The aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternatives in girls ’schools is higher than that of boy’s schools. It has also been concluded that professional development did not differ according to specialization, and it did not differ in different education offices.
Among the imams who honor the soil of Iraq by embracing their remains is Imam Al-Qasim Ibn al-Imam Musa Ibn Ja'far ibn Muhammad ibn Ali ibn al-Hussein ibn Ali ibn Ali ibn Abu Talib, Amir of the believers Al-Kadhim (may peace be upon him ), the mother of the sons and the mother of his brother Imam Ali ibn Musa al-Rida (may peace be upon him), buried in the Holy QOM (1)It is one of the doors of need for Shiite Muslims All the stories of imams are similar in terms of injustice
In this research I like to shed light on the mind because of its importance because it is what distinguishes Human from all other animals and that the question and status comes from his role in the formulation of knowledge and science where the machers agreed that the word of mind in its general sense is the source of thought and thought and the instrument of faith and philosophy , Then to the statement of the various stages pass
... Show Moreان تحقيق التطوير المطلوب في التعليم الجامعي يستلزم القيام ببحوث علمية تساعد في الوصول الى معادلات سليمة لأحداثه، وتجنب سلبيات التغيير غير المدروس وغير المخطط علميا ، والبحث الحالي هو محاولة في هذا الأتجاه، ويهتم بوضع خطوط عريضة تتضمن مجموعة الآراء والأفكار والتوجهات ذات الاهمية لتطوير دور التعليم العالي في تنمية العلم والتكنولوجيا، والتنمية البشرية ، أيضا في توجيه
... Show Moreالعراق في مواجهة متطلبات الانضمام الى منظمة التجارة العالمية
يعد الذكاء الاصطناعي من العلوم الحديثة التي ارتبطت بالإنسان منذ العقود الخمسة الماضية، ولتصبح السياسة الرقمية الاقتصادية جزءاً لا يتجزأ من المجتمع، لكونها خرقت أغلب مجالات حياة الانسان. وهذا ما شجع صانعوا السياسات التكنولوجية الجديدة في التفكير بكيفية توظيفه لخدمة مصالحهم الاقتصادية العُليا، بغض النظر عن بذل الجهود للتفكير في مصالح الانسان الاقتصادية وتنظيمهم ومراقبة الذكاء الاصطناعي التوليدي. لقد أيقن
... Show MoreThe science of exegesis was started by the first teacher, the Holy Prophet, and then further developed in various methods and approaches through history
This search modest deviation personal than to doubt that the event was not guilty by nature or offenders of evil in origin but is arictim of misfortune that makes him grow or live in the center of the corruption, even if he could be in the middle of the blessing of good and virtue and reform lived living righteousness and honor it was a useful member for himself and his community and must state and family community take hands mnhrfaite in order to prevent and provide then
Bohemia AL-Kharab for Salah Salah Which contain 477Paper deal With History of Nathion This Novel Has a different styl from another IraQis Novels, this Novel has no conversation this is the basic reason Which hav this research .
The novel have 3 versions , the first one deal with explain the text in different ways , the second contains the realation ship between the text and the reader .
Which appear very clear in novel from up to down , whil the third one and the last explaine
The hermonologiq
The time bylose the relation in the novel.
The last thing is the conclusion which has the simple things conclude by the researcher from several readings to the novel
<
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show More