updated hws
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Thu, 08 Oct 2015 14:04:04 +0100
changeset 401 2d6eb340fd98
parent 400 f05368d007dd
child 402 fb0c844a26cf
updated hws
hws/hw01.pdf
hws/hw02.pdf
hws/hw03.pdf
hws/hw04.pdf
hws/hw04.tex
style.sty
Binary file hws/hw01.pdf has changed
Binary file hws/hw02.pdf has changed
Binary file hws/hw03.pdf has changed
Binary file hws/hw04.pdf has changed
--- a/hws/hw04.tex	Thu Oct 08 12:08:10 2015 +0100
+++ b/hws/hw04.tex	Thu Oct 08 14:04:04 2015 +0100
@@ -5,6 +5,8 @@
 
 \section*{Homework 4}
 
+\HEADER
+
 \begin{enumerate}
 \item What should the architecture of a network application under Unix
   be that processes potentially hostile data?
--- a/style.sty	Thu Oct 08 12:08:10 2015 +0100
+++ b/style.sty	Thu Oct 08 14:04:04 2015 +0100
@@ -32,8 +32,20 @@
 \makeatother
 
 
-\newcommand{\HEADER}{{\bf Please submit your solutions to the email address 
-7ccsmsen at gmail dot com. Please submit only ASCII text or PDFs. Every solution 
-should be preceeded by the corresponding question. Solutions will only be accepted until 
+\newcommand{\HEADER}{{\bf Please submit your solutions to the
+email address 7ccsmsen at gmail dot com. Please submit only
+ASCII text or PDFs. Every solution should be preceded by the
+corresponding question, like:
+
+\begin{center}
+\begin{tabular}{ll}
+Q$n$: & \ldots a difficult question from me\ldots\\
+A:    & \ldots an answer from you \ldots\\
+Q$n+1$ & \ldots another difficult question\ldots\\
+A:     & \ldots another brilliant answer from you\ldots
+\end{tabular}
+\end{center}
+
+\noindent Solutions will only be accepted until
 30th December!}\bigskip}