Overview
I would certainly appreciate suggestions of other extra credit activities (preferably via email).
I forgot to log some of my time on the exam. What should I do?
Put in an approximate log.
; Time Log:
; Date Start Finish Elapsed Activity
; 2019-03-07 ~3:00 ~3:30 ~30min Woke up, typed code, went back to sleep (approx)
I think I can reuse a solution from a lab or homework assignment on this exam. Is that okay?
Sure, as long as you cite. E.g., “Lab from 03/06, completed by student 823412 and partner” or “Problem 2 on HW 5, completed by student 123152 and partner.”
Should there be a time log for the prologue?
Yes.
;; +----------+-------------------------------------------------------
;; | Prologue |
;; +----------+
; Time Log:
; Date Start Finish Elapsed Activity
On problem 3, what do you mean by “simplify any unnecessarily complicated code”?
There’s a lot of useless code in the procedure. Get rid of it.
What’s the pair in problem 3?
It wasn’t supposed to be there. It now reads
hash. (It was correct in the starter code.)
Did we get extra credit for any of the above errors?
Yes.
Can we put in insane restrictions in the preconditions, such as “all fieldsd must contain strings and those strings can only contain the letter a”?
No
But you can say “no quotation marks, no backslashes”
You must allow commas and colons.
You will not lose points for disallowing quotation marks and backslashes.
Why doesn’t SHACS have mental health appointments?
I don’t know, but you should be able to use telecounseling.
And, although it is not my responsibility, I express regret that the College is not able to provide sufficient face-to-face counseling resources, particularly during midsems and data breaches.
How would you social engineer an attack on our password system?
Develop a resource that people would want to use.
Set up an account creation system that requires “security” questions similar to those on PasswordReset.
Send an announcement to everyone in some group (e.g., admissions).
Alternately, set up one of those “learn about yourself” (e.g., “What kind of animal are you?”) quizzes and ask things similar to the security questions.
How does sort work?
You don’t need to know how, but you need to know what.
Sort takes two parameters, a list and a “less than operation”, and rearranges the list so that each element is less than the next element.
Your goal on problem 5 is to come up with the appropriate “less than operation” (binary predicate) that tells sort when to swap.
It should be loads of fun, or at least loads of confusion.
Yes, the code for average-w/o-extremes is incorrect. It is
intentionally incorrect. Our goal in this lab is to see how we can
track down bugs using the debugger. The debugger will be very important
starting next Wednesday.
filter-range is so strange because, in an earlier iteration of CSC 151,
we had students write it before they learned filter, but after they
learned sort, take, and drop. (We like to challenge students to
do things with limited tools; you’ve probably figured that out.)