Bourne shell and design suitable functions

Assignment Help Computer Engineering
Reference no: EM131673

Part-1

1. How can you perform a ?oating point comparison? You should include two examples, one in C-shell and one in Bourne shell.

2 Explain the getopts command and write a sample shell script that uses getopts.

Part-2 Bourne Shell

1. You should write the following questions in Bourne shell and design suitable functions for each of them.

-  Write an alarm clock script that sleeps for a number of seconds and then beeps and displays a message after that times has elapsed. The number of seconds is set based on an input argument.

- Use a recursive function to print each argument passed to the function, regardless of how many arguments are passed. You are allowed to echo only the ?rst positional argument (echo $1).

2. Write a Bourne shell script that create an HTML ?le. This ?le should have a table of 4 columns and n rows. The table's elements are the contents of a directory. Directory names are written in blue and ordinary ?le names are written in green.

The above command line creates an html ?le myhtml.html and this ?le is shown in ?gure 1.

3. Write a Bourne shell program that displays the following menu to the user:

Would you like to:

1. Look someone up

2. Add someone to the phone book

3. Remove someone form the phone book

4. Quit

Please select one of the above (1-4):

For option 3, if multiple entries are found, then the program will prompt the user for the entry to be removed:

More than one match, please select the one to remove:

AAA Brown Remove[y or n]: y

AAA Blue Remove[y or no]: n

Part-3 Bourne shell and C-Shell

You should write two scripts for each of the following questions: one in Bourne shell and one in C-Shell.

1 Write a program called isyes that returns an exit status of 0 if its argument is "yes" and 1 otherwise. For purpose of this exercise, consider y,yes, Yes, YES and Y to be valid "yes" arguments.

2 Write a program called counttime that prints the number of hours and minutes that a user has been logged on to the system (assume that this is less than 24 hours). The name of the user is an input argument.

3 Write a Shell script that checks the validity of a userid that is passed as an input argument. If the userid is available on mars it will display the appropriate message.

4 Write a shell script that looks at the name on on the command line and responds with the output string Web page if the name ends with html or with htm and with the output string applet if the name ends with class

5 Write a shell script that changes the permissions of all the ?les in the current directories that ends with scpt so that they are executable by everyone.

Reference no: EM131673

Questions Cloud

Risk and return : Investing in the stock market and Risk-free investment and inflation
The total number of slots available in the zone : The total number of slots available in the zone, the total number of bicycles in the zone at the beginning of the period
Encipher a message using a keyword : The first program will encipher a message using a keyword and second program will decipher a message using a keyword.
Write the constructor function makestk : Write the constructor function makestk, predicate function emptystk and mutator functions pushstk and popstk
Bourne shell and design suitable functions : Bourne shell and design suitable functions
Net salvage value : Evaluate Net Salvage Value
Mergers and acquisitions : Track record of mergers and acquisitions
Present and defend the budget : Given a description of a new business, new product, service or project develop, present and defend the budget.
Software engineering and microprocessor systems : Software is required for a simple house burglar alarm system.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Data representation and logic

Representing Text and Numbers, Binary Arithmetic, Interpreting Logical Statements, Logic Puzzle, Binary and Algorithms.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

  Software engineering and microprocessor systems

Software is required for a simple house burglar alarm system.

  Convert csv file into html file

Convert CSV file into HTML file

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Mathematics in computing

Write the selection sort algorithm

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  Application to computer science

Find the matrices that represent the relations.

  Examine the behavior of airfoil

Write HW assignment written in Matlab airfoils have different C mc/4

  Risk assessment of ict system

Risk Assessment of ICT System and Developing Computer Incident Response System on WAMP platform

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Write a recursive implementation of euclids algorithm

Write a recursive implementation of Euclids algorithm

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd