Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | DIL625 | ||||
Course Name: | Spanish 5 | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | English | ||||
Course Condition: |
DIL624 - Spanish 4 |
||||
Does the Course Require Work Experience?: | Yes | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. MERVE KESKİN | ||||
Course Lecturer(s): |
Öğr. Gör. ESNIHT YULIET ATEHORTUA MESA |
||||
Course Assistants: |
Course Objectives: | This course aims to improve listening, writing, reading and speaking skills of Spanish in upper-intermediate level and to teach grammar structures of Spanish in upper-intermediate level. |
Course Content: | This course covers improving basic effective communication skills through reading, writing, speaking and listening. It also covers cultural beliefs, values and various aspects of everyday life in Spanish speaking countries. |
The students who have succeeded in this course;
1) The student can write well-organized and structured texts and articles. 2) The student can express his/her ideas fluently. 3) The student can easily understand a literary text which includes complex structures. |
Week | Subject | Related Preparation |
1) | Writing a presentation letter to apply for a job Talk about present / past / duration of experiences | AULA 3 |
2) | -Writing a presentation letter to apply for a job -Talk about present / past / duration of experiences | AULA 3 |
3) | -Writing a presentation letter to apply for a job -Talk about present / past / duration of experiences | AULA 3 |
4) | -Thinking about myself in the next few years -Actions / situations in the future | AULA 3 |
5) | -Thinking about myself in the next few years -Actions / situations in the future | AULA 3 |
6) | Talking about customs and social situation of the people in our country Prohibitions | AULA 3 |
7) | Talking about customs and social situation of the people in our country Prohibitions | AULA 3 |
8) | MIDTERM | AULA 3 |
9) | Writing the summary of a movie | AULA 3 |
10) | Writing the summary of a movie | AULA 3 |
11) | Deciding and presenting an advertising campaign Describing a commercial | AULA 3 |
12) | Deciding and presenting an advertising campaign Describing a commercial | AULA 3 |
13) | Writing a letter trying to explain a problem Expressing desires/ complaining / talking about needs | AULA 3 |
14) | Writing a letter trying to explain a problem Expressing desires/ complaining / talking about needs | AULA 3 |
15) | FINAL | AULA 3 |
16) | FINAL | AULA 3 |
Course Notes / Textbooks: | Bu derste AULA 3 kullanılmaktadır. / In this course, AULA 3 is aimed to be used. |
References: | Ek alıştırmalar ve dersin öğretim görevlisi tarafından geliştirilmiş çeşitli oyunlar ve etkinlikler. Teacher created upplementary worksheets, classroom activities and games |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 10 | % 10 |
Homework Assignments | 10 | % 10 |
Midterms | 1 | % 35 |
Final | 1 | % 45 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 55 | |
PERCENTAGE OF FINAL WORK | % 45 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 4 | 56 | |||
Homework Assignments | 10 | 0 | 7 | 70 | |||
Midterms | 1 | 0 | 1 | 1 | |||
Final | 1 | 0 | 1 | 1 | |||
Total Workload | 128 |