1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
8

In online education is intrinsically related to equity. Professionalism Communication Accessibility

Computers and Technology
2 answers:
Vlada [557]3 years ago
8 0

Answer:

C. Accessibility ​

Explanation:

Intrinsic motivation is doing something for the sake of personal satisfaction.

ratelena [41]3 years ago
7 0

Answer:

The correct answer is C. Accessibility.

Explanation:

Online education is understood as the educational system by which knowledge is acquired through the use of computer media in which students interact with teachers electronically without personally attending classes in person. This type of education has advantages and disadvantages: in terms of the pros, it is an education system that requires less time and mobility on the part of the student, thus facilitating the process of learning and making the times more effective, but in terms of its cons, online education is not always accessible, as in order to access it requires a certain connectivity capacity, that is, the provision of a computer and an internet network capable of guaranteeing the functioning of online educational systems.

In this context, accessibility is understood as the ability of each individual to acquire an online education through the use of the necessary means for this, so accessibility implies the possibility of accessing said electronic media. This is related to equity, as online education systems should be able to guarantee their use by means of equipment that is as less specific as possible so that any common person can access them.

You might be interested in
This is used to copy information from cell to cell in the spread sheet
Kryger [21]

Answer:

D. Fill handle

Explanation:

Required

Which can be used to copy from cell to cell

(a); Means the current cell being selected in the spreadsheet program

(b): Used to fit all columns in the spreadsheet program. Usually, the columns are fitted based on their width.

(c): The vertical and horizontal lines that separate cells.

(d): This is used to copy from one cell to another, especially adjacent cells.

5 0
3 years ago
Victoria enjoys laughing with her friends as they walk around the track after school. Which best describes her hate rate during
Pachacha [2.7K]
Her heart rate would be 56 or 75 it high but not that high because shes walking
3 0
3 years ago
Which domain refers to the equipment and data an organization uses to support its IT infrastructure. It includes hardware, opera
vovikov84 [41]

Answer:

D. System/Application Domain

Explanation:

A system or application domain is used by an organization to supports its IT infrastructure, holding all the business critical mission system, applications and data. All the resources of the company are contained in this domain, and is accessible by a member.

LAN to WAN domain links the company's infrastructure or local area network to a wide area network or the internet. The WAN domain simply holds publicly the data of an organisation, while remote access domain is meant for a small group of workers in the office or working from home.

8 0
4 years ago
What is stands for BCPL explain ?​
krek1111 [17]
Answer: Basic Combined Programming Language

Explanation: it is a procedural, imperative, and structured programming language, originally intended for writing compilers for other languages.
8 0
3 years ago
Musical instruments cause the air to vibrate, sending waves that are detected by our senses. The energy from these vibrations of
Assoli18 [71]
B. Sound.

Explanation - instruments create sound waves
4 0
3 years ago
Other questions:
  • Prompt the user for a string that contains two strings separated by a comma. (1 pt)Examples of strings that can be accepted:Jill
    5·1 answer
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • ________ is a software that interprets java bytecode.
    12·1 answer
  • By default, a word document generally displays in ____ view.
    9·1 answer
  • Define the following terms:<br><br> - pigment<br> - vehicle<br> - binder<br><br> plz help
    12·2 answers
  • What is the cffa act
    5·2 answers
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • I had tried to turn on Linux on the Chromebook but it's not working
    11·2 answers
  • What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
    7·2 answers
  • Dynamics simulate stillness via calculations performed by the computer.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!