1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kobotan [32]
4 years ago
12

A ________ is when teachers develop a professional based network of people selected by him/her to pursue learning needs and shar

e knowledge and experiences in technology use.
Computers and Technology
1 answer:
Anarel [89]4 years ago
4 0

Answer:

Blog

Explanation:

A blog is when teachers develop a professional based network of people selected by him/her to pursue learning needs and share knowledge and experiences in technology use.

A class blog is a shared space, which gives the teacher and student ease of access to share and write ideas to the main area. It is basically used as a collaborative discussion space and can serve as an extra-curricular extension of the classroom.

You might be interested in
What reason best explains why complementary colors are important to web page design?
Brums [2.3K]

Complementary colors are important to web page design because they will inspire the visitor. For example, complementary colors make your website's text easier to red. They contrast with one another, so that they create a harmony for your page.

4 0
3 years ago
Read 2 more answers
___ data is ____data; non-numeric data; observations are organized into categories without any recognition of order.
Virty [35]

Nominal data is qualitative data; non-numeric data; observations are organized into categories without any recognition of order.

<h3>What is qualitative data?</h3>

Qualitative data is information that cannot be counted, measured or easily expressed using numbers.

It is collected from text, audio and images and shared through data visualization tools, such as word clouds, concept maps, graph databases, timelines and infographics.

Qualitative data is the descriptive and conceptual findings collected through questionnaires, interviews, or observation.

Analyzing qualitative data allows us to explore ideas and further explain quantitative results.

For example, it could be notes taken during a focus group on the quality of the food at Cafe Mac, or responses from an open-ended questionnaire.

To learn more about qualitative data, refer

brainly.com/question/3151198

https://brainly.ph/question/5565846

#SPJ4

5 0
2 years ago
What Are the main reasons students take the SAT/ACT?
ratelena [41]
To help college application, To showcase a students intelligence and memory,and to prepare for college.
7 0
3 years ago
what is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulate
Soloha48 [4]

A honeypot is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion.

What is software?
Software is a grouping of computer programmes, along with auxiliary data and files. In contrast, hardware is the foundation upon which a system is built as well as what actually does the work. Executable code is the lowest level of programming and is made up of machine language instructions that are supported by a single processor, usually a central processing unit (CPU) or even a graphics processing unit (GPU). Machine language is made up of collections of binary values that represent processor instructions that alter the previous state of the computer. One effect that is not immediately visible to the user is when an instruction modifies the value kept in a specific storage location in the computer.

To learn more about software
brainly.com/question/28224061
#SPJ4

4 0
1 year ago
Janae started an essay on the computer at school. She would like to work on it when she gets home, but she does not have a flash
Marina86 [1]
A) it would be cloud computing
3 0
4 years ago
Read 2 more answers
Other questions:
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • __________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, suc
    5·1 answer
  • Which of the following has the honor of the first robot-human handshake in space?
    10·1 answer
  • The fraction 460/7 is closest to which of the following whole numbers?
    11·1 answer
  • Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
    13·1 answer
  • A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobi
    13·1 answer
  • Which statement is true about the purpose of a work in process constraint?
    15·1 answer
  • What is the purpose of the 5 Whys Strategy? How could you use the 5 Whys strategy in your day-to-day life? (Site 2)
    5·1 answer
  • What is the difference between Input, Output, and Storage Devices?
    12·2 answers
  • This code --&gt; plt.plot(x,y) is used to draw :
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!