Write down a shell script to send a customized

Assignment Help Computer Engineering
Reference no: EM1336602

Write a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on. If no users are listed on the command line, an error message should be printed.

In the mail message, the full (real) name from the passwd file (/etc/passwd) should be used. Also, mail should be signed with the real name of the person who is running the script.

Following error message should be printed if an argument username does not exist in the passwd file - "Please send this message to users whom you know personally.".

The mail message should be as follows:

Hello "<INSERT THE ARGUMENT USER'S REAL NAME FROM THE PASSWORD FILE>",

Please ignore this mail. The current time and date is <CURRENT DATE AND TIME>. Have a nice day.

"<INSERT THE SCRIPT RUNNING USER'S REAL NAME FROM THE PASSWORD FILE>"

Reference no: EM1336602

Questions Cloud

Explain marketing concepts and marketing managers : Explain Marketing concepts and marketing managers and Strategies to engage shareholders in new product development
Find the break even point in units for proposal : Find the break-even point in units for proposal A.
Discuss a hypothetical economy where both the price : Suppose the following equations discuss a hypothetical economy where both the price level and interest rates are fixed.
Illinois whistleblower statute : Your explanation must apply a professional code of ethics or ethical philosophical approach. What protection might you have under the Illinois whistleblower statute?
Write down a shell script to send a customized : Write down a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on. If no users are listed on the command line, an error message should be printed.
Lucidate what will happen to the economy in the short run : If the government decides to intervene to return the economy to full employment, elucidate what will happen to the economy in the short run and in the long run.
Explain important information about marketing discussion : Explain Important information about Marketing Discussion and Most discussions of marketing strategy focus on large businesses like Procter and Gamble
Forecast the next period using simple exponential smoothing : Calculate the forecast for the next period using simple exponential smoothing.
Could an until loop sometimes never execute : could an until loop sometimes never execute.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd