SlideShare una empresa de Scribd logo
1 de 4
Should Cell Phones be used in school? By Jared
My Opinion thewholeway.wordpress.com/2009/06/
Why I think this. ,[object Object]
Reasons

Más contenido relacionado

Más de St John

Top 10 Email Etiquette
Top 10 Email EtiquetteTop 10 Email Etiquette
Top 10 Email EtiquetteSt John
 
Email ettiquette
Email ettiquetteEmail ettiquette
Email ettiquetteSt John
 
Proper Email Etiquette
Proper Email EtiquetteProper Email Etiquette
Proper Email EtiquetteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Kayla!!! email etiquette
Kayla!!! email etiquetteKayla!!! email etiquette
Kayla!!! email etiquetteSt John
 
Email etiquette emily
Email etiquette emilyEmail etiquette emily
Email etiquette emilySt John
 
Proper email etiquette
Proper  email etiquetteProper  email etiquette
Proper email etiquetteSt John
 
Email ettique te
Email ettique teEmail ettique te
Email ettique teSt John
 
Proper email kimi
Proper email kimiProper email kimi
Proper email kimiSt John
 
Olivia proper email etiquette.pptx
Olivia proper email etiquette.pptxOlivia proper email etiquette.pptx
Olivia proper email etiquette.pptxSt John
 
Email ettiqute
Email ettiquteEmail ettiqute
Email ettiquteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Good Email Etiquette matt
Good Email Etiquette mattGood Email Etiquette matt
Good Email Etiquette mattSt John
 
Email Etiquette for Students
Email Etiquette for StudentsEmail Etiquette for Students
Email Etiquette for StudentsSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Ten Rules for Email
Ten Rules for EmailTen Rules for Email
Ten Rules for EmailSt John
 
Parent Open House 2010
Parent Open House 2010Parent Open House 2010
Parent Open House 2010St John
 
Kindergarten Night 2010
Kindergarten Night 2010Kindergarten Night 2010
Kindergarten Night 2010St John
 

Más de St John (20)

Top 10 Email Etiquette
Top 10 Email EtiquetteTop 10 Email Etiquette
Top 10 Email Etiquette
 
Email ettiquette
Email ettiquetteEmail ettiquette
Email ettiquette
 
Proper Email Etiquette
Proper Email EtiquetteProper Email Etiquette
Proper Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Kayla!!! email etiquette
Kayla!!! email etiquetteKayla!!! email etiquette
Kayla!!! email etiquette
 
Email etiquette emily
Email etiquette emilyEmail etiquette emily
Email etiquette emily
 
Proper email etiquette
Proper  email etiquetteProper  email etiquette
Proper email etiquette
 
Email ettique te
Email ettique teEmail ettique te
Email ettique te
 
Proper email kimi
Proper email kimiProper email kimi
Proper email kimi
 
Olivia proper email etiquette.pptx
Olivia proper email etiquette.pptxOlivia proper email etiquette.pptx
Olivia proper email etiquette.pptx
 
Email ettiqute
Email ettiquteEmail ettiqute
Email ettiqute
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Good Email Etiquette matt
Good Email Etiquette mattGood Email Etiquette matt
Good Email Etiquette matt
 
Email Etiquette for Students
Email Etiquette for StudentsEmail Etiquette for Students
Email Etiquette for Students
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Ten Rules for Email
Ten Rules for EmailTen Rules for Email
Ten Rules for Email
 
Parent Open House 2010
Parent Open House 2010Parent Open House 2010
Parent Open House 2010
 
Kindergarten Night 2010
Kindergarten Night 2010Kindergarten Night 2010
Kindergarten Night 2010
 

Último

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 

Último (20)

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

Jared No Cell Phone

Notas del editor

  1. In my opinion cell phones are not needed in school. I think face to face conversation is stronger than “ texting “. I also think that if you can’t last seven hours without a cell phone than you are addicted to your cell phone. Also it would take longer to get feedback from a cell phone than it would face to face. So in my opinion, I think that there is no need for cell phones.
  2. Cell Phones are suppose to be used for connecting to each other without a cord. Which means that you could take your phone anywhere as long as you get “ service “. Now that cell phones have been getting even more smaller and more technical. Which means that face to face talk is going down the drain.
  3. As almost everyone says. Technology these day are amazing. Whether it be computers or phones everything gets smaller and more technical as everything moves on. The picture above shows how phones have gotten smaller and smaller and time moves on. There are also now touch screen phone and computers. That’s just one example of how technology is getting bigger and bigger and now face to face talk is going down the drain. But also sadly the new way of talk is texting.