1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
13

Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren

t date on the system is Thu Jan 30 10:57:20 CST 2020 Then when you run your script as: $ SpellOutDate Then the output should be: Time: 10:57:20 Today is: Thursday Day of the month: 30 Month: January Year: 2020
Computers and Technology
1 answer:
AlladinOne [14]3 years ago
6 0

Answer:

Hi there! We can use the "date" function and formats available to us along with the "echo"command to print the date in the format required in the question. Please see below for the details.  

Explanation:

SpellOutDate.sh

#!/bin/bash

echo "Time: $(date +'%T')"

echo "Today is: $(date +'%A')"

echo "Day of Month: $(date +'%u')"

echo "Month: $(date +'%B')"

echo "Year: $(date +'%G')"

running from the command line, the code will produce the results as:

./SpellOutDate.sh

Time: 11:12:53

Today is: Monday

Day of Month: 1

Month: March

Year: 2020

You might be interested in
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
V125BC [204]
Yes it’s true the window net use command is a quick way to discover any shared resources on a computer or server
8 0
2 years ago
What obstacles could prevent you from getting and keeping a job
stepladder [879]
Drugs, No Collage, Gangs, bad grades, Criminal Records →
7 0
3 years ago
Your manager asks you to calculate the sale price if the product is marked down 20 percent. You enter the original price in cell
padilas [110]
The answer is =A2*.80
7 0
3 years ago
Read 2 more answers
In the classic experimental design, there are two groups: the _____ group and the _____ group.
Tju [1.3M]

Main Answer:In the classic experimental design, there are two groups: the <u>treatment group and the control group.</u>

<u>Sub heading:</u>

<u>Explain treatment group and control group?</u>

Explanation:

1.The treatment group also known as the experimental group receives the treatment that the researcher is evaluating.

2.the control group  on the other hand does not receive the treatment.

Reference link:

https://brainly.com

Hashtag:

#SPJ4

5 0
1 year ago
Other questions:
  • As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
    12·2 answers
  • Concept of CPU scheduler?​
    7·1 answer
  • How do ethics affect people?
    15·1 answer
  • All tif files start at offset 0 with what 6 hexadecimal characters?​
    11·1 answer
  • Why is compression a "hard problem" for computers? Draw on your own experience compressing text with the text compression widget
    12·1 answer
  • How many Iron molecules are in the compound Fe4O2?
    15·2 answers
  • Whenever Jim starts his laptop he sees some commands and numbers appearing on his screen these instructions are being processed
    9·1 answer
  • Why is information broken down into packets
    15·1 answer
  • What does 69 mean?<br> Whenever I watch memes they always talk about the number 69
    8·2 answers
  • Que es la felicidad??​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!