Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

We typically use this blog to share information about the technology that a business should be leveraging - but in this blog, we’ve decided to focus on a different group that is increasingly reliant on technology: students. As these pupils will someday make up the workforce and almost certainly utilize technology on a daily basis, it is important that their education reflects this increase in their curriculums. Here, we’ll consider some of the effects (good and bad) that this has had.

How Has Education Benefited from Technology Use?

Frankly, it would take too long to really get into all of the different ways that technology has given the classroom a boost. From those devices that have replaced (if you’ll pardon the expression) old-school solutions to the near-ubiquitous access that students have to tools that could be used for learning thanks to their mobile devices, technology has taken a leading role in education. Smart displays are replacing chalkboards, and students are more and more frequently supplied with laptops to support their learning.

Teachers have used their access to this technology to enrich their students’ learning experience, connecting with classrooms around the world to allow their students some time to interact with other cultures. These students have been shown to overcome language barriers to share what makes them similar to one another. This is just one way that cooperation and collaboration have helped to generate educational breakthroughs.

More examples of technology’s benefits to the educational process were shared on an episode of the EdSurge on Air Podcast, delivered through anecdotes and classroom stories. Mimi Kasner was one educator who shared a few stories. One was about a young girl who was having a considerably difficult time learning to read and write through the traditional approach. However, when she was introduced to a website that taught the alphabet, she excelled - much to her delight. When Kasner was made a principal of a school, she experienced another inspirational moment. During a fire drill, a few teachers approached her and informed her that the students wanted the time that the fire drill took up back, so they could continue to work on their self-managed projects that the drill interrupted.

The 'overcoming language barriers' example we referenced earlier wasn't hypothetical! According to education technology coordinator Sam Jordan of the Alaska Department of Education and Early Development, Skype was used in the classroom to connect Alaskan students with Sri Lankan students, where the two groups were able to communicate and teach one another about themselves and how they were similar - again, with nothing to remedy the language barrier between them.

By nurturing a thirst for knowledge and an openness to educational experiences, a school can live up to businessman Richard Livingstone’s criteria for educational success:

“If the school sends out children with a desire for knowledge and some idea of how to acquire and use it, it will have done its work.”

Another benefit that technology offers is how interactive lessons can now become through a “gamification” approach. Look at it through the eyes of an energetic 10-year-old… would you rather sit and listen politely as the teacher reads at you from a book (probably published when your parents were still in school), or play a game where you pretend to be an important historical figure and role-play the events your character had a part in? Today’s technology makes these kinds of activities easier to manage - and since technology can be updated, it is much easier to keep up on the latest lessons.

Of course, today’s technology also benefits the person standing at the head of the class. Teachers have found that the advanced solutions available to them can greatly simplify things in the classroom, allowing for more assistance to be given to students. Take Jill Watson, a teacher’s assistant who can answer questions students have about classroom policies, and who just so happens to be an artificial intelligence. Think about how much time could be better spent actually teaching students and assisting them in processing the lessons, if educators weren’t constantly being interrupted by bathroom requests and “Where can I find…?” inquiries. Much like a real teacher’s assistant, Jill Watson would also know to pass along any questions that were beyond her scope to the teacher.

Whether you consider the improvements to the learning process that can be made, or how much more accessible alternative styles of educating can become, it only becomes more clear that technology could quickly become as ubiquitous to the learning process as a blackboard, or a textbook, or a homework assignment have been for decades. That being said, there are some concerns that have come up regarding how technology might also hinder actual learning.

How Technology Can Be an Educational Detriment

Unfortunately, we aren’t talking about a few hypothetical situations. Actual events have also proven that technology could do some damage to the educational process.

Most obvious among the potential issues of bringing technology into the classroom is the clear risk of it serving more as a distraction than an educational supplement. A survey of 500 people affiliated with the University of Waterloo indicated that almost half of this group found technology to be a distraction, 68 percent of teachers surveyed expressing their frustration at the use of cell phones in class. Another study showed a link between lower test scores and the use of technology.

It gets worse than just being a distraction. Naturally, students have come up with some very clever ways of using technology to help them cheat. Smartphones have been deemed responsible for instances of cheating in the United Kingdom going up, as they did by 25 percent in 2017 and 26 percent in 2018. For another example of “CheatTech”, some schools in the UK have suggested banning watches - not even just smartwatches, but all watches - from examination rooms. Why? Simple - it has become too hard to tell the difference between the two.

Across the pond, students in the United States have adopted the use of hidden earbuds to listen to information stored in their phones (which are “safely” stowed away during the test). Students from Thailand and Singapore would use a combination of gadgets to cheat. One would walk into the exam wearing a pair of honest-to-goodness spy glasses, transmitting the exam questions to an accomplice on the outside. This accomplice would look up the answer and message it to the test-taker, whose smartwatch would display the message. In China, students have been caught trying to cheat college entrance exams by using false fingerprints. Someone could be hired to take the test on their behalf, “their” identity confirmed by their fingerprints.

Examples like these beg the question: could the ingenuity that these cheats require be a better indicator of a student’s intelligence than a written exam could ever be?

