Write down a shell script to send a customized

Assignment Help Computer Engineering
Reference no: EM1336602

Write a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on. If no users are listed on the command line, an error message should be printed.

In the mail message, the full (real) name from the passwd file (/etc/passwd) should be used. Also, mail should be signed with the real name of the person who is running the script.

Following error message should be printed if an argument username does not exist in the passwd file - "Please send this message to users whom you know personally.".

The mail message should be as follows:

Hello "<INSERT THE ARGUMENT USER'S REAL NAME FROM THE PASSWORD FILE>",

Please ignore this mail. The current time and date is <CURRENT DATE AND TIME>. Have a nice day.

"<INSERT THE SCRIPT RUNNING USER'S REAL NAME FROM THE PASSWORD FILE>"

Reference no: EM1336602

Questions Cloud

Explain marketing concepts and marketing managers : Explain Marketing concepts and marketing managers and Strategies to engage shareholders in new product development
Find the break even point in units for proposal : Find the break-even point in units for proposal A.
Discuss a hypothetical economy where both the price : Suppose the following equations discuss a hypothetical economy where both the price level and interest rates are fixed.
Illinois whistleblower statute : Your explanation must apply a professional code of ethics or ethical philosophical approach. What protection might you have under the Illinois whistleblower statute?
Write down a shell script to send a customized : Write down a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on. If no users are listed on the command line, an error message should be printed.
Lucidate what will happen to the economy in the short run : If the government decides to intervene to return the economy to full employment, elucidate what will happen to the economy in the short run and in the long run.
Explain important information about marketing discussion : Explain Important information about Marketing Discussion and Most discussions of marketing strategy focus on large businesses like Procter and Gamble
Forecast the next period using simple exponential smoothing : Calculate the forecast for the next period using simple exponential smoothing.
Could an until loop sometimes never execute : could an until loop sometimes never execute.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain minimum four benefits of modular design

define the design and application of arrays and how an array simplifies program development. Support your answer with a hypothetical real-world example.

  Project management tasks

Explain how the systems analyst may help along with the project management tasks. Also, explain how a new employee can contribute to the tasks.

  Find out coding of binary information and error detection

find out Coding of Binary Information and Error Detection.

  Use the int cast process to convert to an integer

give Output the corresponding letter grade along with the initial number entered in decimal format utilizing the printf method and format specifiers. Output the number in only 3 decimal places.

  Chomsky normal form

Requesting assistance with the Theory of Computing.Construct a PDA that accepts L.

  How pert may be used for strategic decision making

Based on the article "One Application for Using PERT Methodology in Strategic Decisions," write down a memo to your CIO recommending how PERT may be used for strategic decision making and assisting project managers who need to deal with complex pr..

  Peer-to-peer networking

Explain the term peer-to-peer networking? Describe why is bit torrent regarded to be a more efficient protocol? In the bit torrent context, explain how seeders and the leechers work.

  Where is the reason of most of the attacks

Where is the reason of most of the attacks.explain the differences between the two main classes of intrusions: misuse and anomaly.

  How various cells can be in a computer''s main memory

Suppose a machine has 20GB of storage space available on a hard disk and receives data over a telephone connection at the rate of 14,400 bps. At this rate, how long will it take to fill the available storage space.

  How to set up or recover cybersecurity

How to set up or recover cybersecurity.

  Implementing the python atm program

Write down a simple Python ATM program. Ask user to enter their account number, and then print their beginning balance. Then ask them if they wish to make a deposit or a withdrawal.

  What is a data type in c

What is the difference between a constant and the variable in a program? Why would you use one or the other.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd