Answer:
The code is given as below: The input and output is as given for one case.
Explanation:
echo -e "Enter A, B or C : \c" #Printing the line on the screen
read -rN 1 test #read the character in the variable test
echo
case $test in #Setting up the case structure for variable test
[[:lower:]] ) #checking all lower case letters
echo You did not enter A, B or C;;
[D-Z] ) #checking upper case letters from D to Z
echo You did not enter A, B or C;;
A ) #Condition to check A
echo You entered A;;
B ) #Condition to check B
echo You entered B;;
C ) #Condition to check C
echo You entered C;;
esac #Exiting the case structure
Answer:
Check the explanation
Explanation:
The two examples for each type of violation:
A) Power failure and Act of sabotage
B) Accidental deletion of file and Permission failure
C) Tampering of data, Denial of service attack
D) Failures of HDD (hard disk) and finding program bugs.
Note:
There is a difference in trusted behavior for pc's and servers are relevant because pea-to-peer system must be designed to cope with the looser interpretation of trust for pi s
If some files appear dimmed in one of the default folders on your computer, the best course of action would be to A. leave the files as they are.
These files are probably either hidden or system files, which are never meant to be deleted or moved.