The study aimed to identify the role of the teacher in confronting intellectual extremism in high school students, and identify the differences of statistical significance in the role of teacher in confronting intellectual extremism in secondary school students according to gender variable (males, females) and the duration of service (less than 5 years more than 5 years), the sample was consisted of (100) teachers with (50) male and (50) female in the city of Bayaa, Dora and Sadiya, the measure of intellectual extremism was applied by the researcher, and the study reached a role of the teacher in facing the intellectual extremism at Secondary school students, and the existence of differences of statistical significance in the role
... Show MoreThe phenomenon of the social movements of researchers, based on the scope of their influence on political events, and the nature of the wide role played, and its ability to influence, through its activities and various activities and various. It has practiced its activities through new and non-traditional peaceful means, with clear slogans and specific objectives. And was able to mobilize activists from different strata of the Iraqi people, and its categories and social strata. As the demands focused on freedoms, rights, dignity and social justice
The research aims to measure the relationship and impact of the operations of the knowledge of management of the six dimensions (diagnosis knowledge, define knowledge objectives, knowledge generation, knowledge storage, distribution of knowledge, application of knowledge) in the fiscal performance of the General Authority for taxes of the four dimensions (financial, customers (taxpayers), Operations Interior, learn and grow), the research aims also to the use of computerized programs for training and career development of the Authority that helps to add knowledge workers in the Authority, and to reach an appropriate arrangement for knowledge management processes in the Authority, as well as analysis of the reality of the Authority to get
... Show MoreAbstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreThis research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in Arabic language grammar was prepared, a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three
... Show MoreThis research has been applied on 100 children (age 4 – 6 years) from three kindergartens distributed on basis of 43 children from the college of Education for women kindergarten (A) , 27 children from the governmental Al- Mustafa kindergarten (B) , and 30 children from the private Al – Baraom kindergarten (C) . Details concerning their school meals, already prepared at home , have been analyzed according to their dietary components taken from the tables of the dietary values .The statistical analysis results have shown no significant difference (p< 0.01) in the intake of energy , protein and thiamin between the children of A and C kindergartens while these children have significantly recieved higher amounts of the above nutrien
... Show MoreConstruction is the opening of the important pillars of the construction of the film as a whole for this, we find that the first of any narrative of my film begin at the borders of this construction is the window that we look through the contents tale and puzzle narrative is of significance that degrade traveler when reservoirs expression later in reasoning and find justifications ills that came by those initiation, this initiation may be the window that lead us to the core, understanding the story through signals received to the recipient to sail because of the paths of pickling what is which is encoded, but this initiation may serve as keys that understanding the be puppies and signals that beset and surrounded to what He holds inevita
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More