
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Create a bash script that will take two directories as input parameters, iterate over the lists of files, and report files which are either present in one directory but missing in the other, or present in both directories but differ in content.
The script MUST NOT consider subdirectories or files therein.
The script should work with both relative and absolute paths. This also means the output format displayed must contain a relative or absolute path depending on what the original argument was
(see attached image for commands allowed)
![[[ ]] $) $CO) $[] _basename
$[] basename
bc
break case
cd
continue
date
diff
dirname echo exit
export expr for
grep if
1s
pwd
read
set shift
tar
while](https://content.bartleby.com/qna-images/question/9c002e4e-ece1-4dd1-9934-cbb442392244/c826c89e-b8c7-4560-82ce-60319cb4e15d/qpu5sw_thumbnail.png)
Transcribed Image Text:[[ ]] $) $CO) $[] _basename
$[] basename
bc
break case
cd
continue
date
diff
dirname echo exit
export expr for
grep if
1s
pwd
read
set shift
tar
while
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 2 steps

Knowledge Booster
Similar questions
- Need another function written in python from the csv linkarrow_forwardSuppose you wrote a program like HW9's rpn.c, except it was to read the input from a file opened with fopen instead of from stdin. Assume that code contains the line fscanf(f, "%s", buffer), where f was that opened file. Based on this information, your code: A. Has a buffer overrun vulnerability B. Has a use-after-free vulnerability C. Has an uninitialized memory vulnerability D. Will cause a segmentation faultarrow_forwardWith the exception of fp being a file pointer rather than a file descriptor and the return value being an int status rather than a location, the standard library method int fseek(FILE *fp, long offset, int origin) is identical to Iseek. Compose fseek. Ensure that the caching used for the other library functions and your fseek are correctly coordinated.arrow_forward
- Enter a BASH "glob" pattern that will match all files in the current working directory that have an 'm' in their name (start, middle, or end). Note: no "whitespace" is permitted (spaces, tabs, newlines, etc). The answer is one "word" only.arrow_forwardPlease write a 2.7 Python script/function that will find a specific file/check if it exists through multiple folders that contain multiple folders and files that contain multiple folders and files and some are also zipped as well. Once it is found/exists, move that file into a different directory. If there is no such file in any of these folders then return pass. Please provide a folder structure picture as well. Please provide a full commented solution with an explanation and screenshot of code and output.arrow_forwardWrite a small program in any language other than bash (python, C, C++ etc.) to read the contents of the given file one line at a time, and output each line at specified time intervals. This small program will form the basis for further demonstrations. Submit code and output to D2L dropbox. The filename must be read from the commandline The time interval must be setas a commandline option in milliseconds. The output must go to stdout Output the env of your new process to a file strace your process and save the output to a file оооо оarrow_forward
- Scenario: You have been tasked with building a URL file validator for a web crawler. A web crawler is an application that fetches a web page, extracts the URLs present in that page, and then recursively fetches new pages using the extracted URLs. The end goal of a web crawler is to collect text data, images, or other resources present in order to validate resource URLs or hyperlinks on a page. URL validators can be useful to validate if the extracted URL is a valid resource to fetch. In this scenario, you will build a URL validator that checks for supported protocols and file types.arrow_forwardYou shall implement a Microshell, “MSH”. MSH shall provide the following functions: Provide a shell-like interface for launching new programs: When MSH starts running, it will print a prompt "cssc0000% " (replace cssc0000 with your username) and then wait for the user to type in a file name. Note, MSH will NOT have any shell built-in functions (such as cd, setenv, printenv, bg, fg, etc), with the exception of #5 (below). When the user enters a filename and hits the “enter” key, MSH then reads the filename entered and determines if the file is an executable file. If it isn't, MSH will print a useful error message to the user and then return to #1 above (display a new prompt and wait for user input). If it is an executable file, then MSH will create a new process and run this program in the new process. Note – you will need to determine whether the filename is a fully qualified path name or if the file needs to be searched for (fully qualified pathnames begin with a slash (i.e. "/"),…arrow_forwardProfessor Potter, a punning pedantic, practices puzzling her students. She has left a secret message, of unknown length, encoded in a file for you to unravel. The setup is simple: each line of the file contains one char and one non-negative integer. The key to reading the message is organizing the characters in the proper order. The integer indicates the position of the character within the message. For example: e 2 b 1 a 3 h 5 c 4 spells 'beach' when unraveled. Write a program that will: Ask the user for the name of a file Check to see that the file exists and contains some data. Open and read this file exactly once Using your MessageDecoder class, unravel and display the message Offer to do it again on another file Required classes: You will create and submit 2 classes: MessageDecoder class: Responsible for converting a scrambled message file into plain text. Contains a public method getPlainTextMessage() that returns the String object. The scrambled file must be scanned only once…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY