BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | 2022211007 | ||||||||
Ders İsmi: | Web Programing | ||||||||
Ders Yarıyılı: | Fall | ||||||||
Ders Kredileri: |
|
||||||||
Language of instruction: | TR | ||||||||
Ders Koşulu: | |||||||||
Ders İş Deneyimini Gerektiriyor mu?: | No | ||||||||
Type of course: | Necessary | ||||||||
Course Level: |
|
||||||||
Mode of Delivery: | Face to face | ||||||||
Course Coordinator : | Öğr.Gör. Yunus KURAL | ||||||||
Course Lecturer(s): |
Öğr.Gör. Yunus KURAL |
||||||||
Course Assistants: |
Course Objectives: | The main purpose of this course is to provide students with Internet and Web programming skills and to enable students to develop applications with HTML5, CSS and javascript languages. |
Course Content: | Basic elements of HTML5. Dynamic HTML - CSS, javascript, object modeling and aggregation, event model, filters and transitions. Introduction to XML and Ajax. |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Introduction, Basic information about Computers and Internet, definitions | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
2) | HTML5, core tags | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
3) | HTML5 forms and Frames | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
4) | Formatting, Cascading Style sheets | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
5) | Introduction to Javascript language | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
6) | Javascript Control statements | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
7) | Javascript Functions | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
8) | Midterm Exam | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
9) | Javascript Arrays | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
10) | Javascript Objects | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
11) | Dynamic Web Pages | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
12) | Javascript Events | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
13) | Document Object Model | None1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
14) | Introduction to XML and Ajax | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 |
Course Notes / Textbooks: | Internet & World Wide Web How to Program, 5/e, Paul J. Deitel, Harvey M. Deitel, Abbey Deitel, Prentice Hall, 2012 |
References: | 1. Web Programming Step by Step, Second Edition, Jessica Miller, Victoria Kirst, Marty Stepp, Step by Step Publishing, 2012 2. HTML5 Programming with JavaScript For Dummies, John Paul Mueller, For Dummies, 2013 |
Ders Öğrenme Kazanımları | 1 |
2 |
3 |
4 |
---|---|---|---|---|
Program Outcomes | ||||
1) Having knowledge and skills in security algorithms for programming | ||||
2) Ability to install and manage software required for end user security | ||||
3) Having the ability to install and manage computer networks and use the network operating system | ||||
4) Have basic database and web programming skills |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Having knowledge and skills in security algorithms for programming | 3 |
2) | Ability to install and manage software required for end user security | 3 |
3) | Having the ability to install and manage computer networks and use the network operating system | 5 |
4) | Have basic database and web programming skills | 2 |
Bireysel çalışma ve ödevi | |
Course | |
Homework |
Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama) | |
Homework |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 30 |
Midterms | 1 | % 30 |
Semester Final Exam | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 2 | 28 |
Laboratory | 14 | 2 | 28 |
Homework Assignments | 1 | 10 | 10 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 106 |