Create bash script that will keep track of notes

Assignment Help Computer Network Security
Reference no: EM133375838

Question

How Create a Bash script that will keep track of notes, like a digital sticky note in your terminal. The user must be able to check their notes any time. Additionally, it must be able to keep track of important dates and remind the user on that day. Once again, there is no wrong answer. I just want to see what your thought process is. What does a solution look like to you? You will most likely need to use several script files for this, don't be afraid to create and call different script for different purposes.

Reference no: EM133375838

Questions Cloud

When the criminal action was filed against him : Kevin Sancho was criminally charged with serious physical injuries allegedly committed against Russell Westbrook. During the pendency of the criminal case
Explain the characteristics you used in the poem : Explain the characteristics you used in the poem, like stanza length, line breaks, and any sound devices used. Be sure to analyze the effects of using those
How do you perceive elizabeth proctor : How do you perceive Elizabeth Proctor? Why do you think Elizabeth lied about her husband's affair?
What needs to resolved by the concerned states : Summary of News Article (Who are the parties involved? What is the problem? What are the issues and controversies, if any? - -Where and when did these issues
Create bash script that will keep track of notes : How Create a Bash script that will keep track of notes, like a digital sticky note in your terminal.
What advice could you give to a teacher : What advice could you give to a teacher who considers sending the ELLs in her class to lower grades or special education because they do not understand
Explain whether tabitha is correct : ENG 102 National Paralegal College - explain whether Tabitha is correct and /or to what extend she is correct - he is reviewing Wikipedia articles
How the topic makes you feel as a citizen of the world : Explore your knowledge and assumptions (formal- i.e. other classes you've taken, and informal- i.e. the news or social media) of the topic
What can you learn from the story about the young girl : What can you learn from the story about the young girl who was "15 pedals" from her home? . Reggie Shaw killed two people and was sentenced to 30 days

Reviews

Write a Review

Computer Network Security Questions & Answers

  Passing environment variables from parent process

Passing Environment Variables from Parent Process to Child Process - Describe your observations between the two programs and suggest why this may be

  What are some ideas you have about possible research topics

Considering your Program (DM/DCS) your concentration, and your interests, what are some ideas you have about possible research topics? Please add in these yourself

  Design and simulate a network fulfilling the requirement

MIT Australia - MN503 Overview of Internetworking Assignment - Design and simulate a network fulfilling the gvien requirement

  Analyze the importance of network architecture to security

Analyze the importance of network architecture to security operations. Apply information security standards to real-world implementation.

  What are some of the most widely publicized dos attacks

What are some of the most widely publicized DoS attacks that have recently occurred? What about attackers who threaten a DoS attack unless a fee is paid?

  The application of malware for cyber warfare

Is it acceptable to create malware to stop activities that threaten national security? Why?

  Implementation of Network Reconnaissance

Demonstrate understanding and implementation of Network Reconnaissance, Exploitation and Reverse Engineering security tools

  Design proposal completed in cmit

If you recall, this was the Network Design Proposal completed in CMIT 265. University realizes it needs to secure the faculty, students, and visitors network.

  Public key encryption

If you have access to public keys n and e, it is possible to reverse the public keys from them. One method is to factor the value of n to discover p and q,

  How you would use the tool in the investigation

How you would use the tool in the investigation. How the tool helps the investigation and the evidence you expect it to provide.

  You have just been hired as an information security engineer

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

  Difference between workgroup and domain

What is the benefit of having computers joined to a domain? What is the difference between a workgroup and a domain?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd