1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
12

Display all the lines in unixPasswd that contain at least 10 consecutive lowercase letters. How many names are there in total th

at meets this criteria?
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
7 0

Answer and Explanation:

To display 10 consecutive lower case letters in Unix, we make use of the commands below. The first command finds the letters in the file and the second command counts them line by line.

$ grep '[a-z]\{10,\}' /unixPasswd/passwd

# this command displays lines with at least 10 consecutive lowercase letters or more than 10 consecutive lowercase letters

$ grep '[a-z]\{10,\}' /unixPasswd/passwd | wc -l

# this command counts the number of lines that has at least 10 consecutive lower case letters or more than 10 consecutive lowercase letters

Note: the unixPasswd is a file in passwd file. The # is used when we want to add comments, is optional here. The $ is a prompt on the terminal that begins a new command.

You might be interested in
Any song recommendations, pls dont say 6ix9ine or lil pump
gogolik [260]

I actually do have one tho. Try Megan Tha Stallion.

8 0
2 years ago
Read 2 more answers
A large computer repair company with several branches around Texas, TexTech Inc. (TTi), is looking to expand their business into
Aleks04 [339]

Answer:

hecks

Explanation:

nah

6 0
3 years ago
Which activity is a case of identity theft
dezoksy [38]
<span>Criminal identity theft (posing as another person when apprehended for a crime)Financial identity theft (using another's identity to obtain credit, goods and services)Identity cloning (using another's information to assume his or her identity in daily life)Medical identity theft (using another's identity to obtain medical care or drugs)<span>Child identity theft]


cite: wikipedia</span></span>
4 0
3 years ago
Read 2 more answers
Critical Thinking Questions
Hoochie [10]

Answer:

One example of syntax in Logo is “[”. Two examples of Java are “;” and “{“or “}”. If you don’t use these parts of syntax then you could get a Syntax error, this will make you have to stop the code and debug.

Explanation:

6 0
2 years ago
Read 2 more answers
The recelver in a communication exchange can always ellminate all barriers to the communication.
gogolik [260]
It’s false because I know it
3 0
3 years ago
Other questions:
  • write a program using if condition and print fail and try again if student marks are less than 33 using if condition and print f
    5·1 answer
  • Which command provides the source refrence at the bottom of the current page of a document?
    5·1 answer
  • i got a set of headphones and when i plug them into my speakers the right side only works how do i fix the left side of them
    12·1 answer
  • What do you need for digital photography? 1. 2. 3.
    13·1 answer
  • Using ________ as a promotion method will bring return visitors to your site.
    8·1 answer
  • Example of negative body language include all but
    8·1 answer
  • Describe the difference between a chained conditional and a nested conditional. Give your own example of each.
    5·1 answer
  • Ayúdenme porfa se los agradecería :c
    7·1 answer
  • In the computer science industry, the process of finding and removing errors from computer hardware or software is known as
    7·1 answer
  • What is the vibrating or buzzing of a hand controller known as?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!