Write a Shell program in C that can handle pushd, popd , and dirs commands supported by many shell programs including bash, tcsh and zsh. examples/how it works: The user enters pushd + [directory] The user enters popd The user enters dirs
Q: Write ARM assembly language to find the average of 5 pass marks. If the student passed the class put...
A: Start. Reserve two-byte memories Initialize the data segment. Set AX as 00. Add the numbers in AL re...
Q: 1. Why we need Artificial Intelligence?
A: Note:- As per guidelines, we are entitled to answer the first question only. Artificial Intelligenc...
Q: MCQS OF SOFTWARE QUALITY ASSURANCE 1.Testing the application as a whole for the modification in any ...
A: Note: Since the question is multipart we are advised to do only first three parts. Kindly post other...
Q: Code division multiplexing and time division multiplexing are compared and contrasted.
A: Introduction: Multiple data streams are integrated for simultaneous transmission across a shared fre...
Q: How crucial is software development? Four more characteristics, in your opinion, should be incorpora...
A: Introduction: Software development's ability to create and provide value to its users cannot be emp...
Q: 1 Write a python program that will calculate the function exp(x) Make sure your program meets...
A: 1. code: import mathdef expo(x): summ = 0.0 n = 0 while math.exp(x) - summ > 0.0000001...
Q: Suppose that the address of the branch instruction (beq) is 0x2000,0000. Is it possible to use this ...
A: yes it is possible. use jr to jump to the address 0x2001,0000. jump instruction uses the current PC...
Q: Write a function validate_date(date_string) which takes in a datestring and checks if the datestring...
A: Given The answer is given below.
Q: Read the article and answer the following question in your own word Artist’s link: https://timo...
A: According to the information given:- We ahve to define ASCII , Unicode, Code point,Unicode sandwich ...
Q: Encryption protects secrecy, integrity, authenticity, and nonrepudiation in what ways? Give at least...
A: Encryption is a technique utilized in information security wherein a user has access to data through...
Q: Print both the value(s) of lambda and the corresponding Photon energy ONLY where the Photon Energy i...
A: The lambda function is used find the wavelength when photon energy is given
Q: LWC Assignment: Create a LWC component to display the output: Data Binding Example Hello, Jhon Ron! ...
A: Lightning Web Components uses core Web Components standards and provides only what’s necessary to pe...
Q: the cloud?
A: given - What can you store on the cloud?
Q: What role does DCT play in picture processing?
A: Intro The question is about role does DCT play in picture processing and here is the solution in the...
Q: Give a regular expression that denotes the language of this automaton. . Show the derivation.
A: An expression that represents a regular language is termed as a regular expression. It consists of s...
Q: Which method is used to ensure that legacy systems continue to evolve?
A: Introduction: Hardware for the system Legacy systems may have been developed for hardware that is no...
Q: The length of both the search and the lookahead buffer is 8 (3 bits for coding the distance and the ...
A: Lets see the solution in the next steps
Q: What is a Cloud Technology?
A: Users can access storage, data, software, and servers over the cloud using any internet-connected de...
Q: 1.Am I limited to only one operating system per computer? 2. What is the product key? 3. what is a c...
A: answer is
Q: Software Engenering This requirement is not testable (that is, I can’t verify that I’m meeting i...
A: I will this question in simple examples 1) Assume there are two and they are using WhatsApp for comm...
Q: 1. Varying the computer responses can help hold the student’s attention. Modify the script so that ...
A: # get a questionare of 5 questions# for each question find if answer is correct or inncorect# if in ...
Q: 6. Design the following GUI by using Swing concept ( No action is required) FontViewer O X JAC444 Mi...
A: Import necessary classes. Extend the JFrame class. Create an object of frame. Create a label. Cre...
Q: Compute the DTFT of the following signals: i) x[n] =[ ii) x[n] = [1, -2, 1]
A: Here is the detailed explanation of the solution
Q: A command that can print this out: | full name in caps | JHUMPA LAHIRI 1 ΝΕIL GAIMAΝ 1 ΝΕIL GAIMAΝ |...
A: According to above question, the output is a column with name of people from a table . Assuming tabl...
Q: FOR UNIX, please give a description of these commands UNIX Command Description ...
A: Linux Cystem Admin Command: A system administrator is responsible for the configuration, care, and r...
Q: Brief information about matlab software
A: MATLAB software is a programming platform which is designed to analyse and design the products and s...
Q: Explain the differences between physical and wireless communication routes.
A: Introduction: The distinctions between physical and wireless communication channels
Q: ve an example of activities of the last network construction. (A must finish before B can start, and...
A: Lets see the solution.
Q: -Problem -3 -Create a flowchart design that depicts the solving of the following problem: Asks user ...
A: Please refer to the following step for the complete solution of the problem above.
Q: Who was the person responsible for developing the vacuum tubes that were utilized in the earliest co...
A: Answer: John Ambrose Fleming
Q: What kind of worries and challenges arise from the use of an unintegrated information system?
A: Introduction: Computer failure and loss are key issues resulting in unnecessarily high costs and cos...
Q: Consider a two-link network where Host A is connected to the router by a 1 Mbps link with 10 ms prop...
A: please find the handwritten solution in step 2
Q: Brief information about matlab software
A: Introduction: MATLAB combines a desktop environment optimized for iterative analysis and design with...
Q: Q10 Data consistency is a big deal in data processing. a. What needs to be sacrificed, to ensure hig...
A: Data Consistency: In database systems, consistency (or correctness) refers to the condition that eac...
Q: A sequence is defined by ao = 2, a1 = 1, %3D and an = 2an-1 + an-2 - 1 (for n > 2). What is the valu...
A: an = nth term a0 = first term = 2 a1 = second term = 1 a5 = fifth term
Q: John von Neumann's birthplace is unknown.
A: Introduction: John von Neumann was a talented mathematician and physicist who lived in the early twe...
Q: Vhich of the following are true, explain why: 1. log(n) = O(n) 2. n= 0(log n) 3. log? (n) = O(n) 4. ...
A: 10 condition are valid
Q: Using the following Relational database Schema write queries to retrieve the specified information. ...
A: here i write simple query to retrieve all tuples from song table: ==================================...
Q: Prepare a presentation using the presentation program you chose, on one of the following topics:
A:
Q: What is Onion network?
A: Here is your Solution .
Q: Provide a description for the Str copy variable.
A: Introduction: The Str copy function copies the source string to the destination string.
Q: Brief information about matlab software
A: A software is collection of applications integrated to achieve a particular execution of task.
Q: A web browser uses a non-persistent http/1.0 to download (GET) three images of sizes 1 MB, 500 KB an...
A: The answer is
Q: Give a short history of computer systems and their progress in relation to technology and trends.
A: INTRODUCTION: HISTORY OF TECHNOLOGY: As technology has progressed, computer systems, in particular, ...
Q: Describe the elements that influence transmission delay.
A: Introduction: The Transmission Delay Influencing Factors
Q: Which of the following are true, explain why: 5. log(n) = Q(n) 6. n= 2(log n) 7. 5n³ + 7n + 13 = O(n...
A: Lets see the correct statement in the next steps
Q: Using doc function, determine what the dot-asterisk (.*) operator does in matlab
A: % In the below help doc you will find the matlab operator and sp char % In that under Arithmetic o...
Q: 3. A program executes 200 billion instructions. It executes on an IBM processor that has an average ...
A: Here is the detailed explanation of the solution
Q: mize the function f(x)=2x2between the range 0-31 using genetic algorithm approach for one step only....
A: Lets see the solution.
Q: Given the following branch instruction and location, answer the following questions about it. Addres...
A: Given that: 0X10000 , 0Xb5000184At present, the PC is at 0X10000 * Type of branch Instruction: Her...
