DIL625 Spanish 5Istinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: DIL625
Course Name: Spanish 5
Semester: Fall
Spring
Course Credits:
ECTS
5
Language of instruction: English
Course Condition: DIL624 - Spanish 4
Does the Course Require Work Experience?: Yes
Type of course: University Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: E-Learning
Course Coordinator: Öğr. Gör. MERVE KESKİN
Course Lecturer(s): Öğr. Gör. ESNIHT YULIET ATEHORTUA MESA
Course Assistants:

Course Objective and Content

Course Objectives: This course aims to improve listening, writing, reading and speaking skills of Spanish in upper-intermediate level and to teach grammar structures of Spanish in upper-intermediate level.
Course Content: This course covers improving basic effective communication skills through reading, writing, speaking and listening. It also covers cultural beliefs, values and various aspects of everyday life in Spanish speaking countries.

Learning Outcomes

The students who have succeeded in this course;
1) The student can write well-organized and structured texts and articles.
2) The student can express his/her ideas fluently.
3) The student can easily understand a literary text which includes complex structures.

Course Flow Plan

Week Subject Related Preparation
1) Writing a presentation letter to apply for a job Talk about present / past / duration of experiences AULA 3
2) -Writing a presentation letter to apply for a job -Talk about present / past / duration of experiences AULA 3
3) -Writing a presentation letter to apply for a job -Talk about present / past / duration of experiences AULA 3
4) -Thinking about myself in the next few years -Actions / situations in the future AULA 3
5) -Thinking about myself in the next few years -Actions / situations in the future AULA 3
6) Talking about customs and social situation of the people in our country Prohibitions AULA 3
7) Talking about customs and social situation of the people in our country Prohibitions AULA 3
8) MIDTERM AULA 3
9) Writing the summary of a movie AULA 3
10) Writing the summary of a movie AULA 3
11) Deciding and presenting an advertising campaign Describing a commercial AULA 3
12) Deciding and presenting an advertising campaign Describing a commercial AULA 3
13) Writing a letter trying to explain a problem Expressing desires/ complaining / talking about needs AULA 3
14) Writing a letter trying to explain a problem Expressing desires/ complaining / talking about needs AULA 3
15) FINAL AULA 3
16) FINAL AULA 3

Sources

Course Notes / Textbooks: Bu derste AULA 3 kullanılmaktadır. / In this course, AULA 3 is aimed to be used.
References: Ek alıştırmalar ve dersin öğretim görevlisi tarafından geliştirilmiş çeşitli oyunlar ve etkinlikler.

Teacher created upplementary worksheets, classroom activities and games

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Attendance 10 % 10
Homework Assignments 10 % 10
Midterms 1 % 35
Final 1 % 45
total % 100
PERCENTAGE OF SEMESTER WORK % 55
PERCENTAGE OF FINAL WORK % 45
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Preparation for the Activity Spent for the Activity Itself Completing the Activity Requirements Workload
Course Hours 14 0 4 56
Homework Assignments 10 0 7 70
Midterms 1 0 1 1
Final 1 0 1 1
Total Workload 128