What is the unusual feature of the for loop that you used

Assignment Help Computer Engineering
Reference no: EM131876315

Problem

A telephone directory, teledir.txt, maintains records in the form name: number where number is of the form nnn-nnn-nnnn. Devise a shell script that accepts one or two arguments that could be:

(i) the name or number. If it exists in the directory, then the line should be displayed.

(ii) both. The entry is displayed if it exists and is added if it doesn't exist in the file. Note that the number will always be entered as a 10-digit string, so you'll have to use the script developed in Exercise 18 to perform both conversion and validation.

Exercise 18

Display the processes in the system every 30 seconds five times using a

(i) while loop,

(ii) for loop. What is the unusual feature of the for loop that you used?

Reference no: EM131876315

Questions Cloud

Compute the dollar amount of variable and fixed cost : Compute the dollar amount of variable and fixed cost that should have been allocated to each of the operating departments
What amount should king recognize as gain before income tax : At June 30, 2010, what amount should King recognize as gain before income taxes on redemption of bonds?
Prepare a marketing plan: imc for the love all children : Organization's basic values and philosophy: Take good care of our world future generations.
What amount should fort report as bonds payable : the market value of the warrants was $120,000. In its December 31, 2010 balance sheet, what amount should Fort report as bonds payable?
What is the unusual feature of the for loop that you used : Display the processes in the system every 30 seconds five times using a while loop. What is the unusual feature of the for loop that you used?
Prepare the amortization schedule for the bonds : On January 1, 2016, Novotna Company sold the bonds for $372,875 after receiving interest to meet its liquidity needs. Prepare the amortization schedule
What were the causes of the 2010-2012 debt crisis : What does this tell us with regard to the potential weaknesses of the euro? Explain your answer with a well-constructed and cogent response.
Devise a script that takes a filename as argument : Devise a script that takes a filename as argument and looks in the home directory tree to display the listing of all its links.
What amount of loss should hart recognize on the redemption : Hart amortizes discounts, premiums, and bond issue costs using the straight-line method. What amount of loss should Hart recognize on the redemption of these bo

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to design the network

Pat's Engineering Works is a small company that specializes in complex engineering consulting projects. The projects typically involve one or two engineers who do data intensive analyses for companies.

  Determine the maximum number of simultaneous users

[Maximum Number of Users in CDMA] Suppose that the desired level of performance for a user in a CDMA system is achieved when Eb I Jo = 10.

  List differences between a file-processing system and a dbms

List four significant differences between a file-processing system and a DBMS. Explain the difference between physical and logical data independence.

  Questioncreate a white paper based on knowledge listed

questioncreate a white paper based on knowledge listed below. please be sure to contain any security concerns. include

  Create an architectural diagram that shows how the virtual

write a two to three page paper in which you1. examine five issues that the it department is likely to face when it

  Discuss the given rlc circuit

(RLC circuit) The circuit in the figure consists of a resistor (R ohms), an inductor (L henrys), a capacitor (C farads), and an initial voltage source.

  What is importance of testing for the given vulnerability

What is the importance of testing for this vulnerability? How many occurrences of the vulnerability did an automated scan discover? What is your recommendat

  Findout which one is false statement

Findout which one is false statement.

  Explain what is a reflective cross-site scripting attack

What is a cross-site scripting attack? Explain in your own words. What is a reflective cross-site scripting attack? Which Web application attack is more likely to extract privacy data elements out of a database?

  List two reasons why a company would pursue onshoring

List two reasons why a company would pursue onshoring or insourcing. List two reasons why a company would not pursue onshoring or insourcing.

  Develop a simple but attractive webpage using css

CE206 - Assignment 1. OBJECTIVE: To develop a simple but attractive webpage using CSS and following HCI criteria. Read the design brief to get a good understanding of the requirements of the client (Head of School). Search the web for webpages that ..

  Prepare a report on computer evolution and performance

Research and prepare a report on "Computer evolution and performance". Research computer evolution based on processor speed, component size, memory speed, system clock and I/O capacity.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd