Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

We typically use this blog to share information about the technology that a business should be leveraging - but in this blog, we’ve decided to focus on a different group that is increasingly reliant on technology: students. As these pupils will someday make up the workforce and almost certainly utilize technology on a daily basis, it is important that their education reflects this increase in their curriculums. Here, we’ll consider some of the effects (good and bad) that this has had.

How Has Education Benefited from Technology Use?

Frankly, it would take too long to really get into all of the different ways that technology has given the classroom a boost. From those devices that have replaced (if you’ll pardon the expression) old-school solutions to the near-ubiquitous access that students have to tools that could be used for learning thanks to their mobile devices, technology has taken a leading role in education. Smart displays are replacing chalkboards, and students are more and more frequently supplied with laptops to support their learning.

Teachers have used their access to this technology to enrich their students’ learning experience, connecting with classrooms around the world to allow their students some time to interact with other cultures. These students have been shown to overcome language barriers to share what makes them similar to one another. This is just one way that cooperation and collaboration have helped to generate educational breakthroughs.

More examples of technology’s benefits to the educational process were shared on an episode of the EdSurge on Air Podcast, delivered through anecdotes and classroom stories. Mimi Kasner was one educator who shared a few stories. One was about a young girl who was having a considerably difficult time learning to read and write through the traditional approach. However, when she was introduced to a website that taught the alphabet, she excelled - much to her delight. When Kasner was made a principal of a school, she experienced another inspirational moment. During a fire drill, a few teachers approached her and informed her that the students wanted the time that the fire drill took up back, so they could continue to work on their self-managed projects that the drill interrupted.

The 'overcoming language barriers' example we referenced earlier wasn't hypothetical! According to education technology coordinator Sam Jordan of the Alaska Department of Education and Early Development, Skype was used in the classroom to connect Alaskan students with Sri Lankan students, where the two groups were able to communicate and teach one another about themselves and how they were similar - again, with nothing to remedy the language barrier between them.

By nurturing a thirst for knowledge and an openness to educational experiences, a school can live up to businessman Richard Livingstone’s criteria for educational success:

“If the school sends out children with a desire for knowledge and some idea of how to acquire and use it, it will have done its work.”

Another benefit that technology offers is how interactive lessons can now become through a “gamification” approach. Look at it through the eyes of an energetic 10-year-old… would you rather sit and listen politely as the teacher reads at you from a book (probably published when your parents were still in school), or play a game where you pretend to be an important historical figure and role-play the events your character had a part in? Today’s technology makes these kinds of activities easier to manage - and since technology can be updated, it is much easier to keep up on the latest lessons.

Of course, today’s technology also benefits the person standing at the head of the class. Teachers have found that the advanced solutions available to them can greatly simplify things in the classroom, allowing for more assistance to be given to students. Take Jill Watson, a teacher’s assistant who can answer questions students have about classroom policies, and who just so happens to be an artificial intelligence. Think about how much time could be better spent actually teaching students and assisting them in processing the lessons, if educators weren’t constantly being interrupted by bathroom requests and “Where can I find…?” inquiries. Much like a real teacher’s assistant, Jill Watson would also know to pass along any questions that were beyond her scope to the teacher.

Whether you consider the improvements to the learning process that can be made, or how much more accessible alternative styles of educating can become, it only becomes more clear that technology could quickly become as ubiquitous to the learning process as a blackboard, or a textbook, or a homework assignment have been for decades. That being said, there are some concerns that have come up regarding how technology might also hinder actual learning.

How Technology Can Be an Educational Detriment

Unfortunately, we aren’t talking about a few hypothetical situations. Actual events have also proven that technology could do some damage to the educational process.

Most obvious among the potential issues of bringing technology into the classroom is the clear risk of it serving more as a distraction than an educational supplement. A survey of 500 people affiliated with the University of Waterloo indicated that almost half of this group found technology to be a distraction, 68 percent of teachers surveyed expressing their frustration at the use of cell phones in class. Another study showed a link between lower test scores and the use of technology.

It gets worse than just being a distraction. Naturally, students have come up with some very clever ways of using technology to help them cheat. Smartphones have been deemed responsible for instances of cheating in the United Kingdom going up, as they did by 25 percent in 2017 and 26 percent in 2018. For another example of “CheatTech”, some schools in the UK have suggested banning watches - not even just smartwatches, but all watches - from examination rooms. Why? Simple - it has become too hard to tell the difference between the two.

Across the pond, students in the United States have adopted the use of hidden earbuds to listen to information stored in their phones (which are “safely” stowed away during the test). Students from Thailand and Singapore would use a combination of gadgets to cheat. One would walk into the exam wearing a pair of honest-to-goodness spy glasses, transmitting the exam questions to an accomplice on the outside. This accomplice would look up the answer and message it to the test-taker, whose smartwatch would display the message. In China, students have been caught trying to cheat college entrance exams by using false fingerprints. Someone could be hired to take the test on their behalf, “their” identity confirmed by their fingerprints.

Examples like these beg the question: could the ingenuity that these cheats require be a better indicator of a student’s intelligence than a written exam could ever be?

