
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
thumb_up100%
![CENTENNIAL COL GE: LAB TEST SUBMISSION
Debug the following bash script:
# Prompt the user and get input for username and password and store username #in a
variable and password in another variable.
#Write this information in two files as userlogin. txt and passlogin.txt.
# start
echo "Enter username"
read username
echo "Enter password"
read password
if [I (Susername = "guest" & $password = "etec" ) ]]: then
echo Şusername < userlogin.txt
echo Spassword < passlogin.txt
tend
#Append contents of these two files in one file as login.txt
# start
cat login.txt >> userlogin.txt passlogin.txt
else
echo "invalid user"
fi](https://content.bartleby.com/qna-images/question/67404d4e-9981-449d-8948-d7256f3d19f9/2f2f391d-3d7d-4924-8845-3e9be7fa9eaf/gmsbfb_thumbnail.jpeg)
Transcribed Image Text:CENTENNIAL COL GE: LAB TEST SUBMISSION
Debug the following bash script:
# Prompt the user and get input for username and password and store username #in a
variable and password in another variable.
#Write this information in two files as userlogin. txt and passlogin.txt.
# start
echo "Enter username"
read username
echo "Enter password"
read password
if [I (Susername = "guest" & $password = "etec" ) ]]: then
echo Şusername < userlogin.txt
echo Spassword < passlogin.txt
tend
#Append contents of these two files in one file as login.txt
# start
cat login.txt >> userlogin.txt passlogin.txt
else
echo "invalid user"
fi
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 3 steps with 2 images

Knowledge Booster
Similar questions
- Using the following data file (delimited by a space or tab) November 400January 200June 400March 200April 200May 300July 400August 300September 400February 300October 300December 200Write a bash script that will use a loop structure to process the data file line by line. Do not use the command awk. The script will send the output to a file in the following format:Month Sales-------- -------January 200February 300March 200April 200May 300June 400July 400August 300September 400October 300November 400December 200======Total show the totalAverage show the averagearrow_forwardI need Answer Quicklyarrow_forwardCreate a file called contacts.py, implement a program that prompts the user to select a choice between these 5 options. Add contact (1), Delete Contact (2) Save Contact(3), show all contact (4), exit program (5). Contact info should be saved in a separate read/write file. If user inputs number (1) on the keyboard, then prompt them to input the name and number of the contact. If user selects (2), delete all contacts or show an error if there are no contacts saved to file. If user inputs (3) save the contact and loop the choice of the 5 options until user inputs (5) to exit. If user inputs (4) print out the saved contacts to the screen neatly, Name, Number(newline). if user inputs 5 then exit the program. If the user inputs a number not shown then give an error message and ask them to input a valid number. Please code in python, preferably using case statements to completearrow_forward
- In python, which of the following opens read_it.txt for appending or reading in data test_file variable. a. text_file = open("read_it.txt", "ar") b. text_file = open("read_it.txt", "wr") c. text_file = open("read_it.txt", "a+") d. text_file = open("read_it.txt", "ra") Which one is correct? help!arrow_forwardPlease answer the following Bash question, please show your output as well. 1. Write a Bash function named ‘Generate-ID' that generates all possible UGA student id start with 900. The output should be saved into a file named studentID.csv. 2. Write a Bash function named ‘Find_word’ that read wordlist.txt file to find all words end with “ing” and output these words to WordEndIng.csv. 3. The auth.log file (path: /var/log/auth.log) and syslog file (path: /var/log/syslog) are two of the most important log files in Linux. Generally, adversaries target these files so that system administrators couldn’t track what attackers are doing. Write a function named get-linuxlog() that reads all the above two files and stores them into a file named linuxeventlog.txt (Hint use the ‘cat’ command)arrow_forwardThe following code segment is supposed to read all of the lines from and save them in copy.txt infile = open ("test.txt", "r") %3D outfile = open ("copy.txt", "w") %3D line = infile.readline () %3D outfile.write (line) line = infile.readline () infile.close () outfile.close () Which line of code should be placed in the blank to achieve this goal? Select one: while line == while line !-" %3D while line !- "" while linearrow_forward
- Assume that there is a data file named as “data.txt”. This data file contains integer values in multiple lines, as shown below. You are asked to write statements in the main() method to open the file, read and print out the total of all the values (should be 55). Place your code into try-catch block so that the FileNotFoundException will be caught and an error message will be printed if no such file exists. data.txt 1 2 3 4 5 6 7 8 9 10 import java.util.*; import java.io.*; public class ReadAndPrint { pubilc static void main() { // your code goes here }arrow_forwardInsert the missing code in the following code fragment. This fragment is intended to read an input file. public static void main(String[] args) String inputFileName = "dataIn.txt"; File inputFile = new File(inputFileName); Scanner in = new Scanner(inputFile); Select one: Oa. throws FileNotFoundException b. inherits FileNotFoundException C. catches FileNotFoundException O d. extends FileNotFoundException Next pag A 1 ENGarrow_forwardCreate a new file (in Dev C++) and save it as lab11_XYZ.cpp (replace XYZ with your initials). Create ANOTHER new file (in Dev C++) and save it as swap_XYZ.h (replace XYZ with your initials). Use the swap_XYZ.h header file to define a set of functions for swapping two items of the same type. Given the following prototypes, define (overloaded) swap functions void swap(int&, int&); //swap two integers void swap(double&, double&); //swap two doubles void swap(float&, float&); //swap two floats void swap(char&, char&); //swap two characters void swap(string&, string&); //swap two strings The header file should contain the following: header comments (similar to normal program header comments) function definitions (for you to do, based on provided prototypes above...) In general, a swap works like this: void swap(type first&, type second&){ type temp = first; first = second; second = temp; } Once your header file is complete, make…arrow_forward
- How would I open a file and encrypt that file from a dictionary in Python? Attached is a picture of my current code. I am currently stuck at the getFiles() and convert(inputFile, outputFile) functions.arrow_forwardIn Python, which of the following opens read_it.txt for writing or reading data text_file variable. a. text_file = open("read_it.txt", "wr") b. text_file = open("read_it.txt", "rw") c. text_file = open("read_it.txt", "aw") d. text_file = open("read_it.txt", "w+") which one is correct?arrow_forwardWrite one line of code that reads a full line from a file with file handle fp into a string defined aschar line[256]. Do this using both fscanf and fgets.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY