CSC 310 Programming Languages, Spring 2014, Dr. Dale E. Parson
|
|
- Agnes Kelley
- 5 years ago
- Views:
Transcription
1 CSC 310 Programming Languages, Spring 2014, Dr. Dale E. Parson Assignment 3, Perquacky in Python, due 11:59 PM, Saturday April 12, 2014 I will turn the solution back on Monday April 14, after which I will accept no late solution. Read the sections in Chapter IV entitled Classes and Advanced Class Definition in as preparation for this assignment after the midterm. The book is linked on the course page. Login into your account on acad/bill and do the following steps: cp ~parson/proclang/perquack3.problem.zip ~/ProcLang/perquack3.problem.zip cd ~/ProcLang unzip perquack3.problem.zip cd./perquack3 gmake clean test Initially Perquacky.java will test correctly but Perquacky.py will not because Perquacky.py is incomplete. Your assignment is to use Java class Perquacky in Perquacky.java as a model for completing Python class Perquacky in Perquacky.py as explained in detail in STUDENT comments in Perquacky.py. Make sure to read them all thoroughly. In addition to the Java source code, there is Javadoc for the Java solution, including private fields and methods, at: If you just want to run Java tests invoke gmake testj. For the Python tests invoke gmake testpy. As usual use gmake clean test to run tests. Here is what the solution test run looks like. -bash-3.00$ gmake clean test /bin/rm -f *.o *.class.jar core *.exe *.obj *.pyc /bin/rm -f *.class *.pyc *.out *.dif testsave.dat *.dat /bin/rm -f./perquacky CLASSPATH=.. /usr/jdk/jdk1.6.0_02/bin/javac Perquacky.java JAVA COURSE ASSIGNMENT1 TESTS STARTED CLASSPATH=.. /usr/jdk/jdk1.6.0_02/bin/java perquack3.perquacky english.mthes.txt hermione harry ron < jtest1.txt > jtest1.out 2>jtest1.error.out diff jtest1.out jtest1.ref > jtest1.dif diff jtest1.error.out jtest1.error.ref > jtest1.error.dif JAVA ASSIGNMENT1 TESTS PASS gmake[1]: Entering directory `/export/home/faculty/parson/private/csc310/solutions/perquack3' gmake[1]: Leaving directory `/export/home/faculty/parson/private/csc310/solutions/perquack3' ASSIGNMENT3 PYTHON TESTS STARTED PYTHONPATH=. python Perquacky.py english.mthes.txt harry hermione ron < pytest1.txt > pytest1.out 2>pytest1.error.out diff pytest1.out pytest1.ref > pytest1.dif diff pytest1.error.out pytest1.error.ref > pytest1.error.dif gmake[1]: Entering directory `/export/home/faculty/parson/private/csc310/solutions/perquack3' gmake[1]: Leaving directory `/export/home/faculty/parson/private/csc310/solutions/perquack3' ASSIGNMENT3 PYTHON TESTS PASS The handout tests run the same for Java, but the Python tests give diffs. To play the Java game interactively just do this: page 1 Dr. Dale E. Parson, CSC 310, Spring, 2014,
2 CLASSPATH=.. /usr/jdk/jdk1.6.0_02/bin/java perquack3.perquacky english.mthes.txt hermione harry ron You can use other player names, and use a different pseudo-random number generator seed to get a different game sequence. Below is a static call graph for all of the methods in the Java class. Java students had to write all of the ones labeled STUDENT. You will write all of the Python methods except main and the Perquacky constructor. Method call graph for assignment 3 After gmake clean test runs without diffs, please reread these specifications and the STUDENT comments in Perquacky.py to make sure you don t miss anything. Complete the optional survey.txt if you want to, and then gmake turnitin as usual before the deadline. Time management study survey: OPTIONAL 2% BONUS CREDITS I am collecting data for assessment that determines the associations between a) project start date, b) length of work sessions, c) time of day of work sessions, and d) conflicting schedule pressures, and student success on projects as measured by grades and grade improvements. You can earn half of these bonus points (1% additional for the project) by permitting me to collect file sizes, time stamps, time of change, and duration of work session. My automatic script uses a simple ls l command to list directory contents, and it keeps backup copies of your source files to determine amount of code changed per session. The log data goes to my account to keep your account from running out of file space. page 2 Dr. Dale E. Parson, CSC 310, Spring, 2014,
3 If you do not want to participate, run gmake optout to shut off data collection, and also notify me my using the subject line opt out. I will not collect your data, and if you have already turned some in, I will remove the files. You can earn an additional 1% bonus point by completing a survey in file survey.txt in the project directory. Please fully replace each ****** field with a number. To get this 1% you must also allow data collection for the previous 1%. This survey is not useful without the auto-collected log data. Thus, the total possible points for a project is 102%. The collected data in no way affects your grade, other than by contribution of bonus points. My assessment outlined in the first paragraph of this section could show an association between number of CSC courses that assign you big projects on the same week and the rate of problems encountered completing an assignment. I am looking for ways to improve success rates on projects in future semesters, and I need to collect data in survey.txt and by automatic data collection before I can analyze these data. This is not secret data mining, and I have no time or intention of analyzing the data until this summer. Again, if you wish to opt out of this optional part of assignments, there is no penalty. Perquacky.py as handed out: 1 # perquack3/perquacky.py 2 # CSC 310 Programming Languages Spring # D. Parson's handout starting point for Perquacky problem 3. 4 # STUDENT 1: Place your name here. 5 # See 6 # and Perquakcy.java for the complete Java solution. 7 8 import random 9 import sys 10 import copy class Perquacky(object): 13 ''' 14 An object of class Perquacky allows two or more players 15 to place the dice-based word game Perquacky. 16 ''' 17 # STUDENT 2: Write the initializations for all of the class-static 18 # data fields below except vulnerablescore and blackdice, which I 19 # have given you. Also, write documentation STRINGS similar to 20 # mine immediately AFTER each class-static field initialization. 21 # You can use the documentation from the Java Perquacky.java or 22 # 23 vulnerablescore = ''' 25 A player becomes vulnerable after attaining a score of 26 vulnerablescore, after which that played must make 27 vulnerablerequired per complete round, or lose 28 vulnerablepenalty points. 29 ''' 30 blackdice = [ # each row is a die 31 ['r', 'i', 'f', 's', 'u', 'h'], 32 ['k', 't', 'h', 'r', 'b', 'i'], 33 ['b', 'w', 'y', 'l', 'o', 'o'], 34 ['e', 'a', 'a', 'a', 'e', 'e'], 35 ['o', 'o', 'p', 'c', 'w', 'm'], page 3 Dr. Dale E. Parson, CSC 310, Spring, 2014,
4 36 ['r', 'u', 'm', 'i', 's', 'g'], 37 ['e', 'a', 'e', 'a', 'a', 'e'], 38 ['n', 'd', 'o', 't', 'l', 'r'], 39 ['e', 'q', 'v', 'x', 'j', 'z'], 40 ['f', 'n', 'u', 'p', 'i', 't'] 41 ] 42 ''' 43 blackdice holds the black dice, 1 1D array of 44 6 letters per die. 45 ''' 46 # STUDENT 3 I have written the constructor and Python's equivalent 47 # of Java's Perquacky.main. You must write all of the other methods 48 # from Perquacky.java or their equivalents. In some cases it may 49 # not be necessary to translate a private helper method to Python, 50 # because Python easy to do the same work using built-in techniques. 51 # It is up to you concerning how closely to stick to the Java code. 52 # However, you will have to be careful to match the sequence of 53 # calls to the pseudo-random number generator in order to match my 54 # test output in pytest1.ref and pytest1.error.ref. Your output 55 # must match pytest1.ref and pytest1.error.ref exactly. 56 def init (self, dictionaryfilename, seed, playerlist): 57 ''' 58 Construct a Perquacky object that is ready to play via 59 the play() method. dictionaryfilename is the path to the dictionary file 61 with one word per line. seed is the seed integer for the pseudo-random 63 generator used to order the players and role the dice. 64 A negative seed lets the generator seed itself. Use a 65 non-negative seed to repeat test runs. playerlist is an array of two or more player names. 67 ''' 68 # STUDENT NOTE: All fields contained within the object are first 69 # defined inside the constructor. Note that "self" is Python's 70 # equivalent to C++ or Java's "this" pointer. It must appear 71 # as the first parameter of non-static methods (a.k.a. object 72 # methods), and it must always be used explicitly to reference 73 # the current object's fields and methods. 74 # IMPORTANT THINGS TO NOTE: 75 # A. Calling self.randomnumgenerator.randint(a,b) returns an 76 # integer from A through B *inclusive*, meaning that B may be 77 # among the returned values. Including B is rather unusual; 78 # Java's randomnumgenerator.nextint and most Python functions 79 # and methods (such as range(a,b)) do not include the upper 80 # bound itself. They operate in the range [A, B). 81 # B. When you want to use a static field in your code, you must 82 # refer it it like this: Perquacky.vulnerableScore 83 # Its name is CLASSNAME.FIELDNAME. The same holds for static 84 # methods, but there are none in this assignment. 85 # Object methods and fields are prefixed with self. when used 86 # from within an object method. 87 # C. Where Perquacky.java uses System.out.print or System.out.println, 88 # use sys.stdout.write with a single string argument. Glue together 89 # a single string argument using string concatenation, and convert 90 # any non-string to a string by using the str() constructor on that 91 # object. Concatenation requires only string objects. Also, page 4 Dr. Dale E. Parson, CSC 310, Spring, 2014,
5 92 # concatenate '\n' if you want the equivalent of println. Also, 93 # where Perquacky.java uses System.err.print or System.err.println, 94 # use sys.stderr.write. There is an example of sys.stdout.write in 95 # my constructor code below. 96 # STUDENT THIS CONSTRUCTOR IS COMPLETE AND CORRECT AS WRITTEN. 97 self.dictionary = set([]) 98 dfile = open(dictionaryfilename, "ru") 99 line = dfile.readline() 100 while line: 101 line = line.strip() 102 if line: 103 self.dictionary.add(line.lower()) 104 line = dfile.readline() 105 dfile.close() 106 self.randomnumgenerator = random.random() 107 if seed < 0: 108 self.randomnumgenerator.seed(none) # default seed 109 else: 110 self.randomnumgenerator.seed(seed) # explicit 111 self.players = [] # random order 112 self.score = [] # parallel to player name 113 plist = copy.copy(playerlist) # shallow copy 114 while plist: 115 if len(plist) == 1: 116 index = else: 118 index = self.randomnumgenerator.randint(0, 119 len(plist)-1) 120 self.players.append(plist[index]) 121 self.score.append(0) 122 del plist[index] 123 sys.stdout.write("order of play is:") 124 for p in self.players: 125 sys.stdout.write(' ' + p) 126 sys.stdout.write('\n') 127 def validateword (self, whoix, letters, word, wordsformed, 128 smallestword, wordset): 129 ''' 130 Validate that the word is legal, or if it is not, 131 report the problem to the error output and return. 132 This method does not compute score or change object state. whoix is the internal index of the player. letters is the list of letters to be used. word is the word proposed by the user. wordsformed is a 2D array of words, where each 137 1D column holds the words of a given length, starting 138 with 3-letter words at wordsformed[0]. smallestword is the length of the smallest allowed word 140 in this round for this player, may be 3 or 4. wordset is the set of words formed by this player 142 so far in this round. 143 ''' 144 pass # STUDENT REPLACE THIS LINE WITH THE METHOD CODE 145 # STUDENT MAKE SURE TO INCLUDE ALL THE TESTS IN THE JAVA METHOD. 146 def scorewords (self, whoix, wordsformed, isvulnerable): 147 ''' page 5 Dr. Dale E. Parson, CSC 310, Spring, 2014,
6 148 Score the already-validated word, returning the score for 149 this player in this round, and updated the player's 150 overall score (sum) in this object. scorewords will update 151 and return a negative score when a vulnerable player does 152 not make the required number of points. whoix is the internal index of the player. wordsformed is a 2D array of words, where each 155 1D column holds the words of a given length, starting 156 with 3-letter words at wordsformed[0]. isvulnerable is True if the player's score has 158 entered the vulnerable state, at which point the player 159 must make a minimum number of vulnerablerequired points 160 to avoid a penalty. this player's score for this round. 162 ''' 163 pass # STUDENT REPLACE THIS LINE WITH THE REAL CODE 164 def playplayer (self, whoix): 165 ''' 166 Let the next player take a turn in this round. whoix is the internal index of this player. the player's score at the end of the round. 169 ''' 170 pass # STUDENT REPLACE THIS LINE WITH THE REAL CODE 171 def playround (self): 172 ''' 173 Play one round among all players, then return. the largest total current score. 175 ''' 176 pass # STUDENT REPLACE THIS LINE WITH THE REAL CODE 177 def play(self): 178 ''' 179 Play the entire game until someone wins, allowing 180 each player to play in every round. At present there 181 is no means for stopping or saving a game. It must 182 complete or be aborted from outside the program. 183 ''' 184 pass # STUDENT REPLACE THIS LINE WITH THE REAL CODE 185 if name == ' main ': 186 ''' 187 Validate command line arguments, then construct and play 188 a game of Perquacky to completion. Command line usage is: 189 python Perquacky.py dictionaryfilename seed players where there must be 2 or more players. 191 ''' 192 # STUDENT THIS MAIN IS COMPLETE AND CORRECT AS WRITTEN. 193 usage = \ 194 "python Perquacky.py dictionaryfilename seed players..." 195 if len(sys.argv) < 5: 196 sys.stderr.write(usage + '\n') 197 sys.exit(1) 198 players = sys.argv[3:] 199 game = Perquacky(sys.argv[1], int(sys.argv[2]), players) 200 game.play() 201 sys.exit(0) page 6 Dr. Dale E. Parson, CSC 310, Spring, 2014,
Assignment 2, perquack2 class hierarchy in Java, due 11:59 PM, Sunday March 16, 2014 Login into your account on acad/bill and do the following steps:
CSC 243 Java Programming, Spring 2014, Dr. Dale E. Parson Assignment 2, perquack2 class hierarchy in Java, due 11:59 PM, Sunday March 16, 2014 Login into your account on acad/bill and do the following
More informationHere are the steps to get the files for this project after logging in on acad/bill.
CSC 243, Java Programming, Spring 2013, Dr. Dale Parson Assignment 3, cloning & serializing game state for save & restore commands ASSIGNMENT due by 11:59 PM on Thursday April 11 via gmake turnitin Here
More informationHere are the steps to get the files for this project after logging in on acad/bill.
CSC 243, Java Programming, Spring 2013, Dr. Dale Parson Assignment 5, handling events in a working GUI ASSIGNMENT due by 11:59 PM on Thursday May 9 via gmake turnitin Here are the steps to get the files
More informationHere are the steps to get the files for this project after logging in on acad/bill.
CSC 243, Java Programming, Spring 2014, Dr. Dale Parson Assignment 4, implementing undo, redo & initial GUI layout ASSIGNMENT due by 11:59 PM on Saturday April 19 via gmake turnitin ASSIGNMENT 5 (see page
More informationCSC 543 Multiprocessing & Concurrent Programming, Fall 2016
CSC 543 Multiprocessing & Concurrent Programming, Fall 2016 Dr. Dale E. Parson, Midterm Exam Project, Assorted Thread Synchronization Problems This assignment is due by 11:59 PM on Wednesday November 2
More informationCSC 343 Operating Systems, Fall 2015
CSC 343 Operating Systems, Fall 2015 Dr. Dale E. Parson, Assignment 4, analyzing swapping algorithm variations. This assignment is due via gmake turnitin from the swapping2015 directory by 11:59 PM on
More informationCSC UNIX System, Spring 2015
` CSC 352 - UNIX System, Spring 2015 Assignment 2, due by 11:59 on Friday March 6 via gmake turnitin. Dr. Dale E. Parson, http://faculty.kutztown.edu/parson The directory, source-file and makefile contents
More information15-110: Principles of Computing, Spring 2018
5-: Principles of Computing, Spring 28 Problem Set 8 (PS8) Due: Friday, March 3 by 2:3PM via Gradescope Hand-in HANDIN INSTRUCTIONS Download a copy of this PDF file. You have two ways to fill in your answers:.
More informationPerform the following steps to copy and inspect my initial code handout.
Java classes, interfaces and exceptions Assignment 2 for CSC 243, Spring, 2010, Dr. Dale E. Parson http://faculty.kutztown.edu/parson/spring2010/csc243spring2010.html Assignment 2 is due 11:59 PM on Thursday
More informationIntroduction to Programming System Design CSCI 455x (4 Units)
Introduction to Programming System Design CSCI 455x (4 Units) Description This course covers programming in Java and C++. Topics include review of basic programming concepts such as control structures,
More informationCSC 343 Operating Systems, Fall 2015
CSC 343 Operating Systems, Fall 2015 Dr. Dale E. Parson, Assignment 2, modeling an atomic spin lock, a mutex, and a condition variable. This assignment is due via gmake turnitin from the criticalsection2015
More informationCSC UNIX System, Spring 2015
CSC 352 - UNIX System, Spring 2015 Study guide for the CSC352 midterm exam (20% of grade). Dr. Dale E. Parson, http://faculty.kutztown.edu/parson We will have a midterm on March 19 on material we have
More informationStudent Responsibilities. Mat 2170 Week 9. Notes About Using Methods. Recall: Writing Methods. Chapter Six: Objects and Classes
Student Responsibilities Mat 2170 Week 9 Objects and Classes Spring 2014 Reading: Textbook, Sections 6.1 6.3 Lab 9 Attendance 1 2 Recall: Writing Methods 3 Decomposition: break a problem down into smaller
More informationMat 2170 Week 9. Spring Mat 2170 Week 9. Objects and Classes. Week 9. Review. Random. Overloading. Craps. Clients. Packages. Randomness.
Spring 2014 Student Responsibilities Reading: Textbook, Sections 6.1 6.3 Attendance Recall: Writing Methods Decomposition: break a problem down into smaller subproblems Use methods whenever you can in
More informationYork University AK/ITEC OBJECT-BASED PROGRAMMING. Midterm Test Sample. Examiner: S.Y. Chen Duration: One Hour and Fifteen Minutes
York University AK/ITEC 1620 3.0 OBJECT-BASED PROGRAMMING Midterm Test Sample Examiner: S.Y. Chen Duration: One Hour and Fifteen Minutes This exam is closed textbook(s) and closed notes. Use of any electronic
More informationCSC 510 Advanced Operating Systems, Fall 2017
CSC 510 Advanced Operating Systems, Fall 2017 Dr. Dale E. Parson, Assignment 4, Benchmarking and analyzing a modified Assignment 1 running on System VMs on Type 1 and Type 2 hypervisors. This assignment
More informationCSC 552 UNIX System Programming, Fall 2015
CSC 552 UNIX System Programming, Fall 2015 Dr. Dale E. Parson, Assignment 4, multi-threading a socket-based server loop & helper functions. This assignment is due via make turnitin from the wordcathreadc4/
More informationCSC 220 Object Oriented Multimedia Programming, Fall 2018
CSC 220 Object Oriented Multimedia Programming, Fall 2018 Dr. Dale E. Parson, Assignment 3, text menu on a remote-control Android, mostly array handling. This assignment is due via D2L Assignment Assignment
More information15-110: Principles of Computing, Spring 2018
15-110: Principles of Computing, Spring 2018 Problem Set 5 (PS5) Due: Friday, February 23 by 2:30PM via Gradescope Hand-in HANDIN INSTRUCTIONS Download a copy of this PDF file. You have two ways to fill
More informationSan Jose State University College of Science Department of Computer Science CS185C, Introduction to NoSQL databases, Spring 2017
San Jose State University College of Science Department of Computer Science CS185C, Introduction to NoSQL databases, Spring 2017 Course and Contact Information Instructor: Dr. Kim Office Location: MacQuarrie
More informationCSCI 111 First Midterm Exam Fall Solutions 09.00am 09.50am, Wednesday, October 18, 2017
QUEENS COLLEGE Department of Computer Science CSCI 111 First Midterm Exam Fall 2017 10.18.17 Solutions 09.00am 09.50am, Wednesday, October 18, 2017 Problem 1 (10 points) The following C++ program has errors
More information15-110: Principles of Computing, Spring 2018
15-110: Principles of Computing, Spring 2018 Programming Assignment 11 (PA11) Due: Tuesday, May 1 by 9PM IMPORTANT ANNOUNCEMENT You cant drop this assignment even if it is your lowest PA score. Failure
More informationCISC-235* Test #2 October 15, 2018
CISC-235* Test #2 October 15, 2018 Student Number (Required) Name (Optional) This is a closed book test. You may not refer to any resources. This is a 50 minute test. Please write your answers in ink.
More informationUniversity of Massachusetts Amherst, Electrical and Computer Engineering
University of Massachusetts Amherst, Electrical and Computer Engineering ECE 122 Midterm Exam 1 Makeup Answer key March 2, 2018 Instructions: Closed book, Calculators allowed; Duration:120 minutes; Write
More informationEECE.2160: ECE Application Programming Spring 2019
Course Meetings Section 201: MWF 8-8:50, Kitson 305 Section 202: MWF 12-12:50, Kitson 305 Course Website Main page: http://mjgeiger.github.io/eece2160/sp19/ Schedule: http://mjgeiger.github.io/eece2160/sp19/schedule.htm
More informationPARTICIPANT (STUDENT) DOCUMENTATION Introduction
PARTICIPANT (STUDENT) DOCUMENTATION Introduction The Experiment Management System provides an easy method for you to sign up for studies, and track your progress through the term. Everything is done through
More informationProgramming Assignment 6: Famous Scientists Diving Competition
Page 1 of 5 Programming Assignment 6: Famous Scientists Diving Competition COP 3014 - Spring Term 2010 Point Value: 100 points Project Due Date: Wednesday April 21, 2010 at 11:59 PM NO programs will be
More information1st Semester Examinations CITS1001 3
1st Semester Examinations CITS1001 3 Question 1 (10 marks) Write a Java class Student with three fields: name, mark and maxscore representing a student who has scored mark out of maxscore. The class has
More informationCE151 ASSIGNMENT
Set by: Mike Sanderson Credit: 20% of total module mark Deadline: 11.59.59, Monday 8 December Submission of this assignment will be via the online submission system; your programs may be tested during
More informationProject 4: ATM Design and Implementation
University of Maryland CMSC414 Computer and Network Security (Spring 2015) Instructor: Dave Levin (project originally created by Jonathan Katz) Updated April 30, 9:00am: Valid user names are now at most
More informationFigure 1: Requesting an Account. Figure 2: Login Page
SONA SYSTEMS Experiment Management System Introduction The Experiment Management System provides an easy method for you to sign up for studies, and track your progress throughout the term. Everything is
More informationStructure and Interpretation of Computer Programs Spring 2017 Mock Midterm 1
CS 61A Structure and Interpretation of Computer Programs Spring 2017 Mock Midterm 1 INSTRUCTIONS You have 1 hour to complete the exam. The exam is closed book, closed notes, closed computer, closed calculator,
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2014 1 / 31 Who am I Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationfor Credit is from January 22 through February 20 at midnight.
Spring 2018 Human Subjects SONA opens January 22, 2018 Last day to do studies is May 1, 2018 at midnight Last day to make changes/corrections is May 6, 2018 at midnight Longer BRIEF SUMMARY Prescreen INSTRUCTIONS.
More informationCS 241 Data Organization using C
CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am
More informationCS 210 Fundamentals of Programming I Spring 2015 Programming Assignment 4
CS 210 Fundamentals of Programming I Spring 2015 Programming Assignment 4 20 points Out: February 18/19, 2015 Due: February 25/26, 2015 Reminder: This is a programming assignment, and work on this assignment
More informationCS 455 Midterm Exam 1 Fall 2017 [Bono] Thursday, Sep. 28, 2017
Name: USC NetID (e.g., ttrojan): CS 455 Midterm Exam 1 Fall 2017 [Bono] Thursday, Sep. 28, 2017 There are 6 problems on the exam, with 55 points total available. There are 10 pages to the exam (5 pages
More information2. You are required to enter a password of up to 100 characters. The characters must be lower ASCII, printing characters.
BLACK BOX SOFTWARE TESTING SPRING 2005 DOMAIN TESTING LAB PROJECT -- GRADING NOTES For all of the cases below, do the traditional equivalence class and boundary analysis. Draw one table and use a new line
More informationIntroduction to Data Structures
15-121 Introduction to Data Structures Lecture #1 Introduction 28 August 2019 Margaret Reid-Miller Today Course Administration Overview of Course A (very basic) Java introduction Course website: www.cs.cmu.edu/~mrmiller/15-121
More informationCSC209H Lecture 1. Dan Zingaro. January 7, 2015
CSC209H Lecture 1 Dan Zingaro January 7, 2015 Welcome! Welcome to CSC209 Comments or questions during class? Let me know! Topics: shell and Unix, pipes and filters, C programming, processes, system calls,
More informationGeography 3300: Transportation Security
The Ohio State University Geography 3300: Transportation Security Spring Semester, 2015 Location: Smith Lab 2150 Time: TuTh 12:45-2:05pm Reg. Number: 18760 Instructor: Dr. Morton E. O'Kelly E-mail: okelly.1@osu.edu
More informationCS150 - Sample Final
CS150 - Sample Final Name: Honor code: You may use the following material on this exam: The final exam cheat sheet which I have provided The matlab basics handout (without any additional notes) Up to two
More informationSCHOOL OF COMPUTING, ENGINEERING AND MATHEMATICS SEMESTER 1 EXAMINATIONS 2015/2016 CI101 / CI177. Programming
s SCHOOL OF COMPUTING, ENGINEERING AND MATHEMATICS SEMESTER 1 EXAMINATIONS 2015/2016 CI101 / CI177 Programming Time allowed: THREE hours: Answer: ALL questions Items permitted: Items supplied: There is
More informationCMPE/SE 135 Object-Oriented Analysis and Design
Course and Contact Information San José State University Department of Computer Engineering CMPE/SE 135 Object-Oriented Analysis and Design Instructor: Ron Mak Office Location: ENG 250 Email: ron.mak@sjsu.edu
More informationPerform the following steps to set up for this project. Start out in your login directory on csit (a.k.a. acad).
CSC 458 Data Mining and Predictive Analytics I, Fall 2017 (November 22, 2017) Dr. Dale E. Parson, Assignment 4, Comparing Weka Bayesian, clustering, ZeroR, OneR, and J48 models to predict nominal dissolved
More informationCIS192: Python Programming
CIS192: Python Programming Introduction Harry Smith University of Pennsylvania January 18, 2017 Harry Smith (University of Pennsylvania) CIS 192 Lecture 1 January 18, 2017 1 / 34 Outline 1 Logistics Rooms
More informationComputer Science E-50a: Introduction to Computer Science Using Java, I Handout #7 part 2
Computer Science E-50a: Introduction to Computer Science Using Java, I Handout #7 part 2 part 2 These problems are due prior to the start of lecture on Monday night, March 31. Part A The Reading You may
More informationCSCI 1301: Introduction to Computing and Programming Spring 2018 Project 3: Hangman 2.0 (A Word Guessing Game)
Introduction In this project, you are going to implement the word guessing game, Hangman 2.0. Your program is going to get a random word from an enumerated list (instructions below) and then let the user
More informationSona Systems, Ltd. Experiment Management System Master Documentation Set 20 April 2015
Sona Systems, Ltd. Experiment Management System Master Documentation Set 20 April 2015 Copyright 2015 Sona Systems, Ltd., All Rights Reserved PARTICIPANT (STUDENT) DOCUMENTATION... 2 Introduction... 2
More informationCSC148 Recipe for Designing Classes
Part 1: Define the API for the class CSC148 Recipe for Designing Classes Download the sample code here: https://www.teach.cs.toronto.edu/~csc148h/fall/lectures/object-oriented-programming/common/course.
More informationNote: This is a miniassignment and the grading is automated. If you do not submit it correctly, you will receive at most half credit.
Com S 227 Fall 2018 Miniassignment 1 40 points Due Date: Friday, October 12, 11:59 pm (midnight) Late deadline (25% penalty): Monday, October 15, 11:59 pm General information This assignment is to be done
More informationAssignment 7: Due Wednesday May 11 at 6pm UPDATES on Monday May 9
CS1110 Spring 2016 Assignment 7: Due Wednesday May 11 at 6pm UPDATES on Monday May 9 You must work either on your own or with one partner. If you work with a partner, you and your partner must first register
More informationAPCS Semester #1 Final Exam Practice Problems
Name: Date: Per: AP Computer Science, Mr. Ferraro APCS Semester #1 Final Exam Practice Problems The problems here are to get you thinking about topics we ve visited thus far in preparation for the semester
More informationfor Credit is between September 5 and October 3 at midnight.
Fall 2017 Human Subjects Sona opens September 5, 2017 Last day to do studies is December 12 at midnight Last day to make changes/corrections is December 17 at midnight Longer BRIEF SUMMARY Prescreen INSTRUCTIONS.
More informationThis is a combination of a programming assignment and ungraded exercises
CSE 11 Winter 2017 Programming Assignment #1 Covers Chapters: ZY 1-3 START EARLY! 100 Pts Due: 25 JAN 2017 at 11:59pm (2359) This is a combination of a programming assignment and ungraded exercises Exercises
More informationEncapsulation. Administrative Stuff. September 12, Writing Classes. Quick review of last lecture. Classes. Classes and Objects
Administrative Stuff September 12, 2007 HW3 is due on Friday No new HW will be out this week Next Tuesday we will have Midterm 1: Sep 18 @ 6:30 7:45pm. Location: Curtiss Hall 127 (classroom) On Monday
More informationSTUDENT INSTRUCTIONS FOR KENT STATE UNIVERSITY S PSYCHOLOGY RESEARCH WEBSITE (http://kentstate.sona-systems.com)
STUDENT INSTRUCTIONS FOR KENT STATE UNIVERSITY S PSYCHOLOGY RESEARCH WEBSITE (http://kentstate.sona-systems.com) Introduction The Psychology Research website provides an easy method for you to sign up
More informationCMSC 201 Spring 2018 Project 2 Battleship
CMSC 201 Spring 2018 Project 2 Battleship Assignment: Project 2 Battleship Due Date: Design Document: Friday, April 13th, 2018 by 8:59:59 PM Project: Friday, April 20th, 2018 by 8:59:59 PM Value: 80 points
More informationCPSC 217 Assignment 3
CPSC 217 Assignment 3 Due: Monday November 23, 2015 at 12:00 noon Weight: 7% Sample Solution Length: 135 lines, including some comments (not including the provided code) Individual Work: All assignments
More informationDue: 9 February 2017 at 1159pm (2359, Pacific Standard Time)
CSE 11 Winter 2017 Program Assignment #2 (100 points) START EARLY! Due: 9 February 2017 at 1159pm (2359, Pacific Standard Time) PROGRAM #2: DoubleArray11 READ THE ENTIRE ASSIGNMENT BEFORE STARTING In lecture,
More informationCourse Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face
Course Title: Computer Networking 2 Course Section: CNS-106-50 (Winter 2018) FORMAT: Face to Face TIME FRAME: Start Date: 15 January 2018 End Date: 28 February 2018 Monday & Wednesday 1:00pm 5:00pm CREDITS:
More informationISM 324: Information Systems Security Spring 2014
ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method
More informationYou must pass the final exam to pass the course.
Computer Science Technology Department Houston Community College System Department Website: http://csci.hccs.cc.tx.us CRN: 46876 978-1-4239-0146-4 1-4239-0146-0 Semester: Fall 2010 Campus and Room: Stafford
More informationThis project is worth 600 points Due on April 17 Pick one from the following project to create complete running program with documentation
This project is worth 600 points Due on April 17 Pick one from the following project to create complete running program with documentation 1. Product Inventory Project Create an application which manages
More informationDUE By 11:59 PM on Thursday March 15 via make turnitin on acad. The standard 10% per day deduction for late assignments applies.
CSC 558 Data Mining and Predictive Analytics II, Spring 2018 Dr. Dale E. Parson, Assignment 2, Classification of audio data samples from assignment 1 for predicting numeric white-noise amplification level
More informationCSCI 150 Exam 2 Solutions
CSCI 150 Exam 2 Solutions 1. Here are definitions of two classes. Give a main( ) function that creates 3 persons: Hagrid, who is a Person, and Harry and Hermione, who are both Students at Hogwarts school.
More informationThe Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012.
Department of Mathematics and Computer Science Adelphi University Fall 2018 0145-275-001 Operating Systems Practicum Dr. R. M. Siegfried 407 Science (516)877-4482 http://home.adelphi.edu/~siegfried/cs271
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2017 1 / 34 Who am I? Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationCMSC 201 Spring 2018 Project 3 Minesweeper
CMSC 201 Spring 2018 Project 3 Minesweeper Assignment: Project 3 Minesweeper Due Date: Design Document: Friday, May 4th, 2018 by 8:59:59 PM Project: Friday, May 11th, 2018 by 8:59:59 PM Value: 80 points
More informationJava Outline (Upto Exam 2)
Java Outline (Upto Exam 2) Part 4 IF s (Branches) and Loops Chapter 12/13 (The if Statement) Hand in Program Assignment#1 (12 marks): Create a program called Ifs that will do the following: 1. Ask the
More informationFinal Exam Practice. Partial credit will be awarded.
Please note that this problem set is intended for practice, and does not fully represent the entire scope covered in the final exam, neither the range of the types of problems that may be included in the
More informationParentConnection User Guide
ParentConnection User Guide Table of Contents How to Access ParentConnection for the Anchorage School District... Welcome Parents!... Computer Requirements... Finding ParentConnection & Logging In... Your
More informationIntroduction to: Computers & Programming: Review prior to 1 st Midterm
Introduction to: Computers & Programming: Review prior to 1 st Midterm Adam Meyers New York University Summary Some Procedural Matters Summary of what you need to Know For the Test and To Go Further in
More informationEXAMINATION INSTRUCTIONS
Midterm exam CSE5/503 Computer Science I Spring 209 EXAMINATION INSTRUCTIONS This examination has 9 pages. If your copy is missing a page, let one of the course staff know. Before starting this test, students
More informationEXAMINATION INSTRUCTIONS
Midterm exam CSE115/503 Computer Science I Spring 2019 EXAMINATION INSTRUCTIONS This examination has 9 pages. If your copy is missing a page, let one of the course staff know. Before starting this test,
More informationSONA SYSTEMS. Manual for PARTICIPANTS (STUDENTS)
SONA SYSTEMS Manual for PARTICIPANTS (STUDENTS) Introduction The Experiment Management System provides an easy method for you to sign up for studies, and track your progress throughout the term. Everything
More informationRemaining Enhanced Labs
Here are some announcements regarding the end of the semester, and the specifications for the last Enhanced Labs. Don t forget that you need to take the Common Final Examination on Saturday, May 5, from
More informationBCIS 3630 Dr. GUYNES SPRING 2018 TUESDAY SECTION [JAN version] GRADER COURSE WEBSITE
COURSE WEBSITE http://www.steveguynes.com/bcis3630/bcis3630/default.html Instructor: Dr. Guynes Office: BLB 312H Phone: (940) 565-3110 Office Hours: By Email Email: steve.guynes@unt.edu TEXTBOOK: Starting
More informationCSCI 204 Introduction to Computer Science II
CSCI 204 Project 2 Maze Assigned: Wednesday 09/27/2017 First Phase (Recursion) Due Friday, 10/06/2017 Second Phase (Stack) Due Monday, 10/16/2017 1 Objective The purpose of this assignment is to give you
More informationInformation and Guide for Students Participating in Research Studies at MSU. Sona System msu-psychology.sona-systems.com
[Type text] Information and Guide for Students Participating in Research Studies at MSU Sona System msu-psychology.sona-systems.com Copyright 2015 Sona Systems, Ltd., All Rights Reserved PARTICIPANT (STUDENT)
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communications & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationCOMP 110 Programming Exercise: Simulation of the Game of Craps
COMP 110 Programming Exercise: Simulation of the Game of Craps Craps is a game of chance played by rolling two dice for a series of rolls and placing bets on the outcomes. The background on probability,
More informationCSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209
CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System
More informationPower Teacher August 2015
Power Teacher 2015-2016 August 2015 1 What s Possible with Power Teacher 2.8 Can change a student s given name to his/her preferred name. Can leave a late-enrolling student at the bottom of the class list.
