Course Outcomes for CSC 230 - C and Software Tools

Upon successful completion of this course, a student will be able to...

  1. Write small to medium C programs having several separately-compiled modules. 
  2. Explain what happens to a program during preprocessing, lexical analysis, parsing, code generation, code optimization, linking, and execution, and identify errors that occur during each phase. In particular, they will be able to describe the differences in this process between C and Java. 
  3. Correctly identify error messages and warnings from the preprocessor, compiler, and linker, and avoid them. 
  4. Find and eliminate runtime errors using a combination of logic, language understanding, trace printout, and gdb or a similar command-line debugger. 
  5. Interpret and explain data types, conversions between data types, and the possibility of overflow and underflow. 
  6. Explain, inspect, and implement programs using structures such as enumerated types, unions, and constants and arithmetic, logical, relational, assignment, and bitwise operators. 
  7. Trace and reason about variables and their scope in a single function, across multiple functions, and across multiple modules. 
  8. Allocate and deallocate memory in C programs while avoiding memory leaks and dangling pointers. In particular, they will be able to implement dynamic arrays and singly-linked lists using allocated memory. 
  9. Use the C preprocessor to control tracing of programs, compilation for different systems, and write simple macros. 
  10. Write, debug, and modify programs using library utilities, including, but not limited to assert, the math library, the string library, random number generation, variable number of parameters, standard I/O, and file I/O. 
  11. Use simple command-line tools to design, document, debug, and maintain their programs. 
  12. Use an automatic packaging tool, such as make or ant, to distribute and maintain software that has multiple compilation units. 
  13. Use a version control tools, such as subversion (svn) or Git, to track changes and do parallel development of software. 
  14. Distinguish key elements of the syntax (what’s legal), semantics (what does it do), and pragmatics (how is it used) of a programming language.
  15. Describe and demonstrate how to avoid the implications of common programming errors that lead to security vulnerabilities, such as buffer overflows and injection attacks.
  16. Describe the security properties provided by cryptographic “primitives” (e.g., symmetric cryptography, asymmetric cryptography, and cryptographic hash functions) and use one or more these “primitives” to add security to software.

See Course Listings

See Course Coordinators