1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
13

Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren

t date on the system is Thu Jan 30 10:57:20 CST 2020 Then when you run your script as: $ SpellOutDate Then the output should be: Time: 10:57:20 Today is: Thursday Day of the month: 30 Month: January Year: 2020
Computers and Technology
1 answer:
AlladinOne [14]3 years ago
6 0

Answer:

Hi there! We can use the "date" function and formats available to us along with the "echo"command to print the date in the format required in the question. Please see below for the details.  

Explanation:

SpellOutDate.sh

#!/bin/bash

echo "Time: $(date +'%T')"

echo "Today is: $(date +'%A')"

echo "Day of Month: $(date +'%u')"

echo "Month: $(date +'%B')"

echo "Year: $(date +'%G')"

running from the command line, the code will produce the results as:

./SpellOutDate.sh

Time: 11:12:53

Today is: Monday

Day of Month: 1

Month: March

Year: 2020

You might be interested in
A circular copper disk of diameter D=10 cm rotates at frequency =1800 rev/min about an axis through its center and at right angl
MAXImum [283]

Answer:

Induced current is 0.226 A

Explanation:

To calculate potential difference we have

E =1/2Bomega*r2 =1/2*1*1800*3.14*0.05=141.3

putting values we get

the p.d is 141.3

7 0
3 years ago
Which of the following is not a basic networking hardware component? Network interface card
RideAnS [48]

Answer:

Device Driver

Explanation:

All of the other options are physical and are something that you can physically touch. The device driver runs in software and allows the computer to communicate with the device that is attached.

4 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Help ASAP!!! During which phase of a well-structured study session is each occurring?
gladu [14]

Answer:

1. drill

2. discuss

3. review

4. prepare

Explanation:

Your Welcome!

7 0
2 years ago
Read 2 more answers
Identify an advantage of centralized processing
lara [203]

Answer:

In a centralized organization structure, the centralized authority may have a better perspective on the big picture of the organization and how the subunits of the organization fit together and this may make centralized authority optimal.

Please mark brainliest, hope this helped :)

7 0
3 years ago
Other questions:
  • Which of these port transmits digital video
    12·2 answers
  • Interest rate risks would be most relevant to what purchase?
    7·2 answers
  • What is the duty of business to contribute to the well-being of society
    12·1 answer
  • A(n) ____ is a grouping of related objects within a domain,
    15·1 answer
  • . When a function template has two parameterized types, one as the return value, and one as an argument, then _____.
    11·1 answer
  • During which phase of the website transformation processwould the project team for developing perform content analysis, layout t
    13·1 answer
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
  • Write the code to produce a for loop that counts down from 20 to 0 by 2’s and prints the number each time it goes through the lo
    15·1 answer
  • How are switches indirectly involved in ARP poisoning?
    10·1 answer
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!