- Remain polite, courteous, respectful and constructive
throughout the evaluation
process. The well-being of the community
depends on it.
- Identify with
the person (or the group) evaluated the eventual
dysfunctions of the work. Take
the time to discuss
and debate the problems you have identified.
- You
must consider that there might be some difference in how your
peers might have
understood the project's instructions and the
scope of its functionalities.
Always keep an open mind and grade
him/her as honestly as possible. The pedagogy
is valid only and
only if peer-evaluation is conducted seriously.
- Only grade the work that is in the student or group's
GiT repository.
-
Double-check that the GiT repository belongs to the student
or the group. Ensure
that the work is for the relevant project
and also check that "git clone" is used
in an empty folder.
- Check carefully that no malicious aliases was used to
fool you
and make you evaluate something other than the content of
the
official repository.
- To avoid any surprises, carefully check that
both the evaluating
and the evaluated students have reviewed the possible scripts
used
to facilitate the grading.
- If the evaluating student has not
completed that particular
project yet, it is mandatory for this student to read
the
entire subject prior to starting the defence.
- Use the flags
available on this scale to signal an empty repository,
non-functioning program, a
norm error, cheating etc. In these cases,
the grading is over and the final grade
is 0 (or -42 in case of
cheating). However, with the exception of cheating, you
are
encouraged to continue to discuss your work (even if you have not
finished
it) in order to identify any issues that may have caused
this failure and avoid
repeating the same mistake in the future.
- Remember that for the duration of
the defence, no segfault,
no other unexpected, premature, uncontrolled or
unexpected
termination of the program, else the final grade is 0. Use
the
appropriate flag.
You should never have to edit any file except the
configuration file if it exists.
If you want to edit a file, take the time to
explicit the reasons with the
evaluated student and make sure both of you are
okay with this.
- You must also verify the absence of memory leaks. Any
memory allocated on the heap must
be properly freed before the end of
execution.
You are allowed to use any of the different tools available on the
computer, such as
leaks, valgrind, or e_fence. In case of memory leaks, tick the
appropriate flag.