wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Google classroom

profile
khushi saroj
Jul 11, 2022
0 Likes
0 Discussions
38 Reads

Nowadays, development of technology is growing The developments have been almost sectors. Economics, Politics and Education have applied technology. It can be predicted that many people have been addicted with information and communication technology (ICT). The development of ICT cannot be separated from information technology ( IT ) which is also growing . Information Technology is one of many the device used by managers in anticipating changes ( Laudon and Laudon , 2014 ) . With the development of IT , many people do innovation to make IT that can be used to facilitate other people in doing daily activities , ranging from sending messages , assignments and communicate online , search for and buy many things . by online , order tickets and modes of transportation online and many others . Therefore, many aspects of human life are influenced by technological developments information where one of them is related to the learning process in the field education. The current teaching and learning process is different from in the past time where classes that are held directly ( face to face ) or traditional method of teaching is teacher


Comments ()


Sign in

Read Next

Social Media Sentiment Analysis

Blog banner

Multicore and Multithreading

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Article on team management software

Blog banner

Direct Memory Access

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Trello ( management software)

Blog banner

WORKFRONT SOFTWARE

Blog banner

IP ADDRESS

Blog banner

Time Series Analysis

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Real Time Scheduling

Blog banner

Memory heirchy

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Virtual memory in windows

Blog banner

Deadlock

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Penetration Testing

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Development Of Modern Operating System

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Record Blocking

Blog banner

SQL Injection

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Memory Management

Blog banner

Blog name

Blog banner

File Organization and Access

Blog banner

File management

Blog banner

Operation system

Blog banner

John Titor: The Time Traveler

Blog banner

Threads

Blog banner

Cache memory

Blog banner

The Right way of cooking

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

I Personally

Blog banner