Create a single log file from these 7 log files

Assignment Help Basic Computer Science
Reference no: EM13864772

4.In the assignment4 directory are several log files containing IP addresses. Create a single log file from these 7 log files using a single line of commands that are chained together. e.g. passing output from one command as input into another. The resulting file should contain the results in the following format:

Monday

165.234.216.100

192.168.1.4

...

Tuesday

165.234.216.100

...

etc

5.In the unorganized directory are numerous files. The files in these directories are unorganized and need to organized.

a.Using single lines of commands create files that can be read in by xargs for moving files. The files should separate the files to allow xargs to do the following:

i.Move bak files into a directory called backups

ii.Move jpgs into a directory called 2015_jpgs

iii.Move all non_junk files to the directory called not_junk inside the text_docs directory.

b.Run xargs on the file to move the backup files to the correct directory. In the same line (before hitting enter) archive the backup directory containing the files using bzip2 and delete the original files.

c.Move the jpg files to the 2015_jpgs using the file you created earlier.

d.Move all not_junk files to the directory called not_junk using the file you created.

6.Find and remove all the junk files and the junk directory.

7.Rename jpeg files to png files using xargs and archive these files using gzip compression.

You must chain as many commands together as possible for each part of this assignment to receive credit for the problem number.

Reference no: EM13864772

Questions Cloud

Discuss the companys dividend policy between 20w9 and 20x3 : Discuss the companys dividend policy between 20W9 and 20X3 and its possible consequences for earnings and Advise the directors of the share price for XYZ Inc which might be expected immediately following the announcement of their decision if they p..
Power and crosson : Using the accounting book Financial and Managerial Accounting 10th edition by Needles, Power, and Crosson, For the problem E8A, I need to prepare Keepers Statement of cash flows using the indirect method from the given Income statement and balance sh..
Interval for preventing intersymbol interference : What is the minimum guard time interval for preventing intersymbol interference? What is the maximum data rate (BPSK signaling) where minimum SINR is 40 (in linear scale)?
Complete the outline for the education essay : Complete the outline for the education essay -  You use given articles to support your ideas.
Create a single log file from these 7 log files : 4.In the assignment4 directory are several log files containing IP addresses. Create a single log file from these 7 log files using a single line of commands that are chained together. e.g. passing output from one command as input into another. The r..
Why do you think that free will was compromised : Answer the following questions: Why do you think that free will was compromised? What led you to make the decisions and take the actions that you took
Describe elements of credit card theft and identity thef : Describe the elements of Credit Card Theft and Identity Theft. Describe how technology is used to facilitate these crimes
How to help your toddler begin developing empathy : The reading for the paragraphs: How to help Your Toddler Begin Developing Empathy
Analyze basic aspects related with recruitment and selection : Students are required to analyze the crucial aspects associated with recruitment and selection which could be adopted as a best practice by other organizations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use double variable to represent the private data of class

Use double variable to represent the private data of the class. Provide a constructor that enables an object of this class to be initialized when it is declared.

  Convert the following two''s complement to decimal numbers

Convert the following two's complement representations to decimal numbers (assume 5 bit numbers). a. 11101 b. 01111 c. 10011

  Write a script to help users calculate compressed file size

Develop a small console program driven by a text menu (see the sample screenshot below):? It displays a simple menu with 4 items indicated by number 1-4.? Users will enter number 1 to 4 to run some commands.?

  Complement in tcp and udp connections

UDP and TCP use the 1s complement for their check sums. Suppose you have the following three 8-bit bytes: 10011001, 01010010, and 01011001.

  Compare and contrast the four levels of protection

Compare and contrast the four levels of protection used during spill response and cleanup activities. In your discussion, provide an example of a spill or cleanup scenario for each level

  Explain relationship oriented and less transaction oriented

Are geared towards short-term spot purchasing. Are more relationship oriented and less transaction oriented than private industrial networks.

  Good meetings in software development life cycle

Provide three words or phrases that explain why "good meetings" are important during the Software Development Life Cycle?

  Draw a structured flowchart describing the steps

1. Draw a structured flowchart describing the steps you would take to cook popcorn in a microwave oven. Include at least one decision. 2. Create the pseudocode to go along with the flowchart created in question above.

  The development of cad and bim in architectural use

A brief history report about the development of CAD and BIM in architectural use supported with pictures and diagrams and perhaps a simple timeline. all in one A2 page. prefered page format is indesign.

  Compare results search and identify any differences

There are several options of search engines, including Yahoo, Google, DogPile, and Maholo. Using the listed search engines above, search for something that interest you

  How procuring organization has sorted out problem

You are the engineer involved in development of financial system. Should you simply abandon work until procuring organization has sorted out problem?

  Show using a state diagram the maca protocol

Show using a state diagram the MACA Protocol

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd