Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | DIL616 | ||||
Course Name: | Russian 6 | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | English | ||||
Course Condition: |
DIL615 - Russian 5 |
||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. MERVE KESKİN | ||||
Course Lecturer(s): |
Öğr. Gör. ASSEM AMIRZHANOVA |
||||
Course Assistants: |
Course Objectives: | It is aimed to teach -advanced level of Russian speaking, writing, reading and listening skills. -how to understand every written or oral input clearly -how to summarize information from different written or oral sources fluently - how to express oneself fluently and clearly, without any help -how to understand and make use of nuances - how to write critical essays and detailed reports |
Course Content: | Reading, writing, speaking and listening activities are done by focusing on advanced vocabulary items and grammar structures in Russian. Focusing on academical, literary and critical texts, the skills of aggregating and reporting information from different academic sources coherently and clearly, understanding, analyzing and reflecting on Russian literary texts are developed. |
The students who have succeeded in this course;
1) The student is able to understand everything s/he hears and reads in Russian. 2) The student can use the language fluently and clearly to express his/her ideas. 3) The student is able to summarize written or oral texts and lead a discussion about the texts in a fluent and clear way. |
Week | Subject | Related Preparation |
1) | Telling real or fictional anectodes | |
2) | Talking about causes and consequences | |
3) | Writing a script about a couple having an argument | |
4) | Expressing interest/ feeling | |
5) | Creating a presentation about a new movement | |
6) | Talking about situations / facts | |
7) | Writing a blog about science mystery | |
8) | Midterm Exam | |
9) | Making hypothesis and talking about mystery event | |
10) | Deciding an object that makes daily life easier | |
11) | Talking on the phone | |
12) | Describing characteristics / how something works | |
13) | Giving orders / suggestions | |
14) | Semester Revision | |
15) | Final Exam | |
16) | Final Exam |
Course Notes / Textbooks: | Way to Russia 3 |
References: | Ek alıştırmalar ve dersin öğretim görevlisi tarafından geliştirilmiş çeşitli oyunlar ve etkinlikler. Teacher created upplementary worksheets, classroom activities and games |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 1 | % 10 |
Homework Assignments | 10 | % 10 |
Midterms | 1 | % 35 |
Final | 1 | % 45 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 55 | |
PERCENTAGE OF FINAL WORK | % 45 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 4 | 4 | 4 | 32 | |||
Application | 4 | 4 | 4 | 32 | |||
Study Hours Out of Class | 4 | 4 | 4 | 32 | |||
Presentations / Seminar | 1 | 3 | 1 | 4 | |||
Project | 1 | 3 | 1 | 4 | |||
Homework Assignments | 10 | 3 | 1 | 40 | |||
Quizzes | 1 | 2 | 1 | 3 | |||
Midterms | 1 | 4 | 2 | 6 | |||
Final | 1 | 4 | 2 | 6 | |||
Total Workload | 159 |