هدف البحث إلى تصميم برنامج الكتروني للرحلات المعرفية عبر الانترنيت (web quest) المصاحب لمنهج تعليمي معد للدروس العملية بكرة اليد لطالبات المرحلة الثانية، والتعرف على تأثيره في التحصيل المعرفي بكرة اليد لديهن، وأُعتمد المنهج التجريبي بتصميم المجموعتين التجريبيتين والمجموعة الضابطة على عينة من طالبات المرحلة الثانية في كلية التربية البدنية وعلوم الرياضة/جامعة بغداد للعام الدراسي (2021- 2022)، البالغ عددهن (60) طالبة تم اختيارهن عمدياً بنسبة (34.09)% من مجتمعهن الكلي، وقسمت عشوائياً منهن (45) طالبة على كل مجموعة من مجموعات البحث الثلاث وبعددٍ متساوٍ، وتم تحديد اختبار المجال المعرفي وتصميم برنامج الكتروني للرحلات المعرفية عبر الانترنيت (web quest) بكرة اليد على وفق خطوات منهجية متسلسلة، ومن ثم إجراء التجربة الرئيسة على وفق محددات التصميم التجريبي، واستغرقت المدة الزمنية للبحث من (17/12/2022) ولغاية (25/3/2022 )، وبعد انتهاء التجريب تمت معالجة البيانات بنظام (SPSS)، لتكون الاستخلاصان والتطبيقات إن تصميم برنامج الرحلات المعرفية (web quest) عبر الإنترنيت يصلح لتدريس مادة كرة اليد وملائم لطالبات المرحلة الثانية، ويساعد البرنامج الرحلات المعرفية (web quest) عبر الإنترنيت على تمكين طالبات المرحلة الثانية من تحسين مستوى المجال المعرفي بكرة اليد لديهن، ويتفوقنَّ على تحسين مستواه لدى الطالبات المُتعلمات بدونها، ولابد من الاهتمام باعتماد التطبيقات العملية للمعلومات المقدمة بوساطة برنامج الرحلات المعرفية (web quest) عبر الإنترنيت لمادة كرة اليد ليلائم طالبات المرحلة الثانية في كلية التربية البدنية وعلوم الرياضة.
ملخـــص البحــــث
ان اختلاف الناس في أديانهم في نظر الإسلام أمر طبيعي؛ لاختلاف عقولهم ومداركهم وأصول تربيتهم، لذلك يبين القرآن الكريم أنَّه سنة ماضية في جميع الخلائق، ومع هذا الاختلاف في الأديان والعقائد فإن ذلك لا يقتضي انعزال المجتمع المسلم عن غيره من المجتمعات؛ لأنَّه مدعو إلى التعارف والتلاقي مع جميع الناس، وتبليغ دعوة الله ورسالته، مما يؤدي إلى اختلاط المجتمع المسلم بغ
... Show More
In The Bluest Eye (1970), the American-African writer, Toni Morrison explores how
Western standards of ideal beauty are created and propagated with and among the black
community. The novel not only portrays the lives of those whose dark skinned and Negroid
features blight their lives; it also shows how the standard of white beauty, when imposed on
black youth, can drastically damage one’s self-love and esteem which usually occurs when
beauty goes unrecognized. Morrison in this novel focuses on the damage that the black
women characters suffer through the construction of femininity in a racialised society where
whiteness is used as a standard of beauty.
In The Bluest Eye (1970) , Toni Morrison addresses a timeless problem of white racial dominance in the United States and points to the impact it has on the life of black females growing up in the 1930's. Morrison in this novel explores how Western standards of ideal beauty are created and propagated with and among the black community. The novel not only portrays the lives of those whose dark skinned and negroid features blight their lives; it also shows how the standards of white beauty are imposed on black youth to cause a damage of one's self-love and esteem which usually occurs when beauty goes unrecognized
A preliminary test single stage Shrinkage (PTSSS) techniques is used for estimation the scale parameter q of an exponential distribution when a prior knowledge about q is a available in the form of initial estimate q0 of q. It is proposed to estimate q by a testimator that is based upon the result of a test of the hypothesis H0 :q = q0 against the hypothesis HA
... Show MoreDespite scholars’ attention on the typology of modality as a linguistic phenomenon, yet the use of modality across varieties of English is not well visible in communication-based researches that take semantics, pragmatics and discourse issues as the objects for their investigation. The paper generates its data from six M. A. dissertations from Nigerian University and equal number of the M. A. dissertations from Iraqi University to qualitatively and quantitatively investigate the contextual use of modality within the pragmatic perspective. The data analysis reveals that modality such as usuality, potentiality, necessity, probability and obligation in the dissertations encapsulates interpersonal and authorial voice in which the mean
... Show MoreIn linear regression, an outlier is an observation with large residual. In other words, it is an observation whose dependent-variable value is unusual given its values on the predictor variables. An outlier observation may indicate a data entry error or other problem.
An observation with an extreme value on a predictor variable is a point with high leverage. Leverage is a measure of how far an independent variable deviates from its mean. These leverage points can have an effect on the estimate of regression coefficients.
Robust estimation for regression parameters deals with cases that have very high leverage, and cases that are outliers. Robust estimation is essentially a
... Show Moreتأثير الآرامية على العبرية
The Problem of the research is Limited with the ambguity of environmental work Characterstics role and among them the natural Working Conditions: Temproture, Lighting, Noise, Colours,and Smells, in the Decisions that rule the Planning and Designing work of the industrial Location and it 's targets are Limited with discovering the effect of environmental work Characterstics in planning and designing the industrial Companies and to reach to the most important properties that distinguish the industrial Location Within the frame of dealing with the nature Conditions in the dry, hot regions and the dfining of the relationship between them on the assumption that the Characterstics of environmental work have agreat effect in
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More