Executing a shell script

Assignment Help Basic Computer Science
Reference no: EM13764349

1. Use vim (Lab Manual, page 34) to create a file named short with the follow¬ing line in it: echo 'hi there'

2. Use cat to verify the contents of short and then try to execute it. Use Is -1 to display the permissions for short. Read the tip on page 338 of Sobell.

3. Use chmod (pages 193 and 337 of Sobell) to make the file executable, dis¬play the permissions for short, and try executing the file again.

4. Add a line that starts with 11! (Sobell, page 338) to the beginning of short to make sure it is executed by bash.

5. Add a comment line (Sobell, page 340) to short that explains what the script does.

6. Within a shell script, the shell expands Si (a positional parameter; Sobel!, page 1023) to the first argument on the command line the script was called with. Write and execute a script named first that displays (sends to standard output) the first argument on the command line it was called with. Include the #! line and a comment. Remember to make the file executable.

7. The date (Sobell, page 218) utility displays the date and time. Write and exe¬cute a shell script named mine that displays the date and time, the name of your home directory, and the value of your PATH variable.

8. Write a shell script that copies the file named by its first argument to a file with the same name with the filename extension of .bak. Thus, if you call the script with the argument first (and a file named first exists in the work-ing directory), after the script runs you would have two files: first and first.bak. Demonstrate that the script works properly.

9. Read the caution titled "Always quote positional parameters" on page 1023 of Sobell. Use touch to create a file whose name has a SPACE in it. What happens when you give that filename as an argument to cptobak from the previous step?

10. Modify the cptobak script from the previous step by quoting the positional parameters in the cp line. Now what happens when you use the script to make a copy of a file with a SPACE in its name?

Reference no: EM13764349

Questions Cloud

Problems related to ethical criteria : Where do you draw the line when using material found on the Internet, but trying to respect the artists' intellectual property and rights to royalties from their creations?
Leveraging power from batna : Assuming your Best Alternative to a Negotiating Agreement (BATNA) is letting a court sell the property, discuss how it may help you reach an agreement. Recommend other strategies that you could use to accomplish a successful negotiation.
Explanation of the nutritional theory : What? (A thorough explanation of the nutritional theory or concept on which you have chosen to write; this should pertain specifically to what you have gleaned from your study during the class.)
Was williamson''s intoxication sufficient to void mortgage : Wiliamson, an alcoholic who was threatened with foreclosure on her house entered into a contract to sell it for $17,000. Was Williamson's intoxication sufficient to void the mortgage
Executing a shell script : Use vim (Lab Manual, page 34) to create a file named short with the follow¬ing line in it: echo 'hi there'
Explain the security risks and applicable laws : Explain the security risks and applicable laws that govern the privacy risk. Describe the security measures that the organization needs to implement to mitigate the risks.
How would americans react to gay marriage today : How would Americans react to such a crime today? Consider current and proposed legislation (and attitudes) towards hate crimes, gay marriage, gay parenting, and gay rights.
What are the four requirements of a valid contract : What are the four requirements of a valid contract? Explain each requirement and why it is important. Who are the parties to this License Agreement? Is this a unilateral or bilateral contract? Is this a formal or informal contract? Is this an e..
Problems related to diseases : Identify any known risk factors; include any age groups, race, genders that are affected more than others.Describe any known prevention methods.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd