Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | DIL632 | ||||
Course Name: | Chinese 2 | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | English | ||||
Course Condition: |
DIL631 - Chinese 1 |
||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. MERVE KESKİN | ||||
Course Lecturer(s): |
|
||||
Course Assistants: |
Course Objectives: | By the end of the course, students will be able to: 1. Speak words, phrases, and sentences in Chinese with the proper pronunciation and intonation; 2. Use appropriate words and phrases in various social situations; 3. Write grammatically correct sentences and paragraphs in pinyin romanization and traditional and simplified characters; 4. Read elementary texts written in Chinese. |
Course Content: | Introduction to spoken and written Chinese, providing practice in listening, speaking, reading, writing and grammar |
The students who have succeeded in this course;
1) The course enables students to communicate (listen, speak, read, write) accurately and appropriately in simple Chinese for common everyday purposes such as greeting, introducing friends and relatives, identifying people or objects etc. 2) The course enables Ss to write Chinese characters appropriately. 3) The course enables Ss to comprehend elementary listening tracks and reading texts and speak with correct stress, intonation, and pronunciation. |
Week | Subject | Related Preparation |
1) | Colors | |
2) | Fruits and food | |
3) | Seasons and Weather | |
4) | Around the house | |
5) | House cleaning | |
6) | In the kitchen | |
7) | Small Talk 1 | |
8) | Midterm Week | |
9) | Small Talk 2 | |
10) | Appointment | |
11) | In the city | |
12) | In nature | |
13) | At the restaurant | |
14) | At the train station | |
15) | Final Week | |
16) | Final Week |
Course Notes / Textbooks: | Başarının Yolu 1&2 |
References: | Ek alıştırmalar ve dersin öğretim görevlisi tarafından geliştirilmiş çeşitli oyunlar ve etkinlikler. Teacher created upplementary worksheets, classroom activities and games |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 80 | % 10 |
Homework Assignments | 5 | % 10 |
Midterms | 1 | % 40 |
Final | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 4 | 56 | |||
Homework Assignments | 10 | 0 | 7 | 70 | |||
Midterms | 1 | 0 | 1 | 1 | |||
Final | 1 | 0 | 1 | 1 | |||
Total Workload | 128 |