wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Google classroom

profile
khushi saroj
Jul 11, 2022
0 Likes
0 Discussions
49 Reads

Nowadays, development of technology is growing The developments have been almost sectors. Economics, Politics and Education have applied technology. It can be predicted that many people have been addicted with information and communication technology (ICT). The development of ICT cannot be separated from information technology ( IT ) which is also growing . Information Technology is one of many the device used by managers in anticipating changes ( Laudon and Laudon , 2014 ) . With the development of IT , many people do innovation to make IT that can be used to facilitate other people in doing daily activities , ranging from sending messages , assignments and communicate online , search for and buy many things . by online , order tickets and modes of transportation online and many others . Therefore, many aspects of human life are influenced by technological developments information where one of them is related to the learning process in the field education. The current teaching and learning process is different from in the past time where classes that are held directly ( face to face ) or traditional method of teaching is teacher


Comments ()


Sign in

Read Next

LTE Technology

Blog banner

Artificial Intelligence and I

Blog banner

Depression

Blog banner

Drawing tips for a beginner

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Network Forensics Tools and Techniques

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Virtual memory

Blog banner

COMMUNICATION

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Cache memory

Blog banner

PODIO

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Service Strategy In ITSM

Blog banner

Art and Culture of Rajasthan

Blog banner

Fashion marketing in india

Blog banner

Deadlock and Starvation

Blog banner

Shoulders

Blog banner

Traditional Unix System

Blog banner

Know your Processors!

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

Deadlock and Starvation

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Multiple processor scheduling

Blog banner

Memory Management

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Service transistion under difficult conditions

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Virtual Machine

Blog banner

Balance

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Components of GIS

Blog banner

Virtual Memory

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner