1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
10

(6 pts) Write a bash shell script called 08-numMajors that will do the following: i. Read data from a class enrollment file that

will be specified on the command line. ii. If the file does not exist, is a directory, or there are more or less than one parameters provided, display an appropriate error/usage message and exit gracefully. iii. Display the number of a specified major who are taking a given class.
Computers and Technology
1 answer:
Levart [38]3 years ago
6 0

Answer:

Check the explanation

Explanation:

Script:

#!/usr/bin/ksh

#using awk to manipulated the input file

if [ $# != 1 ]

then

echo "Usage: 08-numMajors.sh <file-name>"

exit 1

fi

if [ -f $1 ]

then

awk '

BEGIN {

FS=","

i=0

flag=0

major[0]=""

output[0]=0

total=0

}

{

if ($3)

{

for (j=0; j<i; j++)

{

# printf("1-%s-%s\n", major[j], $3);

if(major[j] == $3)

{

flag=1

output[j] = output[j] + 1;

total++

}

}

if (flag == 0)

{

major[i]=$3

output[i] = output[i] + 1;

i++;

total++

}

else

{

flag=0

}

}

}

END {

for (j=0; j<i; j++)

{

if(output[j] > 1)

printf("There are %d `%s` majors\n", output[j], major[j]);

else

printf("There is %d `%s` major\n", output[j], major[j]);

}

printf("There are a total of %d students in this class\n", total);

}

' < $1

else

echo "Error: file $1 does not exist"

fi

Output:

USER 1> sh 08-numMajors.sh sample.txt

There are 4 ` Computer Information Systems` majors

There is 1 ` Marketing` major

There are 2 ` Computer Science` majors

There are a total of 7 students in this class

USER 1> sh 08-numMajors.sh sample.txtdf

Error: file sample.txtdf does not exist

USER 1> sh 08-numMajors.sh

Usage: 08-numMajors.sh <file-name>

USER 1> sh 08-numMajors.sh file fiel2

Usage: 08-numMajors.sh <file-name>

You might be interested in
Which domain suffixes do businesses that sell products and services commonly use?
sineoko [7]
I’m having a hard time understanding your question
8 0
4 years ago
Read 2 more answers
Posts that you delete
kiruha [24]
Answer
are visible to others may already have been shared
8 0
2 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
Write a sequence of statements that create a file named "greeting" and write a single line consisting of "Hello, World!" to that
tia_tia [17]

Answer:

The solution code is written in Python 3 as below:

  1. outfile = open("greeting.txt", "w")
  2. outfile.write("Hello World")
  3. outfile.close()

Explanation:

To create a simple text file in Python, we can use Python built-in function, <em>open()</em>. There are two parameters needed for the open() function,

  1. the file name and
  2. a single keyword "w". "w" denote "write". This keyword will tell our program to create a file if the file doesn't exist.

The statement <em>open("greeting.txt", "w")</em> will create a text file named "<em>greeting.txt</em>" (Line 1)

To fill up the content in the greeting.txt, we use <em>write()</em> method. Just include the content string as the argument of the <em>write()</em> method. (Line 2)

At last, we use <em>close() </em>method to close the opened file,<em> outfile</em>. This will release the system resource from the<em> outfile.</em>

4 0
3 years ago
owever, sitting in a corner of the store, a hacker had just set up an open "rogue" wireless hotspot posing as the coffee shop’s
Ivenika [448]

However, sitting in a corner of the store, a hacker had just placed up an open “rogue” wireless hotspot posing as the coffee shop’s wireless network. When Sarah logged onto her bank’s website, the hacker hijacked her session and gained access to her bank accounts. Another term for rogue wireless hotspots exists as “evil twin” hotspots.

<h3>What is meant by wireless network?</h3>

A computer network is referred to as a wireless network if radio frequency (RF) links are used to connect network nodes. A common solution for households, companies, and telecommunications networks is wireless networking. Wi-Fi is a wireless networking technology that enables printers and video cameras to connect to the Internet as well as computers (laptops and desktops), mobile devices (smart phones, wearables, etc.), and other devices.

Increased Mobility: Wireless networks give mobile users access to real-time data, enabling them to move freely across the premises of your firm without losing network connectivity. This improves collaboration and production across the entire organisation, which is not achievable with traditional networks.

Hence, However, sitting in a corner of the store, a hacker had just placed up an open “rogue” wireless hotspot posing as the coffee shop’s wireless network. When Sarah logged onto her bank’s website, the hacker hijacked her session and gained access to her bank accounts. Another term for rogue wireless hotspots exists as “evil twin” hotspots.

To learn more about wireless network refer to:

brainly.com/question/26956118

#SPJ4

6 0
2 years ago
Other questions:
  • What is one reason the SOC categorizes occupations as it does?
    9·1 answer
  • What is the standard markup language of the world wide web?
    14·1 answer
  • In a microsoft word document, what is the amount of space that appears between paragraphs called?
    14·1 answer
  • What are programming paradigms?​
    9·1 answer
  • 1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
    13·1 answer
  •  In which part of a professional email should you try to be brief, but highly descriptive? 
    10·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • PLEASE HELP
    7·2 answers
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
  • What should you implement to leverage power, cooling, and networking capabilities independent from other datacenters in a region
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!