Write a Shell
Step by step
Solved in 2 steps
- Write two c++ programs to implement a distributed version of a multithreaded Huffman decompressor using the one in project 1 The server program The user will execute this program using the following syntax: ./exec_filename port_no < input_filename where exec_filename is the name of your executable file, port_no is the port number to create the socket, and input_filename is the name of the file with the alphabet's information. The port number will be available to the server program as a command-line argument. The server program receives from STDIN the alphabet's information (using input redirection). The input file has multiple lines, where each line contains information (character and frequency) about a symbol from the alphabet. The input file format is as follows: A char representing the symbol. An integer representing the frequency of the symbol. Example Input File: E 3 G 3 F 1 H 2 Given the previous input file, the expected output for the server program is: Symbol: C,…Write two c++ programs to implement a distributed version of a multithreaded Huffman decompressor using the one in project 1 The server program The user will execute this program using the following syntax: ./exec_filename port_no < input_filename where exec_filename is the name of your executable file, port_no is the port number to create the socket, and input_filename is the name of the file with the alphabet's information. The port number will be available to the server program as a command-line argument. The server program receives from STDIN the alphabet's information (using input redirection). The input file has multiple lines, where each line contains information (character and frequency) about a symbol from the alphabet. The input file format is as follows: A char representing the symbol. An integer representing the frequency of the symbol. Example Input File: E 3 G 3 F 1 H 2 Given the previous input file, the expected output for the server program is: Symbol: G,…Using a UNIX environment, write a program in C++ that will: Open a directory "/home/timapple/" and step through each individual directory. Determine file type and display it along with the name of the file. Just provide the relevant code segment in a POSIX compliant system.
- Write a shell program that counts the number of files in a given directory. Thedirectory should be specified as a command line argument. The program doesnot need to count files recursively in subdirectories; instead, it should not count subdirectories at all.This is concerning files in c/c++ If I wanted to do the equivalent of a command-line rm followed by touch with one C function call, what would that be? Assume that pathToCleanse holds the path to that fileWrite a shell program that renames all files in the current directory. It should remove all vowels from the filenames. For example, apple.txt should be renamed ppl.txt. If the resulting filename is an empty string, then the file should not be renamed.
- Create a daemon in C in the Unix environment, your daemon must create a text file called aitDaemonLog.txt and populate it with 1000 lines of a string each line must be written after 10 seconds, the string must end with the count of the string;I need solution in shell script (bash) with screen shot of input and output very quickly1) Create a daemon in C in the Unix environment, your daemon must create a text file called aitDaemonLog.txt and populate it with 1000 lines of a string each line must be written after 10 seconds, the string must end with the count of the string;. 2)Create a shell script that lists all the files in the present working directory in long format name this file listMyFiles.sh. Write a c program that uses the system() function and uses it to run listMyFiles.sh 3)Write a c program to write a string of your own choosing into shared memory then read the contents of the shared memory created in 4)demonstrate in a c program how to use a fork to create a child process, using pipes let this child process send a message which is read by the parent process 5) Write a c program that shows the PID, PPID, UID and GID of a running process, let this process fork thus creating a child process, let the parent process count from 0 to 50 and the child process from 0 to 25 each process showing while counting…
- Which of the following accurately describes the linking of a C++ executable? linking is the same as compiling .o files getting put together to form an executable replacing the #define statements with the appropriate values taking the output of the preprocessor and compiling it into a .o fileWrite a C program based on the following code: int p[2]; char *argv[2]; argv[0] = "wc"; argv[1] = 0; pipe(p); if(fork() == 0) { close(0); dup(p[0]); close(p[0]); close(p[1]); exec("/bin/wc", argv); } else { close(p[0]); write(p[1], "hello world\n", 12); close(p[1]); } The program must accept the name of a file as a command line argument in argv and pipe the contents of that named file to wc similar to the way the sample code pipes a constant string to wc. Program should compile and work in Linux and xv6.Write a Shell script that accepts a list of file names as arguments and counts and reports the occurrence of each word that is present in the first argument file in other argument files.