Resulted in scientific and technological developments to the emergence of changes in the educational process and methods of teaching modern formats commensurate with the level of mental retardation. Which called for educational institutions, including the University of Baghdad / College of Fine Arts to urge and guide researchers to study and follow-up of recent developments in the educational process in order to develop in the fine arts in general and technical education in particular being play an important role in achieving educational goals. The educational methods of modern educational require effort-intensive and advanced for the development of technical skills among students, and thus worked researcher to employ computer technology (power point) for the development of technical skills for students of art education in the subject of colors, and through the development of training programs, educational the task of development of technical skills among students. So is being search of the first quarter, which included the research problem the researcher has conducted a prospective study on a sample composed of 35 students, and the researcher met on the set constraints experienced by students in the subject of colors, including the problem began to search through the following question: - Could employ computer technology (Power point) for the development of technical skills for students of art education in the subject of colors. It also included the chapter one and important goals and assumptions and boundaries and definition of terms either Chapter two guarantees the four sections, the first topic the role of educational technology in the educational process. The second topic of computer source of learning, and the third section of skill and the fourth section colors, while the third quarter included the research methodology and procedures, either Chapter four guarantees the findings, conclusions and recommendations and proposals, then said researcher training program and then sources and references.
The dependence of the energy losses or the stopping power for the energies and the related penetrating factor are arrive by using a theoretical approximation models. in this work we reach a compatible agreement between our results and the corresponding experimental results.
This paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the
... Show MorePrison and imprisonment
And their impact on the strengthening of power
In the Qur'anic perspective
The purpose of this paper is to identify environmental awareness under the Corona pandemic among students of the Faculty of Physical Education and Sports Sciences at the University of Kufa. and comparison of environmental awareness under the Corona pandemic between students of the Faculty of Physical Education and Sports Sciences at the University of Kufa. The two researchers used the descriptive approach in the style of the survey and comparisons to identify the research community in the students of the College of Physical Education and Sports Sciences at the University of Kufa for the academic year 2020-2021, who numbered (210) students, then a sample of (80) students was chosen randomly, with a percentage of (38.09%) from the research co
... Show MoreThe Reasons behind the decadence of the studies concerning the evening school in Salah al Deen A field study
The current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample.
... Show MoreAcquires this research importance of addressing the subject (environmental problems) with
age group task, a category that children pre-school, and also reflected the importance of
research, because the (environmental problems) constitute a major threat to the continuation
of human life, particularly the children, so the environment is Bmchkladtha within
kindergarten programs represent the basis of a hub of learning where the axis, where the
kindergarten took into account included in the programs in order to help the development of
environmental awareness among children and get them used to the sound practices and
behaviors since childhood .
The research also detected problem-solving skills creative with kids Riyad
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More