The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticity of the tool was confirmed. The researcher adopted the idea unit (explicit and implicit) as a unit of analysis, and it was confirmed the validity and stability of the analysis. The research found that the content of the computer textbook scheduled for the second intermediate students dealt with the criteria of digital citizenship in unequal proportions, and did not take into account the balance and regulation, as the proportion of standards (digital behavior, digital communication, digital literacy, digital health and safety, digital security) respectively( 12.11%, 40.36%, 45.29%, 0.45%, 1.79%) in the textbook content, and the content of the book omitted standards (digital access, digital laws, digital trade, digital rights and responsibilities).
Set dietary program for some of dietary supplements and training for badminton young players, and identifying effect of taking some of the dietary supplementary for badminton young players. The research population :( badminton young players group (Arminian club). For age group (16-18) years the sample is divided in to two experimental groups within each group (6) players, and two for the exploratory experiment which was within the research sample, they were divided in to two groups, the first group take some of the dietary supplements (multivitamin creating) .the set exercises by the researchers in the main part of the training unit and the second group (amino acids, vitamins) and the set exercises by the researcher. The scientific approach
... Show MoreAbstract
The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result
... Show MoreOntology is a system for classifying human knowledge according to its objective characteristics and hierarchical relations through building clusters or that bear common characteristics. In digital environments, it is a mechanism that helps regulate a vast amount of information by achieving a complete link between sub-thematic concepts and their main assets. The purpose of this study is to survey the previously conducted studies that use ontology in organizing digital data on social networking sites, such as the search engines Yahoo, Google, and social networks as Facebook and their findings. Results have shown that all these studies invest ontology for the purpose of organizing digital content data, especially on
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreWrestling Judo, one of the sports that have seen greatdevelopment in recent years in the world, requiring preparationphysically special, which is to be determined physical aptitude of thebad functional efficiency of the heart and lungs, Efficient physicalclosely linked to the ability of the player performance, as the physicalaptitude to play an important role the possibility of control over theaspects and physical skills during training and competition.The study aims to determine the effect of training on anaerobicendurance according to the average (30-60 sec) in the development ofphysical aptitude for judo players. Used a much more extremeexperimental method on a sample was Blaabat national teamwrestling judo and numbers of 16 for the play
... Show MoreIn this paper, we use the repeated corrected Simpson's 3/8 quadrature method for obtaining the numerical solutions of Fredholm linear integral equations of the second kind. This method is more accurately than the repeated corrected Trapezoidal method and the repeated Simpson's 3/8 method. To illustrate the accuracy of this method, we give a numerical example
The problem of slow learning in primary schools’ pupils is not a local or private one. It is also not related to a certain society other than others or has any relation to a particular culture, it is rather an international problem of global nature. It is one of the well-recognized issues in education field. Additionally, it is regarded as one of the old difficulties to which ancient people gave attention. It is discovered through the process of observing human behaviour and attempting to explain and predict it.
Through the work of the two researchers via frequent visits to primary schools that include special classes for slow learning pupils, in addition to the fact that one of the researcher has a child with slow learning issue, t
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More