c program, array read

 

Given two binary vectors X = (x1, x2, …, xN) and Y = (y1, y2, …, yN), each a 1-D array of N binary numbers, the number of positions where corresponding bit values of the two vectors are different is called the Hamming distance of the two vectors. For example, if X = (1,1,0,0) and Y = (1,0,0,1) then their Hamming distance is 2 since X and Y differ in their second and fourth positions counting from left to right. The Hamming distance is a useful tool in various subfields of computer science including communication networks where it captures how much two binary vectors differ. In the above example, X = (1,1,0,0) may comprise four bits transmitted by a sender whereas Y = (1,0,0,1) are the actual bits received by a receiver. The Hamming distance, d(X,Y) = 2, indicates that two bits of X flipped — i.e., changed their value from 0 to 1, or 1 to 0 — while traveling from sender to receiver. This is common when sending bits wirelessly using a smartphone or laptop over cellular and WiFi interfaces.

Write an app, calchamming, that takes as input two vectors whose components are binary from stdin, calculates their Hamming distance, and outputs the value to stdout. The format of the input should be

N
x1 x2 … xN
y1 y2 … yN

where N is an integer specifying the size of the 1-D arrays (i.e., dimension of 1-D vector), x1 x2 … xN are the N bit values of the first vector, and y1 y2 … yN are the bit values of the second vector. The individual bit values x1 x2 … xN are separated by a single space. The same holds for y1 y2 … yN. Assume that N cannot be greater than 15. Declare N, X[15], Y[15] to be local variables of main() of type int.

Perform reading of the input from a function

int readinput(int *, int *, int *);

where the first argument is a pointer to N, the second and third arguments point to the two 1-D arrays X and Y. readinput() returns 0 if successful, -1 if there is an error. For example, if N exceeds 15 then readinput() returns -1. Consider other cases that readinput() should consider as invalid input and return -1 to its caller main(). main() checks the return value of readinput() and terminates the app by calling exit(1) if it is -1. Perform calculation of the dot product by calling function

int calchamm(int, int *, int *);

where the first argument is the value of N, and the second and third arguments are pointers to the two arrays. calchamm() computes the Hamming distance of the binary vectors and returns the value to the caller main(). Since readinput() is tasked with checking that the input is valid, calchamm() can focus on performing the Hamming distance calculation. Print the Hamming distance to stdout by calling

void writeoutput(int);

where the int argument is the distance value.

Electronica

 For each week in our course, you will consider music as a cultural artifact and be  assigned either a piece of music or a specific musical artist to explore and analyze for  the week. This week, you will be listening to music that is considered “electronica.” As  you have read this week, technology moved at a fast pace from the 70s all the way  through to the present day. For our guided listening this week, we will be exploring  these new technologies. Be sure to read through the entire page, as this particular  assignment is formatted slightly different compared to our previous guided listening  assignments. In addition to your etextbook, you should expect to complete some research online to  respond to these questions. Be sure to use vetted resources—if you aren’t sure what a  reliable source is, remember, you can use the CRAP test to determine if your source is  reliable! Resources that might help you:  What is electronica music?. (2019). worldatlas. Instructions: Part 1: Electronica  Answer the following question: o Define Electronica. Part 2: Chance Music  On the internet or your phone, listen to ONE the following examples of  antecedents of electronica. Those composers used totally electronic sounds,  taped small segments of sounds and wrote music in fragments. They would often  leave the order of performance up to the performer, and this would change from  performance to performance. This is known as chance music. o Karlheniz Stockhausen, “Mikrophonie”  o Milton Babbitt, “Ensembles for Synthesizer”  o John Cage, “Imaginary Landscape No. 1”  o Edgar Varese, “Poeme electronique”  After listening to your selection, answer the following questions in a word  document: o Define the musical term: Chance Music. MUS 121 – Rhythm Blues and Hip Hop Unit 6 – Electronica – Music as a Cultural Artifact – Guided Listening Assignment o Share a brief biography of the composer that you chose. o What is the date that the original music was written? What is the date that  this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings?  o What emotions did the performances/recordings make you feel when you  heard it? Part 3: Ambient Music  Ambient music goes back to the 1970s, is considered “atmospheric music.” On  the internet or your phone, listen to ONE of these artists:  o Brian Eno, “Music for Airports”  o Pink Floyd, “Astronomy Domine”  o Kraftwerk, “Roberter”  o Tangerine Dream, “Stratosfear”   After listening to your selection, answer the following questions in a word  document: o Define the musical term: Ambient. o Share a brief biography of the artist/ensemble that you chose. o What is the date that the original music was written? What is the date that  this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings?  o What emotions did the performances/recordings make you feel when you  heard it? Part 4: More Mainstream Electronica  By the mid-1990s, electronica began to “chart” and electronic elements began to  merge with tock, tap and other pop elements to create a new fusion. On the  internet or your phone, listen to ONE of these artists:  o Nine Inch Nails, “Ghosts IV”  o Moby, “South Side”  o Bjork, “Bachelorette”  o Chemical Brothers, “Block Rockin’ Beats”  o Trent Reznor  After listening to your selection, answer the following questions in a word  document: o Share a brief biography of the artist you chose. o What is the date that the original music was written? What is the date that  this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings?  o What emotions did the performances/recordings make you feel when you  heard it? Requirements:  Three to four pages in length, excluding the Reference page.  APA format, including an in-text citation for referenced works.  At least four resources. 

HTML Website

I will give you picture of website I want to do the same with the links that need to be connected, it very easy and it should take hour or less.
I uploaded all what you neeed. open the docx file and you will see the info, and the picutres what you will use. please put Bone.jpg and merica.jpg in Folder Called Enter.  and please put Beef.png, Chicago.jpg, pizza.jpg in Folder called Food.  ENTER FOLDE and FOOD FOLDER and skull.jpg Will be place in folder called IMAGES

question

  1. What are the characteristics of anomaly detection? 
  2. What are the detection problems and methods?
  3. What are the statistical approaches when there is an anomaly found?
  4. Compare and contrast proximity and clustering-based approaches.

Tech Project

Joshua Tree Technology is a technology firm based in Boston, MA, focusing on technology software, implementation, delivery, and research & development. By 2001, it had become one of the world’s largest multinational corporations and was one of the “Big Five” technology consulting firms. A Fortune Global 500 company, it reported revenues of $50.53 billion in 2021. Joshua Tree Technology’s current clients include 91 Fortune Global 100 and more than three-quarters of the Fortune Global 500. 

Project 1: JTT is opening a new office in London. As a project manager, you have been assigned to lead this effort. The office space is secured and ready for 300 employees. Your job is to create a plan for the technological implementation of the opening of this office. Staff will need access to our global database. We have network access throughout the building. We need a plan to determine how to execute this move. The plan should include a timeline, budget, and personnel. Again remember…this building is empty. 

Project 2: JTT needs to develop a new website. As a project manager, you must develop a plan to create and deploy the new website. The plan should include a timeline, budget, mock-ups, style guide, and personnel. Also, please indicate any research you have conducted on our competitors 

or

15-25 page paper on one of the following topics:

  • Simulation of Gaming with Financial Service
  • Intelligent Vehicle Transportation System
  • Wireless surveillance technologies 
  • Technology and Sports Medicine
  • Biometric Security Systems

discussion

 Describe how you will resolve disconnection between the major IT functions of software development, quality assurance, and technology operations in your organization. 

Computer Programing

In 250 words or more, answer the following.

Understand the concept of a WHILE loop.  Then, suggest a programming situation or a real-life scenario where the use of a while loop is needed.  Identified a reason to use a while loop.

IT345 Week 8 A

Week 8 Discussion

2929 unread replies.2929 replies.

Welcome to Week 8

With any invention there will be trial and error. When it comes to technology, the errors can be extremely costly, more frequent, and sometimes deadly. Software applications are so in depth, that they are almost always released with bugs. On the opposite end of the spectrum, some technology has made our lives safer and even extended our life span. Put your proverbial “critical thinking” hats on for this week.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 200 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

Topics:

  • Do you believe we are too dependent on computers? Why or why not?
  • In what ways are we safer due to new technologies?
  • What are some recent examples of technology that has been created that is used to “save lives”?
  • What technologies have inadvertently taken lives?

Search entries or author