DIL102 General English 2Istinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: DIL102
Course Name: General English 2
Semester: Spring
Course Credits:
ECTS
2
Language of instruction: English
Course Condition:
Does the Course Require Work Experience?: No
Type of course: Compulsory Courses
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: E-Learning
Course Coordinator: Eğitim Danışmanı GÜLŞAH ERDAŞ
Course Lecturer(s): Eğitim Danışmanı GÜLŞAH ERDAŞ
Course Assistants:

Course Objective and Content

Course Objectives: The course aims to equip students with basic language structures and communication abilities in English.
Course Content: Students will be able to use basic structure about personal information, jobs, asking and giving directions, public transportation.

Learning Outcomes

The students who have succeeded in this course;
1) Students will be able to tell the main idea of a text in Beginner level.
2) Students will be able to understand frequently used basic expressions and daily language and use most of them in their daily lives.
3) Students will be able to introduce themselves and other people and they will be able to write sentences in basic level to introduce themselves.
4) Students will be able to communicate in basic level on the condition that they get help from the interlocutor who speaks slow and comprehensible way.

Course Flow Plan

Week Subject Related Preparation
1) English for everyday life: At a restaurant / Clothes
2) Adjectives / The weather
3) (Have to / Must) Using structures of obligation and necessity
4) Comparatives / Superlatives
5) Geographical Features / Adverbs
6) Present Perfect Tense
7) Vocabulary: Office / Used to (Past habits)
8) Midterm Exam
9) Past Continuous Tense
10) Quantifiers / Vocabulary: Cooking
11) Future with will / Vocabulary: Money
12) Conditionals Type 0, 1
13) Should/ Shouldn't - Vocabulary: House
14) Conjunctions (And, But, Because, So)
15) Final Exam
16) Final exam

Sources

Course Notes / Textbooks: Ders öğretmenleri tarafından hazırlanmış, online kullanılan slaytlar.
References: Online slides prepared by the course instructors.

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

4

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 1 % 40
Final 1 % 60
total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Workload
Course Hours 13 26
Study Hours Out of Class 16 16
Midterms 1 1
Final 1 1
Total Workload 44