Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write an AWK program which takes the following input file and processes it.
$cat data.txtJohn Do 111-1111 English 90 Maths 80Alice Do 222-2222 English 90 Maths 90 Chemistry 93
The input file has first 3 fields fixed as first name, last name, and student id. After the student id, it has a variable number of fields which has a pair of name of a subject and points scored in that subject. Your output should print the full name of the student, number of subjects taken, and his/her average score. The output corresponding the above input file is as follows:
$awk -f avgerage.awk data.txt
John Do: 2 subjects taken, average = 85
Alice Do: 3 subjects taken, average = 91
Classify Scheduler. Scheduler is a kernel function decide which method be thought to be implemented by the processor: the scheduler scans the list of processes in the ready s
Q. Develop a Menu driven program with following menu: 1. Octal to Decimal 2. Octal to Hexadecimal 3. Octal to Binary
Subroutine are the part of implementing processes (like any process can call a subroutine for achieve task), whereas the interrupt subroutine never be the part. Interrupt subroutin
An expert systems is software that contains a knowledge base of facts and relationships and has the ability to make inferences based on that knowledge base. An experts sys
Locality of reference implies that the page reference being made by a process is Ans. Locality of reference means that the page reference being made through a process is proba
What are the desirable features of an Electronic Market Place? Features of an Electronic Market Place: 1. Its electronic and business center is not a physical building qu
What are the events done by the Kernel after a process is being swapped out from the main memory? When Kernel changes the process out of the primary memory, it performs the fol
Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list
How can common bus system be constructed A common bus system could be constructed using multiplexers. These multiplexers select source register whose binary information is then
SEARCH is a sequential search from the starting of the table. SEARCH ALL is a binary search, continually dividing the table in two halves until a match is found. SEARCH ALL is more
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd