Design a script that checks the day of the week

Assignment Help Computer Engineering
Reference no: EM1336253

Create a script that checks the day of the week, and takes one of two actions (step 2 or 3) depending on the day.
If the day is Monday through Friday, print (send to stdout) the name of the day. Then, find each file named TTDL (Things-To-Do List) in the tree rooted at the current directory (pwd on down). Using a separate output line for each of these files, print the file path and the number of lines in the file using wc -l. Create at least two TTDL files to test my program: one in my working directory and one in a subdirectory.

If the day is Saturday or Sunday, print only a simple message, such as "Go back to sleep".

Run my script on a weekday, redirecting your output to the file my_save and append a copy of my script.

Reference no: EM1336253

Questions Cloud

Managing data and information : How are data and information used within the human services organizations to support organizational planning and Why are integrated information management systems important in human service organizations? Give an example to support your answer.
Regarding the cultural perspective on crime : Write a position on whether or not you feel that minorities are overrepresented in the criminal justice system because of prejudices within the system.
Explain how would your answer change if you : Explain how would your answer change if you also noted that the biggest declines in the unemployment rate occurred.
Explain creating a marketing mix : Explain Creating a Marketing Mix and The combination of the four Ps used for the purpose of marketing product is known as the Marketing Mix
Design a script that checks the day of the week : Using a separate output line for each of these files, print the file path and the number of lines in the file using wc -l. make at least two TTDL files to test my program: one in my working directory and one in a subdirectory.
Show reaction to the vendor''s past litigation experience : Prepare an e-mail to the vendor describing how you will move ahead with the contract and what actions you would like them to take next. Discuss your reaction to the vendor's past litigation experience, and decide what you will do to avoid a simila..
Discuss how the findings align with the organization''s goals : Analysis of a plan examining the degree of alignment between the organization's proposed published values and mission and  Discuss how the findings align with the organization's goals.
Strategies for positive risk or opportunities : List the strategies for positive risk or opportunities.
Elucidate the effectiveness of these staffing practices : Elucidate the effectiveness of these staffing practices and selection tools in meeting current and future employment needs of the organization.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create the table relationships

make one query, your choice. Remember a query answers a question. As an example, list all household electronics that are greater in value than $200. Please ensure that the query title reflects what the query is about.

  Deducing security policy to mitigate the threat.

Information like sales data, client data, and the network configuration. Recognize the threats these significant items are subject to and deduce the security policy in order to mitigate that threat.

  Create program that will read a list of student last names

create program that will read a list of student last names

  When potential new suppliers compete for contracts

The company's newly hired VP of the IT is conducting this project because she does not have a security specialist on her staff and has learned that the company does not have the comprehensive security strategy. In fact, she suspects lack of even b..

  Identify connectivity of each relationship

Identify connectivity of each relationship

  What five items are the most important to organization

What five items are the most important to an organization as it comes to databases? Please provide an example for each of the five items that you feel are important.

  How to create a database for music

How to create a database for music? Other entities will be Artist/Group - Attributes will be Name, Year Founded, Origin, Tones and Biography, Track - Attributes will be Number and User's Recommendation and finally Song - Attributes will be Name, ..

  Mips single-cycle datapath processor

An instruction is being executed on the MIPS single-cycle datapath processor. Which class of instruction is being executed over the processor? b) Will you specify which instruction is being executing?

  Demonstrate how this search would go

assume an algorithm that processes a data set of size 8 has a runtime of 72, and the same algorithm on a data set of size 20 has a runtime of 420. Using big-O notation, state runtime for this algorithm for the general case of a data set of size n.

  Providing access to the user

Explain the other questions you would ask? Will you think of any other ways to estimate this? How will you verify that the user requires this access?

  Potential vulnerabilities in purchasing with a debit card

Recognize any potential vulnerabilities in the act of forming a purchase along with a debit card.

  Program simulating the rolling of one dice

Write down a program which simulates rolling one dice utilizing the following steps: Prompt user for the number of sides on the dice.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd