Write an awk script to display the phone number

Assignment Help Computer Engineering
Reference no: EM132080065

Need some help with UNIX/Linux and awk scripting please:

Consider the address book below:

$ cat addr

Xiao Li, lxiao, [email protected], 6705462234, Jackson, NC 764

Natkin William, wnatkin, [email protected], 8044344528, Richmond, VA 22345

Elizi Moe, emoe, [email protected], 5208534566, Tempe, AZ 85282

Ma Ta, mta, [email protected], 4345667345, Austin, TX 91030

Diana Cheng, dcheng, [email protected], 5203456789, Matitsi, WY 4587

Jackson Five, jfive, [email protected], 5206564573, Kyenta, AZ 85483

Adi SrikanthReddy, sadi1, [email protected], 6578904566, Wyo, WS 67854

Write an awk script called activity6.1-6.awk to display the phone number of the user whose username is assigned to the variable user at the command line.

Reference no: EM132080065

Questions Cloud

Lease shifts more cost uncertainty to tenant than gross : A triple net lease shifts more cost uncertainty to a tenant than a gross lease
Explain example of business decision that would be unethical : Describe and explain an example of a business decision that would be unethical even though it is legal.
Compute the amount of the stock dividend : Tidwell Corporation issued a 4 percent stock dividend on 20,000 shares of its $10 par common stock. At th time of the dividend, the market value of the stock.
Identify candidate keys of employee : Identify candidate keys of EMPLOYEE. Construct a decomposition of EMPLOYEE into relations in 3NF that preserves dependencies.
Write an awk script to display the phone number : Write an awk script called activity6.1-6.awk to display the phone number of the user whose username is assigned to the variable user at the command line.
Determine how to maximize your cash on hand : At time 0, you have $10,000. Investments A and B are available; their cash flows are shown in the table below: Assume that any money not invested.
Perform the test for the non-additive join property : Perform the test for the non-additive join property (lossless join) for the relation R(A1, A2, A3, A4, A5), and the decompositions Da, Db, Dc, Dd .
Emobile technology into healthcare organization : Other considerations of implementing eMobile technology into a healthcare organization?
What is the concept utilitarianism according to jeremy : What is the concept utilitarianism according to Jeremy Bentham? Is this a morally valid approach to governance? Why or why not?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write an application that will enable a vendor

Write an application that will enable a vendor to see what earnings he can expect to make based on what percentage he marks up an item.

  Define how to construct control flow graphs for programs

Define how to construct control flow graphs for programs containing structured statements such as -until,cass, and if-their-eleif-else-end if.

  How does your online business fulfil customer needs

How does your online business fulfil customer needs - Revenue Model - how does your online business earn revenue and have a positive return on investment?

  Create a global function called updatebucket

Create a global function called "updatebucket(TetrisShape localTetrisShape)" to populate the bucket with values of the "shapeArray". Here, you will use two nested for loops to go over the shapeArray of 4x4.

  Write a paragraph describing what mistakes the company made

Write another paragraph describing what mistakes the company / individual / organization made that made their system less secure.

  Briefly explain top ten android malware attacks

Briefly explain top 10 Android Malware attacks with a keynote on the applications. List out the 10 attacks and briefly explain what triggered the attacks.

  In short describe the situation inside your company

It is likely that your organization uses various decision-support programs, as in  programs that automate production, programs for resource optimization, and so on.

  What the project hopes to accomplish

Goals: What the project hopes to accomplish. Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 things.

  Custom decision support system for an international airline

A major international airline (of your choice) wants to upgrade its rostering tool, which has had many upgrades and still used some manual input. A salesman from CSIRO has convinced them to consider a new Intelligent Automated Rostering Toolkit

  Discuss unauthorized individual access to valuable data

weak access-control policies within the organization that allowed an unauthorized individual access to valuable data

  Problem regarding the general unemployment

1. The following information is for the US economy in 1998: Find the US labor force, the number unemployed and the unemployment rate for 1998. Numbers are in millions

  What are the security and privacy risks and vulnerabilities

What are the security and privacy risks and vulnerabilities in using the Internet? List some specific common attack strategies and describe how they work and their effects/consequences on the security and privacy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd