Course Objectives: |
The objective of this course is to introduce the principles of database systems including a comprehensive introduction to data modeling, relational database design, query languages, transaction processing, distributed databases and physical database design. |
Course Content: |
Database requirements analysis, database definition, installation of database tools , creating tables and determining their characteristics, creating queries and using the types of queries,preparing queries with relational tables,using DML queries,writing user queries, normalization |
Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
|
|
Knowledge
(Described as Theoritical and/or Factual Knowledge.)
|
1) Know components of a database system.
|
2) Know the database design.
|
Skills
(Describe as Cognitive and/or Practical Skills.)
|
1) Use query language to elicit information from a database.
|
2) Categorize data models based on the types of concepts that they provide to describe the database structure.
|
3) Design relational databases in SQL.
|
Competences
(Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)
|
Week |
Subject |
Materials Sharing * |
|
Related Preparation |
Further Study |
1) |
Introduction to database |
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
2) |
Entity-Relationship diagram and DDL statements
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
3) |
Creating tables and DDL statements
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
4) |
Table properties and DML expressions
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
5) |
Data Types, Integrity, and Arithmetic Operators
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
6) |
Designing a database
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
7) |
Normalization |
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
8) |
Midterm |
|
|
9) |
Normalization |
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
10) |
Subquery |
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
11) |
Create a query in the database
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
12) |
Union and join statements
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
13) |
Union and join statements
|
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
14) |
Sample project in database |
Kerem Köseoğlu, Veritabanı Mantığı, Pusula Yayıncılık, 2016. Reading the related chapter and other resources to be obtained
|
|
15) |
Final Exam |
|
|
Course Notes / Textbooks: |
Kerem Köseoğlu, 2016; Veritabanı Mantığı, 10. Baskı, Pusula Yayıncılık
|
References: |
Turgut Özseven, 2019; Veritabanı Yönetim Sistemleri, 4.Baskı, Ekin Yayınevi
Coşkun Telciler, 2013; Veritabanı Kavramı ve MS-SQL Uygulamaları, Pusula Yayıncılık
Dr. Ali Nizam, 2011; Veritabanı Tasarımı-İlişkisel Veri Modeli ve Uygulamaları, Papatya Bilim
Musa Çiçek, 2010; Veritabanı Tasarımı ve SQL Sorgulama Dili, Nirvana Yayınevi
|
|
Programme Learning Outcomes |
Contribution Level (from 1 to 5) |
1) |
Defines the corporate cyber security rules and guidelines.
|
|
1) |
Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware. |
|
1) |
Follow the patches of information technology systems published against known cyber security gaps. |
|
1) |
Experiences all processes in business life. |
|
1) |
Explains the basic, theoretical and practical information in the field of information security technology. |
|
1) |
Acquires competency of analyzing and solving the problems. |
4 |
2) |
Know and analyze cyber assets in terms of information security. |
|
2) |
Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components. |
3 |
2) |
Information Security Creates procedure and control components |
2 |
2) |
Takes part in activities related to the field of education in a business operating in the field. |
|
2) |
Has awareness for ethical and social responsibility. |
|
2) |
Explains the importance of authorizing users as much as they can. |
5 |
3) |
Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks. |
|
3) |
Experience the cyber security risk management system. |
|
3) |
Explains the necessary policies and processes for effective event management. |
|
3) |
Identify non-technological tools and methods against cyber attack. |
|
3) |
Questions the application with theoretical knowledge. |
5 |
3) |
Takes responsibility as a team member in works and operations of his/her field. |
4 |
4) |
Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements. |
|
4) |
Is aware of written, verbal communication and interaction. |
3 |
4) |
Applies the theoretical knowledge learned in business life for a semester. |
|
4) |
Identifies the methods and methods of technological methods against cyber attack. |
2 |
4) |
Compiles the knowledge and experience gained in the field. |
5 |
5) |
Follows the developments of advanced technology and digital transformation. |
1 |
5) |
User training and security awareness describes the importance of cyberspace. |
|
5) |
Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society. |
|
6) |
Acquires the awareness for lifelong learning. |
3 |
6) |
Recall national and international legislation and regulations related to the field of Information Security Technology. |
|
7) |
Defines the fundamentals of programming and algorithm information. |
|
7) |
Has awareness about citizenship competency. |
|
8) |
Evaluates the developments of his/her field with the understanding of an entrepreneur. |
|
9) |
Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1). |
|
WORKLOAD OF TEACHING & LEARNING ACTIVITIES |
Teaching & Learning Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
Course |
14 |
2 |
28 |
Laboratory |
14 |
1 |
14 |
Application |
0 |
0 |
0 |
Special Course Internship (Work Placement) |
0 |
0 |
0 |
Field Work |
0 |
0 |
0 |
Study Hours Out of Class |
0 |
0 |
0 |
Presentations / Seminar |
0 |
0 |
0 |
Project |
0 |
0 |
0 |
Homework Assignments |
1 |
10 |
10 |
Total Workload of Teaching & Learning Activities |
- |
- |
52 |
WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES |
Assesment & Evaluation Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
Quizzes |
2 |
15 |
30 |
Midterms |
1 |
15 |
15 |
Semester Final Exam |
1 |
20 |
20 |
Total Workload of Assesment & Evaluation Activities |
- |
- |
65 |
TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) |
117 |
ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) |
5 |