Unix Shell, Basic Computer Science

Assignment Help:
Write a shell script, change-lines, which will substitute a string for a replacement string for each occurance of the string in files specified.
The original file will be saved, with the same filename with the .keep extension unless the -n option is present.

You may use a temporary file for this script.

Remember the search string and or the replacement string can have special characters in them, so you must use proper quoting techniques.

The script will use following options:


the option -s "string" for the search strings
the option -r "string" for the replacement string
the -n option to prevent a backup file from being created
the -h option to print a usage statement and exit
The script will exit with an error status and print an error message:
if the -s option is not present.
if the -r option is not present.
if the string is not specified with the -s option
if the string is not specified with the -r option
if there are any other options specified
if there are no input files specified
if the input file cannot be read by the current process
if the input file cannot be written by the current process
if you cannot create the backup file.
Here is the usage statement for the script:
change-lines [-n] -s search string -r replace string files ...
-n do not backup the original file
-s search string the search for this string
-r replace string replace the search string with this string
-h print this message

Related Discussions:- Unix Shell

Flowcharts, what is a dry running of flow chart?

what is a dry running of flow chart?

Search strategies, Search strategies are evaluated along four main dimensio...

Search strategies are evaluated along four main dimensions. Name those dimensions and briefly describe each one

Optical fibres, Optical Fibres: Coaxial cables have limitations such a...

Optical Fibres: Coaxial cables have limitations such as broadband transmission medium which can be overcome by the use of optical fibres. Optical fibres carry light waves (rep

We will compare the performance of a vector processor, In this problem we w...

In this problem we will compare the performance of a vector processor with a system that contains a scalar processor and a GPU-based coprocessor. In the hybrid system, the host pr

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Experiment with computer system measurements, In this assignment, you need ...

In this assignment, you need to experiment with computer system measurements. Firstly, pick a platform to study. Any Unix-based system (such as a PC running some version of Linu

Sequential writing in fcb files, Previous to we can perform writing to the...

Previous to we can perform writing to the disk it is essential to define the data transfer region using for this end the 1AH function of the 21H interruption. The 1AH function does

Desk top publishing program, Desk Top Publishing Program: Desktop publ...

Desk Top Publishing Program: Desktop publishing programs contain many of the features of word processing software, but .go even further in the ability to layout the format of

What is computer, how to use computer and how we can manage it

how to use computer and how we can manage it

Homework , Using only the digits 1-6 how many five digit numbers can be for...

Using only the digits 1-6 how many five digit numbers can be formed? How many of these have at least a 5? How many of them have either no 5 or no 6?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd