Explore BrainMass


Bash shell scripting questions

1) Describe the result of executing each of the following grep commands. a. grep -c ill memo b. grep -n ill memo 2) Rewrite the following sequence of commands using sort as a filter. The end result should be a single command line when you are done. sort roster > temp lp temp rm temp 3) Write a command

UML graphical notation-sequence diagrams-public works

Using UML graphical notation, develop the design for the following system to define the object classes and show the interaction of the data collection sub-systems (sequence diagrams). The department of public works has decided to develop a computerized pot hole tracking and repair system. As pot holes are reported, they are

Examples showing the different levels of a DBMS.

Identify the level within a database system (user, programmer of application software, and designer of the DBMS software) at which each of the following concerns or activities occur: a. How should data be stored on a disk to maximize efficiency? b. Is there a vacancy on flight 243? c. Could a relation be stored as a sequentia

Problems with making a listing by city

Please see the attached file for data. Question 1: What problem would you encounter if you wanted to produce a listing by city? How would you solve this problem by altering the file structure? Question 2: What data redundancies do you detect, and how could these redundancies lead to anomalies?

Pros and Cons of DHCP Server

What are the pros and cons of having a DHCP server on each network segment, versus having some of the network segments receive their IP address and network configuration via a router using a DHCP relay agent? Consider how your answer depends on the scale of the network.

Network Problem Analysis to Trace Files

You are the Systems Analyst at a manufacturing company in Seattle, WA. A Systems Analyst in your company's New York office sends you a trace file to analyze. The complaint is that an end-users machine cannot connect to any of the network devices on the other side of the local router; it can communicate with any network device on


Using UNIX Please explain how to do the following: 1. Create a directory called class. 2. Move into that directory directory. 3. Create a text file, that contains what is your absolute path, relative path and call it paths.txt 4.Create a sub directory called your name under the class directory. 5. Create a file c

E-Business: Legal, Ethical Problems Failures, Enron

A. What are the legal and regulatory ramifications of operating an e-Business? b. Discuss three examples of possible ethical problems when running an e-business. c. Discuss one e-Business failure. Explain what happened and what you would have done differently. Explain whether or not the e-Business practiced sound financial pla

XHTML Web Page

Could someone please look at this and let me know if you can help. I need the code for these steps. Thanks. Thanks for any help that can be offered. I am attaching the lab and the CSS test file. This must be done in notepad being saved as an HTM document.

Write a statement using VB.NET programming

Write the statements to save the contents of the RichTextBox named rtbCurrent. Display a SaveFileDialog named sfdCurrent to get the name of the file from the user. Create the necessary event handler that will execute when the user clicks the Save button to save the file in a rich text format.

CPP: Calculating Growth Rate, Population, and Death Rate

If P is the population on the first day of the year, B is the birth rate, and D is the death rate, the estimated population at the end of the year is given by the formula: P + (B * P)/100 - (D * P)/100 The population growth rate is given by the formula: B - D Write a program that prompts the user to enter the sta

How to copy a floppy disk?

How do you make 10 duplicates of one floppy disk. What two methods can be used and which is the best method?

Explain which Windows Server 2003 fault-tolerant feature they should use to protect their desktop settings, applications, and data files, and explain how it provides this protection.

A. On your network, all network administrators upgraded their machines to Windows XP Professional, and a Windows Server 2003 server with an enormous amount of disk space is available for their use. Explain which Windows Server 2003 fault-tolerant feature they should use to protect their desktop settings, applications, and

Equivalence Class Partitioning and Boundary Value Analysis

Hi, I need assistance in the following problem please. Many functions have an almost infinite number of input values. Testing all of these values is not possible in most cases, and doesn't necessarily tell us more than testing a few values. How do you choose the best values to test? Equivalence class partitioning can be used

Mollett.3-7 Script in KNOPPIX 4.0

I need to create the script below and name it Mollett.3-7 It is also attatched in a word file too. This set of directions in Project 3-7 script produces some kind of expected output by creating this script called Mollett.3-7 Set a variable named "x" to 10 Set a variable named "y" to 100 Display the result of dividing "y"

Unix Command Directory

1 Make a directory in your home directory called your last name (ie. boyle) 2. Create a directory within "your last name" called BLACKSBURG. Do this from your home directory 3. Change to the "your last name" directory. 4. Create a directory within "your last name" called HAMPTON 5. Create directories TIDEWATER and HO

Briefly answer the questions related to I/O redirections in Bourne shell.

1. Will the following only print the text "I FOUND A MATCH" to standard output when the grep is successful? if grep "mrichard" /etc/passwd; then echo "I FOUND A MATCH"; fi 2. Does the following command send both standard output and standard error to the same file for the command cmd1? cmd1 2>&1 >outfile 3. Do

Give brief answers for the given Bourne and C shell questions.

Give brief answers for the following questions. 1. Can an until loop sometimes never execute? 2. Will the following script execute with no errors? #!/bin/csh for I do echo $I done 3. Does the following script print to standard output, a list of numbers equal to the number passed on the com

Write a Bourne Again shell (Bash) script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on.

Write a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on. If no users are listed on the command line, an error message should be printed. In the mail message, the full (real) name from the passwd file (/etc/passwd) should be used.

Shell scripting

How would I write a shell script, change-lines, which will substitute a string for a replacement string for each occurance of the string in files specified? The original file will be saved, with the same filename with the .keep extension unless the -n option is present. I don't mind using temporary file for this script. The

Shell Scripting

How would I write a shell script to locate executable files? This script takes a list of file names from the command line and determines which would be executed had these names been given as commands. The search path should be based only on the user's PATH environment variable. I don't want to use use the Unix which comman

What is the correct subnet mask for the network?

Your company is assigned the network address You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What is the correct subnet mask for the network? a. b. c. 255.255

Price Discrimination

For your convenience, I have attached a formatted MS Word file containing information on the subject of price discrimination, and the conditions under which price discrimination becomes unlawful. I have also also added reference sources to this posting which might prove useful in helping to increase your understanding of the fe

This posting contains a formatted MS Word file, which contains information on a buyer's perception of product and pricing, including value consciousness, price consciousness, and prestige sensitivity.

Buyer's perceptions of a product and its price are an important influence on pricing. Value consciousness, price consciousness, and prestige sensitivity are three ways of describing these perceptions. Discuss how these characteristics influence the buying decision for one of the following products: a new house, an airline ticket

Forensics - P2P network crimes

Do some research on peer-to-peer networks (e.g., you may search "crime activity peer to peer networks", "crime activity P2P", "pornography P2P", "child pornography peer to peer network", etc.). What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a repor

ERD design

Please assist me on designing the ERD from the file attached. Any help will be very much appreciated.

Domain/Key Normal Form

Need help transforming 2 relations into Domain/Key Normal Form. See attached file for full problem description.