1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
13

What is different between lms and e learning?

Computers and Technology
1 answer:
koban [17]3 years ago
6 0

Answer:

A learning management system is a kind of software platform where the learning content material is delivered. And it is a medium to deliver the learning content material. Learning is mostly done in the informal region generally, where people try out their talent and skills to learn. You should know that all LMS learning is elearning, but not all elearning is done through the LMS. This is the difference between the LMS and elearning. Like we learn through forums as well, and there is no LMS over there. Also we learn through blogs, and various online content, and there is no LMS over there. In fact LMS is what is explained above. And hence, its a source used for elearning, like the internet content.

Explanation:

Please check the answer.

You might be interested in
What should you include in a persuasive speech
Vlad [161]

Answer:

Come up with a controversial topic, one that make your listeners think

Research the topic thoroughly that you have chosen

Understand the perspective of your audience. Keep your goal in mind. You are trying to persuade the audience to do or believe something .

7 0
3 years ago
An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be i
a_sh-v [17]

Answer: Closed port

Explanation:

Port 23 basically refers to the telnet which provide very severe services and it is used to access the server remotely. We should always closed the port 23, when we are not using telnet services because to prevent it from being hacked due to the port scanning.

As, now a days it is rarely used by the hackers as it is difficult to access this services from the server.

Therefore, Closed port is the correct answer.

3 0
3 years ago
A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
alexira [117]

Answer:

Repeater

Explanation:

Repeater is the device that is used in networking to enhance or boost the signal to increase the range of the signal.

So the user should purchase the Repeater to boost the wireless signal.

6 0
3 years ago
Type the correct answer in the box. Spell the word correctly.
fomenos

Answer:

"a callout is a type of text box that also includes a line for pointing to any location on the document. A callout appears under the SHAPES menu of the word processing program. The answer that completes this statement is the word "shapes". Hope this answers your question."

Explanation:

8 0
3 years ago
Read 2 more answers
Disrupting a business's ability to conduct electronic commerce is cönsidered an act of
aalyn [17]

Answer:

Digital Restrictions

Explanation:

This is the process that arises as a result of not meeting specific ethical standards and procedures for operating an online business on the form of electronic commerce. Such situation could be as a result of important factors like:

1. Unduly registered or incorporated businesses

2. Lack of patent or trademark to shown authenticity of product or services

3. Inability to provide certified prove of ownership to avoid fraudulent acts and others.

7 0
3 years ago
Other questions:
  • How do rubrics increase learning?
    15·2 answers
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • How might writing an online journal be different than writing in a paper one ​
    15·2 answers
  • What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?
    8·2 answers
  • Which of the following statements is false? People tend to shortcut security procedures because the procedures are inconvenient.
    13·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • Which task would most likely be completed by a physician’s assistant?
    12·1 answer
  • What is the output for the following code?<br><br> print (5*4+5)
    11·1 answer
  • What can handle work that is hard on a person and could cause repetitive injuries?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!