Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI260 | ||||
Course Name: | Experimental Ex-libris Design | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Prof. Dr. HASİP PEKTAŞ | ||||
Course Lecturer(s): | Prof. Dr. Hasip Pektaş | ||||
Course Assistants: |
Course Objectives: | To comprehend the ex-libris culture, To teach the functions of exlibris, To encourage creativity, To gain self-confidence by designing an artistic product, |
Course Content: | In this course, students will learn the brief history, function and characteristics of the ex-libris sticked on the inside cover of the books and bearing the name of its owner. They will design original ex-libris for people who live as a communication object. They will create experimental examples by bringing together artistic thought. |
The students who have succeeded in this course;
1) Knows what exlibris is. 2) He/she can explain ex-libris to his/her close friends. 3) Can analyze the ex-libris samples. 4) Knows the principles of composition in exlibris design. |
Week | Subject | Related Preparation |
1) | Definition and brief history of ex-libris. Ex-libris samples. | |
2) | Functions and properties of ex-libris. | |
3) | Preparing ex-libris drafts for individuals or institutions. | |
4) | Designing ex-libris using photography. | |
5) | Basics of using Illustrator and Photoshop. | |
6) | Criticisms on drafts. | |
7) | Ex-libris reproduction, subtitle. DELIVERY OF HOMEWORKS. | |
8) | Analysis on ex-libris artists and designs from the world and Turkey. | |
9) | Ex-libris propagation techniques and properties. | |
10) | Drafting for ex-libris to be reproduced with linoleum printing technique. | |
11) | How do we apply the linoleum technique in Photoshop? | |
12) | Linoleum printing at home as much as possible. | |
13) | Suggestions for ex-libris collecting. TERM PROJECT DELIVERY. | |
14) | Presentation of ex-libris and preparation for exhibition. |
Course Notes / Textbooks: | Ekslibris (Hasip Pektaş) İstanbul Ekslibris Derneği Yayınları, 2017, İstanbul |
References: | http://www.aed.org.tr/tr/ (İstanbul Ekslibris Derneği Web Sitesi) http://exlibrist.net/index.php/exlibrist (Uluslararası Online Ekslibris Dergisi) http://art-exlibris.net/ (Danimarka Frederikshavn Ekslibris Müzesi Koleksiyonu) |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 2 | % 50 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Midterms | 1 | 55 | 2 | 57 | |||
Final | 1 | 55 | 2 | 57 | |||
Total Workload | 114 |