المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : موضة 2013 فساتين سهرة 2014 لانجري 2014


الصفحات : 1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53

  1. 1. Define Ethernet stating its standard? (3 marks)
  2. 2. What is the history of Ethernet? (3 marks)
  3. 3. What is the media access control method used in Ethernet? Explain it? (8 marks)
  4. 4. What is MAC address? (4 marks)
  5. 5. Four fast categories of Ethernet standards are 1000Base-EX, 1000Base-ZX, 1000Base-T and 1000Base-TX, what are the differences between them in terms of medium and range? (8 marks)
  6. 6. Hub, Switch, and Bridge are important parts of Ethernet network; define each one of them stating which layer of the OSI model they belong to? (9 marks)
  7. Part C: Compression and Data Rate (30 marks)
  8. This task aims to spotlight on data compression and data rate. Answer the following questions:
  9. Two students are trying to download two files from the internet, student (A) is downloading File (A) which has the size of 110 MB while student (B) is trying to download the second one, file (B), which has the size of 50 MB. Student (A) is using inte
  10. 1. How long does it take to download file (A) by student (A), express your answer in seconds and minutes? (4 marks)
  11. 2. How long does it take to download file (B) by student B, express your answer in seconds and minutes? (4 marks)
  12. 3. Which student will download his file first? (2 marks)
  13. 4. Both students finished downloading them and decided to compress the files before storing them to CD. Student (A) compressed the file to 40 MB file, what is the compression ratio? (3 marks)
  14. 5. Student (B) used the same application which was used by student (A) to compress his file, what is the size of the compressed file of student B? (3 marks)
  15. 6. If student (A) starts copying his compressed file to CD with writing speed of 950 Kbps: (8 marks)
  16. a) How long does he need to finish copying his compressed file (40 MB), express your answer in seconds and minutes? (4 marks)
  17. b) How long does student (A) need to finish copying his original file (uncompressed file) to CD, express your answer in seconds, minutes, and hours? (4 marks)
  18. 7. If student (B) starts copying his compressed file to CD with writing speed of 950 Kbps: (6 marks)
  19. a) How long does he need to finish copying his compressed file, express your answer in seconds and minutes? (3 marks)
  20. b) How long does student (B) need to finish copying his original file (uncompressed file) to CD, express your answer in seconds, minutes? (3 marks)
  21. Advantages of Asymmetric and symmetric key cryptography
  22. Definition Advantages and disadvantages applications of Asymmetric and symmetric key cryptography
  23. disadvantages of Asymmetric and symmetric key cryptography
  24. Advantages and disadvantages of Asymmetric and symmetric key cryptography
  25. Definition of Asymmetric and symmetric key cryptography
  26. applications of Asymmetric and symmetric key cryptography
  27. Definition of Asymmetric and symmetric key cryptography Advantages and disadvantages Their applications of Asymmetric and symmetric key cryptography
  28. 4. How many bits is the encrypted message? (2 marks)
  29. Your answer should be detailed, you should show each output of each step of the algorithm besides the final answer.
  30. 3. Based on the understanding of Q4 of Bart B, use the generated keys of Q2 – Part C to encrypt the message of Q1 – Part C using the Simplified DES algorithm. (30 marks)
  31. 2. Based on the understanding of Q3 of Bart B, use the 10 bits password (1100110010) to generate the keys (K1 and K2). (7 marks)
  32. 1. ASCII code is a fixed-length coding scheme. Using the 7-bit ASCII code table [3] or any other references, find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit (MSB), for exampl
  33. This part is a practical task. Based on the previous study of DES in Part B, you have to test the algorithm but using the Simplified DES.
