1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
monitta
3 years ago
9

Unix is a command line-driven operating system. The Unix command line behaves in a similar manner to the MATLAB interpreter: use

rs repeatedly enter commands at a prompt (denoted by the character >’). You are to write a "command line" that repeatedly prompts the user for a command and repeats it back to them. The user can exit the command line when only the character q is passed (meaning "quit"). For example:
>> command_line
> ls ../folder
You entered: ls ../folder
> echo hello world!
You entered: echo hello world!
> q
Computers and Technology
1 answer:
maria [59]3 years ago
3 0

Answer:

function command_line()

while 1==1

x = input('>','s');

if x == 'q'  

user_message = sprintf('Shutting down the program now... ');

disp(user_message)

Explanation:

  • Create a function called command_line and run a while loop loop inside it.
  • Take input from user and keep on displaying it.
  • Check whether the user entered the letter q, then display the "Shutting down the program now..." message and then terminate program.
You might be interested in
Ivy is a student. She is looking for some freelance assignments during her vacation. Which of the following networking sites can
lara [203]

The answer is D. XING


3 0
3 years ago
WAp to input the radius and print<br> the area of circle
Sergeu [11.5K]

Program:-

\tt r=float(input("Enter\:the\:value\:for\:radius\:of\:circle"))

\tt x=3.14*\:r**2

\tt print("Area\:of\:Circle=\{x\}")

<h3>Sample run:-</h3>

\tt r=3

\tt Area\:of\:the\:circle=28.26

7 0
2 years ago
While researching ideas for cutting energy costs is his company. Hector watches an online video in which a business expert says,
Nataliya [291]
B. Put it in quotes if it is directly quoted as is and cite the source. You should likely also list the source in the works cited but not the phrase itself.
6 0
2 years ago
Read 2 more answers
A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
malfutka [58]

Answer:

DoS or Denial of Service

Explanation:

Have a nice day! :)

3 0
2 years ago
Now that you have explored some of the possibilities for using Excel at home, what concerns or questions do you have about using
lora16 [44]

This seems like an opinionated question, I suggest attempting to answer it yourself.

8 0
3 years ago
Other questions:
  • What is the purpose of this diamond shape in a flowchart?
    8·1 answer
  • Will an email sent from a phone say it was sent from your phone
    5·2 answers
  • The most popular way for hackers to take over hosts today is ________.
    15·2 answers
  • Using symbols (%, $, #, etc.) can make it easier to take notes.
    8·2 answers
  • Assume that a function with this header: function amountSaved(price, discountRate, salesTaxRate) already exists. Write a single
    14·1 answer
  • Translate We get up at 8 o'clock into Spanish in the box below:​
    9·1 answer
  • PLEASE HELP ASAP
    13·2 answers
  • How many hours do you spend on the Internet per day?
    11·2 answers
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!