Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
W.A.S.S to display all the files in a specified directory in the following format:File size in K Date Protection OwnerProgramecho -e "Enter dir : \c"read dircls -al $dirc > list.tmpwc -l list.tmp > rec.tmpnorec=`awk '{print $1}' rec.tmp`echo "REC=$norec"count=2echo "FILE SIZE IN K DATE PROTECTION OWNER " > list2.tmpecho "---------------------------------------------------" >> list2.tmpwhile [ $count -le $norec ]do head -$count list.tmp > list1.tmp tail -1 list1.tmp | awk '{printf "%-20s %-10d %15s %-15s %5s\n",$8,$5,$6,$1,$3}' >> list2.tmp count=`expr $count + 1` donecat list2.tmp OUTPUT $ sh e6vax.shEnter dir : tmpREC=7FILE SIZE IN K DATE PROTECTION OWNER-----------------------------------------------------------------------------. 1024 2006-11-10 drwxr-xr-x linux.. 1024 2006-11-10 drwxr-xr-x linuxshv 0 2006-11-10 -rw-r--r-- linuxj2me 0 2006-11-10 -rw-r--r-- linuxanaconda 14 2006-11-10 -rw-r--r-- linuxtemp1 1024 2006-11-10 drwxr-xr-x linux
need some one to help me with malab
XML Publishing. Consider the following relational data: Products: pid Name Price Description 323 gizmo
how do I change a existing formula with a new formula and it show the result
hi
Lennie McPherson, proprietor of Lennie''s Bail Bonds, needs to calculate the amount due for setting the bail. Lennie requires something of value as collateral, and his fee is 10%
Advantages of visual basic programming language Visual Basic is an exclusive selection language published by Microsoft Company, so programs published in Visible Basic cannot, e
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Plan, design and dry run a program for the Little Man Computer (LMC) that produces the same result using a fixed number of 10 iterations.
analyse the information need in the different functional area in any organization
Question: (i) All Security authentication mechanism that run on the TRU64 Unix Operating system run under the Security Integration Architecture (SIA ) layer. Explain with di
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd