1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
3 years ago
6

Impact of computer on education

Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
7 0

Answer:

It has a very great impact on education

Explanation:

MAVERICK [17]3 years ago
6 0

Answer:

Computers can have both a positive and negative impact on education.  

Positives:

-students have access to more information (the internet)

-students can more efficiently type and research

-students can save time (ex not having to walk to a library)

Negatives:

-can be a distraction

-students may have a harder time staying on task/topic

-students may develop a technology addiction

You might be interested in
What is the general term for programs used to operate a computer
andre [41]

Answer: SOFTWARE

Explanation: Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device.

7 0
3 years ago
When purchasing a mobile computer, you should determine the form factor that meets your needs. What is a form factor?
Ilia_Sergeevich [38]

Answer:

A FORM FACTOR is the shape, size/dimension and all physical specifications of an electronic device. It refers to the hardware in computers.

It determines the compatibility of several devices despite the manufacturer.

Examples of motherboard form factors include:

- ATX: this is the most common motherboard form factor for desktop computers today

- AT

-BTX

-DTX

-ITX

-Full AT

-Full ATX

-Micro-ITX

-MicroATX

-Mobile-ITX

8 0
3 years ago
How can netiquette help you communicate when texting or instant messaging?
Yanka [14]

1. D

2. C

it allows citizens to submit anonymous tips to the police

5 0
3 years ago
Consider an improved version of the Vigen ere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic su
anzhelika [568]

Answer:

Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.

Explanation:

Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.

The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.

6 0
3 years ago
Limitations of systems analysis and design​
Sonja [21]

Answer:

<h3 />

Explanation:

<h3>Although System analysis offers an extensive range of benefits it might also have some disadvantages. One of the main disadvantages which is mostly overlooked is the risk of too much analysing which may be costly and time consuming. It is therefore part of the analyst's job to find the right balance.</h3>
6 0
3 years ago
Other questions:
  • While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel
    13·1 answer
  • When a vehicle strikes a pedestrian, it's most often during A. a period of darkness or low visibility B. the day when pedestrian
    10·2 answers
  • You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
    12·1 answer
  • What are some tasks Petroleum Engineers perform?
    5·2 answers
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • When you need to cut new external threads on a bolt, which of the following tools should you use?
    9·2 answers
  • Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
    12·1 answer
  • You are an online training company and stream a lot of training videos from your
    12·1 answer
  • To use the AutoCalculate area, select the range of cells containing the numbers for a calculation you want to verify and then pr
    6·1 answer
  • Ingredient Adjuster
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!