More informationMore Flow Control Functions in C++ CS 16: Solving Problems with Computers I Lecture #4
More Flow Control Functions in C++ CS 16: Solving Problems with Computers I Lecture #4 Ziad Matni Dept. of Computer Science, UCSB Administrative CHANGED T.A. OFFICE/OPEN LAB HOURS! Thursday, 10 AM 12 PM
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2015 1 / 33 Who am I? Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationCS 455 Midterm Exam 1 Fall 2010 [Bono] Sept. 29, 2010
SOLUTION Name: USC loginid (e.g., ttrojan): CS 455 Midterm Exam 1 Fall 2010 [Bono] Sept. 29, 2010 There are 4 problems on the exam, with 55 points total available. There are 7 pages to the exam, including
More informationBeyond programming. CS 199 Computer Science for Beginners Spring 2009 Lois Delcambre Week 5/12/2009 1
Beyond programming CS 199 Computer Science for Beginners Spring 2009 Lois Delcambre Week 5/12/2009 1 Introduction We ve covered: Python data types Python expressions Python statements We ve written approximately
More informationCS 3030 Scripting Languages Syllabus
General Information CS 3030 Scripting Languages Semester: Summer 2013 Textbook: Location: Instructor Info: Website: None. We will use freely available resources from the Internet. Online Ted Cowan tedcowan@weber.edu
More informationUnix Jeopardy 3, 2/16/2016. CSC 352, UNIX Dr. D. Parson, Session 3 of Unix Jeopardy
Unix Jeopardy 3, 2/16/2016 CSC 352, UNIX Dr. D. Parson, Session 3 of Unix Jeopardy Ini@al setup In one window: cd ~parson/unix/runcat2 Examples from February 9 outline on course page. mkdir ~/unix cd ~/unix
More informationCIS 162 Project 4 Farkle (a dice game)
CIS 162 Project 4 Farkle (a dice game) Due Date at the start of class on Monday, 3 December (be prepared for quick demo and zybook test) Before Starting the Project Read chapter 10 (ArrayList) and 13 (arrays)
More informationNote: This is a miniassignment and the grading is automated. If you do not submit it correctly, you will receive at most half credit.
Com S 227 Spring 2018 Miniassignment 1 40 points Due Date: Thursday, March 8, 11:59 pm (midnight) Late deadline (25% penalty): Friday, March 9, 11:59 pm General information This assignment is to be done
More informationHomework #5 Algorithms I Spring 2017
Homework #5 Algorithms I 600.463 Spring 2017 Due on: Saturday, March 18th, 11:59pm Late submissions: will NOT be accepted Format: Please start each problem on a new page. Where to submit: On Gradescope,
More informationCSE 143: Computer Programming II Spring 2015 HW7: 20 Questions (due Thursday, May 28, :30pm)
CSE 143: Computer Programming II Spring 2015 HW7: 20 Questions (due Thursday, May 28, 2015 11:30pm) This program focuses on binary trees and recursion. Turn in the following files using the link on the
More informationEECE.2160: ECE Application Programming Spring 2017
Course Meetings Section 201: MWF 8-8:50, Ball 314 Section 202: MWF 12-12:50, Kitson 305 Course Website Main page: http://mjgeiger.github.io/eece2160/sp17/ Schedule: http://mjgeiger.github.io/eece2160/sp17/schedule.htm
More informationThis handbook contains directions on using tools and resources in WebAccess at CSM.
WebAccess Handbook This handbook contains directions on using tools and resources in WebAccess at CSM. Contents Logging in to WebAccess... 2 Setting up your Shell... 3 Docking Blocks or Menus... 3 Course
More informationVIS II: Design Communication Graphic Design Basics, Photoshop and InDesign Spring 2018
Rutgers, The State University of New Jersey Landscape Architecture :0-8 VIS II: Design Communication Graphic Design Basics, Photoshop and InDesign Spring 08 Tuesday 9:am :pm Friday 9:am :pm Round : TUE
More informationPARTICIPANT (STUDENT) DOCUMENTATION
PARTICIPANT (STUDENT) DOCUMENTATION Introduction The Sona System provides an easy method for you to sign up for studies, and track your progress throughout the term. Everything is done through the software
More informationSan Jose State University College of Science Department of Computer Science CS185C, NoSQL Database Systems, Section 1, Spring 2018
San Jose State University College of Science Department of Computer Science CS185C, NoSQL Database Systems, Section 1, Spring 2018 Course and Contact Information Instructor: Suneuy Kim Office Location:
More informationPractice Midterm Examination #1
Eric Roberts Handout #35 CS106A May 2, 2012 Practice Midterm Examination #1 Review session: Sunday, May 6, 7:00 9:00 P.M., Hewlett 200 Midterm exams: Tuesday, May 8, 9:00 11:00 A.M., CEMEX Auditorium Tuesday,
More information