Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | DIL614 | ||||
Course Name: | Russian 4 | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | English | ||||
Course Condition: |
DIL613 - Russian 3 |
||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. MERVE KESKİN | ||||
Course Lecturer(s): |
Öğr. Gör. ASSEM AMIRZHANOVA |
||||
Course Assistants: |
Course Objectives: | It is aimed to -Teach intermediate level of Russian speaking, writing, reading and listening skills -Teach some complex grammatical rules of Russian and establish unified sentences -Improve the susceptibility to conversation and to have knowledge about Russian culture. -Make the students read intermediate level Russian literature without difficulty. |
Course Content: | Mainly reading and listening activities are done by focusing on intermediate vocabulary items and grammar structures in Russian. In addition to the daily speech patterns, activities that help the students to understand the written and oral input in Russian are used and practiced as group or pair activities in the classroom. |
The students who have succeeded in this course;
1) The student is able to read both abstract and factual texts and understand the main ideas. 2) The student is able to communicate with a native Russian speaker without much difficulty. 3) Stusent is able to participate in dialogues in a significantly wide range of everyday situations, initiate, maintain and end a dialogue; speak on different topics formulate an own statement. 4) Although there may be some difficulty with some complex forms and words, the student is able to read with a comprehensive vocabulary knowledge. |
Week | Subject | Related Preparation |
1) | Advicing our classmates about the best way to learn Russian, recommendations | |
2) | Looking for a housemate to share a house and designing a house describing a house, location of objects | |
3) | Describing our classmates, relationships between people, resemblences between people | |
4) | Formal language, invitations, presentations, asking for favors | |
5) | Plan a day in a Russian city, activities, schedule | |
6) | Preparing a buffet for a party, likes and dislikes | |
7) | listing the most interesting things to do in a place, experiences | |
8) | Midterm | |
9) | finding solutions, giving advice, feelings | |
10) | Talking about the most interesting time in our history, circumstances in the past, actions in the past and present | |
11) | Talking about personal anecdotes, talking about the past | |
12) | Designing an advertising campaign, giving instructions | |
13) | Imagining what we will be in the future, talking about future actions | |
14) | Semester Revision | |
15) | Final Exam | |
16) | Final Exam |
Course Notes / Textbooks: | Way to Russia 2 |
References: | Ek alıştırmalar ve dersin öğretim görevlisi tarafından geliştirilmiş çeşitli oyunlar ve etkinlikler. Teacher created upplementary worksheets, classroom activities and games |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 1 | % 10 |
Homework Assignments | 10 | % 10 |
Midterms | 1 | % 35 |
Final | 1 | % 45 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 55 | |
PERCENTAGE OF FINAL WORK | % 45 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 4 | 56 | |||
Homework Assignments | 10 | 0 | 7 | 70 | |||
Midterms | 1 | 0 | 1 | 1 | |||
Final | 1 | 0 | 1 | 1 | |||
Total Workload | 128 |