The aim of this research is to make a new investigation of a scientific thesis in Arabic Morphology in which an allusion occurred in relation to its real author and its title, there is alot of dropping and flaw when it was first applied due to depending on one written transcript
Material Requirements Planning System (MRP) is considered as one of the planning and controlling of production and inventory systems which is used to prepare plan of the final production requirements and its parts of subcomponents raw materials and the time at which it was needed for the purpose of preparing orders of production and purchase.
The problem of the present work is represented in the general company of electrical industrialization adoption of traditional methods and personal experience of the process of the products and\or purchase quantity and inventory quantities and limiting the required time for acquiring the required quantities of the materials and parts used in the finish product of the
... Show MoreAbstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreStarting from the term (forbidden montage) initiated by the French critic (Andre Bazin) as a method of processing the movies that depend on (mise en scene) achieved by the action of the camera and its ability to photograph and employ the depth of the field, in addition to the possibility of free movement without interruption in the filming environment in order to avoid montage as much as possible (the montage that distorts focus and distracts attention and moves away from realism, which is the most important theoretical pillar of Bazin in photography). The pursuit was behind a cinema that depicts its topics in one integrated snapshot with all its details thus approximating reality without any interference of montage. Our study sta
... Show Moreهدف ال الأسلوب المعرفيّ م الإد ا ركيّ اضة للبنات، والتعرّف على علاقة التنظ ة وعلوم الر ة البدنّ ة التر لّ ة في ات المرحلة الثانّ طال إنّه احثتان اضة للبنات، وأفترضت ال ة وعلوم الر ة البدنّ ة التر ل ة في ات المرحلة الثان عض طال التأمّليّ الاندفاعيّ لدى اس الأسلوب المعرفيّ التأمّليّ الاندفاعيّ لدى عیّنة م الإد ا ركيّ ونتائج مق اس التنظ ة بین نتائج مق
... Show MoreSince the advent of the sunrise of the immortal message, Islamic legislation has always established justice and the right guidance, and has prevented any perversion, injustice or corruption, with a divine system that called in its course the characteristics of the legislation on its general basis and its ability to develop, progressivity, and paving the way with a collective approach, accompanied by the worldly and moral punishment. When the corrupters went too far, reformers were delayed and values were missed; Mankind has been afflicted with the scourge of injustice and loss, and has lost sight of the approach that the Creator of the world has given to the people of the world, for what would guide them in their affairs sooner and later
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreCrime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the natu
... Show MoreThe aim of this research is to introduce agricultural insurance, to define financing in the form of salam and the role of agricultural insurance in the prevention of risks to agricultural finance operations in the form of salam by verifying the hypotheses through which to reach the results, including the imposition of risks for agricultural finance in the form of salam, The study of agricultural finance in the form of salm, the deductive approach to the development of the problem of research and hypotheses, and the inductive method to extrapolate the results through analysis and brother The researcher concluded that agricultural insurance works to bridge the risks facing agricultural finance in the form of the ladder in cases of
... Show More