Evaluation is one of the most important elements of teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample consisted of (134) elementary basic school teachers in the Gaza governorate in Palestine. Results have shown that the percentage of knowledge of alternative evaluation tools reached (77.7%), which is a high level, and that the percentage of using alternative evaluation tools reached (70.3%). As it is seen, the percentages do not vary according to variables, such as: gender, educational qualification, specialization, classes taught by the teacher, years of service, type of school, gender of school students, educational region, and taking training courses. Howerver, the degree of usage of such alternative tools varies in favour of basic education. The study recommends continuing to motivate primary school teachers to employ alternative assessment tools, and to support them with courses and workshops that enhance their skills in employing these tools
This study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreProblem: Find dimensions of the problem by answering the following question: what the effect of using the Six Thinking Hats strategy to acquire the historical concepts and retain the fourth-grade students in the subject of literary history. Importance of research: current research is gaining importance in many ways, including: 1. Keep pace with the new in the field of education and modern educational strategies. 2. Shed light on innovative education strategy in the teaching of history, which is one of the materials that need to renew the tragedy of instruction methods for students. 3. Out of the monotony and traditional way of teaching to a method and a new strategy to develop the teacher and the learners thinking skills through various
... Show Moreاستخلص عامل التلزن من E. faecalis EM1 بعد تكسير بالكرات الزجاجية والترسيب بالكحول الاثيلي , واجري فحص التلزن وقياسه لمستخلص لخلايا E. faecalis مع انواع من البكتريا السالبة لصبغة غرام تضمنت Escherichia coli و Klebsiella pneumonia و Serratia marcescens و Pseudomonase aeruginosa و Salmonella typhi , بينت النتائج ان اعلى نسبة تلزن للخلايا والمستخلص تكون مع بكتريا ٍK. Pneumonia حيث بلغ66.5 % مقارنة بالسيطرة79.5 % , واوطا قيمة للتلز
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
The corrosion behavior of 2024 aluminium alloy was investigated in alkaline medium (pH=13) containing 0.6 . in absence and presence of different concentrations of three amino acids separately [Methionine, Glutamice acid and Lysine] as environmentally friendly corrosion inhibitors over the temperature range (293-308)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency increased with an increase of the inhibitor concentration but decreased with increase in temperature . The maximum efficiency value was found with lysine =80.4 of 293 k and 10 . concentration of lysine. The adsorption of the amino acids was found to obey Langmuir adsorption isotherm . Some thermodynamic parameter âˆ
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreThis book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.