Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

We typically use this blog to share information about the technology that a business should be leveraging - but in this blog, we’ve decided to focus on a different group that is increasingly reliant on technology: students. As these pupils will someday make up the workforce and almost certainly utilize technology on a daily basis, it is important that their education reflects this increase in their curriculums. Here, we’ll consider some of the effects (good and bad) that this has had.

How Has Education Benefited from Technology Use?

Frankly, it would take too long to really get into all of the different ways that technology has given the classroom a boost. From those devices that have replaced (if you’ll pardon the expression) old-school solutions to the near-ubiquitous access that students have to tools that could be used for learning thanks to their mobile devices, technology has taken a leading role in education. Smart displays are replacing chalkboards, and students are more and more frequently supplied with laptops to support their learning.

Teachers have used their access to this technology to enrich their students’ learning experience, connecting with classrooms around the world to allow their students some time to interact with other cultures. These students have been shown to overcome language barriers to share what makes them similar to one another. This is just one way that cooperation and collaboration have helped to generate educational breakthroughs.

More examples of technology’s benefits to the educational process were shared on an episode of the EdSurge on Air Podcast, delivered through anecdotes and classroom stories. Mimi Kasner was one educator who shared a few stories. One was about a young girl who was having a considerably difficult time learning to read and write through the traditional approach. However, when she was introduced to a website that taught the alphabet, she excelled - much to her delight. When Kasner was made a principal of a school, she experienced another inspirational moment. During a fire drill, a few teachers approached her and informed her that the students wanted the time that the fire drill took up back, so they could continue to work on their self-managed projects that the drill interrupted.

The 'overcoming language barriers' example we referenced earlier wasn't hypothetical! According to education technology coordinator Sam Jordan of the Alaska Department of Education and Early Development, Skype was used in the classroom to connect Alaskan students with Sri Lankan students, where the two groups were able to communicate and teach one another about themselves and how they were similar - again, with nothing to remedy the language barrier between them.

By nurturing a thirst for knowledge and an openness to educational experiences, a school can live up to businessman Richard Livingstone’s criteria for educational success:

“If the school sends out children with a desire for knowledge and some idea of how to acquire and use it, it will have done its work.”

Another benefit that technology offers is how interactive lessons can now become through a “gamification” approach. Look at it through the eyes of an energetic 10-year-old… would you rather sit and listen politely as the teacher reads at you from a book (probably published when your parents were still in school), or play a game where you pretend to be an important historical figure and role-play the events your character had a part in? Today’s technology makes these kinds of activities easier to manage - and since technology can be updated, it is much easier to keep up on the latest lessons.

Of course, today’s technology also benefits the person standing at the head of the class. Teachers have found that the advanced solutions available to them can greatly simplify things in the classroom, allowing for more assistance to be given to students. Take Jill Watson, a teacher’s assistant who can answer questions students have about classroom policies, and who just so happens to be an artificial intelligence. Think about how much time could be better spent actually teaching students and assisting them in processing the lessons, if educators weren’t constantly being interrupted by bathroom requests and “Where can I find…?” inquiries. Much like a real teacher’s assistant, Jill Watson would also know to pass along any questions that were beyond her scope to the teacher.

Whether you consider the improvements to the learning process that can be made, or how much more accessible alternative styles of educating can become, it only becomes more clear that technology could quickly become as ubiquitous to the learning process as a blackboard, or a textbook, or a homework assignment have been for decades. That being said, there are some concerns that have come up regarding how technology might also hinder actual learning.

How Technology Can Be an Educational Detriment

Unfortunately, we aren’t talking about a few hypothetical situations. Actual events have also proven that technology could do some damage to the educational process.

Most obvious among the potential issues of bringing technology into the classroom is the clear risk of it serving more as a distraction than an educational supplement. A survey of 500 people affiliated with the University of Waterloo indicated that almost half of this group found technology to be a distraction, 68 percent of teachers surveyed expressing their frustration at the use of cell phones in class. Another study showed a link between lower test scores and the use of technology.

It gets worse than just being a distraction. Naturally, students have come up with some very clever ways of using technology to help them cheat. Smartphones have been deemed responsible for instances of cheating in the United Kingdom going up, as they did by 25 percent in 2017 and 26 percent in 2018. For another example of “CheatTech”, some schools in the UK have suggested banning watches - not even just smartwatches, but all watches - from examination rooms. Why? Simple - it has become too hard to tell the difference between the two.

Across the pond, students in the United States have adopted the use of hidden earbuds to listen to information stored in their phones (which are “safely” stowed away during the test). Students from Thailand and Singapore would use a combination of gadgets to cheat. One would walk into the exam wearing a pair of honest-to-goodness spy glasses, transmitting the exam questions to an accomplice on the outside. This accomplice would look up the answer and message it to the test-taker, whose smartwatch would display the message. In China, students have been caught trying to cheat college entrance exams by using false fingerprints. Someone could be hired to take the test on their behalf, “their” identity confirmed by their fingerprints.

Examples like these beg the question: could the ingenuity that these cheats require be a better indicator of a student’s intelligence than a written exam could ever be?

Whether you’re for or against the use of technology as an educational tool, it seems to be the way that things are done - just as in most industries today. However, we’d still like to know what you think about all this… is technology something that schools and educational systems should embrace, or is it all just a way to make the same lessons more expensive to teach? Does a child using technology to learn today really help prepare them for when they will need to use technology to work?

We have a comments section waiting for your input! Please feel free to start a few discussions.