  34. Part C: Simplified DES (45 marks)
  35. 6. Is DES secure mechanism to protect electronic data at the present time, justify your answer? (2 marks)
  36. 5. What are the advantages and disadvantages of DES – at least 2 advantages And 2 disadvantages? (2 marks)
  37. 4. Describe Simplified DES algorithm? It is preferable to answer it as a list of points. (12 marks)
  38. 3. Describe the key generation of the Simplified DES algorithm? It is preferable to answer it as a list of points. (7 marks)
  39. 2. What is the history of DES? (2 marks)
  40. 1. Define DES? (2 marks)
  41. The Data Encryption Standard (DES) [1][2] is a symmetric-key algorithm for the encryption of electronic data, which you studied briefly in T215B. This task aims to assist you in learning more about the DES. Your answer should be as report which start
  42. Part B: Data Encryption Standard (DES) (35 marks)
  43. 3. Their applications (two applications for each one). (4 marks)
  44. 2. Advantages and disadvantages (2 advantages And 2 disadvantages For each one)(8 marks)
  45. 1. Definition (4 marks)
  46. From your study of Asymmetric and symmetric key cryptography, use your own words to compare between them in terms of:
  47. Part A: Asymmetric and Symmetric keys (20 marks)
  48. T215B Communication and Information Technologies - Part B
  49. T324: Keeping ahead in ICTs
  50. You have studied in block three of the course materials the socio-technical system approach for investigating system failures. To demonstrate your understanding of this part of the course, answer to the following questions related to the e-learning s
  51. 1. Draw the system map that you think representative for the given system.
  52. major criteria of failure of such system
  53. 2. Present briefly two processes of the given system.
  54. 3. Discuss the major criteria of failure of such system.
  55. 4. From your point of view, provide one major technical reason and one major non-technical reason that may lead such system to failure in your country?
  56. 5. What are the system questions that should be investigated to identify or avoid the reasons of failure determined in the previous part?
  57. 6. What is the difference between e-learning and M-learning systems?
  58. 7. Do you think it is advantageous to activate the M-learning system in our university? Why?
  59. Using the AOU e-library and Internet resources, you are asked to write an essay presenting an overview on the standard IEEE 802.11ad while providing its major physical layer specifications (e.g., supported data rate, Modulation bandwidth, and distanc
  60. overview on the standard IEEE 802.11ad while providing its major physical layer specifications (e.g., supported data rate, Modulation bandwidth, and distance coverage) and five potential models of usage
  61. You have studied in Block 1 the fundamental concepts, techniques, and mechanisms used in wireless communication in general and in more particularly in IEEE 802.11 standard. Nevertheless, the course does not emphasize on the evolution of this standard
  62. You have studied in Block 1 the fundamental concepts, techniques, and mechanisms used in wireless communication in general and in more particularly in IEEE 802.11 standard. To in-depth your understanding, you will discover the Wi-Fi network in this q
  63. 1. What are the SSIDs of the access points (AP) detected by your mobile device? Prove your answer by providing snapshot of the table listing the relevant information of all the detected APs.
  64. 2. Provide the SSID and MAC address of the best AP (i.e., in terms of the quality of the received signal) to be connected to your mobile device if the access is granted?
  65. 3. What is the Wi-Fi protocol version used by the best AP and its maximum supported rate.
  66. 4. What is the channel number used by the best AP? Determine its lower and upper frequency.
  67. 5. Provide the graph of signal strength (in dBm) of every occupied channel. Is there any other less noisy channel that could be selected for the best AP? Clarify your answer.
  68. 6. Provide the graph of the signal strength (in dBm) variation over time.
  69. 7. Calculate in Watts the average signal power received by your mobile device from the best AP?
  70. Also his own mobile number in the thirst field as a default value. In the description field he needs to say something about himself also as a default value. You need only to list the XHTML code. You need to notice the difference in field sizes
  71. The student must put his own first and last name in the first field instead of first and last as a default value. Also his own mobile number in the thirst field as a default value. In the description field he needs to say something about himself also
  72. Write the proper XHTML code to generate the following form as it appeared. The student must put his own first and last name in the first field instead of first and last as a default value. Also his own mobile number in the thirst field as a default v
  73. An initial sketch of the web page using The Pencil Environment Application ( 2 marks)
  74. The required XHTML code including the needed CSS code where it is a must to adapt Alternative web accessibility initiative ( use ‘alt’ and ‘longdesc’ attributes) (4 Marks)
  75. The screen size and also the complete reference where you found this information. Calculate the resolution in pixels per inch for both phones
  76. List and define any four problems of using mobile devices to access websites.
  77. 2- Calculate the resolution in pixels per inch for both phones
  78. 1- The screen size and also the complete reference where you found this information.
  79. You need to search for the screen sizes of both I-phone 6 and Galaxy S5. Then you need to present the following:
  80. You need to search for the screen sizes of both I-phone 6 and Galaxy S5.
  81. 2- The required XHTML code including the needed CSS code where it is a must to adapt Alternative web accessibility initiative ( use ‘alt’ and ‘longdesc’ attributes) (4 Marks)
  82. 1- An initial sketch of the web page using The Pencil Environment Application ( 2 marks)
  83. You need to submit the following:
  84. Title: Name of the branch Sub menus, one for each program offered in the branch. Image (your own images for your branch and the programs) Short introduction about the branch and its programs.
  85. 1. Title: Name of the branch 2. Sub menus, one for each program offered in the branch. 3. Image (your own images for your branch and the programs) 4. Short introduction about the branch and its programs.
  86. Create a web page for your AOU branch, the page should include:
  87. There are many software applications that are impeded within and used in the web browsers. List and explain four of these applications (browser’s based clients)?
  88. 1. Write the proper XHTML code to generate the following form as it appeared. The student must put his own first and last name in the first field instead of first and last as a default value. Also his own mobile number in the thirst field as a defaul
  89. Tma01 tt284
  90. Q6- Consider the MARIE program below. [10 Marks] i. List the hexadecimal code for each instruction. [5 marks] ii. Draw the symbol table. [4 marks] iii. What is the value stored in the AC when the program terminates? [1 mark] Hex Address Label
  91. i. List the hexadecimal code for each instruction. [5 marks] ii. Draw the symbol table. [4 marks] iii. What is the value stored in the AC when the program terminates? [1 mark]
  92. iii. What is the value stored in the AC when the program terminates? [1 mark]
  93. ii. Draw the symbol table. [4 marks]
  94. Q5- Draw the combinational circuits that directly implements the following Boolean expression . [11 Marks]
  95. Q4- Simplify using Boolean algebra and its identities. List the identity used at each step: [9 Marks]
  96. IV. What decimal value for the sum is the computer actually storing? [1 mark]
  97. III. Show how the computer would represent the sum in part-II. [2 mark]
  98. II. Show how the computer would add the two floating-point numbers in part-I by changing one of the numbers so they are both expressed using the same power. [4 marks]
  99. I. Show how the computer would represent the numbers [20.0] and [0.375] using this floating-point format. [4 marks]
  100. Q3- Assume a simple model for floating-point representation is used, the representation uses a 14-bit format, 5 bits for the exponent, with a bias of 16, a normalized significand of 8bits, and a single sign bit for the number: [11 Marks]
  101. Q2- Represent the following decimal numbers in binary using 8-bit signed magnitude, one’s complement, and two’s complement: [9 Marks] I. 47 II. -82
  102. (113.95)16 = ( )8
  103. (711.03)16 = ( )2
  104. (1111100011.01110011)2 = ( )8
  105. (711.03)8 = ( )2
  106. (113.23)4 = ( )11
  107. (403.02)7 = ( )10
  108. (a1a.cc)16 = ( )2
  109. (1012.64)10 = ( )2
  110. (19.64)10 = ( )9
  111. (1964)10 = ( )6
  112. X. (113.95)16 = ( )8
  113. Ix. (711.03)16 = ( )2
  114. Viii. (1111100011.01110011)2 = ( )8
  115. Vii. (711.03)8 = ( )2
  116. V. (403.02)7 = ( )10
  117. Iv. (a1a.cc)16 = ( )2
  118. Iii. (1012.64)10 = ( )2
  119. Ii. (19.64)10 = ( )9
  120. I. (1964)10 = ( )6
  121. Q1- Perform the following base conversion with a maximum of six places to the right of the concerned point. Show your complete work: [10 Marks]
  122. T103-Computer Organization and Architecture
  123. M255 TMA Spring 13-14 Page 1
  124. Course Code: M255
  125. Course Title: Object-Oriented Programming with Java Tutor Marked Assignment – Spring 13-14 M255 TMA Spring 13-14 Page 2
  126. M255 TMA Spring 13-14 Page 2
  127. 4- What are the attributes and the protocol of FullTimeEmployee? [2 Marks]
  128. 3- What are the attributes and the protocol of Employee? [2 Marks]
  129. 2- How many interface are there? List them [1 Mark]
  130. 1- How many concrete classes are there? List them [1 Mark]
  131. 6- What is the relationship between Employee and PartTimeEmployee? What is the keyword is used to represent this kind of relationship? [2 Marks]
  132. What is the keyword is used to represent this kind of relationship? [2 Marks]
  133. 7-What is the relationship between PartTimeEmployee and Perfectly?
