This study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study. It further suits research papers that deal with educational problems. The study has concluded that modern educational technologies are highly recommended to be used in teaching languages. Such technologies further meet the learners’ needs in terms of achieving special and behavioral goals, supporting the educational content, and activating the teaching methods to achieve the general goals of the educational process if attention was paid to the way they are used and to their governing rules. The study has also concluded that the most important obstacles in teaching using technology are lack of training, ignorance and lack of knowledge of the methods and of employing them in the educational situation. The study has recommended the necessity of having a good preparation for the educational process based on technology, and working to provide, update and follow-up on its maintenance. More so, the interest in teaching Arabic to non-native speakers through employing modern technologies in proportion to its elements and skills should be enhanced.
Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you
... Show MoreBackground:Periodontal diseases and dental caries are the most common oral diseases, but they can be adequately prevented by adopting a specific health behavior and plaque control.The study was carried out to determine and compare oral health status; it included both caries experience, gingival health and oral hygiene behavior betweenfirst and fifth yearsof Al-Mustansiriyahdental students. Materials and methods: Total sample of the study consisted of 50 students at first year (25 males, 25 females)and 60 students at fifth year (30 males, 30 females). Plaque andgingival indices,dental caries indices (DMFS and DMFT) wererecorded to evaluateoral health status for each student. Further questionnaires were given to evaluate different oral hyg
... Show MoreRadioactive elements were identified in samples of imported coffee consumed in the province of Basra using gamma spectrometry SAM940TM. It is a scintillation detector of NaI(Tl) crystal and the dimensions of 2×2 inch. We have identified specific concentration As(Bq/kg) and annual effective dose D(Sv/y) for radioactive elements (_^40)K, (_^131)I, (_^134)Cs and (_^137)Cs. The estimated average effective dose for adults from coffee samples were found to be 0.037mSv/y, 88.434nSv/y, 46.909nSv/y, 27.212nSv/y for ((_^40)K,(_^131)I,(_^134)Cs,(_^137)Cs) respectively. The present results of the study revealed that the radioactivity was relatively low in the coffee and within the permissiblelimit.
Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show MoreThe university Service employee is considered one of the categories of public employees, However, The academic and administrative tasks duties that undertakes have made him a special importance and a distinguished legal status, Therefore, we find That the Iraqi legislatures assigned this category a special Law, it is the university Service law No (23) of 2008 as amended who dealt with some aspects related to serving this category, such as duties, right, condition for appointment and award of academic titles, and financial allocation, such as university service allocation, academic title allocations, and some other Provisions leaving other matters to the general service laws and employee discipline, among the matters that the legislator negl
... Show MoreThe study aims to reach a common point that achieves a balance between two interests, which are generally in conflict with the public interest and the interest of the individual owner of private property, by extrapolating the provisions of the constitutional judiciary that include the protection of private property, and this protection extends to every right of financial value and is not limited to a specific type, but It included everything that can be estimated with money, as ownership is no longer an advantage for the owner, but rather has become a right for him and a social function. The tax is imposed on what is derived from it, but if there is a need to prejudice it, the conditions, limits and restrictions expressly stipulated in the
... Show MoreThe study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo