COS 126 Programming Assignments, Fall 2007

All assignments are due on the date specified by electronic submission. Before you turn in the assignment, make sure that you read the checklist. Feel free to look ahead at any future assignments that appear online, but be warned that some changes are possible.

# DUE ASSIGNMENT CHECKLIST
0 9/24 Hello World checklist
1 10/1 Conditionals, Loops checklist
2 10/8 N-Body Simulation checklist
3 10/15 Recursive Graphics checklist
10/22 Exam 1
4 11/7 DNA Sequence Alignment checklist
5 11/12 Guitar Hero checklist
6 11/19 Traveling Salesperson Problem checklist
7 11/28 Markov Models checklist
8 12/3 Theory of Computation checklist
12/12 Exam 2
9 1/14 Final Project
Atomic Nature of Matter
checklist


Computing Laboratories

There are a number of computing facilities located in the Friend Center. Friend 016 contains a Mac OS X cluster; Friend 017 contains a Windows PC cluster; both labs contain Internet connections if you wish to plug in your laptop. The labs are open 24 hours a day, and are staffed by lab assistants most evenings. Here is the lab assistant schedule. The lab assistants are there to answer general computer-related questions and to assist in debugging. If you have specialized questions regarding the course materials or programming assignments, see your preceptor or instructor.

Submitting Programming Assignments

Submit your solutions to the programming assignments electronically via the course web page. To authenticate yourself, you will need to type your Princeton login and password. You can unsubmit and resubmit files as needed. We do not accept solutions submitted via email.

Programming assignments are due at 11:55pm on the date specified. Are we completely serious about the exact second on this deadline? Well, no. You do have some leeway: a few minutes late we won't even notice, but a whole day late we will definitely notice. Point deductions for lateness will be exacted by your preceptor, and can be waived for unforeseen circumstances, like illness, with an appropriate written excuse. Preceptors may also use their discretion to grant extensions. The very best advice we can give you about completing your programming assignments on time is exactly what you'd expect: do not wait until the last minute! Plan several sessions of work for each assignment, and start early. Partial credit is available for a partially complete assignment; just explain the situation in your readme.txt file.

Collaboration Policy

Programming is an individual creative process much like composition. You must reach your own understanding of the problem and discover a path to its solution. During this time, discussions with other people are permitted and encouraged. However, when the time comes to write code that solves the problem, such discussions (except with course staff members) are no longer appropriate: the code must be your own work. If you have a question about how to use some feature of Java, the operating system, or some other relevant application, you can certainly ask your friends or the teaching assistants, but specific questions about code you have written must be treated more carefully. For each assignment, you must specifically describe in your readme.txt file, whatever help (if any) that you received from others and tell us the names of any individuals with whom you collaborated. This includes help from friends, classmates, lab TAs, and course staff members.

Do not, under any circumstances, copy another person's code. Incorporating someone else's code into your program in any form is a violation of academic regulations. This includes adapting solutions or partial solutions to assignments from any offering of this course or any other course. Abetting plagiarism or unauthorized collaboration by "sharing" your code is also prohibited. Sharing code in digital form is an especially egregious violation: do not e-mail your code or make your source files available to anyone. There is one exception to the code-sharing rule: You may adapt code from the COS 126 course materials provided that you explain what code you use, and cite its source in your comments. An example citation appears in StdGaussian.java.

Novices often have the misconception that copying and mechanically transforming a program (by rearranging independent code, renaming variables, or similar operations) makes it something different. Actually, identifying plagiarized source code is easier than you might think. Not only does plagiarized code quickly identify itself as part of the grading process, but also we can turn to software packages (such as Alex Aiken's renowned MOSS software) for automatic help.

This policy supplements the University's academic regulations, making explicit what constitutes a violation for this course. Princeton Rights, Rules, Responsibilities handbook asserts:

The only adequate defense for a student accused of an academic violation is that the work in question does not, in fact, constitute a violation. Neither the defense that the student was ignorant of the regulations concerning academic violations nor the defense that the student was under pressure at the time the violation was committed is considered an adequate defense.
If you have any questions about these matters, please consult a course staff member. Violators will be referred to the Committee on Discipline for review.