1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
13

What is different between lms and e learning?

Computers and Technology
1 answer:
koban [17]3 years ago
6 0

Answer:

A learning management system is a kind of software platform where the learning content material is delivered. And it is a medium to deliver the learning content material. Learning is mostly done in the informal region generally, where people try out their talent and skills to learn. You should know that all LMS learning is elearning, but not all elearning is done through the LMS. This is the difference between the LMS and elearning. Like we learn through forums as well, and there is no LMS over there. Also we learn through blogs, and various online content, and there is no LMS over there. In fact LMS is what is explained above. And hence, its a source used for elearning, like the internet content.

Explanation:

Please check the answer.

You might be interested in
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
Which technique is used to convert a color image to a black and white image?
Andrew [12]
Microscope
bc thats the answer
4 0
3 years ago
Select the correct answer.
aliina [53]

Answer:

B

Explanation:

engineers design and carry out test cases and evaluate exit criteria (by following the scope set in the planning phase). They create bug reports describing detected defects and report to the stakeholders on the test findings and the completion status. Testing may be repeated to check for errors.

7 0
3 years ago
Use a web browser to find three examples of static webpages and three examples of dynamic webpages, and note the URLs for each p
shepuryov [24]

Answer:

Static web pages are sent as it is at web server without being processed additionally.

Dynamic web pages content may change, and server hosting dynamic web pages return content after processing trough a program.

Examples of dynamic and static web pages are below

Explanation:

<em><u>dynamic websites</u></em>

f o o t y r o o m  (.co) It is a football website. Displays latest highlights and football stats. It is dynamic because it gives live match scores, as the scores change, content change as well.

a c c u w e a t h e r (.com) It shows weather information. It is dynamic because when requested, displays current weather information.

x e (.com)   It is a currency website. Dynamic because it shows live exchange rates.

<em><u>static websites</u></em>

s c i p y - l e c t u r e s (.org) It is a website about scientific python environment. It is static because it gives same content whenever requested.

d o g a c a n d u . b l o g s p o t (.com) it is a blog. Static because the requested content doesn't change unless the blogger adds a new story.  

z t a b l e (.net) It is a website about z-score values and includes z-tables. It is static because its displayed as it is.

5 0
3 years ago
Determine if the situation below is a safe practice: Julia needs to hang some industrial shelvinv, so she carefully selects the
hichkok12 [17]
I think Julia did good.











Its safe 
7 0
4 years ago
Read 2 more answers
Other questions:
  • How can earn more answer from brainly less than two minutes, please
    9·1 answer
  • An example of an electrical insulator is _____.
    15·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • An interpreter _______. converts the procedural language one statement at a time converts the source code into machine language
    12·1 answer
  • No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol mus
    11·1 answer
  • Write a program to check the password( qbasic)​
    8·1 answer
  • Guys how can i video my self from my laptop <br> my laptop is (lenovo)
    8·2 answers
  • . Which of the following is NOT a
    12·1 answer
  • Which layer of the OSI model provides a user interface in the form of an entry point for programs to access the network infrastr
    10·1 answer
  • Which package is required for shadow passwords to be enabled?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!