Unix, Programming Languages

Assignment Help:
1. Write a shell script to locate executable files. This script takes a list of file names from the command line and determines which would be executed had these names been given as commands.
• The search path should be based only on the user''s PATH environment variable. You shall not use the Unix which command, the ksh whence (type) command, or the bash type command.
• The script should find only the first occurrence of the "file". If the file is not found, the script should print an error message that the file was not found in the user''s path. (Both the filename and the users path should be printed.)
• If the first parameter is ''-a'', then the script should print all occurrences of the executable file in the user''s path. Again if the file was not on the path, an error message should be displayed.
• The find command shall not be used.
• A project using temporary files will not be graded.
Note:
• The shell variable PATH defines the search path for the directory containing the command. Alternative directory names are separated by a colon (:). The current directory can be specified by two or more adjacent colons, or by a colon at the beginning or end of the path list.
• If the command name contains a / then the search path is not used. Otherwise, each directory in the path is searched for an executable file.
usage: mywhich [-a] command ....
Examples: The locations of these programs may vary on different systems and the users PATH environment variable.
prompt> mywhich ls
/bin/ls
prompt> mywhich -a cc
/bin/cc
/usr/ucb/cc
prompt> mywhich ./mywhich
./mywhich
prompt> mywhich fooblar
fooblar not found
prompt> mywhich ksh sh csh bash
/usr/bin/ksh
/bin/sh
/bin/csh
/usr/local/bin/bash

2.Write a shell script to concatenate lists together, and output the resulting list. Do not include any argument that is a sub-list of the entire list. (The script will clean the list of any redundant items.) You must preserve the original order of the list. Remember to account for the following situations:
• a : at the beginning of the list is the same as a . at the beginning of the "list" (:/bin is the same a .:/bin)
• a :: any where in the list is the same as :.: (/bin::/etc is the same as (/bin:.:/etc)
• a : at the end of the list is the same a :. ( /bin: is the same as /bin:. )
• Project usings temporary files will not be graded.
• The input to the script will be color or space separated lists and the output will be a colon separated list with the orignal order preserved and all redunant items removed.

USAGE: clean_list list ....
Where list a a colon or whitespace separated list.


Examples:
prompt> clean_list a a:b a:b:c :x: y:z
a:b:c:.:x:y:z

prompt>clean_list /bin:/usr/bin:/usr/openwin/bin /usr/bin:/usr/etc:/etc: /usr/bin/X11 .:/bin
/bin:/usr/bin:/usr/openwin/bin:/usr/etc:/etc:.:/usr/bin/X11

prompt>clean_list apple:orange:apple pear orange peach
apple:orange:pear:peach

________________________________________
REMEMBER TO HANDLE THE SPECIAL CASES OF LEADING :, A ::, AND A TRAILING :

3.
Assignment 3
------------------------------------------------------------------------
Write a shell script, change-lines, which will substitute a string for a replacement string for each occurance of the string in files specified.
The original file will be saved, with the same filename with the .keep extension unless the -n option is present.

You may use a temporary file for this script.

Remember the search string and or the replacement string can have special characters in them, so you must use proper quoting techniques.

The script will use following options:


• the option -s "string" for the search strings
• the option -r "string" for the replacement string
• the -n option to prevent a backup file from being created
• the -h option to print a usage statement and exit
The script will exit with an error status and print an error message:
• if the -s option is not present.
• if the -r option is not present.
• if the string is not specified with the -s option
• if the string is not specified with the -r option
• if there are any other options specified
• if there are no input files specified
• if the input file cannot be read by the current process
• if the input file cannot be written by the current process
• if you cannot create the backup file.
Here is the usage statement for the script:
change-lines [-n] -s search string -r replace string files ...
• -n do not backup the original file
• -s search string the search for this string
• -r replace string replace the search string with this string
• -h print this message
Examples:


prompt> change-lines -s foobar -r FooBar *.c
This script will edit all the files *.c, and each occurrence of foobar it will be replaced by FooBar it will be replaced by FooBar.
Each file will be backed up.


prompt> change-lines -s "SHELL IS NOT FUN" -r "SHELL PROGRAMING IS A LOT OF FUN" /tmp/file1.txt


This script will edit all the file /tmp/file1.txt , and each occurrence of SHELL IS NOT FUN will replaced by the text,
SHELL PROGRAMMING IS A LOT OF FUN. A backup file /tmp/file1.txt.keep will be created.


------------------------------------------------------------------------
I want you to modify the following program
https://ce.uml.edu/~mrichard/hw/p3-hints.txt
If
you do not use the program listed above as the basis for the assignment, your assignment will NOT be graded.

Follow the my shell programming guidelines as in the other assignments.
Write a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on.
• If no users are listed on the command line an error message should be printed.
• In the mail message, you should use the full (real) name from the passwd file (/etc/passwd).
• You also need to sign the script with the real name of the person who is running the script.

o This can be derived from the $USER environment variable and looking up the value in the password file.
• An error message should be printed if the user does not exist in the passwd file.
• PLEASE ONLY SEND THIS MESSAGE TO USERS WHICH YOU KNOW PERSONALLY.

o You can always use yourself and me (mrichard) as a test case
o The real name of the user of the script should only be computed once.
• A "Here-Document (In-Line Redirection)" must be used for the mail message.
• No temporary files shall be used.
The message should be as follows:
Hello ,
**** This email is automatically generatated by ******
My instructor requires that I send this message as part of an assignment for class 92.312.
The current time and date is .
Have a nice day.



Related Discussions:- Unix

Create single page to demonstrates an xhtml form, Create a single page that...

Create a single page that demonstrates an XHTML form. The form should include all the fields you feel are necessary for submitting an order of books and must include at least one

Applications of oop, Applications of OOP, The promising areas for applicati...

Applications of OOP, The promising areas for application of OOP include: Real-time systems Simulation and modelling Object-oriented databases Hypertext, hype

Real-time driver model , AMCC PowerPC 440 EPx Sequoia Evaluation Kit, Embed...

AMCC PowerPC 440 EPx Sequoia Evaluation Kit, Embedded Linux Development Kit (ELDK), and Xenomai A. Description of the Project The project's objective is to design a set of

Produce a hierarchy chart-a structured flowchart, Produce a hierarchy chart...

Produce a hierarchy chart, a structured flowchart, and a Pascal program (with appropriate comments) to generate the Sales Commission Report shown below. The commission for each sal

Components of dot net framework 3-5, Components of .NET Framework 3.5 .NET ...

Components of .NET Framework 3.5 .NET Framework Conceptual Overview Presents the .NET Structure and its elements. Installing the .NET Framework Provides information about .NET Stru

Python, interference of waves

interference of waves

What is multithreaded programming, Question: (i) What is multithreaded...

Question: (i) What is multithreaded programming? Lists the benefits achieved by multithreading your code in a program. (ii) What type of coding should be eliminated when d

Network security, Term project (you should code a function), demonstrate it...

Term project (you should code a function), demonstrate it to the class and a very breief report (one or two pages) describing what you did. You determine your project (could be imp

Matlab, i have a=[0 1 1 2 2 3 6 7 0 4 ] i want to delent elemet but keep it...

i have a=[0 1 1 2 2 3 6 7 0 4 ] i want to delent elemet but keep its position i.e a(4)=[] it gives me 0 1 1 2 3 6 7 0 4 but i need 0 1 1 [] 2 3 6 7 0 4

Just in time compiler, Expertsmind brings you  unique  solution in java as...

Expertsmind brings you  unique  solution in java assignments Just in Time Compiler In processing, just-in-time system (JIT), also known as energetic interpretation, is a m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd