1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
2 years ago
12

What is property in educational technology

Computers and Technology
1 answer:
Maslowich2 years ago
3 0
1. It is based on scientific and technological advancements.
2. It is more a practical discipline and less a theoretical one.
3. It is a fast growing modern discipline.
4. It makes use of the research findings of psychology, sociology, engineering, sciences and social psychology etc., and applies the same to the field of education.
5. It brings pupils, teachers and technical means together in an effective way.
6. It is the science of techniques and methods. It locates the problems in the field of education, remedies them and ultimately aims at improving the education system.
7. It is bound to improve the teacher, the learner and the teaching learning process.
You might be interested in
Which of the following statements are true about the Internet?
Arlecino [84]
1, 2, and 3 are true
6 0
3 years ago
Write multiple if statements: If carYear is before 1967, print "Probably has few safety features." (without quotes). If after 19
Liono4ka [1.6K]

Answer:

public class Main

{

public static void main(String[] args) {

    int carYear = 1995;

   

    if(carYear < 1967)

        System.out.println("Probably has few safety features.");

    if(carYear > 1971)

        System.out.println("Probably has head rests.");

    if(carYear > 1992)

        System.out.println("Probably has anti-lock brakes.");

    if(carYear > 2002)

        System.out.println("Probably has tire-pressure monitor.");

   

}

}

Explanation:

The code is in Java.

Initialize the carYear

Use if statements to handle year before 1967, after 1971, after 1992 and after 2002.

Print the required message for each if statement

5 0
3 years ago
What does it mean for a wireless network to be operating in "infrastructure mode"? If the network is not in infrastructure mode,
Alex_Xolod [135]

Answer and Explanation:

Within the following operating mode, most of the wireless controller remains linked through the main point (access point) for that broader server. The server runs within ad-hoc modes when this does not run under the following mode. Wireless servers wouldn't have the connectivity to interact within ad-hoc mode.

So, the following statement is correct according to the given scenario of the following mode.

4 0
3 years ago
Given that a computer required​ service, what is the probability that it was a​ laptop? Given that the computer required​ servic
Greeley [361]

Complete Question:

A campus bookstore sells both types and in the last semester sold 56% laptops and 44% desktops. Reliability rates for the two types of machines are quite different, however. In the first year, 5% of desktops require service, while 15% of laptops have problems requiring service.

Given that a computer required service, what is the probability that it was a laptop?

Answer:

Probability = 0.084

Explanation:

Given

Laptops = 56%

Desktop = 44%

Service Required (Laptop) = 15%

Service Required (Desktop) = 5%

Required

Determine the probability that a selected computer is a laptop and it requires service.

The question tests our knowledge of probabilities using "and" condition.

What the question requires is that, we calculate the probability of selecting a LAPTOP that REQUIRES SERVICE

Note the capitalised words.

This will be calculated as follows:

Probability = P(Laptop) and P(Service Required (Laptop))

[Substitute values for P(Laptop) and P(Service Required (Laptop))]

Probability = 56% * 15%

[Convert to decimal]

Probability = 0.56 * 0.15

Probability = 0.084

8 0
3 years ago
whats that system tool the rearranges files and unused space on the hard drive so programs can run faster
Zolol [24]
The Disk Fragmenter.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • Explain the difference between an i/o‐bound process and a cpu‐bound process.
    12·1 answer
  • A superscope is a special type of scope that allows a dhcp server to service multiple ipv4 subnets on multiple physical networks
    7·1 answer
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
    5·2 answers
  • PLEASE HELP SOMEONE!!!!!!!!! WILL GIVE BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!! Fill in the blanks.
    15·1 answer
  • Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are mainta
    10·1 answer
  • What is the correct keyboard shortcut to cut a cell value
    15·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!