  134. • Write the code that checks whether "M255" is an element of the Set or not. [3What is the keyword is used to represent this kind of relationship? [2 Marks]Marks]
  135. 8-Does toString method in FullTimeEmployee overload or override the toString() method in Employee? [1 Mark]
  136. 9- Write the header of the abstract class Employee [1 Mark]
  137. 10- Write the header of the class PartTimeEmployee [2 Marks]
  138. 11- Write the header of the class FullTimeEmployee [2 Marks]
  139. 12- Write the header and the body of Perfectly interface [2 Marks]
  140. 13- Write the zero-argument constructor of class Employee which initializes its attributes by their default values. [3 Marks]
  141. 14- Write the multi-argument constructor of class Employee which initializes its attributes by given values. [3 Marks]
  142. 15- Write the multi-argument constructor of class FullTimeEmployee which initializes it attributes given values. It should invoke it super-class multiargument constructor. [4 Marks]
  143. Write a Java program regarding to the following specifications:
  144. • Declare and create a Set of the code of the courses as “M255”, “M253”, “M257”, “M256”, “M359”. [2 Marks]
  145. • Write the code that asks the user to fill codes of the courses in the Set. It should stop if the user entered "stop". [7 Marks]
  146. • Write the code that prints elements of the Set and the size of the Set. [2Mark]
  147. • Write the code that checks whether "M255" is an element of the Set or not. [3 Marks]
  148. • Write the code that sorts the Set then prints the first and the last course in the Set. [3 Marks]
  149. • Write the code that prints the courses after sorting. [3 Marks]
  150. The following table represents a part of a list of Players showing various names with their points. Name Points “khaled” 282 “ahmad” 170 “faisal” 190 “ali” 155 This table is to be implemented and managed by an instance of a class called Player.
  151. (a) Write a class header of the class Player and write a single attribute: index that will reference a collection suitable for holding the data in table1. [2 marks]
  152. (a) Write a class header of the class Player and write a single attribute:
  153. (b) Write a zero argument constructor for Player that initializes index to an instance of a suitable empty collection class. [2 marks]
  154. (c) Write a public instance method called fill() for the Player class that takes no arguments and returns no value. This method should simply fill the index with the data as in the table, it should ask the user to add Players until he entered Zero as
  155. (d) Write a public instance method for the Player class called: findPoints (String name). This method returns the points of the specific name that are found in the collection . [5 marks]
  156. (e) Write a public instance method for the Player class called printAll(). This method prints the index entries. Use for-each statement. [3 marks]
  157. (f) Write a public instance method for the Player class called average(). This method returns average of grades of the index entries. [5 marks]
  158. (g) Write Java statements to do the followings: [3 marks] • Declare and create an object called players of Player class. • Use players object to call fill() method and printAll() method. • Printout average of players object. • Printout the points of
  159. • Declare and create an object called players of Player class.
  160. • Use players object to call fill() method and printAll() method.
  161. • Printout average of players object.
  162. • Printout the points of “faisal”.
  163. Trace the following code, what will the output be?
  164. Write a Java program that reads the lines from the file "C:/M255_first.txt" and writes the lines in the file "C:/M255_Sec.txt" if the length of the line is greater than 20 characters.
  165. 6.d. For each doctor, give a list of his/her Staff Number and the team code which they belongs to.
  166. 6.c. For each drug_code list the patient_id, drug_code and early start date excluding treatments administered by the member of staff whose staff numbers are 603 and 462
  167. 6.b. List the patient ids are their daily dosage prescription for the drug ‘S90’
  168. 6.a. To list the total number of female patients those are only treated by staff number 110 in each ward
  169. Students are required to use the Hospital Database for answering this part of the TMA
  170. Write SQL queries, and run them using iSQL against the University database. Include in your answer BOTH the SQL query you wrote and the output table that results. You MUST use meaningful column names, which may require using column aliases in the SQL
  171. 10. Identify all clients who have viewed all properties with three rooms
  172. 9. List all cities where there is both a branch office and at least one property for rent
  173. 8. List the names and comments of all clients who have viewed a property for rent
  174. 7. List all cities where there is a branch office but o properties for rent
  175. 6. List the clients’ names and joining date those registered through staff number ‘99’
  176. 5. List all cities where there is either a branch office or a property for rent
  177. 4. List the client names and maximum rent who preferred a property in branch number ‘111’
  178. 3. List the name and position of all staff who worked in branch located in ‘Mars’
  179. 2. List all staff with salary > $ 10000 and position ‘Manager’
  180. 1. List all branches located in street ‘1001’ in ‘Milky Way’ city.
  181. Branch (BranchNo, Street, City, PostCode) Staff(StaffNo, Name, Position, Gender, Salary, Position, BranchNo) PropertyRent(PropertyNo, Street, City, RoomType, StaffNo, BranchNo) Client(ClientNo, Name, TelNo, PreferredType, MaxRent) Registration(Client
  182. Given a relation R = (P, Q, R, X, Y, Z), and the FDs: {PQ  XY, RX  Y, Q  YZ, XZ  PR, QX  PZ} If R is decomposed into two relations R1(P,Q,X,Z) and R2(R, X, Y,Z) Is this decomposition dependency preserving or no
  183. Convert the relation clientRental into 1NF, 2NF and 3NF
  184. 3.i. Relationship between Course and Formative Assessments
  185. This question assesses your understanding of normal forms as discussed in Section 5 of Block 2.
  186. 3.j. Relationship between Course and Summative Assessments
  187. 3.h. Relationship between Academic Major and Electives
  188. 3.g. Relationship between Student and Courses
  189. 3.f. Relationship between Staff and courses
  190. 3.e. Relationship between Faculty and Staff
  191. 3.d. Relationship between Faculty and Academic Majors
  192. 3.c. Relationship between AOU Branch and Faculties
  193. 3.b. Relationship between AOU branch and Director
  194. 3.a. Relationship between AOU HQ and AOU branch
  195. 3. Draw ER diagram along with the assumption for each of the following scenarios:
  196. 2.d: Draw a representative occurrence diagram of the new ER diagram
  197. 2.c: Convert the given diagram into an E-R model with three relations
  198. 2.b: Draw a representative occurrence diagram of the given ER diagram
  199. 2.a: Declare the relations corresponding to the fragment of an E–R model below. BankAccount (AccountNo, Type, StartDate) Customer (CustomerID, CustomerName)
  200. the fact that the relationship ChairedBy is 1:1 in the declaration of the relations ? Member (RegNo, MemberName) Committee (DateFormed, Description)
  201. 1. How do you represent the fact that the relationship ChairedBy is 1:1 in the declaration of the relations ?
  202. This question assesses students’ understanding of E-R conceptual modeling as discussed in Section 5 of Block 1 and assesses students’ knowledge of Block 2, Sections 2 and 4, and in particular, students’ understanding of the relational representations
  203. Network Solutions Services is a networking products supplier in GCC. Its main functions are giving support to other enterprises in GCC to build their own networks by supplying or providing them all with modern networking products from the biggest net
  204. Give a conceptual data model (CDM) for the following given scenario using the Entity- Relationship model, including the complete E-R diagram, the entity types, attributes, any required constraints, assumptions and limitations.
