Create a single log file from these 7 log files

Assignment Help Basic Computer Science
Reference no: EM13864772

4.In the assignment4 directory are several log files containing IP addresses. Create a single log file from these 7 log files using a single line of commands that are chained together. e.g. passing output from one command as input into another. The resulting file should contain the results in the following format:

Monday

165.234.216.100

192.168.1.4

...

Tuesday

165.234.216.100

...

etc

5.In the unorganized directory are numerous files. The files in these directories are unorganized and need to organized.

a.Using single lines of commands create files that can be read in by xargs for moving files. The files should separate the files to allow xargs to do the following:

i.Move bak files into a directory called backups

ii.Move jpgs into a directory called 2015_jpgs

iii.Move all non_junk files to the directory called not_junk inside the text_docs directory.

b.Run xargs on the file to move the backup files to the correct directory. In the same line (before hitting enter) archive the backup directory containing the files using bzip2 and delete the original files.

c.Move the jpg files to the 2015_jpgs using the file you created earlier.

d.Move all not_junk files to the directory called not_junk using the file you created.

6.Find and remove all the junk files and the junk directory.

7.Rename jpeg files to png files using xargs and archive these files using gzip compression.

You must chain as many commands together as possible for each part of this assignment to receive credit for the problem number.

Reference no: EM13864772

Questions Cloud

Discuss the companys dividend policy between 20w9 and 20x3 : Discuss the companys dividend policy between 20W9 and 20X3 and its possible consequences for earnings and Advise the directors of the share price for XYZ Inc which might be expected immediately following the announcement of their decision if they p..
Power and crosson : Using the accounting book Financial and Managerial Accounting 10th edition by Needles, Power, and Crosson, For the problem E8A, I need to prepare Keepers Statement of cash flows using the indirect method from the given Income statement and balance sh..
Interval for preventing intersymbol interference : What is the minimum guard time interval for preventing intersymbol interference? What is the maximum data rate (BPSK signaling) where minimum SINR is 40 (in linear scale)?
Complete the outline for the education essay : Complete the outline for the education essay -  You use given articles to support your ideas.
Create a single log file from these 7 log files : 4.In the assignment4 directory are several log files containing IP addresses. Create a single log file from these 7 log files using a single line of commands that are chained together. e.g. passing output from one command as input into another. The r..
Why do you think that free will was compromised : Answer the following questions: Why do you think that free will was compromised? What led you to make the decisions and take the actions that you took
Describe elements of credit card theft and identity thef : Describe the elements of Credit Card Theft and Identity Theft. Describe how technology is used to facilitate these crimes
How to help your toddler begin developing empathy : The reading for the paragraphs: How to help Your Toddler Begin Developing Empathy
Analyze basic aspects related with recruitment and selection : Students are required to analyze the crucial aspects associated with recruitment and selection which could be adopted as a best practice by other organizations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Justify characterizing data types according to task taxonomy

"Characterizing Data Types" Please respond to the following: Justify characterizing data types according to task taxonomy. Support your response

  Atmega128 is being used to monitor humidity inside test cham

Atmega128 is being used to monitor humidity inside test chamber 03. The device uses two sensors to have some fault tolerance. They are connected to ADC channels 0 and 1. The program uses the average and maximum error of the two values.

  What are the reasons for your choices

Discuss three principles that you found to be the most surprising or helpful in, the following website: " Biggest Mistakes in Web Design, 1995-2015." What principles will you apply to your own site design? What are the reasons for your choices?

  How would you show an input mask for a serial number

In MS Access, how would you show an input mask for a serial number that had 5 letters followed by 7 numbers? No dashes or any other characters.

  Calculate the difference between two numbers

Create a template function that can be used to calculate the difference between two numbers. Make it able to use two integers, two floats, and an integer and a float.

  How would you deallocate memory in a destructor

We can use the destructor to deallocate memory for an object. How would you deallocate memory in a destructor?

  Determine optimal objective function value of lp problem

Implement given LP problem in a spreadsheet. Use Solver to solve problem and create Sensitivity Report. Determine the optimal objective function value if RHS value for second constraint changes from 15 to 25?

  Important ideas for legislators to get from your testimony

Suppose the legislature in your state is debating the adoption of UCITA. What are the three most important ideas you want your legislators to get from your testimony?

  Literature for information on position of cko

Investigate literature for information on position of CKO and find out an approximate percentage of firms with knowledge management initiatives which have CKOs.

  Create a name class of three string objects

Provide methods and operators for reading and writing Persons and for allowing the retrieval and changing of components of a Person (Name and Address)

  How much laser be tipped before light no longer continues

If a laser is to be pointed into the end of the fibre, but is "tipped" to one side by θ degrees, how much can the laser be "tipped" before the light no longer continues down the fibre?

  Discuss the points and tabulate the strengths and weakness

Please discuss the points and tabulate the strengths and weaknesses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd