SlideShare a Scribd company logo
The Impact of Technology on the Developing Child name 7 negative ways it can
Solution
1. Now a days, children play time is majorly occupied by the gadgets, and thus lacking their
physical abilitiy to achieve sensory and motor development.
2. Due to availability of gadgets like calculators, and mobile phones, children are loosing their
ability to memorize/analyze their simple things like calculations, or memorizing phone numbers.
3. Child obesity is one of the impact of technology on developing child. This is just because of
lack of physical activity.
4. Children are lacking their family life, due to the business of parents, and therefore getting
addicting to gadgets, and missing human relations.
5. The availability of gadgets to parents, and therefore, their ability to work from home, is
inflicting negligence towards their children.
6. Children addiction towards television and internet, are lacking their sleep during nights.
7. Due to various programs over internet, and television, children are pyschologically loosing
their mind, and dreaming of almost impossible things in real world.

More Related Content

Similar to The Impact of Technology on the Developing Child name 7 negative ways.docx

Abstract
AbstractAbstract
Abstract
aininsyazana
 
Group 4 Personal Impact
Group 4 Personal ImpactGroup 4 Personal Impact
Group 4 Personal Impact
Sadaf357
 
1Running Head Technology’s role in children development. .docx
1Running Head Technology’s role in children development.       .docx1Running Head Technology’s role in children development.       .docx
1Running Head Technology’s role in children development. .docx
eugeniadean34240
 
Negative effect
Negative effectNegative effect
Negative effect
Zheng Chee Cham
 
Yew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing - Computers and your ChildrenYew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing
 
DT Activity-5 (Ideation and Six Thinking Hats) .pptx
DT Activity-5 (Ideation and Six Thinking Hats) .pptxDT Activity-5 (Ideation and Six Thinking Hats) .pptx
DT Activity-5 (Ideation and Six Thinking Hats) .pptx
Ankuramandash1
 
Business Plan for a Healthcare OrganizationTwo main tasks.docx
Business Plan for a Healthcare OrganizationTwo main tasks.docxBusiness Plan for a Healthcare OrganizationTwo main tasks.docx
Business Plan for a Healthcare OrganizationTwo main tasks.docx
humphrieskalyn
 
Information Effect: Internet Procrastination, What is it?
Information Effect: Internet Procrastination, What is it?Information Effect: Internet Procrastination, What is it?
Information Effect: Internet Procrastination, What is it?
9586344
 
Regulations and ImplementationsIn a paper (750-1,000 words), exp.docx
Regulations and ImplementationsIn a paper (750-1,000 words), exp.docxRegulations and ImplementationsIn a paper (750-1,000 words), exp.docx
Regulations and ImplementationsIn a paper (750-1,000 words), exp.docx
debishakespeare
 
8 tips for tech-free quality family time
8 tips for tech-free quality family time8 tips for tech-free quality family time
8 tips for tech-free quality family time
ParentsWare
 
Problems of well being
Problems of well beingProblems of well being
Problems of well being
brit16
 
6 Signs That Your Child is Being Cyberbullied.
6 Signs That Your Child is Being Cyberbullied.6 Signs That Your Child is Being Cyberbullied.
6 Signs That Your Child is Being Cyberbullied.
Your eKavach
 
Child Addicts
Child AddictsChild Addicts
Child Addicts
rachelhch
 
Intervention of Gadgets in Your Child's Life
Intervention of Gadgets in Your Child's LifeIntervention of Gadgets in Your Child's Life
Intervention of Gadgets in Your Child's LifeNor Baiti Nora
 
Causes of children nowadays mature early in life
Causes of children nowadays mature early in lifeCauses of children nowadays mature early in life
Causes of children nowadays mature early in life
Chong Chin Pin
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosisGehring92
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in Teens
TeenSafe
 
Why do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdfWhy do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdf
onemonitarsoftware
 
Technology in teenagers powerpoint
Technology in teenagers powerpointTechnology in teenagers powerpoint
Technology in teenagers powerpointdaniellemorgan13
 

Similar to The Impact of Technology on the Developing Child name 7 negative ways.docx (20)

Abstract
AbstractAbstract
Abstract
 
Group 4 Personal Impact
Group 4 Personal ImpactGroup 4 Personal Impact
Group 4 Personal Impact
 
1Running Head Technology’s role in children development. .docx
1Running Head Technology’s role in children development.       .docx1Running Head Technology’s role in children development.       .docx
1Running Head Technology’s role in children development. .docx
 
Negative effect
Negative effectNegative effect
Negative effect
 
Yew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing - Computers and your ChildrenYew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing - Computers and your Children
 
DT Activity-5 (Ideation and Six Thinking Hats) .pptx
DT Activity-5 (Ideation and Six Thinking Hats) .pptxDT Activity-5 (Ideation and Six Thinking Hats) .pptx
DT Activity-5 (Ideation and Six Thinking Hats) .pptx
 
Business Plan for a Healthcare OrganizationTwo main tasks.docx
Business Plan for a Healthcare OrganizationTwo main tasks.docxBusiness Plan for a Healthcare OrganizationTwo main tasks.docx
Business Plan for a Healthcare OrganizationTwo main tasks.docx
 
Information Effect: Internet Procrastination, What is it?
Information Effect: Internet Procrastination, What is it?Information Effect: Internet Procrastination, What is it?
Information Effect: Internet Procrastination, What is it?
 