  205. comparison study of Database Connectivity : ODBC and JDBC
  206. comparison study of popular RDBMS vendors Oracle, MySQL and SQL Server ( history, interface, language support, Operating System, Licensing)
  207. comparison study of popular RDBMS vendors Oracle, MySQL and SQL Server
  208. Provide a comparison study of popular RDBMS vendors Oracle, MySQL and SQL Server
  209. 1. Provide a comparison study of popular RDBMS vendors Oracle, MySQL and SQL Server (The study should include history, interface, language support, Operating System, Licensing)
  210. • Twitter • Twitter • Twitter
  211. photo gallery” in the search box. • Click the first search result. • Click the Download Now button. • Follow the instructions to complete the installation. • Use this software to open any image stored in your computer. • Make it black and white
  212. 2. Open your email (if you don’t have an email account, you can create a new one using one of the webmail providers such as Hotmail, Yahoo or Gmail). Send an email using your own words to your tutor’s email address describing what are the computer es
  213. • Second screenshot shows the image after editing. [3 marks]
  214. • First screenshot shows the image before editing. [1 marks]
  215. • First screenshot shows the image before editing. [1 marks] • Second screenshot shows the image after editing. [3 marks]
  216. For this question, you should provide two screenshots from the Windows Live Photo Gallery program:
  217. • Click the first search result. • Click the Download Now button. • Follow the instructions to complete the installation. • Use this software to open any image stored in your computer. • Make it black and white • Crop it in any way from any dire
  218. • Go to http://windows.microsoft.com, and type “photo gallery” in the search box.
  219. 1. As discussed in chapter 3, application software divided into two categories, general-purpose applications and specialised applications. Image editors are specialised graphics programs for editing or modifying digital images and photos. An example
  220. Notes: The minimum word count required for each question is 80.
  221. 3. People use computers to enrich their personal and private lives. There are ways that computers can make people less productive and even harm their health. Describe in your own words what are the physical risks may face computer users and how to av
  222. 2. Using your own words, define computer memory including RAM, ROM, and flash memory. [2 marks]
  223. 1. You have seen that the search engines are excellent tools to locate information on the web. Many sites allow anyone to post material on the web, sometimes without critical evaluation. Explain in your own words how to evaluate the accuracy of infor
  224. Use the common forum in LMS, in TU170 page, to initiate a discussion and to share your ideas with your classmates about one of the following topics: • Twitter • Speech Recognition • Google Docs • Smart Phones • Virus Protection and Internet Secur
  225. You should copy all the thread messages (not screenshots) and paste it on your solution for this part. The thread should contain at least 10 messages.
  226. • Twitter • Speech Recognition • Google Docs • Smart Phones • Virus Protection and Internet Security
  227. Use the common forum in LMS, in TU170 page, to initiate a discussion and to share your ideas with your classmates about one of the following topics:
  228. TU170 Tutor-marked Assignment – Spring 2013-2014
  229. انتقاء منهاج للمهارات الاجتماعية، وتطبيقه في تعليم الأطفال مهارة ضبط النفس التي يمكنهم من خلالها ضبط انفعالاتهم والتحكم بها.
  230. يمكن انتقاء منهاج للمهارات الاجتماعية، وتطبيقه في تعليم الأطفال مهارة ضبط النفس التي يمكنهم من خلالها ضبط انفعالاتهم والتحكم بها.
  231. أهمية تدريس المهارات الاجتماعية، وكيف يمكن انتقاء منهاج للمهارات الاجتماعية، وتطبيقه في تعليم الأطفال مهارة ضبط النفس التي يمكنهم من خلالها ضبط انفعالاتهم والتحكم بها.
  232. اشرح هذه العبارة موضحا أهمية تدريس المهارات الاجتماعية، وكيف يمكن انتقاء منهاج للمهارات الاجتماعية، وتطبيقه في تعليم الأطفال مهارة ضبط النفس التي يمكنهم من خلالها ضبط انفعالاتهم والتحكم بها.
  233. يعاني الأطفال المعاقين من نقص في مهاراتهم الاجتماعية مما يجعل من الأهمية بمكان تعليم المسئولية الشخصية والاجتماعية لهم.
  234. يعاني الأطفال المعاقين من نقص في مهاراتهم الاجتماعية مما يجعل من الأهمية بمكان تعليم المسئولية الشخصية والاجتماعية لهم. اشرح هذه العبارة موضحا أهمية تدريس المهارات الاجتماعية، وكيف يمكن انتقاء منهاج للمهارات الاجتماعية، وتطبيقه في تعليم الأطفال مهارة
  235. تشير الكثير من البحوث العلمية إلى أهمية الوقت في العملية التعليمية. وضح كيف تؤثر إدارة الوقت الصفي على التعلم، مع توضيح الفرق بين أنواع الوقت ذات العلاقة بالعملية التعليمية.
