Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | MYO015 | ||||
Course Name: | Math | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Departmental Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. EMRE DEMİR | ||||
Course Lecturer(s): | Öğr. Gör. Emre DEMİR | ||||
Course Assistants: |
Course Objectives: | Providing a better understanding of the basic subjects of the vocational courses, producing concrete and quick solution to the problems encountered in business life by using mathematical information, Helping to make risk analysis, Providing the most profitable choice at the lowest cost and spreading the use of mathematical operations |
Course Content: | Arithmetic; Arithmetic terms and signs, numbers, multipliers and superscripts, ratio and proportion, averages and percentages, Algebra; evaluation of simple algebraic expressions, four operations, parenthesized operations, linear equations, number systems, first order equations, second order equations, logarithm, Geometry; simple geometric constructions, space and volume, graphs, equation and function graphs, simple trigonometry, trigonometric relations. |
The students who have succeeded in this course;
1) Apply mathematical knowledge to problems and calculations in departmental courses 2) Ability to gain analytical and rapid thinking skills 3) To be able to transfer reasoning and versatile thinking into daily life, 4) Mathematical reading and writing |
Week | Subject | Related Preparation |
1) | Integers and Natural Numbers | |
2) | Rational and dedy numbers | |
3) | Splitting and dividing | |
4) | Ratio-proportion | |
5) | Exponenmed numbers | |
6) | Rooted numbers | |
7) | General re-repeat | |
8) | INTERMEDIATE EXAM | |
9) | Multiplier allocation | |
10) | Identifiies | |
11) | Number-fraction problems | |
12) | Age-mixing problems | |
13) | Percentage problems | |
14) | General re-repeat | |
15) | FİNAL EXAM |
Course Notes / Textbooks: | 2021 DGS Tamamı Çözümlü Soru Bankası Pegem Yayınları |
References: | Ders notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 13 | 26 |
Study Hours Out of Class | 13 | 58 |
Midterms | 1 | 1 |
Final | 1 | 1 |
Total Workload | 86 |