Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
W.A.S.S to compare that given two files are same or not. If found same then delete the second file.
echo -e "Enter the 1st File name : \c"
read ffname
echo -e "Enter the 2nd File name : \c"
read sfname
res=`cmp $ffname $sfname|wc -l`
//cmp is used for comparing two files and return where those are different
if [ $res -eq 1 ]
then
echo "Both files are not same"
else
echo "Both files are same"
rm $sfname
fi
Output
sh compare.sh
Enter the 1st File name : t1.txt
Enter the 2nd File name : t2.txt
Both files are same
Write a program to handle a book collection. The data on each book might be title, author, publication date, book number and cataloging details. Allow for adding or deleting books
The standard way for debuggers to plant interactive breakpoints in a program in RAM (whatever the processor instruction set) is to save the break pointed instruction and replace it
There actually isn't all that much to this section. All we are going to do now is work a quick illustration using Laplace transforms for a 3 rd order differential equation therefo
i have a database having field name title and comm. I want to search by name and get the all data remaining title and comm(comm is integer)
Expertsmind.com is expert in java assignment help JAVA Virtual Machine A Java exclusive device or java virtual machine (JVM) is an exclusive device able of undertaking Jav
(a) Write a recursive procedure (digits n) that computes the number of digits in the integer n using a linear recursive process. For example, (digits 42) should return 2 and (digit
Introduction This assignment builds on your application, produced in Assignment 1, which holds a list of cabins, which can be either read in from a text file or just hard coded
what is a microprocessor? types of microprocessors? advantages disadvantages
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Problem: (i) All Security authentication mechanism that run on the TRU64 Unix Operating system run under the Security Integration Architecture ( SIA ) layer. Explain with diag
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd