Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | MYO005 | ||||
Course Name: | Robotics | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Departmental Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | |||||
Course Assistants: |
Course Objectives: | The main purpose of the course is to teach students the definition of embedded systems, hardware features and software tools that enable the programming of these systems. In addition, it is aimed to enable students to design a system using electronic equipment such as sensors, engines, etc. used in con conversely with these systems. |
Course Content: |
The students who have succeeded in this course;
1) To be able to define the embedded system; 2) To distinguish the types of embedded systems commonly used today. 3) To be able to explain hardware components on embedded systems 4) To be able to develop software for embedded systems 5) To make robotic applications using embedded systems. |
Week | Subject | Related Preparation |
1) | Definition, historical development and types of the embedded system | |
2) | Hardware components of the embedded system | |
3) | Input units in embedded systems | |
4) | Output units in embedded systems | |
5) | Software development environment in the embedded system | |
6) | Basics of programming in the embedded system | |
7) | Using inputs in embedded systems | |
8) | Midterm Exam | |
9) | Using outputs in embedded systems | |
10) | Mathematical operations with embedded systems | |
11) | Serial communication with embedded systems | |
12) | LCD screen applications with embedded systems | |
13) | Sensor applications with embedded systems | |
14) | Example robotic applications with embedded systems |
Course Notes / Textbooks: | |
References: |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | 1 | 1 | 1 | 1 | 1 | |||||||
2) Can install and manage software and hardware required for end user security. | 1 | 1 | 1 | 1 | 1 | |||||||
3) Can follow current security products. | 1 | 1 | 1 | 1 | 1 | |||||||
4) It can manage both software and people in the environment against cyber attack incidents. | 1 | 1 | 1 | 1 | 1 | |||||||
5) Installs the basic software and hardware of the computer. | 1 | 1 | 1 | 1 | 1 | |||||||
6) Installs and manages open source operating system and computer networks software. | 1 | 1 | 1 | 1 | 1 | |||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | 1 | 1 | 1 | 1 | 1 | |||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 | 1 | 1 | 1 | 1 | |||||||
9) Creates, manages and organizes space on cloud platforms. | 1 | 1 | 1 | 1 | 1 | |||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | 1 | 1 | 1 | 1 | 1 | |||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 | 1 | 1 | 1 | 1 | |||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 | 1 | 1 | 1 | 1 |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 2 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 2 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Laboratory | 14 | 3 | 42 | ||||
Midterms | 1 | 20 | 20 | ||||
Final | 1 | 20 | 20 | ||||
Total Workload | 82 |