Whether you’re for or against the use of technology as an educational tool, it seems to be the way that things are done - just as in most industries today. However, we’d still like to know what you think about all this… is technology something that schools and educational systems should embrace, or is it all just a way to make the same lessons more expensive to teach? Does a child using technology to learn today really help prepare them for when they will need to use technology to work?

We have a comments section waiting for your input! Please feel free to start a few discussions.

Diving Into the Differences Between Proactive and ...
For Cybersecurity Awareness Month, Keep Looming Th...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 16 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Data Network Security Privacy IT Support Hosted Solutions Data Recovery Cloud Software IT Services Email Outsourced IT Internet Malware Tech Term Managed IT Services Business Computer User Tips Innovation Hackers Upgrade Cloud Computing Windows 10 Efficiency Microsoft Small Business Hardware Mobile Devices Business Management Collaboration Ransomware Google Cybersecurity Phishing Business Continuity Paperless Office Managed Service Office 365 Workplace Tips Smartphones VoIp Android Communication Backup Managed Service Provider Communications Encryption Server Remote Monitoring Business Technology Vulnerability Internet of Things BDR Passwords Data Management Managed IT Artificial Intelligence Help Desk Quick Tips Holiday Save Money Windows 7 Disaster Recovery Healthcare Saving Money Wi-Fi Facebook Government Document Management Mobile Device Managed IT services Browser Applications Laptops Smartphone Antivirus Scam Redundancy Social Media Bandwidth Compliance Automation Tip of the week Processor Microsoft Office Blockchain Information Employer-Employee Relationship Avoiding Downtime Project Management Customer Relationship Management Data Loss Two-factor Authentication Machine Learning Chrome Maintenance VPN Analytics Website Network BYOD Access Control Windows Miscellaneous Data Security RMM Infrastructure Vendor Management IT Management Router HIPAA Utility Computing Tablet Bring Your Own Device Remote Monitoring and Management Internet Exlporer Users Dark Web Financial Network Management Alert Consultation Smart Technology Operating System Professional Services Training OneDrive Employees Social Network Recycling Consulting Downtime Networking Employee-Employer Relationship Search Mobile Security Company Culture Unified Communications Unified Threat Management Apps Remote Workers Password Files Mobility IoT Regulations Virtual Private Network The Internet of Things Management Gmail Risk Management Hard Drive Cooperation Server Management File Sharing Word File Management Proactive Software as a Service Net Neutrality Gadgets Patch Management Assessment Storage Monitoring Microsoft Excel Remote Worker PowerPoint Display OneNote Permission Computing Infrastructure Value of Managed Services Social Networking Address WiFi Cybercrime Cyber security Screen Reader Authorization Teamwork Information Technology Identity Features Augmented Reality Modem High-Speed Internet Google Calendar Politics Fraud Return on Investment Remote Computing Techology SaaS Options Telephone Office Private Cloud Tech Support How To Computing Test Alerts Managed Services G Suite Hacking Database Management Smart Tech WPA3 Travel Shared resources Going Green Mobile Technology Laws Electronic Health Records Procurement Virtual Reality Touchscreen Emergency Development Multi-Factor Security Instant Messaging Settings Personal Information Outlook Disaster Resistance Firewall Time Management 5G Mobile VoIP Bookmarks ROI Virtual Assistant Bitcoin IT Technicians Cost Management Comparison Licensing Heating/Cooling Manufacturing Vendor Motherboard Chromebook Printer Trending GDPR Connectivity Fleet Tracking Technology Tips Zero-Day Threat Virtualization Batteries Unified Threat Management Cyberattacks Data Warehousing Social Flexibility Wireless Internet Big Data Cookies Cables Windows Server 2008 Legislation Customer Service Transportation Active Directory Migration Shortcut eWaste Proactive IT Managed Services Provider Distributed Denial of Service Mobile Device Management Statistics Favorites Wasting Time Current Events Specifications Wireless Servers Smart Devices Vulnerabilities Operations Lenovo Asset Tracking Digital Payment Backup and Disaster Recovery Hotspot CIO applications Remote Work Managing Stress Read Only Security Cameras Employer/Employee Relationships Apple Nanotechnology Samsung Wires Co-Managed IT MSP Finance Recovery Windows Server Chatbots IT Consulting Point of Sale Managed IT Service Tech Terms Bluetooth Conferencing Database Mirgation Black Friday Hard Disk Drives Sensors Mobile Computing SharePoint Money Printing Notes Wearable Technology Star Wars Superfish Mouse Human Error Language Spam Mail Merge Enterprise Content Management User Error Proactive Maintenance Solid State Drive App Authentication User Management Identity Theft Enterprise Resource Planning Data Breach E-Commerce Break Fix Theft Downloads Meetings Permissions Voice over Internet Protocol Projects Cache Cyber Monday Electronic Medical Records Staff Websites Solid State Drives Payment Cards Geography Daniel Stevens Virtual Machines Regulation Twitter Education Printers Marketing CEO Optimization Students

Latest Blog

The smartphone has become the most utilized computing device in the world. As a result, consumers are looking for the very best of them to get the functionality they demand. The current set of flagship smartphones that are available provide all types of benefits for business...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...