Create a single log file from these 7 log files

Assignment Help Basic Computer Science
Reference no: EM13864772

4.In the assignment4 directory are several log files containing IP addresses. Create a single log file from these 7 log files using a single line of commands that are chained together. e.g. passing output from one command as input into another. The resulting file should contain the results in the following format:

Monday

165.234.216.100

192.168.1.4

...

Tuesday

165.234.216.100

...

etc

5.In the unorganized directory are numerous files. The files in these directories are unorganized and need to organized.

a.Using single lines of commands create files that can be read in by xargs for moving files. The files should separate the files to allow xargs to do the following:

i.Move bak files into a directory called backups

ii.Move jpgs into a directory called 2015_jpgs

iii.Move all non_junk files to the directory called not_junk inside the text_docs directory.

b.Run xargs on the file to move the backup files to the correct directory. In the same line (before hitting enter) archive the backup directory containing the files using bzip2 and delete the original files.

c.Move the jpg files to the 2015_jpgs using the file you created earlier.

d.Move all not_junk files to the directory called not_junk using the file you created.

6.Find and remove all the junk files and the junk directory.

7.Rename jpeg files to png files using xargs and archive these files using gzip compression.

You must chain as many commands together as possible for each part of this assignment to receive credit for the problem number.

Reference no: EM13864772

Questions Cloud

Discuss the companys dividend policy between 20w9 and 20x3 : Discuss the companys dividend policy between 20W9 and 20X3 and its possible consequences for earnings and Advise the directors of the share price for XYZ Inc which might be expected immediately following the announcement of their decision if they p..
Power and crosson : Using the accounting book Financial and Managerial Accounting 10th edition by Needles, Power, and Crosson, For the problem E8A, I need to prepare Keepers Statement of cash flows using the indirect method from the given Income statement and balance sh..
Interval for preventing intersymbol interference : What is the minimum guard time interval for preventing intersymbol interference? What is the maximum data rate (BPSK signaling) where minimum SINR is 40 (in linear scale)?
Complete the outline for the education essay : Complete the outline for the education essay -  You use given articles to support your ideas.
Create a single log file from these 7 log files : 4.In the assignment4 directory are several log files containing IP addresses. Create a single log file from these 7 log files using a single line of commands that are chained together. e.g. passing output from one command as input into another. The r..
Why do you think that free will was compromised : Answer the following questions: Why do you think that free will was compromised? What led you to make the decisions and take the actions that you took
Describe elements of credit card theft and identity thef : Describe the elements of Credit Card Theft and Identity Theft. Describe how technology is used to facilitate these crimes
How to help your toddler begin developing empathy : The reading for the paragraphs: How to help Your Toddler Begin Developing Empathy
Analyze basic aspects related with recruitment and selection : Students are required to analyze the crucial aspects associated with recruitment and selection which could be adopted as a best practice by other organizations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Evaluate online tutorials and online communities

Evaluate online tutorials and online communities in regard to helping users. Create an argument for the approach you find to be the most effective and explain why.

  The sum of the angles of a triangle is always 180

The sum of the angles of a triangle is always 180. Get two angles from the user and display what the final angle must be in order to complete the triangle. Run the program to see the exact format of the output.

  Part of the hipaa privacy rule

True or Flase. As a patient, your doctor must sign a HIPAA Consent and Release Form to share your ePHI or PHI with insurance providers who pay for your medical bills. This is part of the HIPAA Privacy Rule.

  Identify telecommunication component technology

Identify one telecommunication component technology - 3-5 appendix pages including spreadsheets, Datas , and diagram tables if any available or any references.

  Possibility-using fiber optic cable instead of twisted pair

Discuss the possibility of using fiber optic cable instead of either twisted pair cable or staying with the existing coax wiring structure.

  How many inherited classes are defined in the code

1. Which function(s) is/are being overloaded on the code? (Check all that apply) *  void sort(int A[], int size)  bool testIfSorted(int A[], int size)  long getNumCmps()

  Are there certain projects in which the traditional approach

Are there certain projects in which the traditional approach

  Collaboration and social media

While planning for a new project, a young developer mentions that she used Facebook as a collaborative group space for developing her senior project. She tells you that it was the ideal solution since it was free and all of her group members were ..

  Convert 6bd3h into its binary and decimal equivalent

Convert 6BD3H into its Binary and Decimal equivalent

  Ray henry is considering expanding the activities

1. Ray Henry is considering expanding the activities at his book stores to include movies. He has some ideas for how he wants to do this and he needs you to help with database design activities to address these ideas. In particular, he would l..

  Virtualization imagine you are a senior systems

imagine you are a senior systems administrator who has been tasked with considering whether or not to implement server

  Explain the uses and advantages of the chips

Explain the uses and advantages of the chips. Mention likely privacy objections and refute them - making a presentation to a large retail chain to convince them to buy the chips to install in their products.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd