1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
13

Explain use of information and communication technology in our daily life.

Computers and Technology
1 answer:
lions [1.4K]3 years ago
4 0

Answer:

It can improve the quality of human life because it can be used as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. It provides wider knowledge and can help in gaining and accessing information.

<em>That</em><em>'</em><em>s</em><em> </em><em>my</em><em> </em><em>answer</em>

You might be interested in
Write the definition of a function divide that takes four arguments and returns no value . The first two arguments are of type i
Nastasia [14]

Answer:

#include <iostream>

using namespace std;

void divide(int numerator, int denominator, int *quotient, int *remainder)

{

*quotient = (int)(numerator / denominator);

*remainder = numerator % denominator;

}

int main()

{

int num = 42, den = 5, quotient=0, remainder=0;

divide(num, den, &quotient, &remainder);

 

return 0;

}

Explanation:

The exercise is for "Call by pointers". This technique is particularly useful when a variable needs to be changed by a function. In our case, the quotient and the remainder. The '&' is passing by address. Since the function is calling a pointer. We need to pass an address. This way, the function will alter the value at the address.

To sum up, in case we hadn't used pointers here, the quotient and remainder that we set to '0' would have remained zero because the function would've made copies of them, altered the copies and then DELETED the copies. When we pass by pointer, the computer goes inside the memory and changes it at the address. No new copies are made. And the value of the variable is updated.

Thanks! :)

8 0
3 years ago
If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was
tekilochka [14]

To enhance the ICT (Information Communication Technology) used by teachers, I will modify how the ICT was integrated.

The modification of how ICT is integrated will change the culture that places teaching over technology.  Then, teachers will be taught how to use ICT to:

  • improve learning so that teachers become learning facilitators
  • motivate learners by fostering learning autonomy, making students less dependent on the teacher
  • engage the learners by creating collaborative learning
  • diminish content learning so that students learn to think, create, and communicate effectively
  • make learning a lifetime culture
  • enhance the learning environment so that teachers become collaborators and co-learners with students.

Thus, I will enhance the ICT used by teachers by modifying its integration to achieve better results for both teachers and learners.

Learn more about the importance of ICT here: brainly.com/question/13724249

7 0
3 years ago
What is a burned edge ?
scoray [572]

Answer: IT IS A DARK FEATHERED EDGE AROUND AN IMAGE

Explanation:

8 0
4 years ago
Robert wants to start a mobile app development company that builds apps for both iOS and Android. He is researching different cr
kondaur [170]

Answer: phonegap and xamarin

Explanation:

phonegap and xamarin

6 0
3 years ago
A network technician has created a network consisting of an external internet connection, a DMZ,
Elden [556K]

Answer:

B.The admin private network allowing only admin access.

Explanation:

When the network technician created the network that consists of an external internet connection ,an internal private network,an administrative network and a DMZ.All the routers and the switches should be configured so that they can accept SSH connections from the admin private network that allows only admin access.

6 0
4 years ago
Other questions:
  • Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input
    10·1 answer
  • Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have alre
    8·2 answers
  • Jason is computer professional who has access to sensitive information. He shares this information with another organization in
    7·2 answers
  • How do i set up a RAID 1 array?​
    6·1 answer
  • Key differences between software and books include all of the following except
    15·2 answers
  • The __ contains the computers “brain,” the central processing unit (cpu)
    9·1 answer
  • Now suppose that the file is broken into 5 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ig
    14·1 answer
  • Which cell address indicates the intersection of the first row and the first column in worksheet?
    12·2 answers
  • Which is the most common way to install memory in a laptop?
    14·1 answer
  • Does anyone know the answer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!