churches and so on. So that's, that's, you know, it's, it's like norm today for many churches to have live stream and people connect and, you know, and even we are experiencing here in Bangalore. Before the pandemic, we used to have maybe 50, 60 people live, you know, watching online. Now we are more in like 200 plus, even after, you know, all the in-person everything has started. So we're seeing that even after the pandemic, there's still people watching live. And then there are a lot of people who watch the service afterwards. Then there is worship, how worship has changed over the years, the expression of worship. We kind of did a quick run through the history of worship and we talked about the pros and cons of contemporary Christian music and what we should avoid. The including inclusion of creative arts in Christian ministry. We looked at different forms of creative arts, how we can engage, use it meaningfully. We see some good, you know, work that has been done. And so we should try and encourage that, especially when we are trying to reach people who would relate to those forms of expression. Talk a little bit about print media, how print media is very powerful, enables us to reach people and share a little bit about what we are doing as well. Then we spent a bit of time on radio, television, films. We looked at the history of radio, how radio was very, has been in the past, very effective. And in some parts of the world it still continues to be useful. Then we talked about television, how that had a, how that all started and, you know, how television again was very, very powerful, medium. And then slowly people transitioned, I mean television, then Christian films, Christian films still continue to play a very useful, important role in several films that have had a good impact. And then people have, of course we did mention that people are slowly transitioning from television to online consumption. We made a little mention of entertainment and gaming. So this is again interesting, of course, but it's very expensive. So it's not something everybody can do, but it's interesting, it's useful, and it provides another way of reaching out to people, engaging with people. Then we transitioned into digital expressions. So the online expressions, which is very predominant today, a lot of tools, opportunities are available for us and we should take advantage of them. So we said, okay, you know, it's good for a church or a ministry to think through on the digital engagement strategy, who are the people you want to reach, how do you want to reach them? And how would you position the work you're doing to serve them well? Think through on it and ask real questions and just mention some examples of how we could do that. Then we started getting into some specifics, okay, websites are a very useful, probably even necessary thing to have for church and ministry. And we looked into details on how to get that set up, what you can do. And basically, if you do it well, then the content you put out on your website will be accessible or visible globally. And so we gave some tips on how to do that. Emails, all of us are familiar, but just some shared some practical tips on collecting email IDs and how you can interact with your congregation of people through emails. Then we talked about text messaging, whether you're using SMS or WhatsApp, just some tips on how to do it well and some examples there. Virtual meetings, all of us are familiar with that. We are attending class virtually, so that's pretty familiar. Then online content distribution platforms, you could distribute ebooks and podcasts and audio video. So again, these are things we are all familiar with, but we'd encourage all of us to make use of these, all channels and ways you can reach large numbers of people. So to think about distributing your PDFs, your audio and your video across multiple channels to reach more people. And also having a church app was useful. Then we got into some guidelines. Okay, how do you do this well? Some learnings that we could share. So we said, you know, when you're working with the media team, it's always good to have some guidelines so that they don't go off and do, you know, weird things. Design graphic design guidelines, think through on how you want to, you know, really the message you want to communicate through your graphics. Think through on that. Similarly, the videos that you create, think through on how you want to communicate the message. So here are all tips that you could use or give to your media team and say, hey, look at these things. Think about these things as you make your graphics and videos. And here are all the sources that you can get graphics videos for your use. And some tips on how to optimize the graphics and videos that you create for search engines. Then, yeah, we may say make sure you when you're using songs that you adhere to copyright guidelines, give proper credits. Then we talked about social media, what can be done, some simple tips to use them effectively and make good use of social media to get the word around as you're reaching out to people. Then we got into some boring part, I think we started talking about digital equipment or the software to use when you're doing your graphics when you're doing a video editing. So there's a lot of paid and free versions as well. You can start with using the free versions and then when you're ready, you can move into paid software if you'd like. And what are things to keep in mind when you have a media team and just information so that you can engage with them meaningfully. So we talked about photographs that are being taken, cameras that are being used, just some basic information so that you can talk intelligently with your media team. We also covered our audio equipment, how do you make sure the audio equipment is useful in the context in which you're using, working with them. A little schematic of a typical audio setup, what you have inside the auditorium, what you use for broadcast, and the speakers, different kinds of speakers that you typically would have in an auditorium setting. Nowadays people use in-ear mics, in-ear monitors to listen to what's happening and microphones that they could use, mixers, cables just so that you know what's there. And gave a sample of the audio equipment that we use and the cost. So this is what we are using, but like I said, you don't have to start here. We started very simple, very small and over time after we were using all of these fancy things, but we didn't start here, we started small. We had some questions about podcasting, so I included this information here. I will come to the question in the chat. Podcasting, you could use, this is what you could do if you want to set up your own podcast news. And then we went into video production, this is what goes into your video production, you can have a team of people. These are the things that you typically would need for your video production. We talked about using green screens, making it easy. It's all the typical equipment that you will need for your video production. Live streaming, we shared about the usefulness of live streaming and the typical setup that goes in to have live stream happen, shared with you the current schematic that we use. Currently for our live stream, the cameras and all of that, the LED walls, the mixers and so on. So we shared that information with you. Now this part I just introduced here for live audio translation interpretation. We are not using this yet, but we are exploring doing this so we can actually have our services in multiple languages globally. And the last thing that we looked at yesterday was software platforms. And I just gave you a reference of a lot of free software which we are using for our work. And you're welcome to think about these things and make use of them as and when you are ready. And today was the last lesson on data protection, confidentiality and privacy. So that's the whole course. I hope this information was useful. And keep this document with you. And whenever you need, you can come back to it, refer to it and use it. Let's take some time for questions. Christopher, you have a question? Yes, first of all, I think this course has provided so much of information and knowledge about the extent and the application of media and technology. So it's been great. I think there are just a couple of points. I just wanted to get your view on. And again, to the sort of objective of, I think something you had mentioned during the end times where the message of God has to reach every corner of the earth. I think media and technology definitely will be a great infrastructure and a tool to be able to achieve that objective. So again, as I said, it's been a great course and a lot of information that you have provided. I think that there are just two things I just wanted to mention. One is to get your view on. One was the ability of media and technology to be able to generate a debate and discussion and get viewpoints from different sources, whether it is within the church or outside, externally also. So there are tools that allow for that. And one of the tools, I mean, besides the Twitter, which is really a messaging tool, Quora, which does sort of generate a lot of discussions. You know, having some kind of a Quora-like platform, which is specifically around, you know, maybe the Bible and even some of the lifestyle aspects of living a Christ-like life. I'm just thinking that, you know, if that is possible, because I don't think that, you know, churches are doing that, but they are actually deploying media and technology to actually do that. And of course, there would be a need to have ground rules to ensure that these discussions are within certain boundaries and, you know, there's not, you know, real aggression and aggressive behavior and, you know, it has to be some kind of a healthy debate. So that is one. And the second thing is, you know, the church being able to use media and technology to address, you know, social issues and social points that are affecting the current times. So, for example, in the world right now, there's no discussion about gender identity. There is, you know, this topic of work, as well as even the, you know, the political, you know, some of the legislation, you know, done by the political system, which can impact churches. So, good example is, you know, the anti-conversion law. So, again, to be able to use media and technology to be able to get some level of consensus as well as discussion around that. And thereby, you know, ensure that, you know, that people are informed about social topics as well as, you know, in, you know, areas which could impact, you know, the operating of churches in a particular country. And, you know, so I think, you know, behind this is, you know, what is the level of, you know, that a church can actually, you know, ensure that, you know, that they would like to get into those areas. That I think comes back to, you know, whether they want to be able to also, besides, you know, all the messaging and, you know, the gospel and lifestyle areas, whether they want to be able to get into those areas which are impacting society right now. So, it's going to take your view on those points here. Yeah, let's both our interesting comments. Let me just respond, you know, the second one, you know, the second one is interesting what you said about, you know, engaging on social issues, which I didn't, and I haven't thought of it. So, and I, you know, I'm not sure exactly how we can, but that's an interesting thought. So I don't have much to say on it, because I really haven't thought, thought through on it, you know, so on. The first one, which is have more on having discussions and so on. We did try it, but this was our experience. I'm not saying everybody's going to have the same experience, but, you know, this was way back. And I'm thinking I'm going back in time to 2008, maybe something around that time. So as part of our church website, we had a section for people to ask questions and basically the people to interact, you know, where people could put something similar to Quora. The problem was, the moment we opened it, I think within two weeks, there was all kinds of nasty comments. And because it's open. And it was so bad, I had to like, on an emergency basis, I had to call our IT teams, I guess take that down, because people are putting in all kinds of things. It was sad. So then we said, look, so that was one problem. And the second problem is we couldn't, you know, when people ask questions, obviously, we have to moderate it. And the kinds of interactions happening, it was almost like a full-time job, you know, to sit down and make sure that somebody is moderating this and responding to those things. So it became too much. We took it down, you know, so we did try it. And it was, you know, these were two things that we found very overwhelming. One was the kinds of things that people writing and two, to moderate something. It was quite challenging. And of course, then, you know, we could say, let's restrict it. But the moment you restrict it, then the whole purpose of discussion goes off because then you're restricting it only to maybe a few hundred people. Then, you know, you're not opening it to a broader audience. So initially, we had opened to everybody. And that's when we saw this. More recently, this happened when, I think earlier this year, when we had, we tried, we thought of setting up our own social media platform. You know, so there's an open source platform called Mastodon. When, you know, when Twitter was taken over by Elon Musk, and there are a lot of people moving away from Twitter, a lot of them moved to this open platform called Mastodon. Basically, anybody can set it up. So at that point, I thought, you know, maybe we can set up something for a Christian audience, you know. And so we actually had it installed, the open source version had it installed. Then I said, okay, the adoption of it is going to be challenging because, you know, we've got our people already on Instagram. I'm generally speaking, church people are already on Instagram or Facebook. Some of them will be on Twitter. Some of them may be on some other platform. And now to tell them, hey, set up an account in Mastodon, this is for church people. And, you know, we can interact. You can do things. I said, okay, I don't want to drive that, you know. And so anyway, it's still running. We still have our installation, our version of Mastodon. We didn't open it in public. I just left it as it is. But the thought was to create, you know, and in a platform like Twitter, but this is another version of Twitter for Christian engagement. It's still running. I mean, we haven't opened it out to people. But I said, okay, to drive it. And then then then this subsequent things to moderate it, you know, making sure that because even when you say Christian, people are going to put in all kinds of things that there will be heated arguments and all those things and to moderate it is going to be a lot of work. So we actually didn't go public with it. So just some, you know, thoughts and response to what you shared. Okay, so the plan is next week, next week, Thursday, since so this is the end of the course on media technology. So what what you can expect now is that sometime next week I'll put up your the assessment. It's going to be a non technical assessment. So, you know, we're not going to ask anything technical. We have put out the full course content. So you could use that it's going to be an open book, everything open assessment. So just to kind of walk you through this, this thought process. And, and, you know, you can just do the assessment is just to give you a grade and also to make sure that you review the course content. It's a non technical assessment. So don't, don't worry about it. The whole idea is just to expose everybody to these things. And, you know, whenever you need it you can go and use it. So the assessment will be out. Please do it. Take your time to do it. Now what I was thinking is next week, the third hour on Thursday we could, if everybody's okay, we can use that to do our course on revelation and Daniel is everybody okay. So next Thursday we'll have three hours of revelation and Daniel. Is that okay. It'll give us help us finish that. So we'll do that in case you have some other engagement and you're not able to attend the third hour. You can just listen to the recording, but I thought we could use a third hour next Thursday. So we'll have three hours of revelation Daniel, it will help us, you know, cover that. Okay. Thank you everybody for being part of this course. And I really appreciate all the interaction. Let's close in prayer and we will dismiss please somebody could pray. Please go. Thank you. Please Father we thank you and praise you Father God for this wonderful day which I've given to us. Lord we humble ourselves before your throne. And we thank you Father God for your wisdom, knowledge and your grace, which is Lord Master, which is, which is imparted in our life through your man of God, Father God. We pray and we ask you Father God, let this life be a blessing and blessing for the generations and blessing for the nations of Father. We pray that everything that we have Lord Master received, Lord Master we pray that Father let it be useful for us and useful for your kingdom. We once again thank you for everything. Lord Master, Lord you led him, you gave him the strength and you gave him wisdom. You gave him that energy and everything of Father God to God teachers and we just thank you Father God as a blessing. Lord Master whatever he imparted to Father God, it was really a blessing for us. Once again we ask the students of Father God, we just thank you for him and we give you all the glory on our end praises and Jesus. Thank you Pastor. Amen. Thank you everyone. See you all next week. Enjoy your weekend and God bless. Bye now. Thank you. Thank you everyone. Thank you. God bless. Thank you.