Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | TRK102 | ||||
Course Name: | Turkish Language 2 | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Compulsory Courses | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Doç. Dr. FEYZİ ÇİMEN | ||||
Course Lecturer(s): |
Öğr. Gör. TUĞÇE YILDIRIM Doç. Dr. FEYZİ ÇİMEN |
||||
Course Assistants: |
Course Objectives: | To create awareness of language, to encourage students to read, to introduce the richness, rules and features of Turkish language; to broaden the interests of the students and to develop their comprehension (listening comprehension, reading comprehension), speaking (speaking) skills, and directing them to critical thinking and research. |
Course Content: | Types of written expression, types of oral expression, scientific research methods, oral presentation types. |
The students who have succeeded in this course;
1) Can explain the types of written expression. 2) Can define the development methods of intellectual 3) Can knows the characteristics of a good expression 4) Can explain the basic features of literary and literary genres 5) Can explain the types of verbal expression |
Week | Subject | Related Preparation |
1) | Introduction to Written and Oral Expression Types | 1. Week Lecture Notes |
2) | Rules of Official Correspondence | 2. Week Lecture Notes |
3) | Scientific Research Process and Reference | 3. Week Lecture Notes |
4) | Types of Objective Critical Written Expressions | 4. Week Lecture Notes |
5) | Types of Written Expression I: Article, Clause, Criticism, Trial, Chat, Interview, News, Travel Writing | 5. Week Lecture Notes |
6) | Types of written expression II: Memoir, Daily, Review, Biography, Autobiography, Bibliography | 6. Week Lecture Notes |
7) | Story and Novel | 7. Week Lecture Notes |
8) | Midterm exam | Preparation for the exam |
9) | Narrative and Narrative Structure | 8. Week Lecture Notes |
10) | Theater | 9. Week Lecture Notes |
11) | Poetry | 10. Week Lecture Notes |
12) | Types of Oral Expression I: Conference, Speech, Panel, Forum, Symposium, Debate, Open Session | 11. Week Lecture Notes |
13) | Considerations in Oral Presentations I: Communication, Presentation Success, Communication Message | 12. Week Lecture Notes |
14) | Considerations in Oral Presentations II: Diction, Dictation Style, Sound in Diction | 13. Week Lecture Notes |
15) | General Review and Pre-Exam Applications | Past Week Lecture Notes and Questions |
16) | Final exam | Preparation for the exam |
Course Notes / Textbooks: | Barzun, Jacques ve Henry F. Graff. Modern Araştırmacı. Çev. Fatoş Dilber. Ankara: TÜBİTAK Popüler Bilim Kitapları, 2001. |
References: | Barzun, Jacques ve Henry F. Graff. Modern Araştırmacı. Çev. Fatoş Dilber. Ankara: TÜBİTAK Popüler Bilim Kitapları, 2001. |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 16 | 224 | ||||
Homework Assignments | 7 | 0 | 0 | ||||
Midterms | 1 | 0 | 0 | ||||
Final | 1 | 0 | 0 | ||||
Total Workload | 224 |