Shell scripting in both a windows and unix environment, Operating System

Assignment Help:

Purpose

This is intended to help you develop your understanding of shell scripting in both a Windows and Unix environment.

Deliverables

For both the first and second opportunities, you are required to write TWO shell scripts, one which executes in a Unix environment and one which executes in a Windows environment.

Your scripts must satisfy the following requirements:

1. They must perform some useful system administration function. Some examples of useful system administration functions are given below.

2. It must be possible to run them and hence demonstrate them using the facilities available in the labs used by this module. Alternatively, you may use your own hardware (e.g. personal laptop) and software provided that they are both legal (e.g. licensed) and you are able to bring them to the University for the purposes of demonstration.

3. They may be written in whatever shell scripting  language you choose provided that they comply with point 2 above, and that you do not use the same scripting language for both the Unix and Windows scripts. There are a significant number of scripting languages available for Unix including Bash, Perl and Python and for Windows including Powershell, VBScript,

JScript and the traditional batch file language. In addition, there are Windows versions of many of the scripting languages that are available for Unix including Perl and Python (see above for details of their availability). Whilst you are free to choose any shell scripting language you like, the module leader RECOMMENDS that you use Bash for your Unix script and a batch file for Windows. These are the simplest scripting languages for beginners.

4. You may use examples of scripts that you find in printed documentation and on the Web as the starting point for your own scripts. If you do so, you must include a copy of the original script in your submitted documentation (failure to do so will lead to a mark of zero and charges of plagiarism) along with details of its source. You must also be in a position, when you demonstrate your script to your tutor, to explain how you have enhanced/changed the original script.


Related Discussions:- Shell scripting in both a windows and unix environment

Command line interface, College life is tough.  Eating pizza for every meal...

College life is tough.  Eating pizza for every meal is hitting you hard.  You are looking at working out to stay healthy.  You found a web site that tells you how many calories eac

Explain process scheduling, Explain Process scheduling Process scheduli...

Explain Process scheduling Process scheduling consists of the subsequent sub-functions: 1.      Scheduling : Selects the process to be implement next on the CPU 2.      D

Android operating system, Android operating system is an open source, Linux...

Android operating system is an open source, Linux-based Smartphone OS. It is the world's most popular mobile platform with more than 700,000 applications and 25 billion downlo

Virtual memory, In modern operating systems, applications do not directly a...

In modern operating systems, applications do not directly access the physical memory. Instead, they use so-called virtual memory, where each virtual address is translated to a phys

What are the different methods for handling deadlocks?, What are the differ...

What are the different methods for handling deadlocks? Deadlock detection and recovery: Permit the system to enter a deadlock state, detect it and after that rec

System service program, System Service Program system service program S...

System Service Program system service program Supports and provides the services for other program. System service program perform Varity of tasks.  They are further divided in

Describe the file system architecture, Describe the file system architectur...

Describe the file system architecture. File System Architecture contains the subsequent components:- Device Driver 1 Device Driver 2 Device Driver 3 Basic fi

Semaphores, Synchronization can be achieved by means other than locks and c...

Synchronization can be achieved by means other than locks and condition variables. One alternative is semaphores. A semaphore is used to regulate traf?c in a critical section. A se

Define a policy for data storage, Produce a referenced four page report whi...

Produce a referenced four page report which describes the possible functionality of the system; similar systems that are out there and different possible approaches to delivering t

Unsafe state in a deadlock-avoidance system, Question: A set of process...

Question: A set of processes are in a deadlock state when every process in the set is waiting for an event that can be caused by only another process in the set. (a) There

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd