Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write an AWK program which takes the following input file and processes it.
$cat data.txtJohn Do 111-1111 English 90 Maths 80Alice Do 222-2222 English 90 Maths 90 Chemistry 93
The input file has first 3 fields fixed as first name, last name, and student id. After the student id, it has a variable number of fields which has a pair of name of a subject and points scored in that subject. Your output should print the full name of the student, number of subjects taken, and his/her average score. The output corresponding the above input file is as follows:
$awk -f avgerage.awk data.txt
John Do: 2 subjects taken, average = 85
Alice Do: 3 subjects taken, average = 91
Explain a public key encryption system? A public key encryption system permits only the correct receiver to decode the data.
Ethernet 10 Base 2 is an example of network topology. (A) Bus (B) Ring (C) Star
Whole idea of ISDN is to digitize the telephone network to permit transmission of video, audio and text over existing telephone lines. The purpose of ISDN is to provide fully integ
What is the maximum and minimum number in the range of a 7-digit number for each of the following cases? Express all numerical answers in both the original base and its decimal (ba
What is meant by super scalar processor? Super scalar processors are designed to exploit more instruction level parallelism in user programs. This means that multiple function
given a string S convert it to palindrome by doing character replacement.convert S to palindrome with minimum character replacements
Operations from Functions As we know, function is actually operations on object. These functions could be simple and summarized on object model. Organise functions into oper
Case x, z difference, which is preferable, why? CASEZ : Special version of case statement that uses a Z logic value to signify don't-care bits. CASEX : Special
In a two-pass assembler, the task of the Pass II is to? Ans. The task of the Pass II is to synthesize the target program in a two-pass assembler.
Explain User Datagram Protocol. UDP(User Datagram Protocol) : User Datagram Protocol uses a connectionless communication paradigm. It is an application using UDP does not re
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd