WEEK | DAY | ANNOUNCEMENTS | READING | HW |
---|---|---|---|---|
1 | Oct 05 | Last Day for P/NP, CR/NE, or Withdraw (Dec 06) |
Introduction and course overview | HW 0 - Intro |
Oct 07 | UNIX and the Shell Read LCL, Chapters 1-7 Run the vim and emacs tutorials |
|||
2 | Oct 12 | Last Day to Add/Drop (Oct 13) | Version control and Git Read LCL, Chapters 8-11. Git Book, sections 1.1, 1.3, 1.6, 1.7, 2.1, and 2.2Interactive Git Tutorial |
HW 1 - Shell Scripts |
Oct 14 | Basic shell scripting Read LCL, Chapters 24-29 |
|||
3 | Oct 19 | More Shell Scripting Read LCL, Chapters 30-32 |
||
Oct 21 | Regular expressions, sed and grep Read LCL, 19-20 |
HW 2 - Regular Expressions | ||
4 | Oct 26 | Introduction to C and Compilation CJP, Chapters 1,2, and section 3.8 MC. Level 1's 'Buckle up' and Chapter 7, through section 7.1 |
||
Oct 28 | Makefiles CJP, Section 4.5.1 GNU Make Manual. Chapter 2 |
HW 3 - Introduction to C | ||
5 | Nov 02 | Types and operators CJP, Chapter 4. Bitwise Operations in C MC, Ch. 4, 7.2, 7.3 |
||
Nov 04 | HW 4 - Bits | |||
6 | Nov 09 | Scope, Pointers, Arrays, and Strings CJP, Chapter 5 Pointer Fun with Binky MC, Ch. 6.1 |
||
Nov 11 | Scope and Pointers | |||
7 | Nov 16 | GDB and Testing 21st Century C, Ch. 2 |
||
Nov 18 | Strings, Multi-dimensional arrays and Command Line Arguments CJP. Sections 3.2, 5.4, 5.5, 5.11 | HW 5 - Pig Latin | ||
Nov 23 | Thanksgiving Break (Nov 23-26) | |||
Nov 25 | ||||
8 | Nov 30 | Project Proposals | ||
Dec 02 | Structures and Self-referential structures | |||
9 | Dec 07 | Self-referential structures and IO CJP. Section 3.3, 3.4, 5.6MC 13.1 | HW 6 - Sorting | |
Dec 09 | Formatted I/O, line input, scanf MC 8.1, 8.3 | |||
10 | Dec 14 | Formatted IO | ||
Dec 16 | Variable arguments, getopt | HW 7 - BigNum | ||
11 | Dec 21 | Advanced git | ||
Dec 23 | Winter Break (Dec 23-Jan 02) | |||
Dec 28 | ||||
Dec 30 | ||||
12 | Jan 04 | Compression Read HW 8 assignment | HW 8 - Huffman Compression | |
Jan 06 | System calls overview | |||
13 | Jan 11 | System Calls | ||
Jan 13 | Buffer Overflows Read How Security Flaws Work: The Buffer Overfow |