Attention: This site will be removed from January 5th at the request of School 42. To continue accessing it, contact me at 42-evals@gmx.ch
Please respect the following rules:
- Remain polite, courteous, respectful and
constructive throughout the
evaluation process. The well-being of the community depends on
it.
- Identify with the person (or the group) evaluated the eventual
dysfunctions of the work. Take the time to discuss and debate the
problems that may
have been identified.
- You must consider that there might be some difference in how
your peers
might have understood the project's instructions and the scope of its
functionalities. Always keep an open mind and grade them as honestly as
possible. The
pedagogy is valid only and only if the peer evaluation is
done seriously.
- Only grade the work that is in the student or group's Git repository.
- Double-check that the Git repository belongs to the student or the group. Ensure that
the work is for the relevant project and also check that "git clone" is used in an empty folder.
- Check carefully that no malicious aliases was used to fool you and make you
evaluate something that is not the content of the official repository.
- To avoid
any surprises, carefully check that both the evaluating
and the evaluated students have
reviewed the possible scripts used
to facilitate the grading.
- If the evaluating student has not completed that particular
project yet, it is mandatory for this student to read the entire subject before starting the
defense.
- Use the flags available on this scale to signal an empty repository,
non-functioning program, norm error, cheating etc. In these
cases, the grading is over and the final grade is 0 (or -42 in case cheating). However, except
for cheating, you are
encouraged to continue to discuss your work (even if you
have not
finished it) to identify any issues that may have caused this failure and avoid repeating the
same mistake in the future.
-- Remember that for the duration of the defense, no
segfault,
no other unexpected, premature, uncontrolled or
unexpected
termination of the program, else the final grade is O. Use
the
appropriate flag.
You should never have to edit any file except the
configuration file if it exists.
If you want to edit a file, take the time to explicit the reasons
with the
evaluated student and make sure both of you are okay with
this.
- You must also verify the absence of memory leaks. Any
memory allocated on the heap must
be properly freed before the end of execution. You are allowed to use any of the different tools
available
on the computer, such as
leaks, valgrind, or e_fence. In case of memory leaks, tick the appropriate flag.
Don’t forget to check the flag corresponding to the defense