Shell scripting in both a windows and unix environment, Operating System

Assignment Help:

Purpose

This is intended to help you develop your understanding of shell scripting in both a Windows and Unix environment.

Deliverables

For both the first and second opportunities, you are required to write TWO shell scripts, one which executes in a Unix environment and one which executes in a Windows environment.

Your scripts must satisfy the following requirements:

1. They must perform some useful system administration function. Some examples of useful system administration functions are given below.

2. It must be possible to run them and hence demonstrate them using the facilities available in the labs used by this module. Alternatively, you may use your own hardware (e.g. personal laptop) and software provided that they are both legal (e.g. licensed) and you are able to bring them to the University for the purposes of demonstration.

3. They may be written in whatever shell scripting  language you choose provided that they comply with point 2 above, and that you do not use the same scripting language for both the Unix and Windows scripts. There are a significant number of scripting languages available for Unix including Bash, Perl and Python and for Windows including Powershell, VBScript,

JScript and the traditional batch file language. In addition, there are Windows versions of many of the scripting languages that are available for Unix including Perl and Python (see above for details of their availability). Whilst you are free to choose any shell scripting language you like, the module leader RECOMMENDS that you use Bash for your Unix script and a batch file for Windows. These are the simplest scripting languages for beginners.

4. You may use examples of scripts that you find in printed documentation and on the Web as the starting point for your own scripts. If you do so, you must include a copy of the original script in your submitted documentation (failure to do so will lead to a mark of zero and charges of plagiarism) along with details of its source. You must also be in a position, when you demonstrate your script to your tutor, to explain how you have enhanced/changed the original script.


Related Discussions:- Shell scripting in both a windows and unix environment

Ipc, explain in detail about ipc in linux

explain in detail about ipc in linux

Requirements for solution of critical section problem, What are the require...

What are the requirements for solution of critical section problems? Mutual exclusion : If process p is implementing in its critical section then no other processes can be exe

Explain the architecting for processes, Explain the Architecting For Proces...

Explain the Architecting For Processes Processes are very important to the server application developer, as they may be used to increase responsiveness, deduction time, and tur

Bounded and unbounded buffer, Ask question #Minimum 100 difference between ...

Ask question #Minimum 100 difference between bounded and unbounded buffer words accepted#

What are the objectives of operating system?, What are the objectives of op...

What are the objectives of operating system? Objectives of OS 1.      Convenience: An OS makes a computer more suitable to use. 2.      Efficiency : An OS allows t

What do you mean by semaphore?, What do you mean by semaphore?  Semap...

What do you mean by semaphore?  Semaphore : A synchronization variable that acquires on positive integer values. Invented by the Dijkstra P (semaphore): an atomic proce

Shell scripting, A friend has promised to log in at a particular time. Howe...

A friend has promised to log in at a particular time. However, he needs to be contacted as soon as he logs in. The shell script checks after every minute whether he has logged in o

Explain the request/response interface, Explain the Request/Response Interf...

Explain the Request/Response Interface   Many issues are involved in providing a procedural interface for client functions to interact with server components. First off, since

How are file sharing and protection implemented, How are file sharing and p...

How are file sharing and protection implemented? To execute file sharing and protection the system have to maintain more file and directory attributes than are needed on a sing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd