1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
13

Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren

t date on the system is Thu Jan 30 10:57:20 CST 2020 Then when you run your script as: $ SpellOutDate Then the output should be: Time: 10:57:20 Today is: Thursday Day of the month: 30 Month: January Year: 2020
Computers and Technology
1 answer:
AlladinOne [14]3 years ago
6 0

Answer:

Hi there! We can use the "date" function and formats available to us along with the "echo"command to print the date in the format required in the question. Please see below for the details.  

Explanation:

SpellOutDate.sh

#!/bin/bash

echo "Time: $(date +'%T')"

echo "Today is: $(date +'%A')"

echo "Day of Month: $(date +'%u')"

echo "Month: $(date +'%B')"

echo "Year: $(date +'%G')"

running from the command line, the code will produce the results as:

./SpellOutDate.sh

Time: 11:12:53

Today is: Monday

Day of Month: 1

Month: March

Year: 2020

You might be interested in
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately. editreg.
kenny6666 [7]
Regedit is the Answer
3 0
3 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
What is the most important job of a web server?
attashe74 [19]

Answer:

Provide requested web pages to clients; the other tasks listed there are secondary to that.

6 0
2 years ago
Read 2 more answers
Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
scZoUnD [109]

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

5 0
3 years ago
What are the three major functions of a game engine?
Harrizon [31]
read that hope this helped

8 0
3 years ago
Other questions:
  • Why is it important to explore an Integrated
    13·1 answer
  • BOTH INTERNATIONAL & INLAND Which procedure(s) shall be used to determine risk of collision?
    14·1 answer
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • Randy earn $22 per hour. This is an example of
    11·1 answer
  • In your opinion is it more beneficial to have many folders or is it better to nest subfolders
    12·1 answer
  • How do you mark peoples answer as the brainliest answer? I have trouble doing so. Please help!
    10·2 answers
  • Create a function called "strip_r_o" that takes in a STRING and strips all the Rs and Os from the string. Also use a FOR loop in
    7·1 answer
  • A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured t
    11·1 answer
  • Which of the following are the functions of an os?
    8·1 answer
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!