Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI223 | ||||
Course Name: | Reproductive Health and Family Planning | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Araş. Gör. ELİF BALKAN | ||||
Course Lecturer(s): | Asst. Prof. Refika Genc Koyucu | ||||
Course Assistants: |
Course Objectives: | It aims to learn the importance of family planning in terms of family and society, and family planning methods. |
Course Content: | It includes the definition and importance of family planning, the purpose and benefits of family planning, family planning studies and practices, population characteristics and population policies in the world and in Turkey, the importance of family planning and counseling, family planning methods, contraception in emergency and special situations. |
The students who have succeeded in this course;
1) Define family planning, 2) Will be able to explain the aims and importance of family planning 3) will be able to discuss the characteristics of the population and population policies in the world and in Turkey 4) Will be able to explain family planning methods |
Week | Subject | Related Preparation |
1) | Course Introduction | |
2) | Definition and Importance of Family Planning | |
3) | Population Policies and the Situation of Family Planning in Turkey | |
4) | Female Reproductive Organs Anatomy and Physiology | |
5) | Male Reproductive Organs Anatomy and Physiology | |
6) | Formation Process of Pregnancy (Ovulation, fertilization and conception) | |
7) | The Role of Infections in Family Planning and Protection from Sexually Transmitted Infections | |
8) | Midterm exam | |
9) | Traditional Methods Used in Family Planning | |
10) | Traditional Methods Used in Family Planning | |
11) | Modern methods of contraception | |
12) | Modern methods of contraception | |
13) | Unwanted pregnancies and legal status | |
14) | Postcoital (emergency) contraception | |
15) | Term Evaluation | |
16) | Final exam |
Course Notes / Textbooks: | T.C. Sağlık Bakanlığı Aile Planlaması Danışmanlığı İçin Resimli Rehber |
References: | Öğretim üyesinin sunumları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 30 |
Final | 1 | % 70 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 30 | |
PERCENTAGE OF FINAL WORK | % 70 | |
total | % 100 |