Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | DIL611 | ||||
Course Name: | Russian 1 | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | English | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. MERVE KESKİN | ||||
Course Lecturer(s): |
Öğr. Gör. ASSEM AMIRZHANOVA |
||||
Course Assistants: |
Course Objectives: | It is aimed to -Teach basic level of Russian speaking, writing, reading and listening skills -Introduce them to the phonetic rules in Russian alphabet such as pronunciation and accent -Teach the basic grammatical rules of Russian and establish simple and unified sentences and introduce themselves and their families. -Improve the susceptibility to conversation and to have knowledge about Russian culture. |
Course Content: | Mainly reading and listening activities are done by focusing on basic vocavulary items and grammar structures in Russian. Daily conversational routines such as greeting, introducing yourself, asking the time, asking the prices of the products are taught and practiced as group or pair activities in the classroom. |
The students who have succeeded in this course;
1) Students will be able to say hello to people, keep the short polite dialog box and say goodbye. 2) Students will be able to pronounce Russian voices. 3) Students will be able to keep simple conversations about objects around them. 4) Students will be able to will simply ask their way on the street. 5) Students will be able to understand the main idea of short texts written in very simple language with the help of visuals.. 6) Students will be able to introduce themselves or others and write very simple sentences. |
Week | Subject | Related Preparation |
1) | Alphabet, Reading Letters and Stress | |
2) | Meeting Dialogues | |
3) | Who ?, What?, Where? and when? questions. Simple sentence structure. | |
4) | Names, Gender structures | |
5) | Possessive adjectives. | |
6) | Whose? Question, Family and Occupations | |
7) | Plural forms of names. | |
8) | Midterm | |
9) | Compound sentence structure. Numbers up tp 100 | |
10) | Adjectives. Colors | |
11) | Demonstrative Pronouns/Adjectives | |
12) | How much ? question. "Like" verb. | |
13) | Shopping Dialogue | |
14) | Revision | |
15) | Final Exam | |
16) | Final Exam |
Course Notes / Textbooks: | Doroga v Rossiyu 1 Way to Russia 1 |
References: | Ek alıştırmalar ve dersin öğretim görevlisi tarafından geliştirilmiş çeşitli oyunlar ve etkinlikler. Teacher created upplementary worksheets, classroom activities and games |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 1 | % 10 |
Homework Assignments | 1 | % 10 |
Midterms | 1 | % 30 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 4 | 56 | |||
Homework Assignments | 10 | 0 | 7 | 70 | |||
Midterms | 1 | 0 | 1 | 1 | |||
Final | 1 | 0 | 1 | 1 | |||
Total Workload | 128 |