Problem: Find dimensions of the problem by answering the following question: what the effect of using the Six Thinking Hats strategy to acquire the historical concepts and retain the fourth-grade students in the subject of literary history. Importance of research: current research is gaining importance in many ways, including: 1. Keep pace with the new in the field of education and modern educational strategies. 2. Shed light on innovative education strategy in the teaching of history, which is one of the materials that need to renew the tragedy of instruction methods for students. 3. Out of the monotony and traditional way of teaching to a method and a new strategy to develop the teacher and the learners thinking skills through various educational situations they face, and how it is Accustomed to reflect on the attitudes and problems, and get rid of negative thinking-oriented. 4. Results of this study can contribute to the Testimony of workers to form a history in how the content of the article and in accordance with modern strategies for learning, that develop various aspects of the learner. Aim: The aim of the present research to investigate the effect of the use of Six Thinking Hats strategy on the acquisition of historical concepts and retention of students in fourth grade in the subject of literary history. Hypotheses: 1. No statistically significant differences at the level (0.05) between the average scores of students who studied using the six hats and strategy between the average scores of students who studied using the traditional method in the achievement test. 2. No statistically significant differences at the level (0.05) between the average scores of students who studied using the six hats and strategy between the average scores of students who studied using the traditional method of testing retention. Search limits: 1. Oaadadiat one of the city of Baghdad for the academic year 2010-2011. 2. Sample of students in fourth grade preparatory - literary branch. 3. Doors (the first, second, third, fourth, fifth) book on the history of the Arab Islamic civilization of the fourth grade literary edition in 2010. 4. Strategy Six Thinking Hats. Search Results: 1. There were significant differences at the level (0.05) between the mean scores of students who studied using the six hats and strategy between the average scores, which studied the traditional way in the achievement test. 2. There is a statistically significant difference between the two sets of research at the level of significance (0.05) for the experimental group which studied the strategy of using the six hats to control who has studied using the traditional method (normal) in the retention test (retention).
The political system in Indonesia, since gaining independence from the Dutch colonialism on the seventeenth of August 1945, has gone through long stages. The Indonesian constitution stipulated that the country is based on a democracy. In 1956 the first free elections were held in Indonesia, and President Sukarno announced the adoption of the directed democratic system Then, during the era of President Suharto, the state entered a phase called democracy based on the Five Pancasila principles, which is a false democracy because it served the interests of Suharto, who in his long reign had political and economic corruption leading up to 1998, when the Indonesian people revolted, and the government of Soeharto was overthrown
... Show MoreThe media plays an important role in a number of functions performed by them. Press is one of those media which had and still have a clear role in addressing the various issues, topics, and events. Journalism is no longer as expressed by owners of the liberal theory – it seeks to raise the instincts – but it began to excite the minds of readers to meet their needs. At the same time, it does not neglect the search for the truth and work to deliver it to readers. Some have identified a set of tasks carried out by the press including the interest in public affairs, the needs of the community, work to provide happiness, what is beneficial and useful and combat the negative phenomenon and to address the deviations facing society. The comi
... Show MoreThe study aimed to show the jurisprudential impact of the multiplicity of directing the syntactic movement of the Qur’anic readings, and it was based on the inductive, descriptive and analytical approach. , such as the difference in explaining the ruling on washing the feet, and the one who meditates on the Qur’anic readings notices in it a picture of the Qur’anic miracles, and this is what is manifested by the brevity of the speech. Collapse the research, and the research tried to trace the Qur’anic readings, contained in the verses, and the readings were limited to what is related to the explanatory meaning mentioned by the commentators, by clarifying the explanatory relationship between the Qur’anic readings and the me
... Show MoreThis article aims to identify the traditional industries and crafts that exist in the old city of Sana’a in Yemen. It also aims to explain the pioneering role that these industries play in attracting tourism,
أجري البحث لمعرفة الملوثات الميكروبية الموجودة على قشرة وفي صفار وبياض بيض الدجاج المحلي ، السوري ، التركي ، الاوكراني ، حيث جمعت العينات بمعدل 10 بيضة من الاسواق الشعبية في محافظة بغداد . أظهرت النتائج أن بكتريا السالمونيلا واضحة في صفار البيض التركي . وفي قشرة وبياض وصفار البيض الاوكراني . كما أظهرت نتائج فحص البيض
This research paper is about synoptic climate specifically with in the upper air layers
using upper air layers maps analysis which are maps of thickness for the level 1000 – 500
MB, that their high average ranges between 100 – 5600 M above surface. This research paper
focuses on studying special and temporal variations of the atmosphere thickness above Iraqaccording
to this study, it is concluded that atmosphere thickness above Iraq increases
towards south with an average of 100 M as compared with north of Iraq. Regarding the
temporal variations, it is concluded that atmosphere thickness during hot months. In July, for
example, the atmosphere thickness becomes thicker than in January with an average of
(250)M
This study aimed to statement jet stream and its impact in the anti-cyclone affecting the climate of Iraq. Through the use of simple correlation coefficient ( Pearson ) that there is a very strong relationship between high- Siberian and both of the jet stream especially during the winter or over the stations of North . Therefore we, observe the relationship be significant in most of the winter months , spring and autumn . Statistically significant , but are different between station and another station , while the study come to another Anti-ciyclon have a real ,significant and statistically relationship corrclation . But this relationship is less than which found in are much less it with the Siberian high , it depends on the type of stat
... Show MoreAbstract
Tourism is one of the essential economic fields of many countries, both developed and developing. The social plays a greater role in the continuous awareness of a tourist culture based on the need to attract tourists continuously. the tourism heritage and state-owned tourism are the main factors in attracting more tourists. The interest in this strategic sector makes the country the first and most active framework in the development of appropriate mechanisms for investment in this sector, all within the framework of sustainable development of society through the rational use of resources obtained by various bodies in the implementation of seve
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More