Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | MYO006 | ||||
Course Name: | Software Development | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Departmental Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | Ramazan ŞEN | ||||
Course Assistants: |
Course Objectives: | These lessons include loops, control structures, arrays, etc. Recognizes the building blocks of programming languages such as. They will also learn how to keep good records of reporting and programming. |
Course Content: | Basic building blocks of programming, arrays, debugging, version control systems. |
The students who have succeeded in this course;
1) Student will be able to define the basic concepts in programming, 2) The student will be able to write programs in Java, compile them and report errors. 3) The student will be able to use control structures (decision and loop statements) in Java. 4) The student will be able to design functions in Java. 5) The student will be able to use Version control systems. |
Week | Subject | Related Preparation |
1) | How a Computer Works (Memory, CPU, ALU) | Timur Karaçay - Yazılım Mühendisliğine Giriş |
2) | Version Control (git) | |
3) | Programming Best Practices (Naming conventions, packaging) | |
4) | Components of Programming | |
5) | Getting Starting with Primitive Types | |
6) | Working with Strings | Lecture notes |
7) | MIDTERM | Lecture notes |
8) | Control Structures | Lecture notes |
9) | Arrays | Lecture notes |
10) | 2D and Multidimensional Arrays | Lecture notes |
11) | Iteration (Loops) | Lecture notes |
12) | Writing Functions | Lecture notes |
13) | Recursions | Lecture notes |
14) | Debugging | Lecture notes |
15) | FINAL | FINAL |
Course Notes / Textbooks: | Öğr. Gör. Verileri |
References: | Öğr. Gör. Verileri |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | 3 | 1 | 1 | 1 | 1 | |||||||
2) Can install and manage software and hardware required for end user security. | 1 | 1 | 1 | 1 | 2 | |||||||
3) Can follow current security products. | 1 | 1 | 1 | |||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 1 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final Pratik | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 100 | |
PERCENTAGE OF FINAL WORK | % | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 0 | ||||
Laboratory | 14 | 0 | 0 | ||||
Study Hours Out of Class | 14 | 0 | 0 | ||||
Project | 20 | 0 | 0 | ||||
Midterms | 1 | 0 | 0 | ||||
Final | 1 | 0 | 0 | ||||
Total Workload | 0 |