Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI221 | ||||
Course Name: | Mother and Child Health | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Araş. Gör. ELİF BALKAN | ||||
Course Lecturer(s): | Asst. Prof. Refika Genc Koyucu | ||||
Course Assistants: |
Course Objectives: | Students' maternal and child health, Pregnancy, Childbirth, Postpartum, Diseases of 0-5 year old children, Contagious Diseases of 0-5 year old children, etc. to develop their skills. |
Course Content: | Definition of mother-child health, status of child health in our country and in the world, formation of pregnancy, child development during pregnancy, physical development (height, weight) and follow-up of 0-5 year old children, pediatric diseases (diarrhea and respiratory tract infections) seen in 0-5 year old children , immunization and rash diseases), vaccines, alternative practices related to pregnancy and newborn. |
The students who have succeeded in this course;
1) Will be able to define the factors affecting maternal and child health in the world and in our country. 2) Will be able to evaluate the criteria showing maternal and child health. 3) Will be able to explain the formation of pregnancy and the development of the child during pregnancy. 4) Will be able to define infectious and chronic diseases of children. 5) Will know the basic concepts of maternal and child health. 6) Has knowledge about alternative practices related to pregnancy and newborn. |
Week | Subject | Related Preparation |
1) | The Situation of Mother-Child Health in the World in Turkey and Basic Indicators | |
2) | Definition of Health and Factors Affecting Health | |
3) | Pregnancy Development (Antenatal, Birth, Postnatal) | |
4) | Child Development (Postnatal Newborn Care) | |
5) | Robust Child Follow-up (Public Health Approach) | |
6) | Dairy Banking and Ethical Dimension | |
7) | Midterm exam | |
8) | Diseases and Symptoms of 0-5 Years-Old Children | |
9) | Diseases and Symptoms of 0-5 Years-Old Children | |
10) | Traditional (Taste) Practices in the Newborn | |
11) | vaccines | |
12) | Game Injuries and First Aid | |
13) | Approach to Child Abuse | |
14) | Baby and Child Nutrition | |
15) | Course evaluation | |
16) | Final exam |
Course Notes / Textbooks: | T.C. Sağlık Bakanlığı anne bebek cocuk ergen izlem protokolleri rehberi |
References: | Öğretim üyesinin önerdiği makaleler |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 30 |
Final | 1 | % 70 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 30 | |
PERCENTAGE OF FINAL WORK | % 70 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 42 |
Presentations / Seminar | 7 | 21 |
Homework Assignments | 16 | 48 |
Midterms | 1 | 3 |
Final | 1 | 3 |
Total Workload | 117 |