The present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
colleges to steer those with caution cognitive method in adapting to environmental changes,
especially at college, through the development of programs to promote effective behavior.
The study aims to identify the effectiveness of employing microteaching in acquiring teaching skills of students teaching basic stage in Al-Aqsa University. The two researchers used the experimental method and a quota sample consisted of a group of (80) students who were distributed on the university two branches in Gaza and Khan younis and on males and females equally, and on four teaching courses counted (20) students for each. The study tool represented in an observation card ,and the results showed statistically significant differences between the level of all the skills of teaching and between the standard rate (75%) in favor of teaching skills, also showed statistically significant differences attributed to the variable of the univ
... Show MoreThe aim of the research is to know the effect of a training program based on interactive teaching strategies on achievement and creative problem solving among fourth-grade students in chemistry of the directorate of education Rusafa first, the sample was divided into two groups, one experimental and numbering (29) students and the other control group numbering (30) students. The experimental group underwent the training program in the first semester of the year (2021-2022) and the control one studied according to the usual method. Two tools were built, the first being an academic achievement test consisting of (40) multiple-choice items, and the second a test of creative problem-solving skills in a chemistry subject and consisting o
... Show MoreThe present research aims at identifying the impact of S.N.I.P.S strategy on the achievement of fifth grade students in natural geography
For the purpose of verifying the objective of the research, the researcher put the following zero hypothesis: There is no statistically significant difference at the level of (0.05) between the mean score of experimental group who study according to the (S.N.I.P.S) strategy, and the mean score of control group who study according to the traditional method in the achievement test.
In order to verify the validity of this null hypothesis, the researcher adopted the experimental method. Two groups of (60) fifth grade literary students were collecte
... Show MoreA total of 48 experiments were conducted to investigate the impact of slit weir dimensions and locations on the maximum scour depth and scour area created upstream. The slit weir model was a 110 mm slit opening, and it was installed at the end of the working section in a laboratory flume. The flume was 10.0 m long, 30 cm wide, 30 cm deep, and almost middle. It includes a 2 m working section with a mobile bed with 110 mm in thickness. In the mobile bed, two types of nonuniform sand (with a geometric standard deviation of 1.58 and 1.6) were tested separately. The weir dimensions and location were changed with flow rates. Then dimensions of the slit weir were changed from 60 x 110 mm to 60 x 70 mm (width x height), while th
... Show MoreInformation and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality,
... Show MoreInvestigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data
The current study aims to investigate the second cycle students’ motives for using electronic games in Oman. The sample consisted of (570) students, (346 males and 224 females). The participants completed an open-ended question which was analyzed based on ground theory. The results showed that (46.820%) of the males and (77.678) of the females played electronic games for pleasure, entertainment, and fun. This first category of motivation got the highest percentage of frequency (58.947%). The motive to become a hacker, a popular YouTuber got the lowest percentage (2.280%). Other students’ motives toward playing electronic games included: filling the leisure time, overcoming boredom, feeling adventures, getting science fiction and chal
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).