What have we covered so far? Lecture 1: Unix command: logging into unix via ssh secure shell client, logging off from unix, mkdir, cd, ls Memory model: treating memory space as residential area, and symbolic names acted like zip code referring to houses in the area Programming action: downloading code from website, dragging code from local pc to unix ssh file transfer window, compiling the code at unix: gcc executing the executable code: a.out writing pseudo-code / algorithms with the memory model in mind Lecture 2: Unix command: copy a file: cp vim command: different modes command mode saving your editing action using ":w!", quiting from editing without saving using ":q!" entering insert mode using "i" exiting insert mode using "" deleting the character under the cursor using "x" deleting the line of text where the cursor is using "dd" making your C program correctly indented using "gg=G" Programming action: turning pseudo-codes to programs assignment statement: lvalue, rvalue program structures: declaration type int, float, and void program body main function return statement compiling the code with warning: gcc -Wall compiling the code with new executable code name: gcc -o executing the code using new name