
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
I am trying to create a bash script that does what is instructed in the picture. I need to use the commands that are hinted at in the last part of the problem. What would the bash script look like and how would I execute it from terminal?

Transcribed Image Text:task2
Write a bash script accepting one argument: (directory). The script must
print to stdout the content of any file in (directory) (and, recursively, its
sub-directories) with an name ending with .txt. Assume that any file with a
name ending in .txt contains only printable characters and use the command
cat to print its content.
Hint: You might be tempted to use for loop. A more elegant solution
can be achieved using a combination of commands find and exec.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 4 steps with 3 images

Knowledge Booster
Similar questions
- Provide any working example of Fetch API. Make sure the code you post has all required resources (nothing needs to be uploaded/added/found). The code should work by itself.arrow_forwardProblemMany functions in the OpenSSL library require the use of the OpenSSL pseudo-random number generator. Even if you use something like /dev/urandom yourself,OpenSSL will use its own API under the hood and thus must be seeded properly.Unfortunately, some platforms and some older versions of OpenSSL require the userto provide a secure seed. Even modern implementations of OpenSSL merely read aseed from /dev/urandom when it is available; a paranoid user may wish to do better.When using OpenSSL, you may want to use the provided PRNG for other needs, justfor the sake of consistency.arrow_forwardYou're not sure what the data represents, but you've been told it uses a dual layer obfuscation as follows: Hex with "\x" delimiter Base64 with standard alphabet After you de-obfuscate the given Hex dats, what information do you find? Do some research. What have you found? NOTE: DO NOT BROWSE THESE! Hint: focus on the strings following "/". Essentially, this practical has two stages: 1. De-obfuscate the Hex and give the output. 2. Research the nature of what you found and identify it.arrow_forward
- From a programmer's point of view, if you want to argue that deep access is better than shallow access, you shouldn't just talk about speed.arrow_forwardList and explain four different ways to swap out pages. Put them side by side and see how they stack up.arrow_forwardYou're given a blue-tooth lock that's connected to a house server. The lock can contain at most 10 key-codes. How would you go about to designing the system?arrow_forward
- in python using kernelarrow_forwardWrite a complete bash script that monitors who logs in and logs out of the current CSELinux machine (e.g., cse01, cse02, etc.) where the script is running. In particular, youwill check the status of who is logged in every 10 seconds and report each user ID thatlogs in or logs out during that time frame. Note that there may be more than one userthat logs in or out duringthis interval. You must include the host name when reportingthe user ID information. In addition, you will install a custom signal handler to trap the SIGINT(i.e.,^C) one time before you are able to terminate the script with the SIGINT. You will also print out the current date and time and report the number of users loggedin,even if there are no changes (i.e.,no one logged in or out during the interval). What should the script.h file have inside it? Please show screenshot of output if possible ,what is the answer?arrow_forwarduse python pleasearrow_forward
- Write a complete bash script that monitors who logs in and logs out of the current CSELinux machine (e.g., cse01, cse02, etc.) where the script is running. In particular, youwill check the status of who is logged in every 10 seconds and report each user ID thatlogs in or logs out during that time frame. Note that there may be more than one userthat logs in or out duringthis interval. You must include the host name when reportingthe user ID information. In addition, you will install a custom signal handler to trap theSIGINT(i.e.,^C)onetimebeforeyouareabletoterminatethescriptwiththeSIGINT.You will also print out the current date and time and report the number of users loggedin,even if there are no changes (i.e.,no one logged in or out during the interval). HOW TO DO THIS? PLEASE EXPLAIN WITH ANSWER!!arrow_forwardWhat does TEMP BLOCK in the action page implies ? The authoring rights are taken away permanently The authoring rights are taken away temporarily The authoring rights are taken away for a day The authoring rights are taken away for one yeararrow_forwardAdd the answer to the parts that say #TODO ..... . this is in yaml!arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY