On the cmsy255 server, write a bash shell script called usrinfo that displays information about a specified user. Make sure the script file is executable. Also make sure that you can run the script without having to specify the directory. For example, you should NOT have to enter ./usrinfo in order for it to run.
Q: The rationale behind why putting a virtual private network (VPN) behind a firewall is a good idea.…
A: With the rise of remote work and the increasing need for secure online communications, the use of…
Q: In what ways may knowledge of multimedia be useful for education in the 21st century?
A: Hello student Greetings In today's world, where technology is advancing at an unprecedented pace,…
Q: Introduce data networking by giving a quick description of it.
A: According to the information given:- We have to define data networking
Q: A performance gain may be achieved by using data that has been cached in order to take advantage of…
A: Answer is given below
Q: Why is it that understanding scalability in the cloud is so difficult? Is there a model that can…
A: Understanding scalability in the cloud is difficult because it involves complex and dynamic…
Q: What are the most effective methods for maintaining a firewall? Explain.
A: Maintaining a safe and effective firewall is key to keep the software and firmware up to date.…
Q: Refer to image to answer this; Show the current state of the runtime stack at the call pointed to…
A: Given, Show the current state of the runtime stack at the call pointed to below –include static and…
Q: Create a formal definition of the language that a Turing machine can understand by writing it out…
A: Turing machine is a theoretical model of computation used in computer science and mathematics to…
Q: Concerning the short-term and long-term effects of information technology on individuals and…
A: Information technology refers to the use of computers, software, and other electronic devices to…
Q: When it comes to the creation of software, a broad variety of models are used, and the significance…
A: Waterfall Model: The Waterfall Model is a linear and sequential approach to software development.…
Q: How many different constructors does Java have to offer?
A: Constructors are an essential part of object-oriented programming, providing a mechanism for…
Q: Sorting refers to the task of arranging a collection of items in a specific order, typically based…
A: The solution is given below with explanation
Q: Establish a database containing several predefined functions.
A: A database organization system (DBMS) is software that interact with the user, other Applications,…
Q: Give an example of what you mean by the term "spreading tree" using your own words
A: In computer science, the phrase "spreading tree" can refer to a particular sort of data structure…
Q: The term "Slack" refers to one of the many different types of memory that may be found in an 8086…
A: In the 8086 microprocessor, stack memory is a special area of memory that is used to store data…
Q: Give an explanation of what takes place in a programme when the nextLine() command comes after the…
A: nextInt() or nextDouble() is used to returns input integers or double values from user and leading…
Q: In this article, we will go through two database design concerns that are essential to the building…
A: Brief overview of two critical database design concerns that are crucial for building web-based…
Q: Given the following case, you are to answer the two questions on the following pages. When completed…
A: Given the following case, you are to answer the two questions on the following pages. When completed…
Q: Take into consideration the quality of the programme from the perspective of its bugs. In your role…
A: Hello student Greetings Maintaining high software quality is a crucial aspect of software…
Q: After writing and testing, modules must be assembled and tested. Why is system-wide testing…
A: What is testing: Testing is the process of evaluating a software product or system to find defects…
Q: Why do some analysts choose empirical data analysis (EDA) over hypothesis testing when it comes to…
A: Empirical Data Analysis (EDA) ) and Hypothesis Testing are two normal techniques utilized in data…
Q: 4.01-1. Packet scheduling (a). Consider the pattern of red and green packet arrivals to a router's…
A: a) FCFS scheduling FCFS, or first come, first served, is an acronym. This means that packets will be…
Q: In this video, I will discuss why I believe that people and information systems are the fundamental…
A: Information technology has been progressing rapidly over the past few decades, and it has changed…
Q: How does link state routing differ significantly from distance vector routing, and what are the two…
A: Link state routing and distance vector routing are two different types of routing protocols used in…
Q: Can you take any measures to guarantee that your model gets entry to all the information it…
A: Computer graphics play a crucial role in various industries, such as entertainment, advertising, and…
Q: What exactly differentiates the P code from the W code is the question.
A: Businesses across industries are utilizing Big Data to gain a spirited advantage. Some of the…
Q: In Java Write a program that prints the 128-character ASCII table. It should print the table in…
A: The above Java code is a program that prints the 128-character ASCII table. The table is printed in…
Q: What exactly is meant by the term "input data validation"?
A: Input validation, which is also known as data validation, checks the appropriateness of any input…
Q: How exactly should a firewall be configured such that it adheres to the best practises?
A: A firewall is an important security tool that acts as a barrier between your network and the…
Q: How would you differentiate between the architecture and organization of a computer system and…
A: When it comes to understanding how a computer system works, two terms that often come up are…
Q: 2. Assume the following register mappings: a= $t0,b=$t1, c=$+2, tmpl=$+3, tmp2=$+4 c = (a < b) &&…
A: Register mapping is the process of mapping an application's memory address space to the physical…
Q: Computer Science [1 for 2 correct sketches ] [0 for 1 correct sketch ] sider the function…
A: The analysis of a function's domain and range is an essential part of understanding its behavior and…
Q: Students, Let me use this opportunity to express my best wishes to you. Various black box testing…
A: Software difficult frameworks are essential for ensure the excellence and Dependability of software…
Q: Which model—Agile or Waterfall—should be used to create a programme that manages radiation therapy…
A: Which model—Agile or Waterfall—should be used to create a programme that manages radiation therapy…
Q: There are three methods of data mining that are most often used.
A: Data mining: Gaining information from enormous data stores is called "data mining," and the phrase…
Q: Can you describe software development metrics? Shouldn't the issue be addressed from all angles?
A: Software development metrics are quantitative measurements that help assess software development…
Q: How should a company go about investigating the possibilities offered by cloud computing?
A: With the boundless reception of cloud computing, many companies are investigating its advantages.…
Q: The Production A->cA cannot be in a regular grammar, where lowercase letters are terminals and…
A: A regular grammar is a formal grammar that generates a regular language. Regular languages can be…
Q: Software process models like the spiral model are popular in academia but seldom applied in…
A: The spiral model, a software development process model, has been widely discussed in academia, with…
Q: Do you want to talk about Big Data and how it's being used by organizations today, and why?
A: What is data: Data refers to any information that can be processed by a computer. It can be…
Q: When are conditional statements appropriate to use? What are the advantages of using conditional…
A: Conditional statements are a fundamental concept in computer programming that allow a program to…
Q: When it comes to working with computers and other forms of technology, having a working knowledge of…
A: In today's digital age, computers and technology have become an essential part of our daily lives.…
Q: There are a lot of benefits that come along with putting in place RAID Level 2 for the university's…
A: RAID Level 2 is a data storage technology that uses error-correcting codes to detect and correct…
Q: In what ways may the end user possibly benefit from data mining?
A: In today's digital age, vast amounts of data are generated every second from various sources such as…
Q: To what extent does the technology of the digital twin contribute to the creation of smart cities?
A: In this question we need to explain at what extent digital twin technology contribute for creation…
Q: Which development methodology—Agile or Waterfall—should be used to build an online registration…
A: The development methodology used to build an online registration system for university classes can…
Q: Compare and contrast the strengths and weaknesses of different software testing approaches. It has…
A: Foreword to Software Testing Approaches: Among the most critical processes in the Creation of…
Q: Where did the hierarchy of the storage space for files originate from?
A: The hierarchy of storage space for files is a fundamental concept in modern computer systems. It…
Q: What characteristics might you anticipate from an offshore 'hot site' setup in a company if it is…
A: RAID 5 is an extra example of an independent circular design that equally uses plate striping. No…
Q: Why does using Prim's method always result in a Minimum Spanning Tree being returned?
A: Prim's algorithm is a popular algorithm used to find the minimum spanning tree of a weighted…
On the cmsy255 server, write a bash shell script called usrinfo that displays information about a specified user. Make sure the script file is executable. Also make sure that you can run the script without having to specify the directory. For example, you should NOT have to enter ./usrinfo in order for it to run.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images
- Please log in as “root” and create a new directory called “myScripts”on your desktop (i.e., /root/Desktop).Please leave a comment with your name at the end of each of your script files. You can use “#” to insertcomments in your script. Write a script and save it as /root/Desktop/exercise1. This script performs the followingfunctions:a. Asks the user for the length and width (in feet) of a rectangular roomb. Calculates the area of the roomc. Displays the result to the userRun the script in terminal using the command: bash /root/Desktop/exercise1 SO I HAVE WROTE THE SCRIPT BUT I DON'T KNOW HOW TO SAVE IT TO EXERCISE1 AND DISPLAY IT, JUST NEED TELL ME HOW TO DO IT , NO NEED SCRIPTUse Linux executable objectCode5 for this question. These files are on syccuxas01.pcc.edu in directory ~michael.trigoboff/cs201/quiz02LinuxFiles. The file is run from the Linux command line, and takes one positive numerical argument, like this: ./objectCode5 3 (You can enter any small positive integer instead of 3.) Command line arguments are passed to int main(int argc, char** argv) as arguments argc and argv. You should assume that argc is at ebp+8 and argv is at ebp+12. This code contains a function named what. Using gdb, figure out what the function named what computes: Question options: 1) the absolute value of n 2) n squared 3) the sum of the integers from 1 through n 4) factorial of nUse Linux executable objectCode5 for this question. These files are on syccuxas01.pcc.edu in directory ~michael.trigoboff/cs201/quiz02LinuxFiles. The file is run from the Linux command line, and takes one positive numerical argument, like this: ./objectcode5 3 (You can enter any small positive integer instead of 3.) Command line arguments are passed to int main(int argc, char** argv) as arguments argc and argv. You should assume that argc is at ebp+8 and argv is at ebp+12. This code contains a function named what. Using gdb, figure out what the function named what computes: 1) the absolute value of n 2) n squared 3) the sum of the integers from 1 through n 4) factorial of n
- Using JAVA, Create a File Menu in your GUI Add a file menu to your BulbGUI with options to open any file for reading (and displaying the file as in Project 2), and one to Quit the program. You will need a FileMenuHandler class to handle the events from the FileMenu. Be sure to use getAbsolutePath() when getting the file from the JFileChooser, not getName(). Handle Exceptions Create an exception called IllegalBulbException (by extending IlegalArgumentException as shown in the lecture) and have the constructor of the Bulb throw it. For our purposes, a Bulb is illegal if the wattage is less than 5. Use a try/catch statement to catch this exception in your program, and display the erroneous Bulbs to the console (do not put them in the ArrayList). Use ArrayLists Use an ArrayList to store the unsorted Bulbs. For this project, display only the unsorted bulbs in the GUI. Input file Phillips,1237DF2,100,1200 Phillips,546AHH7,75,900 Phillips,875RTM6,4,750 Cree,14573,65,800 Cree,86545,100,1100…Given a directory called Project1 with 500 files called rock000.py, rock001.py, ... , rock500.py, create a bash shell script that will rename all the files given in this directory. The script should take two arguments: a base name and a file extension. Please include the specifics from the example in the code (i.e., identify the base name, extension, and old and new file names and write them as part of the code). If we run bash project.sh project_rocks py the resulting files in the directory should be like this: project_rocks000.py, project_rocks001.py, .. , project_rocks500.py.do the following in the codeThe shell environment should contain shell=<pathname>/myshell where <pathname>/myshell is the full path for the shell executable (not a hardwired path back to your directory, but the one from which it was executed). #!/bin/bashflag=0echo "Welcome to myshell"while [[ $flag == 0 ]]doread -p "myshell > " str#spilliting the textIFS=' ' #setting space as delimiterread -ra ARR <<<"$str" #reading str as an array as tokens separated by IFScommand=0 # >>>>>>>>>>>>>>>>>>>>>>>>>> 1. cd <<<<<<<<<<<<<<<<<<<<<<<<<if [[ ${ARR[0]} == "cd" ]]thencommand=1word=$(echo ${ARR[@]} | wc -w) # after cd hav no argument then report to current directoryif [[ $word == 1 ]]thencd $PWDelseif [[ -d ${ARR[1]} ]]thencd ${ARR[1]}elseecho "[${ARR[1]}] path is not correct"fififi…
- Create a file named "YournameTask03.txt". Change its permission using absolute(numeric) mode. so that it has ONLY executed permission of owner and group ONLY. Solve this task by using shell scriptingYou have made modifications to the file /etc/apache2/sites-enabled/000-default.conf to change the "DirectoryIndex index.py" to be "DirectoryIndex newstartpage.py". Both files are in the directory, but when you test it, the original entry (index.py) continues to come up. What do you need to do? Change the "DocumentRoot" Remove the file "index.py" Restart the browser you use to test the application Restart apache by entering sudo systemctl restart apache2You can configure your shell by editing the file~/.bashrc for instance to change the value of$ PS1 and $PAth permenatrly true or false
- Write a bash program that takes in a word and a filename from the command line and print out the number of occurrences of the word in the file. Name the program count_word.sh. Your program should work as follow:hb117@uxb5:~$ ./count_word.sh global /home/hb117/shared/cs371/lab04/global.txt global 9 hb117@uxb5:~$ ./count_word.sh nuclear /home/hb117/shared/cs371/lab04/global.txt hb117@uxb5:~$ add awk to your pipeThe payloads used in this lab were not sophisticated at all and would likely raise some red flags. The msfvenom tool provides a method of putting the payload in an existing executable. For testing, another member of your team has created a simple program that displays a success dialog and will open a simple text file if the user chooses Yes. The program is /home/kali/payload.exe on AttackLinux01. Research the options for the command line use of msfvenom and determine how to create a payload that uses windows/meterpreter/reverse_tcp inside this test program.create a java method named clearDirectory(String name)a. This method should delete all of the files in the directory with the specifiedname. Hint: read the java.io.File documentation to see how you might list the files in a directory and then delete them.b. If a file cannot be deleted for some reason, throw an IOException with anappropriate message including the absolute path to the file.c. Rethrow any exceptions that might occur.