  236. كم من الوقت يخصصه المعلم لأداء مهمات معينة، وكم من الوقت مشغول، وكم من الوقت يصرف على التعلم الأكاديمي.
  237. قم بزيارة لأحد الصفوف في إحدى المدارس الحكومية أو الأهلية واكتب تقريرا يوضح كم من الوقت يخصصه المعلم لأداء مهمات معينة، وكم من الوقت مشغول، وكم من الوقت يصرف على التعلم الأكاديمي.
  238. تقريرا يوضح كم من الوقت يخصصه المعلم لأداء مهمات معينة، وكم من الوقت مشغول، وكم من الوقت يصرف على التعلم الأكاديمي.
  239. تشير الكثير من البحوث العلمية إلى أهمية الوقت في العملية التعليمية. وضح كيف تؤثر إدارة الوقت الصفي على التعلم، مع توضيح الفرق بين أنواع الوقت ذات العلاقة بالعملية التعليمية. قم بزيارة لأحد الصفوف في إحدى المدارس الحكومية أو الأهلية واكتب تقريرا يوض
  240. تدريس الطلبة ذوي الاعاقات البسيطة sp333
  241. دور التقنية في تعزيز كل من الإنتاجية الشخصية، والإنتاجية التعليمية للأفراد ذوي الاحتياجات الخاصة.
  242. اهتم التربويون في العقدين الأخيرين بتعليم وتعلم وفهم كيفية استخدام التقنية لتوصيل التعليم بطرق جديدة وقوية وفعَالة. وقد لاحظ الباحثون في ميدان التربية الخاصة مثل هذه الاتجاهات الجديدة في التعامل مع التقنية، مما زاد من وعيهم واهتمامهم بالتطبيقات التق
  243. الاستخدامات العامة للتطبيقات التعليمية مع الأفراد من ذوي الإعاقات البسيطة في المواقف الصفية والعلاجية.
  244. اشرح هذه العبارة مستعرضا الاستخدامات العامة للتطبيقات التعليمية مع الأفراد من ذوي الإعاقات البسيطة في المواقف الصفية والعلاجية.
  245. لقد أثبتت البحوث العلمية أن الحواسيب والتقنيات الأخرى يمكن أن تحسن تحصيل ودافعية الطلبة ذوي الإعاقات البسيطة. ومع أنه لا توجد صيغة مثالية لكيفية الاستخدام الأفضل للتقنية، إلا أنه يمكن استخدامها بطرق مختلفة لتقديم نشاطات تعليمية ودعمها. اشرح هذه العبا
  246. استخدامات الحاسوب في مجال الإعاقة sp330-331
  247. 2- حلل البناء الفني للقصة المختارة من خلال عناصر محددة: الأحداث: الشخوص: طريقة السرد: لغة االقصة:
  248. (إلى هذا النوع من قصص الحيوان الرمزي ينتمي كتاب " كليلة ودمنة " درة قصص الحيوان في الآداب العربية القديمة الذي وضعه ابن المقفع سنة 132 هجرية) د. محمد رجب النجار: التراث القصصي في الأدب العربي, ص108. اختر إحدى قصص كتاب كليلة ودمنة, ثم أجب ع
  249. (إلى هذا النوع من قصص الحيوان الرمزي ينتمي كتاب " كليلة ودمنة " درة قصص الحيوان في الآداب العربية القديمة الذي وضعه ابن المقفع سنة 132 هجرية)
  250. تبسّمي, تورقُ النجومُ ووقِّعي نغْمةَ الصباح بأعراقي عصفورتي زهوةَ الحقولِ, ويا تَأَلَّفي صُحبةَ الهجير, ولا ليت الذي تطلبينَ, أرديةُ أو مهجةُ الشاعر الأسيف, وإن بأعماقي, وتَندى أشعةُ القمرِ وصُبّــــي الربيعَ في الوتـــــر شوقَ الن