Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
You should avoid sharing formula, logic, or any other significant aspect of
your code during a contest. If our plagiarism algorithm finds striking
similarities between your code and someone else’s, your participation may
stand the risk of being suspended.
While taking part in the contest, you must take good care of your code.
Protect it from getting leaked, getting shared, and getting copied by your foes,
friends, or just a random peer. It is your responsibility to provide it the safety
it deserves.
Avoid using any online IDE’s or code sharing sites like Pastebin to share your
code. In case you must, the responsibility of protecting your code lies solely
with you.
Taking help or using third party code is not bad. Passing it off as your own is
BAD.
If you are taking your code from some other source, it is expected that you
give the due attribution to the source in your code. It is mandatory.
The third-party code should have been available publicly before the relevant
contest began, and not created during the contest. And if questioned, the
proof of burden rests on you to prove this beyond a doubt.
But in case you have missed giving attribution to third-party code, and you
get caught in our plagiarism check, then you have the option of proving to us
that this was indeed a publicly available code.
Do not ask or discuss any aspect of any contest problems during an ongoing
contest on any other platform, online or offline. Discussion of strategy should
be avoided during the contest and postponed till the end.
Stay honest to the contest. If you come across any wrongdoing, which
hampers the decorum of the contest on or off it, do report that to
coordinators. We will investigate the issue and take appropriate action to stop
it.
You guys write beautiful codes. Why ruin it by obfuscating it? Keep the real
beauty of the code intact. Do not obfuscate it.
Do not try any dishonest means to move up the rank tables.
Digital Certificates from ISTE shall be issued to all participants through their
mail ID.
Attractive Prizes and Certificates shall be issued to the winners in the contest
of Round two.
Important Note:
There shall be two categories: (Category-1 & Category-2) for the conduction and
evaluation.
Category 1:- students from 1st and 2nd year (BE/B-Tech) & Diploma (1st, 2nd
& 3rd year)
Kindly select your proper category before proceeding for the contest; (1st Year,
2nd Year students and Polytechnic students Select category 1). 3rd Year and
Final Year Engineering Select category 2.
Prerequisites:
Anyone with a knack for programming and should have access to the
Verifying Eligibility:
Organizers hold all rights to adjudicate on any dispute and verify your
eligibility at any stage of the contest.
By entering the Contest, you agree to produce any proof of eligibility
requested by Organizers for verification purposes.
If you fail to do so, it will result in your immediate disqualification from
the contest and forfeiture of the prizes.
If you do not have a “Hacker Rank” profile yet, do not fret, you can get one.
Disqualification:
Organizers can disqualify and forfeit the prizes of any team if they attempt to
undermine the contest decorum by:
Results
10th May 12:00 pm IST
Disclaimer:
The “Rules” listed herein are applicable to “DEBUG YOUR LOCK DOWN” and every
aspect of it. We urge you to go through these terms with awareness as they form a
legal agreement between you and Organizers.
There can be some alterations in the contest, which when happen may require
changes in the existing or inclusion of completely new terms. The changes will
become part of the existing terms and your agreement with Organizers concerning
the Contest.
“As a participant you are expected to adhere to these terms, failing which, you will
be disqualified from the contest at any stage and will not be eligible for any prizes.
Accepting below shall be taken as your agreement to the terms.”