Diving Into the Differences Between Proactive and ...
For Cybersecurity Awareness Month, Keep Looming Th...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Hosted Solutions IT Services Privacy Network Security Email Data Backup Internet Malware Hackers IT Support Software Business Efficiency Outsourced IT Innovation Microsoft Data Recovery Computer Hardware Mobile Devices Productivity Managed IT Services Small Business Upgrade Business Continuity IT Support Google Cybersecurity Cloud Computing Backup Phishing Smartphone Ransomware Collaboration Communication Tech Term User Tips Managed Service Provider Managed IT Services Disaster Recovery Workplace Tips Business Management Windows 10 VoIP Mobile Device Smartphones Managed Service Internet of Things Android Remote Monitoring Social Media Quick Tips Data Management Paperless Office communications Network Facebook Browser Encryption Managed IT Saving Money Server Save Money Windows 10 Office 365 Artificial Intelligence Windows BDR Miscellaneous Virtualization Business Technology Help Desk Risk Management Wi-Fi Covid-19 Compliance Passwords Holiday BYOD Vendor Management Password Training Apps Mobile Device Management Windows 7 Healthcare Health Office App Microsoft Office Government Document Management Automation Users Remote Work Bandwidth Avoiding Downtime Analytics Robot Gmail Content Filtering Firewall Employer-Employee Relationship Applications Laptops Big Data Unified Threat Management Recovery Bring Your Own Device Data Security Chrome Going Green Information Technology Wireless Hosted Solution Website Blockchain IT Management Mobility Redundancy File Sharing Processor Tip of the week SaaS Scam Telephone Systems Project Management Regulations Apple Antivirus Computers Infrastructure Money Storage Data loss Data storage Vulnerability Two-factor Authentication Computing Information Downtime Flexibility Operating System Printing Company Culture Customer Service RMM Virtual Reality Access Control Remote Computing OneDrive Machine Learning Settings Proactive Tablet Employee-Employer Relationship Meetings Files Social VPN IT Service Gadgets Customer Relationship Management Virtual Private Network Software as a Service Politics Unified Communications Hard Drive Router Maintenance IoT Work/Life Balance Budget Bitcoin Chromebook Licensing Electronic Health Records Uninterrupted Power Supply Employees Consultation Monitoring File Management Internet Exlporer Administration Outlook Mouse Payment Cards Education HIPAA LiFi Recycling Word Google Drive Search Cooperation Utility Computing Consulting Upgrades Mobile Security Co-Managed IT IT solutions Twitter Business Growth Display Managed Services Provider Professional Services Managed Services Mobile Office Sports Mobile Computing End of Support Remote Monitoring and Management Hacker Management Solid State Drive Patch Management Monitors Augmented Reality Time Management Networking Dark Web Electronic Medical Records Private Cloud Current Events Remote Workers Alert Remote Worker Wireless Technology Legal The Internet of Things Data Storage Tech Support Data Breach Network Management Spam Digital Payment Assessment How To Samsung Smart Technology Net Neutrality Social Network WiFi Websites Identity Theft How To YouTube Server Management Remote Working Telephony VoIP Sponsor Test Multi-Factor Security Wearable Technology Database Management Shadow IT Sync Best Practice Cache Touchscreen Techology Microsoft Excel Database Modem Sensors High-Speed Internet Printer Alerts Options Holidays Public Cloud Star Wars Lenovo Notifications Distributed Denial of Service Notes Annual Convention Law Enforcement Shared resources Windows Server 2008 Botnet Asset Tracking Address Black Market Comparison Identity Active Directory Travel Statistics Conferencing Windows 8 Digital MSP Save Time Obstacle Writing Emoji Google Calendar GDPR Outsourcing Mobile Device Managment Software Tips Cyberattacks Disaster Resistance Voice over Internet Protocol Cookies Gadget Identities Development Zero-Day Threat Network Congestion 5G IT Automobile Computer Care Superfish Managed IT Service PowerPoint San Diego Value of Managed Services Virtual Desktop OneNote Specifications Windows Server Managing Stress Bluetooth Instant Messaging Computer Repair Nanotechnology Telephone Peripheral GPS Spyware Course Tech Terms Retail Cortana Legislation IT Technicians Video Conferencing eWaste Google Wallet Read Only Proactive IT Physical Security Permissions Hard Drives Cables Google Docs Shortcut Backup and Disaster Recovery SharePoint Staff Wireless Internet Business Telephone 3D Printing Break Fix Social Networking Unified Threat Management Hotspot Manufacturing Optimization Supercomputer Firefox Humor Processors Black Friday Security Cameras Roanoke — Central Technology Solutions User Management Crowdsourcing Enterprise Content Management Finance Fraud Transportation Screen Reader Mobile VoIP Marketing PCI DSS Tracking Backups Theft Mirgation Biometric G Suite History Drones Heating/Cooling Office Tips IT Consulting Taxes WannaCry Wires Human Error Update Downloads Employer/Employee Relationships IT Assessment Buisness Deep Learning Google Maps Cost Management E-Commerce Unsupported Software Virus Virtual Assistant Motherboard Vendor Outsource IT User Error Language Hard Disk Drives Virtual Machines IT Budget Connectivity Cyber Monday technology services provider Batteries Vulnerabilities Hacking Authentication Smart Tech Cyber security WPA3 Financial Social Engineering USB Migration Projects Gamification Alt Codes Cabling Enterprise Resource Planning Servers Bookmarks Cryptocurrency Permission Operations Proactive Maintenance Digitize Features Mobile Data Data Warehousing Wasting Time Smart Devices Laptop Trending Authorization Computing Infrastructure Solid State Drives Credit Cards ROI Technology Assurance Group ’s 18 Point of Sale Disaster Geography Teamwork CRM Hacks Fleet Tracking Mail Merge Procurement Safety Technology Tips Chatbots Return on Investment Cybercrime Typing Mobile Favorites Dark Data Technology Laws Personal Information Regulation Web Server Cameras Motion Sickness CCTV Hard Disk Drive Administrator Relocation Printers Emergency Webcam Students CrashOverride IT Consultant Error