Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | MYO001 | ||||
Course Name: | Visual Programming | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Departmental Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | Ramazan ŞEN | ||||
Course Assistants: |
Course Objectives: | Development of form applications using the C# language in Visual Studio environment. |
Course Content: | Use of Visual Studio, use of the .Net Framework, use of the C# language, form controls, event methods, object identification, dll usage, files, multiform usage, interform information exchange, error management |
The students who have succeeded in this course;
1) Interpret form designs 2) Designing form applications in Visual Studio 3) Developing projects in C# programming language |
Week | Subject | Related Preparation |
1) | .NET Framework Architecture | |
2) | Visual Studio Development Environment and Visual Programming | |
3) | Variables, Data Types, Control Structures | |
4) | Common Windows Form Controls-1 | |
5) | Common Windows Form Controls-2 | |
6) | Common properties | |
7) | Data Types | |
8) | Midterm Exam | |
9) | Methods and Functions | |
10) | Event Methods | |
11) | Object Identification and DLL Usage | |
12) | File and Folder Operations | |
13) | Multiform Usage | |
14) | Error Management | |
15) | Final Exam | |
16) | Final Exam |
Course Notes / Textbooks: | Öğr Gör. notları |
References: | C# Başlangıç Rehberi, İ.Karagülle, Türkmen Yayınevi Her yönüyle C#, Sefer Algan, Pusula Yayıncılık |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | 1 | 1 | 1 | |||||||||
2) Can install and manage software and hardware required for end user security. | 1 | 1 | 1 | |||||||||
3) Can follow current security products. | 1 | 1 | 1 | |||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | 2 | 1 | ||||||||||
5) Installs the basic software and hardware of the computer. | 2 | 1 | 1 | |||||||||
6) Installs and manages open source operating system and computer networks software. | 1 | 1 | 1 | |||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | 1 | 1 | 1 | |||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 | 2 | 1 | |||||||||
9) Creates, manages and organizes space on cloud platforms. | 1 | 1 | 1 | |||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | 1 | 1 | 1 | |||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 | 1 | 1 | |||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 | 2 | 1 |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 1 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 13 | 26 |
Application | 13 | 13 |
Project | 1 | 10 |
Midterms | 1 | 6 |
Final | 1 | 10 |
Total Workload | 65 |