Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI376 | ||||
Course Name: | Fundamentals of International Trade | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. ONAN ŞAHİN | ||||
Course Lecturer(s): | Onan ŞAHİN | ||||
Course Assistants: |
Course Objectives: | At the end of this course, students will be able to recognize the basic components of foreign trade, identify the problems that arise in these elements and choose solutions that suit their needs. At the end of the course, they will be able to apply this knowledge by developing the knowledge that a foreign trade employee should have and the ability to use it. |
Course Content: | Foreign trade processes. State supports in foreign trade, exporters' associations, customs. finance and transportation methods, and payment/delivery methods in foreign trade. |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | International Economic Organizations | Lecture notes |
2) | The Theory of Comparative Advantage and the Return of Foreign Trade | Lecture notes |
3) | Modern Trade Theories | Lecture notes |
4) | Imperfect Competition and Foreign Trade | Lecture notes |
5) | Imperfect Competition and Foreign Trade | Lecture notes |
6) | Tariffs and Quotas | Lecture notes |
7) | Foreign Trade Policy | Lecture notes |
8) | Midterm exam | |
9) | International Trade - Labor and Environmental Standards | Lecture notes |
10) | Balance of Payments | Lecture notes |
11) | Exchange Rate and Exchange Rate Systems | Lecture notes |
12) | Open Economy | Lecture notes |
13) | Protectionism and Liberalization in Foreign Trade | Lecture notes |
14) | Development and Structure of Foreign Trade in Turkey | Lecture notes |
15) | Final exam |
Course Notes / Textbooks: | Adım Adım Dış Ticaret |
References: | Ders notları |
Course Learning Outcomes | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Quizzes | 1 | % 40 |
Final Pratik | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 100 | |
PERCENTAGE OF FINAL WORK | % | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 3 | 42 | ||||
Midterms | 1 | 41 | 41 | ||||
Final | 1 | 42 | 42 | ||||
Total Workload | 125 |