Lab Activities

Secret Word

LabWhen the lab begins, I will give you a secret word that will open the current assignment. The idea is to prevent students from working on the activity ahead of time.

Secret Word:

All labs are due the following Sunday at 11:59pm after they were assigned.

Reference Material

This course uses a library object file. The library contains a large number of utility functions that will allow you to easily print integers, strings, and other useful tasks. We will practice encoding on the Herky 6000 processor.

Coding Server

Labs are written (and executed) on the following server:

Downloading the Library

Type the following at the prompt exactly as it is displayed.

curl > csc35.o

Working on Labs from Home

Installing a Virtual Private Network

So, the first step it to get the VPN software. The University uses GlobalProtect. So, installing it is a good idea for both Windows and Macintosh users. It really is quite cool. Please visit the following website. Find the GlobalProtect link.

Once you open the Global Protect, you will be prompted to enter the name of the virtual private server. Enter the following:

Connecting to the Server


Macintosh users, fortunately, don't need to install software. They simply need to open the Terminal Program (which is built-in to Mac-OS).

You will immediately see a UNIX prompt. Mac-OS is, in fact, a version of UNIX. Neat! Once at the prompt, type the following where username is your Saclink username. You might have to manually type "yes".



To connect to the UNIX server, Windows users must download and install Telnet software. For this, you have two good options - and either will work. MobaXterm has far more features, and I recommend this application.

Once you have installed the software, you need to open a Secure Telnet connection (also known as SSH). Enter the following computer name.

Activity / Assignment Rules

  1. Discussion among students as to the general logic to solve a problem is allowed and encouraged. Likewise, I have no problem with students occasionally helping other students to find a particularly troublesome error in design or code.
  2. However, the design of an algorithm, and the coding of a program that implements that algorithm, must be the work of the student whose name appears on it. Do not cheat.
  3. Do not help others cheat. This means you cannot give your solution to another student or give them the pseudo-code on how to do it. For example, don't let students copy off your screen. In any case, both the student, that copied your solution, and you will receive a zero.
  4. Unless otherwise instructed (as, for example, team projects), all assignments are to be entirely your own work.
  5. You only can submit one solution - so make sure its correct!
  6. No activity or assignment may use AT&T assembly format. Any activity/assignment using it will receive a zero.