Educational guide School of Engineering |
english |
Computer Engineering: Computer Security and Intelligent Systems (2013) |
Subjects |
PRIVACY PROTECTION |
Methodologies |
IDENTIFYING DATA | 2014_15 |
Subject | PRIVACY PROTECTION | Code | 17665206 | |||||
Study programme |
|
Cycle | 2nd | |||||
Descriptors | Credits | Type | Year | Period | ||||
4.5 | Optional | 2Q |
Competences | Learning outcomes | Contents |
Planning | Methodologies | Personalized attention |
Assessment | Sources of information | Recommendations |
Description | |
Introductory activities | The first session introduces the course, describing the objectives, schedule, and how the course will be assessed. |
Lecture | The teacher explains the units of the course. |
Practicals using information and communication technologies (ICTs) in computer rooms | There are four class works. All class works have several objectives to accomplish, by means of a set of exercises that students must complete. The results obtained are discussed by the students at the end of each class. |
Personal tuition | Practicals using information and communication technologies (ICTs) in computer rooms: The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle. Lecture: The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle. |