The purpose of this study is to assess the level of computer literacy of the students at AlQuds open university in Tulkarm Branch. The study investigates the effects of the variables of gender, specialization, academic level, owning a personal computer, internet communication, and own an email account on the level of computer literacy. A test of computer literacy was constructed by the researchers consisting of (37) multiple choice items with a reliability rate (0.85). The study population consisted of (4100) students, while the sample contained (352) students. The study revealed that the level of computer literacy of the students at AlQuds Open University in Tulkarm Branch was (66.2 %) which is educationally acceptable. It also indicated that there are statistically significant differences due to gender, specialization, own an a personal computer, internet communication, and own an email account to the benefit of technology and applied science. Finally, the study revealed that there are no statistically significant differences due to academic level.
Among the imams who honor the soil of Iraq by embracing their remains is Imam Al-Qasim Ibn al-Imam Musa Ibn Ja'far ibn Muhammad ibn Ali ibn al-Hussein ibn Ali ibn Ali ibn Abu Talib, Amir of the believers Al-Kadhim (may peace be upon him ), the mother of the sons and the mother of his brother Imam Ali ibn Musa al-Rida (may peace be upon him), buried in the Holy QOM (1)It is one of the doors of need for Shiite Muslims All the stories of imams are similar in terms of injustice
In this research I like to shed light on the mind because of its importance because it is what distinguishes Human from all other animals and that the question and status comes from his role in the formulation of knowledge and science where the machers agreed that the word of mind in its general sense is the source of thought and thought and the instrument of faith and philosophy , Then to the statement of the various stages pass
... Show Moreان تحقيق التطوير المطلوب في التعليم الجامعي يستلزم القيام ببحوث علمية تساعد في الوصول الى معادلات سليمة لأحداثه، وتجنب سلبيات التغيير غير المدروس وغير المخطط علميا ، والبحث الحالي هو محاولة في هذا الأتجاه، ويهتم بوضع خطوط عريضة تتضمن مجموعة الآراء والأفكار والتوجهات ذات الاهمية لتطوير دور التعليم العالي في تنمية العلم والتكنولوجيا، والتنمية البشرية ، أيضا في توجيه
... Show Moreالعراق في مواجهة متطلبات الانضمام الى منظمة التجارة العالمية
يعد الذكاء الاصطناعي من العلوم الحديثة التي ارتبطت بالإنسان منذ العقود الخمسة الماضية، ولتصبح السياسة الرقمية الاقتصادية جزءاً لا يتجزأ من المجتمع، لكونها خرقت أغلب مجالات حياة الانسان. وهذا ما شجع صانعوا السياسات التكنولوجية الجديدة في التفكير بكيفية توظيفه لخدمة مصالحهم الاقتصادية العُليا، بغض النظر عن بذل الجهود للتفكير في مصالح الانسان الاقتصادية وتنظيمهم ومراقبة الذكاء الاصطناعي التوليدي. لقد أيقن
... Show MoreThe science of exegesis was started by the first teacher, the Holy Prophet, and then further developed in various methods and approaches through history
This search modest deviation personal than to doubt that the event was not guilty by nature or offenders of evil in origin but is arictim of misfortune that makes him grow or live in the center of the corruption, even if he could be in the middle of the blessing of good and virtue and reform lived living righteousness and honor it was a useful member for himself and his community and must state and family community take hands mnhrfaite in order to prevent and provide then
Bohemia AL-Kharab for Salah Salah Which contain 477Paper deal With History of Nathion This Novel Has a different styl from another IraQis Novels, this Novel has no conversation this is the basic reason Which hav this research .
The novel have 3 versions , the first one deal with explain the text in different ways , the second contains the realation ship between the text and the reader .
Which appear very clear in novel from up to down , whil the third one and the last explaine
The hermonologiq
The time bylose the relation in the novel.
The last thing is the conclusion which has the simple things conclude by the researcher from several readings to the novel
<
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show More