The research aims to identify the future teachers' attitudes toward cloud computing in the Kingdom of Saudi Arabia from their point of view. The research adopted the descriptive approach, and a questionnaire was applied to a random sample of (370) male and female teachers in governmental and private general education schools in the Al-Jouf region, Saudi Arabia. The results of the research concluded that the reality of future teachers' attitudes towards cloud computing in the Kingdom of Saudi Arabia from their point of view is very high and that most areas of using computing are in the field of assessment, then teaching, and activities. The challenges of future teachers' attitudes toward cloud computing are recorded at a high level, particularly the technical challenges and personal challenges. There are also statistically significant differences at level (0.05 ≤ α) for each of the realities and challenges of using cloud computing from the point view of teachers in terms of males, government schools, and stage teachers.
The current research deals with the specificity of the interior design of the classes of art education in the schools of excellence for the province of Muthanna and its center of the city of Samawah. In the first chapter، the problem of research was determined by the lack of internal spaces of the classes of art education to designs that meet the requirements and needs of students in these educational stages. The importance of the research in being an addition to knowledge in the field of interior design and engineering department of the general directorates of the Ministry of Education. The objectives of the research were determined through.
- Identifying the reality of the halls of art education for sch
John Dewey is an American philosopher and psychologist. He is one of the primary figures of the philosophy of pragmatism. He is considered one of its founders and one of the leaders of the philosophy of pragmatism. He is one of the most famous figures of the modern education on the international level. His name is associated with the philosophy of education, because he delved in defining the purpose of education and went on talking about linking the theories with the reality without being subject to the existing system and the inherited traditions no matter how ancient they were. He is the godfather of progressive or gradual education, and he is one of the pioneers who established the experimental school in America in cooperation
... Show MoreThis research includes problems that facing the philosophy of education in the variables of knowledge and Informatics society (techno _ social).
The problematic research included three questions:
1- What are the concepts and characterization related to the problematic of relationship between the philosophy of education and informatics variables (techno - social).
2-What kind of problems facing speech philosophy of education in the variables information (techno - social)
3 - What are the perceptions of educational proposed to address problematic philosophy of education in the scope of human (human nature) and (values and morals), in addition the research may explain the co
... Show MoreIn order to specify the features of higher education process and its quantitative and qualitative development in Iraq ; one should look back at its historical process and the need of interesting with it .
Accordingly , there will be a chance for verifying the demand of the Iraqi society according to the political , social , and cultural changes especially during the national governance (1932 – 1958 ) .
For depicting the most important quantitative and qualitative development of this kind of education the period of 1932 -1958 , and since there is no previous study that tackled this topic , here comes the need of writing this paper .
After historical
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreThe communication inspiration formed an essential foundations for contribute the influence individuals and recipients, whether negatively or positively, through the messages that were published and presented in them with multiple themes and viewpoints that covered all parts of the world and all age groups; it is directed to children addressing the various stages of childhood, as it simulates many goals, including what is directed through the digital use of educational data in television production, as it is considered an intellectual and mental bag to deliver ideas and expressive and aesthetic connotations to children, where the songs and cartoons carrying data on education; within adjacent relations and in a mutual direction, both of th
... Show MoreThe present study aimed to asspssment the nutrition a program to sample of student from internal departments of Baghdad University (AL-Jadiriya Complex) and the University of AL-MustanSiriya four grades and aged (19-24) year study included 150 male and female students by (75) male and (75) of female register height, weight nd body mass index were study habits and food pattern of the same sample (150) and by aspecial form and take the personal information interviews and record information on food intake during 24 hour .noted adifference practie in the weights and longths of male and female (sample).
BMI rates were within the normal weight as the value of BMI for males aged (19- 21)and (22-24) and (22.21) and (23,37),respectively and th
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe issue of communication and communication is receiving increasing attention in both contemporary studies and educational literature, and these studies emphasize the importance of studying communication within the classroom, which inevitably applies to the importance of relationships and tensions in the field of teaching art in particular because it is an emotional field that provides an opportunity for communication competencies and skills to be prominent and take Its wide scope, both among the students themselves and between teachers and students. The means of communication are the vessel in which the cultural relations and the commonalities between people revolve. The process of building relationships between students depends in man
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More