wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Google classroom

profile
khushi saroj
Jul 11, 2022
0 Likes
0 Discussions
49 Reads

Nowadays, development of technology is growing The developments have been almost sectors. Economics, Politics and Education have applied technology. It can be predicted that many people have been addicted with information and communication technology (ICT). The development of ICT cannot be separated from information technology ( IT ) which is also growing . Information Technology is one of many the device used by managers in anticipating changes ( Laudon and Laudon , 2014 ) . With the development of IT , many people do innovation to make IT that can be used to facilitate other people in doing daily activities , ranging from sending messages , assignments and communicate online , search for and buy many things . by online , order tickets and modes of transportation online and many others . Therefore, many aspects of human life are influenced by technological developments information where one of them is related to the learning process in the field education. The current teaching and learning process is different from in the past time where classes that are held directly ( face to face ) or traditional method of teaching is teacher


Comments ()


Sign in

Read Next

Risk mitigation and management

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Malware Defense

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

File Sharing

Blog banner

Business Engineering

Blog banner

Direct Memory Access

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Data Warehousing

Blog banner

Deadlock and Starvation

Blog banner

Full Disk Encryption

Blog banner

Concurrency and memory

Blog banner

Virtual Memory

Blog banner

Social Engineering Attacks

Blog banner

Real-time Scheduling - 53003230061

Blog banner

MYNTRA

Blog banner

Remote Work in 2026

Blog banner

Privacy LAWs in IT

Blog banner

"Audit" In Data Science

Blog banner

Open Source Project By Google

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Footprinting

Blog banner

Metasploit

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Functions Of Operating Systems

Blog banner

Race condition

Blog banner

SQL Injection

Blog banner

What is Segmentation?

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Windows Operating System

Blog banner

Threats To Computer System

Blog banner

Fault Tolerance

Blog banner

Balance

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

RAID

Blog banner

Music is life

Blog banner

Deadlock in Operating System

Blog banner