Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Convert the given amount into words.
echo -e "Enter the amount: \c"
read amt
temp=`grep $amt rupees.txt | wc -l`
if test $temp -gt 0
then
grep -w $amt rupees.txt | cut -d " " -f2
else
rw=""
len=`echo "$amt" | wc -c`
i=1
while test $i -lt $len
do
temp=`echo "$amt" | cut -c$i`
if test $i -eq 1
if test $amt -gt 10
temp=`grep "^$temp" rupees.txt | cut -d " " -f2 | tail -n1`
rw=`echo "$rw $temp"`
temp=`grep "^$temp" rupees.txt | cut -d " " -f2 | head -n1`
fi
i=`expr $i + 1`
done
echo $rw
Output
Enter the amount: 66
Sixty Six
Enter the amount: 15
Fifteen
Expertsmind brings you unique solution in java assignments Applet In processing, and the apple company is any little application that works one specific process that works
Memory Hierarchy for Linux Systems A cache line has one or more valid bit(s), tag entry and list of bytes in a block in one set of a cache, as shown below: If you were
about how to create the program in c
We are looking for Pool Services Software Our company Pool Hands LLC is looking to build software for our internal use. We would like the software built therefore that it could
Special Matrices There are some "special" matrices out there which we may use on occasion. The square matrix is the first special matrix. A square matrix is any matrix that s
Simpson's Rule is a more accurate method of numerical integration than the method described in class. Using Simpson's Rule, the integral of a function f between a and b is approxim
Define Reasons for using Functions? 1. Evade rewriting the same code over and over. 2. It is simpler to write programs and keep track of what they are doing. Codes are able t
How to i write a car rental program in jgrasp
You are working for a cryptography department, where one of your jobs is to decipher intercepted messages that have been encrypted using a book cipher. The messages are sent by dif
Let us say we have a list of 10 animal objects called "animals" in Alice. Write the code to move them forward synchronously by 1 meter.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd