Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI306 | ||||
Course Name: | Environmental Health | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. Öğr. Üy. MERVE ARICI | ||||
Course Lecturer(s): | Doctoral Lecturer Merve ARICI | ||||
Course Assistants: |
Course Objectives: | To provide information about the environment and human health, generally prepared products and health risks arising from the products. |
Course Content: | Environment and human health, environmental pollutants and health risks |
The students who have succeeded in this course;
1) Gain knowledge about the environment and human health. 2) Recognizes the basic concepts related to the environment. 3) Recognizes chemical substances encountered in daily life. 4) Gains knowledge about air, water and soil pollution. 5) Gains knowledge about global warming. |
Week | Subject | Related Preparation |
1) | Introduction to Environmental Health | |
2) | Basic concepts about the environment | |
3) | Environmental pollutants and health risks | |
4) | Air pollution and its effects on health | |
5) | Water pollution and its effects on health | |
6) | Soil pollution and pesticides | |
7) | Environmental pollution caused by energy sources | |
8) | Greenhouse effect and global warming | |
9) | Student presentations | |
10) | Student presentations | |
11) | Student presentations | |
12) | Student presentations | |
13) | Student presentations | |
14) | Student presentations | |
15) | Final exam |
Course Notes / Textbooks: | Öğretim Üyesi Ders Notları |
References: | • Vural, N. (2005). Toksikoloji. • Onur Erdem, Merve Bacanlı. Temel Toksikoloji (2021). Ankara Nobel Tıp Kitabevleri. ISBN: 978-625-7594-09-0 • A. Handan Dökmeci. Toksikolojik Çevresel ve Endüstriyel Afetler (2019). Nobel Tıp Kitabevi • Carson, R. (2021). Sessiz Bahar (Silent Spring). Palme Yayınevi. Çeviri: Çağatay Güler |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 15 |
Presentation | 1 | % 35 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 13 | 26 |
Study Hours Out of Class | 12 | 48 |
Presentations / Seminar | 6 | 8 |
Homework Assignments | 11 | 32 |
Final | 1 | 1 |
Total Workload | 115 |