Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI307 | ||||
Course Name: | World Music Culture | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. ÖMER YUSUF TOPÇU | ||||
Course Lecturer(s): |
Öğr. Gör. ÖMER YUSUF TOPÇU |
||||
Course Assistants: |
Course Objectives: | Analysis – Students will experience personal interaction with musical genres from around the world through a critical examination of academic writing, discussion of their observations, and an in-depth analysis of these forms through writing assignments to demonstrate their ability to bridge readings and experiences. Students will also be asked to submit multiple submissions to a digital mapping tool where field observations are paired with classroom readings and personal analysis. Production: Although they are not expected to be involved in music performance on a regular basis, students will work closely with musicians throughout this course and gain in-depth knowledge of the cultural contexts and practical challenges of music-making. Connectivity: Students will engage with musical tropes that are artistic manifestations of direct participation in cultural turmoil in the diaspora, as well as musical forms that function as political protest or religious expression. Musical examples and readings will contextualize the global soundstage that is today's music and demonstrate the complex networks of communication and influence that make up today's musical networks. Context: A broad base of academic reading written by scholars with extensive fieldwork in their field will provide cultural context for each musical genre or geographic region covered in class. Listening assignments will provide a body of auditory information for interpreting new musical experiences. |
Course Content: | Basic issues about the relationship between music and culture. Aural analysis: Listening to music from various regions of the world and describing it verbally and in writing. |
The students who have succeeded in this course;
1) Develop a Western Music Education Philosophy that is flexible enough to be applied to a variety of musical genres and creates contexts 2) Be an active part of the community that meets international standards and is loyal to various duties. 3) Performs various listening exercises that develop technical and historical-cultural literacy skills. 4) Creats a professional space for personal development, continuing education and performance and enhances learning intelligence |
Week | Subject | Related Preparation |
1) | Music in Japan and Korea | |
2) | Jazz and Blues Music | |
3) | Music in Russia and Ukraine | |
4) | Music in Palestine and Israel | |
5) | Music in France, Belgium and the Netherlands | |
6) | Music in Austria, Germany and Switzerland | |
7) | Music in Iran and Italy | |
8) | Music in Argentina and Brazil | |
9) | Music in Scotland, England and Ireland | |
10) | Music in Egypt | |
11) | Music in Greece | |
12) | Music in India | |
13) | General Evaluation | |
14) | General Evaluation | |
15) | General Evaluation |
Course Notes / Textbooks: | Kaplan, A. (2005). Kültürel Müzikoloji. İstanbul: Bağlam Yayıncılık. |
References: | Ders Notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Presentation | 2 | % 100 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 100 | |
PERCENTAGE OF FINAL WORK | % | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 1 | 2 | 42 | |||
Study Hours Out of Class | 14 | 0 | 3 | 42 | |||
Presentations / Seminar | 2 | 20 | 1 | 42 | |||
Total Workload | 126 |