Question about unix commands

Assignment Help Data Structure & Algorithms
Reference no: EM1380640

Question: Assume you have a document called records.txt having the list of employee id and workers names. Every line contains a single employee id immediately followed by (that means no space) the employee name in the format "Last name, First name". The employee id is always five characters long. An example of two lines are as follows:
A0001Smith, John
A0002Joseph, Sheryl

Now, in this scenario, you would like to echo to the monitor just the names of the employees alone in the same order listed in the file. Give the UNIX command to perform this task.

 

Reference no: EM1380640

Questions Cloud

Question related to sequential files : In spite of the fact that sequential files lack direct targeted addressing of each of the records and fields, they are the most widely used.
The goal of maximizing the value per share of existing stock : Which of the following statements is not true regarding the goal of financial management? The goal of maximizing the value per share of existing stock is relevant to all organizations.
Justify how you would generate change : Justify how you would generate change and articulate a vision of change within a particular organization of your choosing. Conceive a rationale for the beginning of a change initiative for this company.
How would you respond by using these six steps in exhibit : She tells you she believes air quality in the building is bad and would like something to be done. How would you respond? Use the six steps in Exhibit 6.3 that are associated with effective decision making to help frame your answer.
Question about unix commands : Assume you have a document called records.txt having the list of employee id and workers names. Every line contains a single employee id immediately followed by the employee name in the format Last name, First name.
Find the range of feasibility for the rhs of constraint : Given the following linear programming problem with two non-negative variables (X1 and X2 ), find the range of feasibility for the RHS of constraint 2.
Identify what hr mechanisms can be introduced : Identify what HR mechanisms can be introduced in the international firm today to build a strategic business partnership, close the gap between management and employees while building a cohesive culture that add value
What do you think are the risks involved : What do you think are the risks involved (to HR and the organization as a whole) if HR does not make this a priority and instead remains a purely task-oriented department mostly administrative in nature.
Boundary value analysis : Several functions have an almost infinite number of input values. Testing all of these values is not possible in most cases, and does not necessarily tell us more than testing a few prices.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Evaluate algebraic expression by code with three-operand

Evaluate a short algebraic expression using code with three-operand instructions. The expression should have a minimum of three operands and 2 operators.

  Creating application - two dimensional array

Make an application that either sums or averages rows or columns of a 2-dimensional array depending on user choices.

  Identifying flaws in the design

Identify flaws in design of the Report of Consumers that follows. What assumptions about users and tasks did you make in order to assess this design?

  Efficient algorithm to achieve goal using few base stations

Certain points along the road, so that every house is within four miles of one of the base stations. Give an efficient algorithm that achieves this goal using as few base stations as possible.

  Explaining augmented red-black tree

Consider T be augmented red-black tree, where each node x has attribute x.size, which is number of internal nodes in subtree rooted at x. Given such augmented red-black tree T.

  Create list of major steps to follow to get input

Create a list of major steps to follow to get input, process, and output desired information (software requirements). Refine the list to include individual refined steps (algorithm).

  Algorithm to keep track of sufficient information

Your algorithm must keep track of sufficient information so that, for any computer Cb it is possible to retrieve in O(n) time a sequence of communications by which Cb could have become infected.

  Modify bellman ford algorithm to find negative weight cycle

Demonstrate how to modify the Bellman Ford algorithm to find and print a negative weight cycle in a weighted directed graph G if one exists.

  Define a federated database

Define a federated database and discuss why are federated databases becoming increasingly common? Provide examples of databases in your current or previous work environment

  Data systems and design

Suppose if you have a program with a housekeep() module, a mainloop() module, and a finishup() module, when is the second input record usually read?

  Write algorithm for program to compute the sum of number

Write an algorithm for a program which will satisfy following requirements: - Asks a user how many numbers they want to calculate.

  Explain algorithm from is optimal by proving lower bound

Illustrate that your algorithm from (a) is optimal by proving lower bound of n - k on number of comparisons required to solve the problem.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd