Public spending represents the government’s financial leverage and has a significant impact on real and monetary economic variables, and one of these effects is the effect of public spending on the exchange rate as an important monetary variable for monetary policy, As we know that public spending in Iraq is financed from oil revenues sold in US dollars, and the Ministry of Finance converts the US dollar into Iraqi dinars to finance the government's need to spend within the requirements and obligations of the state's general budget, And converting the US dollar into Iraqi dinars has an impact on the parallel exchange market, even if there is a contractual exchange rate between the Ministry of Finance and the Central Bank of Iraq to convert the budget dollar into Iraqi dinars. However, the impact of public spending on reserves makes financial shocks have a significant impact on the exchange rate. The researcher believes that there is a reciprocal relationship between the effect of public spending on the exchange rate and the impact of the exchange rate on public spending because the conversion compass between the dollar and the dinar leaves great effects on public spending in the state’s general budget, and this is what the researcher achieved by using modern standard software to discover the nature of the relationship between public spending and the price of Exchange in the parallel market with realistic monthly data taken from the official website of the Central Bank of Iraq.
يكشف هذا المقال عن مشكلة الصفات ذات المكون الكمي والتي تعتبر واحدة من اقوى الموارد المكونة للكلمات التعبيرية والتقويمية و يتم تحليل التركيبات الدلالية ذات الاوجه المتعددة التي تنشا من عملية توظيف الصفات المشتقة بمساعدة اللواحق والتي تدل على الاتجاه العام للغات السلافية وذلك لتطوير الدلالات العاطفية والتقييمية في الكلمات ذات معنى الميزة او الخاصية يتم تقديم تعريف انماط تكوين المعاني الضمنية في دلالات
... Show MoreIn recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen
... Show MoreThe research aims to demonstrate the impact of internal audit in Iraqi economic units on enhancing social performance reports, through the statistical models used, as a survey list (for the independent variant) of the search, which contains five axes of each axis, contains a set of The questions were prepared on the basis of the standards issued by the Institute of Internal Auditors (IIA) and were distributed to a sample of internal auditors, as for (for the approved variable) the researcher obtained numerical data represented by the financial statements of the research sample and used statistical models such as model (Kolmakrov-Smirnov) is a good match (goodness of fit) which assumes that the data is distributed naturally as wel
... Show MoreWe have chosen the subject of the research (the letters at Ibn Jinnie in the lexicon of the tongue of the Arabs) in order to know the opinion of Ibn Jinnie in this range of words and compare them with the opinions of scientists who preceded him to know the personality of this linguistic world.
The following dilutions -710X46, -610X46, -510X46 of Bacillus thuringiensis were used for bioassay against the different larval instar of the potato tuber moth Phthorimaea operculella by the spraying method, the results showed that there was no significant influence in the percentage of egg hatching in comparison with the control. The sensitivity of larval stages was reduced with the increasing the age and exposure period. The study also showed that the larvae infected with B.t. stopped feeding, movement and a general paralysis causing the death of larva after (24-48) hours , and the larva color was changed from the natural waxy colour to brown finally to the black after death.
Abstract Objective: The aim of this study is to evaluate the level of the anatomical knowledge of undergraduate students in Nursing collage/Baghdad university.Methodology:The sample was collected by symmetrical probability. Research sample includes (197)students represent four classes which is distributed as following: fifty students represent first class, fifty students represent the second class, forty nine students represent the third class,&fourty eight students represent the fourth class. Results:The study concludes that the anatomical knowledge level for collage students is intermediate .The m
The Messengers and the Imam of the God-fearing, Muhammad is God, his family, and all of his companions. As for what comes after... Fainting is one of the involuntary symptoms and states that occur to a person when carrying out his life’s tasks suddenly due to his loss of sense and movement, so he loses consciousness for a period of time that is short or may be long, and the person is held accountable and responsible for every moment of his life. He is required to perform duties specified by Sharia law, such as prayer, fasting, and Hajj...and fainting prevents him from performing these actions. We must consider the opinions of jurists and know the legal implications resulting from it. It was said that a person has a capacity that enable
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More