Regulations and ImplementationsIn a paper (750-1,000 words), exp.docx
Regulations and ImplementationsIn a paper (750-1,000 words), exp.docxRegulations and ImplementationsIn a paper (750-1,000 words), exp.docx
Regulations and ImplementationsIn a paper (750-1,000 words), exp.docx
 
8 tips for tech-free quality family time
8 tips for tech-free quality family time8 tips for tech-free quality family time
8 tips for tech-free quality family time
 
Problems of well being
Problems of well beingProblems of well being
Problems of well being
 
6 Signs That Your Child is Being Cyberbullied.
6 Signs That Your Child is Being Cyberbullied.6 Signs That Your Child is Being Cyberbullied.
6 Signs That Your Child is Being Cyberbullied.
 
Child Addicts
Child AddictsChild Addicts
Child Addicts
 
Intervention of Gadgets in Your Child's Life
Intervention of Gadgets in Your Child's LifeIntervention of Gadgets in Your Child's Life
Intervention of Gadgets in Your Child's Life
 
Causes of children nowadays mature early in life
Causes of children nowadays mature early in lifeCauses of children nowadays mature early in life
Causes of children nowadays mature early in life
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosis
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in Teens
 
Why do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdfWhy do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdf
 
Technology in teenagers powerpoint
Technology in teenagers powerpointTechnology in teenagers powerpoint
Technology in teenagers powerpoint
 
FinalDraft
FinalDraftFinalDraft
FinalDraft
 

More from ellenj4

The function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docxThe function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docx
ellenj4
 
The four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docxThe four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docx
ellenj4
 
The IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docxThe IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docx
ellenj4
 
The Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docxThe Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docx
ellenj4
 
The internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docxThe internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docx
ellenj4
 
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docxThe Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
ellenj4
 
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docxThe Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
ellenj4
 
The following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docxThe following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docx
ellenj4
 
The following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docxThe following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docx
ellenj4
 
The following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docxThe following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docx
ellenj4
 
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docxThe German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
ellenj4
 
The graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docxThe graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docx
ellenj4
 
The general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docxThe general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docx
ellenj4
 
The general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docxThe general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docx
ellenj4
 
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docxThe functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
ellenj4
 
The following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docxThe following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docx
ellenj4
 
The G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docxThe G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docx
ellenj4
 
Please do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docxPlease do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docx
ellenj4
 
Please describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docxPlease describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docx
ellenj4
 
please define and describe the following- web server- application serv.docx
please define and describe the following- web server- application serv.docxplease define and describe the following- web server- application serv.docx
please define and describe the following- web server- application serv.docx
ellenj4
 

More from ellenj4 (20)

The function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docxThe function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docx
 
The four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docxThe four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docx
 
The IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docxThe IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docx
 
The Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docxThe Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docx
 
The internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docxThe internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docx
 
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docxThe Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
 
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docxThe Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
 
The following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docxThe following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docx
 
The following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docxThe following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docx
 
The following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docxThe following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docx
 
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docxThe German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
 
The graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docxThe graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docx
 
The general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docxThe general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docx
 
The general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docxThe general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docx
 
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docxThe functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
 
The following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docxThe following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docx
 
The G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docxThe G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docx
 
Please do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docxPlease do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docx
 
Please describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docxPlease describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docx
 
please define and describe the following- web server- application serv.docx
please define and describe the following- web server- application serv.docxplease define and describe the following- web server- application serv.docx
please define and describe the following- web server- application serv.docx
 

Recently uploaded

MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 

Recently uploaded (20)

MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 

The Impact of Technology on the Developing Child name 7 negative ways.docx

  • 1. The Impact of Technology on the Developing Child name 7 negative ways it can Solution 1. Now a days, children play time is majorly occupied by the gadgets, and thus lacking their physical abilitiy to achieve sensory and motor development. 2. Due to availability of gadgets like calculators, and mobile phones, children are loosing their ability to memorize/analyze their simple things like calculations, or memorizing phone numbers. 3. Child obesity is one of the impact of technology on developing child. This is just because of lack of physical activity. 4. Children are lacking their family life, due to the business of parents, and therefore getting addicting to gadgets, and missing human relations. 5. The availability of gadgets to parents, and therefore, their ability to work from home, is inflicting negligence towards their children. 6. Children addiction towards television and internet, are lacking their sleep during nights. 7. Due to various programs over internet, and television, children are pyschologically loosing their mind, and dreaming of almost impossible things in real world.