الملخص - يهدف البحث الحالي الى تعرف اتجاهات مدرسي ومدرسات المدارس الثانوية نحو التربية الجنسية والتعرف على اثر متغير الجنس (ذكور، إناث) في تكوين اتجاهات تدريس التربية الجنسية في التعليم - الثانوي فضلاً عن تعرف التطبيقات التربوية للتربية الجنسية في المدارس الثانوية ، إذ ان التربية الجنسية واحدة من أهم فروع التربية في الإسلام , وهي ذات أهمية في نشر الوعي الديني والصحي والتربوي والاجتماعي والثقافي في المجتمع من خلال تقديمها على وفق أسلوب شرعي وتربوي وديني وعلمي يساعد إفراد المجتمع على فهم التربية الجنسية ويمدهم بالخبرات ألصالحه والاتجاهات السليمة وفق تعاليم الدين ومعايير وقيم المجتمع ، وقد اقتصر تطبيق البحث على المدرسين والمدرسات لمعرفة اتجاهاتهم نحو تدريس مفاهيم التربية الجنسية في مدارس التعليم الثانوي و تم تطبيق البحث على عينه من المدرسين والمدرسات في مديرية التربية في الكرخ والرصافة في مدينه بغداد وقد بلغ عدد إفراد العينة ( 167) من مختلف مدارس المديريتين . وكانت نتائج البحث : - ان المدرسين يمتلكون اتجاهات ايجابية نحو تدريس موضوعات التربية الجنسية في المدارس و يعزى الباحث هذا الاتجاه الى ان التطور التكنولوجي و انتقال المعلومات لم تعد مخفية و بإمكان طلبتنا الحصول عليها , و لذلك يرى المدرسون ان تكون التربية الجنسية ضمن المقررات الدراسية أفضل و أكثر فائدة . - توجد فروق ذات دلاله إحصائية عند مستوى(0,05) بين متوسطات إجابات المدرسين والمدرسات نحو تدريس موضوعات التربية الجنسية في المدارس بحسب متغير الجنس ولصالح المدرسات ( الإناث ) . - وطبقاً لذلك تم وضع جملة من التطبيقات التربوية . - الكلمات المفتاحية : ( اتجاهات ، التربية الجنسية ، تطبيقاتها التربوية ) .
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show More
Abstract: Narrow laser pulses have been essential sources in optical communication system. High data rate optical communication network system demands compressed laser source with unique optical property. In this work using pulsed duration (9) ns, peak power 1.2297mW, full width half maximum (FWHM) 286 pm, and wavelength center 1546.7 nm as compression laser source. Mach Zehnder interferometer (MZI) is built by considering two ways. First, polarization maintaining fiber (PMF) with 10 cm length is used to connect between laser source and fiber brag grating analysis (FBGA). Second, Nested Mach Zehnder interferometer (NMZI) was designed by using three PMFs with 10 cm length. These three Fibers are splicing to sing
... Show MoreAbstract: Objectives: To investigate the effect of temperature elevation on the bonding strength of resin cement to the zirconia ceramic using fractional CO2 laser. Background: Fractional CO2 laser is an effective surface treatment of zirconia ceramic, as it increases the bonding strength of zirconia to resin cement. Methods: Thirty sintered zirconia discs (10 mm diameter, 2 mm thickness) were prepared and divided to three groups (N=10) and five diffident pulse durations were used in each group (0.1, 0.5, 1, 5 and 10 ms). Group A was treated with 10 W power setting, group B with 20 W and group C with 30 W. During laser irradiation, temperature elevation measurement was recorded for each specimen. Luting cement was bonded to the treated z
... Show MoreIn today's world the role of leadership in the control factors of the organization different and advancement, and that the possession of the human ability to the development and creation and innovation varies from one individual to another depending on experience; and levels of performance and intellectual; and his mental and physical and other such factors can create a kind of differentiation between the built humans, and this distinction creates our leaders are able to influence others and have the wisdom and connect active individuals and organizations. as the need for organizations of all sizes and levels of leadership transformation is an urgent need to link the application of the various plans and strategies device which direction
... Show MoreThis study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.
The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th
... Show MoreThe present study includes the effect of the ethanolic and aqueous extract of Piper nigrum against the third instar of Culex pipiens molestus (Diptera:Culicidae) in different concentrations: 1, 1.5 ppm of ethanolic extracts of Piper nigrum causing 100% mortality of larvae in the second day of treatment, while the concentrations 5% of aqueous extracts of Piper nigrum caused 100% mortality of larvae in the second day of treatment. The concentration 2.5% caused 100% mortality of larvae after four days of treatment. The current study also detected the effect of 0.1% concentration of Piper nigrum aqueous extract. The effect of this concentratio
... Show MoreThe research aims to build an educational program - learning, according to the concepts of renewable energy and nanotechnology And knowledge of its impact on the technological enlightenment when the third phase students in the Department of Chemistry, and to verify the goal and put the researcher null hypothesis the following: No Statistically significant difference at the level (0.05) between the average scores of the experimental group students who are studying material nanotechnology and renewable energy program Altalima- learning and the average score for the control group of students who are studying the same article the usual way in technological enlightenment. The search was limited to the third row in the Department of Chemistry,
... Show MoreBobbin friction stir welding (BFSW) is a variant of the conventional friction stir welding (CFSW); it can weld the upper and lower surface of the work-piece in the same pass. This technique involves the bonding of materials without melting. In this work, the influence of tool design on the mechanical properties of welding joints of 6061-T6 aluminum alloy with 6.25 mm thickness produced by FSW bobbin tools was investigated and the best bobbin tool design was determined. Five different probe shapes (threaded straight cylindrical, straight cylindrical with 3 flat surfaces, straight cylindrical with 4 flat surfaces, threaded straight cylindrical with 3 flat surface and threaded straight cylindrical with 4 flat surfaces) with various dimensio
... Show MoreThe financial statements must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74) 2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2 concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision at a rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years .also from the significance of the issue of real estates that become a property of banks as a result of debt settlement and the pr
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More