deleted

 

Suppose a text file contains ASCII characters ‘0’ and ‘1’ representing bits in human readable form. For example, test.txt may contain 111111110000000 which means its size is 16 bytes. A simple method for compressing the file by a factor of 8 is to represent a block of 8 ‘0’ or ‘1’ ASCII characters as a single byte. Thus test.txt which is 16 bytes long can be compressed into a file that is 2 bytes long where the first byte contains all 1’s and the second byte all 0’s. The resultant compressed file is a binary file since the first byte is not an ASCII character.

Code an app, bitpacker, that reads from stdin the input filename which follows the same specification as Problem 3. However, instead of using getchar(), use the library function fgets() whose the second argument allows specifying how many bytes, at most, should be read which helps prevent array overrun. Process the data in the input file 8 characters at a time by reading them into a 1-D array, char rawdat[8]. Compact the eight ‘0’ and ‘1’ characters in rawdat[] into a single byte using the bit processing techniques discussed in class. Write the resultant byte into an output file with suffix “.P”. For the above example, test.txt.P. We will allow the size of the input file not to be a multiple of 8. Since we are compacting 8 ASCII characters ‘0’ and ‘1’ into a single byte, we will use padding to handle files whose size is not a multiple of 8. For example, if text file test1.dat contains characters 1111111100000000111 (file size is 19 bytes), we will pad the last three characters 111 with 00000 so that the byte containing bit values 11100000 is written to test1.dat.P. To note that we padded the original data with five 0 bit values, we will change the suffix of the output file to test1.dat.P5. For test.txt where no padding was needed, the output filename will be test.txt.P0. Thus the last character of the filename specifies how much padding (0-7) was added.

Code bitpacker as a single main() function.  Test and verify that it works correctly.

xcode

This is a basic slideshow app to show 10 cat images, attached to this  assignment (Cats.zip). You need design your app following below sketch. You will need to show all ten images automatically or manually. After  last picture, your app should show the first picture in circular way.   User can touch left and right buttons to navigate thru pictures  manually. Play button automatically shows pictures. Stop button stops  the slideshow. The delay between pictures are 3 sec by default. However  user can change delay time by going setting view of the app. This app is similar to MathGame in terms of how to setup the views. Also, you will need to use timer class. Submit your zipped Xcode project file.

Writing a Critical Review

  • Read chapters 8, 9, and 10 in How to Critique Journal Articles in the Social Sciences. 
  • Access and review Writing Critical Reviews(new tab). https://guides.library.queensu.ca/introduction-research/writing/critical
  • Access and review Writing a Critical Review(PDF document). https://www.utsc.utoronto.ca/ctl/writing-support
  • Access and download Writing a Critical Review Structure Map(PDF document). https://www.jcu.edu.au/__data/assets/pdf_file/0016/202660/How-to-write-a-Critical-Review.pdf
  • Access and review Writing a Critique(new tab) which includes reading notes and language use options.
  • https://www.ucl.ac.uk/ioe-writing-centre/critical-reading-and-writing/critical-review
  • Locate, download, and read one full-text, qualitative, scholarly article at least 10 pages in length that would be beneficial for a research study on the Virtuous Business Model.
  1. Use the qualitative scholarly article to address the following prompts:
    1. Write a critical review on the selected article using concepts introduced throughout the textbook.
    2. Access and use the hyperlinked resources to inform the scholarly process and writing of the review.
    3. The completed article critique should be at least two full pages and no more than three full pages in length, single spaced, with a few headings as appropriate.
      1. The use of two columns with inclusion of headings is optional to the typical page layout.
    4. Doctoral quality, reasonably sized tables, charts, bulleted lists or figures may be included (of limited quantity to not overshadow the narrative critic are optional as well.)

need APA references and minimum 2 pages with content mentioned in all points

Security Audit Procedure Guide

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Requirement: 2 Pages + 2 resources.

Question answer (Brief Answer with at least 400 words for each question)

1)Identify and briefly describe three out of the six reasons given in the text for attempting to reduce the duration of a project.

2)What is crashing? Include a discussion of crash time and crash cost.

3)You are driving to a project status report meeting with your client. You encountered a significant technical problem on the project that has put your project behind schedule. This is not good news because completion time is the number one priority for the project. You are confident that your team can solve the problem if they are free to give their undivided attention to it and that with hard work you can get back on schedule. You also believe if you tell the client about the problem, she will demand a meeting with your team to discuss the implications of the problem. You can also expect her to send some of her personnel to oversee the solution to the problem. These interruptions will likely further delay the project. What should you tell your client about the current status of the project?

4)You are managing the renovation of the Old Princeton Landing Bar and Grill. The project is on schedule despite receiving a late shipment of paint. The paint was supposed to arrive on 1/30, but instead arrived on 2/1. The assistant store manager apologizes profusely for the delay and asks if you would be willing to sign the acceptance form and backdate it to 1/30. He says he won’t qualify for a bonus that he has worked hard to meet for the past month if the shipment is reported late. He promises to make it up to you on future projects. What would you do and why?

Uber’s Internal Systems Compromised By An 18 Year Old

Please include an in-depth analysis of the causes of the breach, the impact of the breach, and what could have been done to avoid it. Most generally all of this is well documented online. Frequently the vulnerability is shared so that other businesses do not suffer the same consequences. The paper should be 3-5 pages long, double-spaced, 1″ margins 

Week 2 Assignment: Parallel Programming jan 8

  1. Question 1 How does parallel processing work in computer architecture?
  2. Question 2 What does Amdahl’s law state? What is Amdahl’s law and why it is used?
  3. Question 3 What are the applications of parallel processing in computer architecture?
  4. Question 4 What are the challenges in parallel processing in computer architecture?
  5. Question 5 Identify reasons for and consequences of the recent switch from sequential processing to parallel processing among hardware manufacturers.