The personal drama in particular, and one of the key elements underlying the dramatic structure to convey ideas and visions presented by the author when writing the text of the dramatic fall after that on the way out the submission form that suits the proposals of the text and processors directorial would push the wheel of dramatic structure to the front. So take the maker of the artwork (writer) undertook the transfer of those events and personalities in art presumed sometimes real and sometimes, in order to enrich the art inspired by the human reality through the ages, and full of its themes and ideas that led to the development experiences of peoples experiences of living. Therefore, we find it important to research in the characters
... Show MoreAbstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreThe study aimed to identify the future thinking skills of university students and which of these skills are prevalent. The sample of the study consisted of (400) male and female students from the university students. In order to achieve the goals of the research, the researcher built a measure of future thinking skills based on Torrance theory (2003). Psychometric properties of the standards were extracted, which are represented by honesty and consistency and the application of the measures to the research sample. The researchers found that Future thinking skills of university students, and that the skill of future planning is the most common skill among the research sample.
Isthmus life and prepare for it
