Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
W.A.S.S to display all the files in a specified directory in the following format:File size in K Date Protection OwnerProgramecho -e "Enter dir : \c"read dircls -al $dirc > list.tmpwc -l list.tmp > rec.tmpnorec=`awk '{print $1}' rec.tmp`echo "REC=$norec"count=2echo "FILE SIZE IN K DATE PROTECTION OWNER " > list2.tmpecho "---------------------------------------------------" >> list2.tmpwhile [ $count -le $norec ]do head -$count list.tmp > list1.tmp tail -1 list1.tmp | awk '{printf "%-20s %-10d %15s %-15s %5s\n",$8,$5,$6,$1,$3}' >> list2.tmp count=`expr $count + 1` donecat list2.tmp OUTPUT $ sh e6vax.shEnter dir : tmpREC=7FILE SIZE IN K DATE PROTECTION OWNER-----------------------------------------------------------------------------. 1024 2006-11-10 drwxr-xr-x linux.. 1024 2006-11-10 drwxr-xr-x linuxshv 0 2006-11-10 -rw-r--r-- linuxj2me 0 2006-11-10 -rw-r--r-- linuxanaconda 14 2006-11-10 -rw-r--r-- linuxtemp1 1024 2006-11-10 drwxr-xr-x linux
2. Design an ER diagram for an IT training group database that will meet the information need’training programme. Clearly indicate the entities, relationships and the key constrain
Assigment 01 Subject Code: ITE 2106 Subject Name: Software Engineering You run a software development organization catering to external clients to build software solutions. The bus
QUESTION 1 (a) (i) What is linear programming problem? (ii) Define and explain the following terms: (1) objective function, (2) decision variable, (3) constraints, (4) feasi
how to store multidimensional array in a single column in mysql database using MATLAB?
The schematic of the traffic light controller is as shown in figure 1. There are three control buttons on the panel: HAZ (Hazard), LT (Left) and RT (Right). Whenever, HAZ is clicke
Question: (i) All Security authentication mechanism that run on the TRU64 Unix Operating system run under the Security Integration Architecture (SIA ) layer. Explain with di
wat is- m=5; n=3; x=m++-n+++m;
How does a Case Structure differ from a Case structure program in pseudocode
We want a program, a logic, we can list the intermediate films sandwiched between the 2 tapes (from - to) that indicates the user. example: From to
Windows Communication Foundation The Microsoft windows Interaction or communication foundation (or WCF), formerly known as "Indigo", is an application selection program (API) in th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd