Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI197 | ||||
Course Name: | Toxic Substances in Nutrients | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. Öğr. Üy. MERVE ARICI | ||||
Course Lecturer(s): | Doctoral Lecturer Merve ARICI | ||||
Course Assistants: |
Course Objectives: | To give information about additives and natural ingredients that have toxic effects in foods and their effects, food allergy, environmental pollutants and their effects |
Course Content: | Food safety, related regulations and legal regulations, food additives, toxic substances in foods due to various reasons and their effects, natural contaminants and their effects, pesticides and heavy metals, food allergy |
The students who have succeeded in this course;
1) She/He has information about toxic substances in foods and their effects 2) She/He has information about natural contaminants. 3) She/He has information about pesticides and their effects. 4) She/He has information heavy metals and their effects. 5) She/He has information about food allergy. |
Week | Subject | Related Preparation |
1) | Food Safety and General Concepts | |
2) | Hazards in Foods I | |
3) | Hazards in Foods II | |
4) | Food Additives | |
5) | Environmental Contaminants I | |
6) | Environmental Contaminants II | |
7) | Mid term exam | |
8) | Environmental Contaminants III | |
9) | Detergents and Packaging Materials | |
10) | Natural Toxins I | |
11) | Natural Toxins II | |
12) | Food-Related Hereditary Diseases and Food Allergy | |
13) | Student Presentations | |
14) | Student Presentations | |
15) | Final Exam |
Course Notes / Textbooks: | Dersin öğretim üyesinin notları - Lecturer's notes. |
References: | • Vural, N. (2005). Toksikoloji • Carson, R. (2021). Silent Spring. Palme Yayınevi. Çeviri: Çağatay Güler • Ayaz, A., Yurttagül, M. (2008). Besinlerdeki Toksik Öğeler I-II • Zehirlenmeler & İlaç Aşırı Dozu (2012). Çeviri Editörü: Prof. Dr. Vahide Savcı |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Presentation | 1 | % 20 |
Midterms | 1 | % 30 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 15 | 28 |
Field Work | 13 | 27 |
Study Hours Out of Class | 13 | 46 |
Presentations / Seminar | 4 | 8 |
Homework Assignments | 2 | 4 |
Quizzes | 2 | 2 |
Midterms | 1 | 1 |
Final | 1 | 1 |
Total Workload | 117 |