wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Google classroom

profile
khushi saroj
Jul 11, 2022
0 Likes
0 Discussions
49 Reads

Nowadays, development of technology is growing The developments have been almost sectors. Economics, Politics and Education have applied technology. It can be predicted that many people have been addicted with information and communication technology (ICT). The development of ICT cannot be separated from information technology ( IT ) which is also growing . Information Technology is one of many the device used by managers in anticipating changes ( Laudon and Laudon , 2014 ) . With the development of IT , many people do innovation to make IT that can be used to facilitate other people in doing daily activities , ranging from sending messages , assignments and communicate online , search for and buy many things . by online , order tickets and modes of transportation online and many others . Therefore, many aspects of human life are influenced by technological developments information where one of them is related to the learning process in the field education. The current teaching and learning process is different from in the past time where classes that are held directly ( face to face ) or traditional method of teaching is teacher


Comments ()


Sign in

Read Next

Models of Information Security.

Blog banner

Blockchain in IoT Applications

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Zoho

Blog banner

Memory Management

Blog banner

The Laws of Karma

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Deadlock in operating system

Blog banner

Mumbai Metro 3

Blog banner

Guidelines for a low sodium diet.

Blog banner

Data Visualization in Decision-Making

Blog banner

Memory management and virtual memory

Blog banner

Types of Malware in Cyber Security

Blog banner

Article on Fresh Book

Blog banner

Types of threads

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Understanding Regression Analysis

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

PYTHON

Blog banner

I/O Buffering

Blog banner

Risk factors in service transistion

Blog banner

Social Media.

Blog banner

Dangers of Using Public WiFis

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Steganography and Steganalysis

Blog banner

I/O Management and Disk Scheduling

Blog banner

A True Friendship

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Proof-of-Stake (PoS)

Blog banner

Starting Android Activity Using Intent

Blog banner

Process State

Blog banner

How to write a cover letter

Blog banner

Big O Notation

Blog banner

10 Reasons to date your best friend

Blog banner

Deadlock and Starvation

Blog banner

Beauty of indian railway

Blog banner

Hey Aryan here

Blog banner

On-Page SEO

Blog banner

Computer Security

Blog banner