INFORMATION TECHNOLOGIES (TURKISH, THESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
YZM5601 | Programming with Java | Fall | 3 | 0 | 3 | 8 |
The course opens with the approval of the Department at the beginning of each semester |
Language of instruction: | Tr |
Type of course: | Departmental Elective |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Prof. Dr. MEHMET ALPER TUNGA |
Course Lecturer(s): |
Instructor BİLGİN EŞME |
Course Objectives: | The students will learn the area of usage and the structure of the Java programming language. They can write easily simple applications. |
The students who have succeeded in this course; 1. Describe the Java Virtual Machine. 2. Define the concepts of Garbage collector 3. Describe the area of usage, advantages and disadvantages of Java 4. Explain the relationship between class and object 5. Apply the rules of the Java programming language 6. Develop basic algorithms and convert theses algorithms to the Java programming language 7. Apply the concepts of Test-Based Development to the examples 8. Compute the applications from the mind, express the results |
The content of this course is composed of The history of the Java language, Java Virtual Machine, Object-class relationship, The Java mention syntax highlighting the rules, Java syntax rules, Examining the examples of the Java applications, Loops in Java, Testing-based software development, Implementation of the various algorithms to Java programming language and the summary. |
Week | Subject | Related Preparation | |
1) | The history of the Java language | ||
2) | Java Virtual Machine | ||
3) | Object-class relationship | ||
4) | Syntax of Java programming Language | ||
5) | Syntax of Java programming language | ||
6) | Examining the examples of the Java applications | ||
7) | Examining the examples of the Java applications | ||
8) | Loops in Java | ||
9) | Loops in Java | ||
10) | Testing-based software development | ||
11) | Testing-based software development | ||
12) | Implementation of the various algorithms to Java programming language | ||
13) | Implementation of the various algorithms to Java programming language | ||
14) | Summary |
Course Notes: | Head First Java, 2nd Edition, Kathy Sierra, Bert Bates, O'Reilly, 2005, ISBN: 978-0-596-00920-5 |
References: | Yok - None. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 10 |
Laboratory | % 0 | |
Application | % 0 | |
Field Work | % 0 | |
Special Course Internship (Work Placement) | % 0 | |
Quizzes | 5 | % 10 |
Homework Assignments | 5 | % 10 |
Presentation | % 0 | |
Project | % 0 | |
Seminar | % 0 | |
Midterms | 1 | % 30 |
Preliminary Jury | % 0 | |
Final | 1 | % 40 |
Paper Submission | % 0 | |
Jury | % 0 | |
Bütünleme | % 0 | |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Laboratory | 0 | 0 | 0 |
Application | 14 | 3 | 42 |
Special Course Internship (Work Placement) | 0 | 0 | 0 |
Field Work | 0 | 0 | 0 |
Study Hours Out of Class | 14 | 3 | 42 |
Presentations / Seminar | 0 | 0 | 0 |
Project | 0 | 0 | 0 |
Homework Assignments | 0 | 0 | 0 |
Quizzes | 0 | 0 | 0 |
Preliminary Jury | 0 | 0 | 0 |
Midterms | 1 | 22 | 22 |
Paper Submission | 0 | 0 | 0 |
Jury | 0 | 0 | 0 |
Final | 1 | 41 | 41 |
Total Workload | 189 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Uses basic Software Engineering knowledge and competencies. | |
2) | Applies the software development ability that is necessary for software engineering applications. | |
3) | Uses data structures and applies information about algorithm development. | |
4) | Develops system programs on operating systems. | |
5) | Develops system programs on operating systems. | |
6) | Creates the structure of computer networks and network security. | |
7) | Uses business intelligence, data mining and data analysis tools, applies techniques about them. | |
8) | Develops database applications and WEB based programs. | |
9) | Defines, analyzes, designs and manages information technologies projects. | |
10) | Uses and develops technology-based environments and tools in education. | |
11) | Detects, identifies and solves information technology needs of the business environment. | |
12) | Uses the capabilities of information technologies within the rules of professional responsibility and ethics. |