UNI327 Data Analysis with RIstinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: UNI327
Course Name: Data Analysis with R
Semester: Fall
Spring
Course Credits:
ECTS
5
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: University Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: E-Learning
Course Coordinator: Öğr. Gör. AYŞEGÜL ÇALIŞKAN İŞCAN
Course Lecturer(s): Dr. Ayşegül Çalışkan İşcan
Course Assistants:

Course Objective and Content

Course Objectives: This course aims to teach the R programming language at a basic level.
Course Content: This course includes basic elements of R programming languages.

Learning Outcomes

The students who have succeeded in this course;
1) Have knowledge about R programming language
2) Learns R programming language at a basic level.
3) Can analyze any data by using R language.
4) Can understand and manipulate any R code.
5) Can make statistical analysis by using R language.

Course Flow Plan

Week Subject Related Preparation
1) Course overview
2) R Arithmetic, Atomic Data Types
3) Variables, Vectors
4) Matrices
5) Lists, Data Frames
6) Factors, Reading and Writing Data
7) Exercises, Lesson Repetition
8) Mid-term Week
9) Control flow, functions
10) Exploring and Preparing Data
11) Working with text data
12) Preparing Numeric Data, Dealing with Dates
13) Merging data, Frequency tables
14) Plotting in Base R, plotting with ggplot2

Sources

Course Notes / Textbooks: 1. Mark Gardener - Beginning R_ The Statistical Programming Language-Wrox
2. Tony Fischetti - Data Analysis with R_ Load, wrangle, and analyze your data using the world's most powerful statistical programming language-Packt Publishing (2015)
References: 1. Mark Gardener - Beginning R_ The Statistical Programming Language-Wrox
2. Tony Fischetti - Data Analysis with R_ Load, wrangle, and analyze your data using the world's most powerful statistical programming language-Packt Publishing (2015)

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

4

5

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Application 13 % 20
Midterms 1 % 30
Final 1 % 50
total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Workload
Course Hours 15 45
Study Hours Out of Class 16 16
Project 1 8
Midterms 1 1
Total Workload 70