1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
2 years ago
13

Think back to your early days of education—what role did technology play? Now ask a parent/guardian/older family member what rol

e technology played in their education. Discuss the difference between your experience and this older family member’s experience with technology in education. Which do you think created a better learning experience?
Computers and Technology
1 answer:
Marizza181 [45]2 years ago
3 0

The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Note that schools were said to slowly create a curriculum where the subjects which are seen as most vital were taught.

By the mid-1600s, the invention of the modern library and the pencil were brought up, starting the first et of educational technology.

<h3>How has technology played a role in education?</h3>

It is one that has helped a lot of students to be able to look out or search for new subjects and broaden their understanding of a lot of hard concepts, such as STEM.

Note that The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Learn more about technology from

brainly.com/question/25110079

#SPJ1

You might be interested in
What is imagined risk
lara31 [8.8K]
Hello there!

Imagined Risks are simply 'imaginary' risks that are created out of doubt/fear.

Hope This Helps You!
Good Luck :)
3 0
4 years ago
What is a risk or an effect of software piracy?
Butoxors [25]
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
5 0
4 years ago
Read 2 more answers
What does it mean when a red squiggly line appears under a typed word? How do we fix it?
Alenkinab [10]
That means the device is programmed to mark the word as grammatically incorrect, if you double tap the word there should be a correct suggestion of the word instead. This may not always be the right one tho, ask someone experienced if you’re unsure.
3 0
3 years ago
Write any four causes of cyber crime
jenyasd209 [6]
A Lack of Empathy
The Victim Deserves It
Self-loathing
It Becomes an Addiction
7 0
3 years ago
What is the difference between "call by value" and "call by reference"? Explain with example in c language.
Serjik [45]

Answer:

<u>Call by reference</u>

In an function if the variables are passed as reference variables this means that the variables are pointing to the original arguments.So the changes made in the function on the reference variables will be reflected back on the original arguments.

For example:-

#include<stdio.h>

void swap(&int f,&int s)

{

   int t=f;

   f=s;

  s =temp;  

}

int main()

{

int n,m;

n=45;

m=85;

swap(n,m);

printf("%d %d",m,n);

return 0;  

}

the values of m and n will get swapped.  

<u> Call by value</u>

In this program the values of m and n will not get swapped because they are passed by value.So duplicate copies of m and n will be created and manipulation will be done on them.

#include<stdio.h>

void swapv(int f,int s)

{

   int t=f;  

   f=s;  

   s=temp;

}

int main()

{  

int n,m;

n=45;

m=85;

swapv(n,m);

printf("%d %d",n,m);

return 0;

}

7 0
3 years ago
Other questions:
  • What operating system was most commonly used by early personal computers? Apple Mac MS-DOS Windows
    6·2 answers
  • Which of the following terms means that the system changes based on
    14·1 answer
  • What kind of game was pole position?
    6·2 answers
  • What is human data,
    8·1 answer
  • Which is true of ASCII and Unicode?
    7·1 answer
  • You would like to narrow your search on this topic.
    15·2 answers
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • Hi, please help me complete my Database Development 2 hw by completing what should been done from the document and show the code
    11·1 answer
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part.
    10·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!