1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kobotan [32]
3 years ago
11

Demonstrate your grasp of the Unix file system by constructing a directory structure as follows: In your home ( ~ ) directory, c

reate a directory named "UnixCourse".This directory will be used in the remaining assignments of this course, as well as this one.Several of the commands that you will issue in this course will examine files in this directory and, in some cases, send me a listing of those files or even copies of those files for grading and diagnostic purposes. So you should not store anything unrelated to the course assignments in this ~/UnixCourse area. Within your UnixCourse directory, create a directory named "fileAsst". Within that fileAsst directory, create two directories, named "TweedleDee" and "TweedleDum".
Use the ls and/or tree command to check your work. Within the TweedleDee directory, you should place a copy of the file ~cs252/Assignments/fileAsst/hatter.txt

Use the ls and/or tree command to check your work. Within the TweedleDum directory, you should place a copy of the file ~cs252/Assignments/fileAsst/dormouse.txt Use the ls and/or tree command to check your work.

When you have completed this much, execute the command ~cs252/bin/fileAsst-1 (Take note of the difference between the numeric digit 1 and the lower-case letter l in the command above.

If you can’t tell the difference between these, check your web browser settings to see if you can get it to use some better fonts.) This will check to see if you have built the desired directory structure so far. You should repeat the above steps as necessary until this command reports success.

If you have been successful so far, the fileAsst-1 command will have placed a new file somewhere in the directory structure you have built.

Find it, and move it into the TweedleDee directory, renaming the file to "rabbit.dat". Execute the command ~cs252/bin/fileAsst-2
Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
7 0

Answer:

The steps to follow in executing the command are listed in the Explanation section

Explanation:

Open the terminal using Ctrl + Alt + T

To go to home directory, type: cd ~ OR just cd

To create a directory named UnixCourse, type: mkdir UnixCourse

To change directory to UnixCourse, type: cd UnixCourse

To create a fileAsst directory, type: mkdir fileAsst

To change directory into fileAsst, type: cd fileAsst

To create TweedleDee directory, type: mkdir TweedleDee

To create TweedleDum direectory, type: mkdir TweedleDum

To view the directory, type: ls

To copy from one directory to another:

cp ~/cs252/Assignments/fileAsst/hatter.txt  ~/UnixCourse/fileAsst/TweedleDee

To change to TweedleDee directory and list to view:

cd TweedleDee

ls

cd .. (this is to go back to the fileAsst directory)

To copy from one directory to another:

cp ~/cs252/Assignments/fileAsst/dormouse.txt  ~/UnixCourse/fileAsst/TweedleDum

To change to TweedleDum directory and list to view:

cd TweedleDum

ls

cd .. (this is to go back to the fileAsst directory)

The command below is executed as required:

~/cs252/bin/fileAsst-1

We check the directory for new file:

ls (to display entire file/folder)

then move the new file to TweedleDee directory

mv ~/UnixCourse/fileAsst/'name of file' ~/UnixCourse/fileAsst/TweedleDee

we then rename the file to rabbit.dat

mv ~/UnixCourse/fileAsst/TweedleDee/'name of file' ~/UnixCourse/fileAsst/TweedleDee/rabbit.dat

cd .. (this is to go back to the fileAsst directory)

The command below is executed as required:

~/cs252/bin/fileAsst-2

You might be interested in
Why Java Script uses the prefix Java in itsname?
kifflom [539]

Answer:

Java in JavaScript does not correspond to any relationship with Java programming language.

Explanation:

The prefix Java in Javascript is there for historical reasons.

The original internal name of Javascript when it was created by Brendan Eich at Netscape was Mocha. This was released to public as Livescript in 1995. The name Livescript was eventually changed to Javascript in Netscape Navigator 2.0 beta 3 release in December 1995 after Netscape entered into an agreement with Sun Microsystem. The primary purpose of change of name seemed to be as a marketing aid to benefit from the growing popularity of Java programming language at that time.

4 0
3 years ago
What is the output of intb= 4+ 6 /2 Systemoutprintln (b)
uysha [10]

Answer:

Command: Systemoutprintln (b)

Output: 7

Explanation:

To solve this problem, we must take into account the precedence of operation.

The division takes precedence before the addition, so we must divide before we add for b.

So

int b = 4 + 6/2 = 4 + 3 = 7.

So

Command: Systemoutprintln (b)

Output: 7

5 0
3 years ago
____ is scientifically seeking and discovering facts.
galina1969 [7]

Answer:

I believe it is science, but before you do anything with this answer, research more on it, just in case I'm wrong! :)

Explanation:

3 0
3 years ago
Write an application that reads the lengths of the sides of a triangle from the user. compute the area of the triangle using her
zlopas [31]

Here you go,


import java.util.Scanner;

import java.util.Random;

public class OrderCalculator{


public static void main(String[] args){  


float x, y, z, semi, area;

Scanner in = new Scanner(System.in);

System.out.print("Enter the 3 sides: ");

x = in.nextFloat();

y = in.nextFloat();

z = in.nextFloat();

semi = (float) ((x + y + z) / 2.0);

area = (float) Math.sqrt(semi * (semi - x) * (semi - y) * (semi - z));

System.out.printf("The area is: %.3f\n", area);


}

}

3 0
3 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Other questions:
  • a computer that no longer works after having minor repair work done to it may have been damaged by ______.
    6·1 answer
  • A program written in a(n) procedural language consists of sequences of statements that manipulate data items. __________________
    9·1 answer
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    5·2 answers
  • Most Muslims are Sunni Muslims; however, the Shiites are a forceful minority in some parts of the Middle East. The Sunni-Shiite
    13·1 answer
  • Which are the best examples of cost that should be considered when creating a project budget
    14·1 answer
  • Does anyone play genshin impact here?
    12·2 answers
  • What will be the index of leaf node in a right-skewd binary tree with height =7,where every parent has at most one child?​
    15·1 answer
  • Which of the following terms best describes the product development life cycle process?
    6·2 answers
  • Write a program that calculates the average of N integers. The program should prompt the
    12·1 answer
  • I’ll give brainliest if answers are correct
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!