Whether you’re for or against the use of technology as an educational tool, it seems to be the way that things are done - just as in most industries today. However, we’d still like to know what you think about all this… is technology something that schools and educational systems should embrace, or is it all just a way to make the same lessons more expensive to teach? Does a child using technology to learn today really help prepare them for when they will need to use technology to work?

We have a comments section waiting for your input! Please feel free to start a few discussions.

Diving Into the Differences Between Proactive and ...
For Cybersecurity Awareness Month, Keep Looming Th...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 15 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing IT Support Hosted Solutions Network Security Data Privacy Software Cloud Data Recovery IT Services Outsourced IT Managed IT Services Malware Internet Email Tech Term Innovation Business Efficiency User Tips Hackers Computer Cloud Computing Windows 10 Small Business Collaboration Business Management Ransomware Microsoft Google Hardware Paperless Office Upgrade Phishing Business Continuity Managed Service VoIp Mobile Devices Android Communication Remote Monitoring Server Communications Managed Service Provider Encryption Managed IT Workplace Tips Artificial Intelligence Office 365 Vulnerability Backup Smartphones Internet of Things Cybersecurity Passwords Applications Data Management Help Desk Business Technology Holiday Disaster Recovery Saving Money Wi-Fi Document Management Quick Tips Save Money Healthcare Managed IT services Laptops Browser Compliance Blockchain BDR Smartphone Project Management Employer-Employee Relationship Antivirus Redundancy Scam Government Bandwidth Processor Mobile Device Information Automation Tip of the week Microsoft Office Windows Data Security Vendor Management Infrastructure IT Management Windows 7 Avoiding Downtime Customer Relationship Management Chrome Two-factor Authentication Router VPN Analytics Social Media Machine Learning RMM Website Access Control BYOD Monitoring Gmail The Internet of Things Company Culture Cooperation Server Management Risk Management Financial Word Remote Monitoring and Management Patch Management Operating System IoT Software as a Service Net Neutrality Gadgets Regulations Professional Services Assessment Training Management File Sharing Employees Tablet Data Loss Downtime Dark Web Network Management Internet Exlporer Users Smart Technology Alert Consultation Maintenance Storage Bring Your Own Device HIPAA Utility Computing Network Facebook Remote Workers Networking Search Mobile Security Unified Threat Management Unified Communications Miscellaneous File Management Files Recycling Virtual Private Network Mobility Proactive IT Consulting Electronic Medical Records Managed IT Service Solid State Drives Bluetooth Payment Cards Connectivity Samsung Meetings Voice over Internet Protocol Recovery Projects Black Friday Value of Managed Services Cookies Cables SharePoint Remote Worker PowerPoint Display Migration eWaste OneNote Permission Teamwork Information Technology Vulnerabilities Mail Merge User Error Features Money Cybercrime Superfish Authorization Mouse Language Managing Stress Data Breach Break Fix Options Telephone Politics Return on Investment Test Cyber Monday Staff OneDrive Websites Managed Services Nanotechnology Wires Downloads Office Private Cloud Permissions Chatbots How To Shared resources Going Green Mobile Computing Address WiFi Electronic Health Records Procurement Microsoft Excel Database Management Mirgation Hard Drive WPA3 Computing Infrastructure Spam Enterprise Content Management Consulting Augmented Reality 5G Mobile VoIP Wearable Technology Star Wars Instant Messaging Settings Personal Information Employee-Employer Relationship Manufacturing SaaS Vendor App Bookmarks ROI Google Calendar Fraud Virtual Assistant Bitcoin Identity Theft Enterprise Resource Planning Techology Alerts Virtualization Batteries Geography Cyberattacks Social GDPR Cache Fleet Tracking Zero-Day Threat Computing Social Networking Technology Laws Managed Services Provider Mobile Device Management Virtual Reality Touchscreen Wireless Internet Hacking Big Data Customer Service Travel Transportation Active Directory Disaster Resistance Wireless Firewall Time Management Password Smart Devices Screen Reader Emergency Multi-Factor Security Favorites Apps Wasting Time Current Events Identity Outlook Comparison Licensing CIO applications Heating/Cooling Remote Work Modem High-Speed Internet Printer Read Only Security Cameras Remote Computing Asset Tracking Backup and Disaster Recovery G Suite Unified Threat Management Point of Sale Tech Terms Data Warehousing Flexibility Employer/Employee Relationships Trending Tech Support MSP Finance Technology Tips Windows Server Shortcut Proactive IT Distributed Denial of Service Hard Disk Drives Statistics Sensors Smart Tech Conferencing Legislation Database Mobile Specifications Servers Development Printing Notes Human Error User Management Motherboard Chromebook E-Commerce Theft Operations Proactive Maintenance IT Technicians Cost Management Lenovo Authentication Digital Payment Hotspot Daniel Stevens Marketing Twitter Regulation Education CEO Printers Students

Latest Blog

Traditionally, small businesses don’t use their data in the same way as larger companies. This is largely because they may not think they have a lot of data. Well, I’m here to tell you that even small businesses can have big data. Let’s go over three ways small business can ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...