Executing a shell script

Assignment Help Basic Computer Science
Reference no: EM13764349

1. Use vim (Lab Manual, page 34) to create a file named short with the follow¬ing line in it: echo 'hi there'

2. Use cat to verify the contents of short and then try to execute it. Use Is -1 to display the permissions for short. Read the tip on page 338 of Sobell.

3. Use chmod (pages 193 and 337 of Sobell) to make the file executable, dis¬play the permissions for short, and try executing the file again.

4. Add a line that starts with 11! (Sobell, page 338) to the beginning of short to make sure it is executed by bash.

5. Add a comment line (Sobell, page 340) to short that explains what the script does.

6. Within a shell script, the shell expands Si (a positional parameter; Sobel!, page 1023) to the first argument on the command line the script was called with. Write and execute a script named first that displays (sends to standard output) the first argument on the command line it was called with. Include the #! line and a comment. Remember to make the file executable.

7. The date (Sobell, page 218) utility displays the date and time. Write and exe¬cute a shell script named mine that displays the date and time, the name of your home directory, and the value of your PATH variable.

8. Write a shell script that copies the file named by its first argument to a file with the same name with the filename extension of .bak. Thus, if you call the script with the argument first (and a file named first exists in the work-ing directory), after the script runs you would have two files: first and first.bak. Demonstrate that the script works properly.

9. Read the caution titled "Always quote positional parameters" on page 1023 of Sobell. Use touch to create a file whose name has a SPACE in it. What happens when you give that filename as an argument to cptobak from the previous step?

10. Modify the cptobak script from the previous step by quoting the positional parameters in the cp line. Now what happens when you use the script to make a copy of a file with a SPACE in its name?

Reference no: EM13764349

Questions Cloud

Problems related to ethical criteria : Where do you draw the line when using material found on the Internet, but trying to respect the artists' intellectual property and rights to royalties from their creations?
Leveraging power from batna : Assuming your Best Alternative to a Negotiating Agreement (BATNA) is letting a court sell the property, discuss how it may help you reach an agreement. Recommend other strategies that you could use to accomplish a successful negotiation.
Explanation of the nutritional theory : What? (A thorough explanation of the nutritional theory or concept on which you have chosen to write; this should pertain specifically to what you have gleaned from your study during the class.)
Was williamson''s intoxication sufficient to void mortgage : Wiliamson, an alcoholic who was threatened with foreclosure on her house entered into a contract to sell it for $17,000. Was Williamson's intoxication sufficient to void the mortgage
Executing a shell script : Use vim (Lab Manual, page 34) to create a file named short with the follow¬ing line in it: echo 'hi there'
Explain the security risks and applicable laws : Explain the security risks and applicable laws that govern the privacy risk. Describe the security measures that the organization needs to implement to mitigate the risks.
How would americans react to gay marriage today : How would Americans react to such a crime today? Consider current and proposed legislation (and attitudes) towards hate crimes, gay marriage, gay parenting, and gay rights.
What are the four requirements of a valid contract : What are the four requirements of a valid contract? Explain each requirement and why it is important. Who are the parties to this License Agreement? Is this a unilateral or bilateral contract? Is this a formal or informal contract? Is this an e..
Problems related to diseases : Identify any known risk factors; include any age groups, race, genders that are affected more than others.Describe any known prevention methods.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  When the jmpc field in the microinstruction is enabled

Assume that when the JMPC field in the microinstruction is enabled (set), MBR is ORed with NEXT_ADDRESS to determine the address of the next microinstruction to be executed

  Short description css

Select two pages where you have applied CSS. Then create two external style sheets and apply each to the two copies of the page. Then answer the following questions below

  Enterprise information systems

Enterprise Information Systems, Technologies, and InfrastructuresWrite a brief, 1 page paper that discusses the topic that you will do your research paper on.  The paper, at a minimum should address the topic that you have selected, which of the 5 fo..

  Corporate agency policy on employee use of instant messaging

What specific questions should a corporate or government agency policy on "Employee use of Instant Messaging (IM) using corporate computers" address?

  Best practices for network security

Need an orgianal paper over one of the followingProtecting IT: A Roadmap for Securing the Enterprise•Best Practices for Network Security

  Compute the average grades

Prepare a program that allows a teacher to compute the average grades for EACH student in his or her class

  Address three components represented in cell

Assume that a security model is needed for protection of information in your class. Write a brief statement on how you would address the three components represented in that cell.

  Draw the portion of the state space tree

Draw the portion of the state space tree

  Write the following sum using summation sigma notation

Write the following sum using summation (sigma) notation

  What is the paintcomponent method

Describe the types of information available to a program when using the KeyListener interface.

  Construct a vector containing all of the even numbers

Construct a vector containing all of the even numbers between 6 and 33, inclusive of the end points. Store your answer in the variable evens. (Note: 33 is not an even number)

  Draw an erd to model this situation

The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on each team and the children that will be playing on each team and their parents.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd