1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
3 years ago
11

2 negative impact of excessive use of computer even in solving mathematical problem.

Computers and Technology
1 answer:
zlopas [31]3 years ago
4 0

Answer:

Computers are now a days the very important part of each department as well as homes. All people are somehow using computers for their respective needs. As technology always has the negative impacts along with the positive ones so, computer do have some crucial points when taking about students specially.

Following are listed some acts that add to the negativity of computer's usage.

  • Excess use of computers by students while solving mathematical problems lead them to rely totally on the computer. Students don't tend to calculate by their own instead they use computerized calculators for their ease and hence they start lacking even in basic calculations in normal routine also.
  • Computers may impact students routine in such a way that they don't concentrate on their studies while having extreme interest in video games and their favorite seasons and other activities.
  • Using computers more than a certain limit effects eyesight badly. This is the reason today most of the teenagers use spectacles in normal routine.

<h3>I hope it will help you! </h3>
You might be interested in
A negative effect of computer technology's role in creating images is that:
otez555 [7]

Answer:

Personally would go with D.

Information being shared could be both good and bad but it all would be about the situation and if it was private information or not.

5 0
3 years ago
Read 2 more answers
Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate?.
telo118 [61]

Answer:

Bad Ram or CPU/GPU Problems

Explanation:

It depends on the motherboard used in the type of PC you'd have to look up the number of beeps and the time spread out to figure out your certain issue.

3 0
2 years ago
Value appears on the left hand side of cell <br> true or false
11111nata11111 [884]

Answer:

True

Your welcome

.........

4 0
2 years ago
Read 2 more answers
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
3 years ago
A company that manufactures machine parts orders a new system that makes products at ten times the speed of the earlier machine.
kirill [66]
"Self-management" This is a huge clue. c:
Your answer: Autonomic Computing.
Autonomic Computing refers to "Self-management." 
7 0
3 years ago
Read 2 more answers
Other questions:
  • I don’t know technically
    9·2 answers
  • Write a setInterval() function that increases the count by 1 and displays the new count in counterElement every 300 milliseconds
    12·1 answer
  • Which software is used to play, create, and modify audio and video files?
    13·2 answers
  • Please refer to the MIPS solution in the question above. How many total instructions are executed during the running of this cod
    10·2 answers
  • Which is true about TCP and UDP? Choose two answers.
    15·1 answer
  • ____ is a bundled set of communications services, including internet, telephone, and tv, that operates over a total fiber-optic
    5·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were discussed in this unit or
    10·1 answer
  • A robot worker and a human worker are both vulnerable to
    5·1 answer
  • The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
    8·1 answer
  • An individualized course plan for the 4 years of
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!