1) Describe the result of executing each of the following grep commands. a. grep -c ill memo b. grep -n ill memo 2) Rewrite the following sequence of commands using sort as a filter. The end result should be a single command line when you are done. sort roster > temp lp temp rm temp 3) Write a command
Using UML graphical notation, develop the design for the following system to define the object classes and show the interaction of the data collection sub-systems (sequence diagrams). The department of public works has decided to develop a computerized pot hole tracking and repair system. As pot holes are reported, they are
Identify the level within a database system (user, programmer of application software, and designer of the DBMS software) at which each of the following concerns or activities occur: a. How should data be stored on a disk to maximize efficiency? b. Is there a vacancy on flight 243? c. Could a relation be stored as a sequentia
What new files should you create to help eliminate the data redundancies found in the file shown in Figure P1.5 (attached)?
Please see the attached file for data. Question 1: What problem would you encounter if you wanted to produce a listing by city? How would you solve this problem by altering the file structure? Question 2: What data redundancies do you detect, and how could these redundancies lead to anomalies?
What are the pros and cons of having a DHCP server on each network segment, versus having some of the network segments receive their IP address and network configuration via a router using a DHCP relay agent? Consider how your answer depends on the scale of the network.
You are the Systems Analyst at a manufacturing company in Seattle, WA. A Systems Analyst in your company's New York office sends you a trace file to analyze. The complaint is that an end-users machine cannot connect to any of the network devices on the other side of the local router; it can communicate with any network device on
Using UNIX Please explain how to do the following: 1. Create a directory called class. 2. Move into that directory directory. 3. Create a text file, that contains what is your absolute path, relative path and call it paths.txt 4.Create a sub directory called your name under the class directory. 5. Create a file c
A. What are the legal and regulatory ramifications of operating an e-Business? b. Discuss three examples of possible ethical problems when running an e-business. c. Discuss one e-Business failure. Explain what happened and what you would have done differently. Explain whether or not the e-Business practiced sound financial pla
Could someone please look at this and let me know if you can help. I need the code for these steps. Thanks. Thanks for any help that can be offered. I am attaching the lab and the CSS test file. This must be done in notepad being saved as an HTM document.
Write the statements to save the contents of the RichTextBox named rtbCurrent. Display a SaveFileDialog named sfdCurrent to get the name of the file from the user. Create the necessary event handler that will execute when the user clicks the Save button to save the file in a rich text format.
If P is the population on the first day of the year, B is the birth rate, and D is the death rate, the estimated population at the end of the year is given by the formula: P + (B * P)/100 - (D * P)/100 The population growth rate is given by the formula: B - D Write a program that prompts the user to enter the sta
How do you make 10 duplicates of one floppy disk. What two methods can be used and which is the best method?
Explain which Windows Server 2003 fault-tolerant feature they should use to protect their desktop settings, applications, and data files, and explain how it provides this protection.
A. On your network, all network administrators upgraded their machines to Windows XP Professional, and a Windows Server 2003 server with an enormous amount of disk space is available for their use. Explain which Windows Server 2003 fault-tolerant feature they should use to protect their desktop settings, applications, and
Hi, I need assistance in the following problem please. Many functions have an almost infinite number of input values. Testing all of these values is not possible in most cases, and doesn't necessarily tell us more than testing a few values. How do you choose the best values to test? Equivalence class partitioning can be used
I need to create the script below and name it Mollett.3-7 It is also attatched in a word file too. This set of directions in Project 3-7 script produces some kind of expected output by creating this script called Mollett.3-7 Set a variable named "x" to 10 Set a variable named "y" to 100 Display the result of dividing "y"
I am using KNOPPIX 4.0 In your week2 directory create two identical files. Mollett.ed1 Mollett.vi The contents of the two files should be: There once was a man from Nantucket, Who carried his lunch ina bucket, Saih he with a sigh, I am very full As he ate a whole pie, Using an editor available in your Konsole
1 Make a directory in your home directory called your last name (ie. boyle) 2. Create a directory within "your last name" called BLACKSBURG. Do this from your home directory 3. Change to the "your last name" directory. 4. Create a directory within "your last name" called HAMPTON 5. Create directories TIDEWATER and HO
1. Will the following only print the text "I FOUND A MATCH" to standard output when the grep is successful? if grep "mrichard" /etc/passwd; then echo "I FOUND A MATCH"; fi 2. Does the following command send both standard output and standard error to the same file for the command cmd1? cmd1 2>&1 >outfile 3. Do
Give brief answers for the following questions. 1. Can an until loop sometimes never execute? 2. Will the following script execute with no errors? #!/bin/csh for I do echo $I done 3. Does the following script print to standard output, a list of numbers equal to the number passed on the com
Write a Bourne Again shell (Bash) script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on.
Write a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on. If no users are listed on the command line, an error message should be printed. In the mail message, the full (real) name from the passwd file (/etc/passwd) should be used.
How would I write a shell script, change-lines, which will substitute a string for a replacement string for each occurance of the string in files specified? The original file will be saved, with the same filename with the .keep extension unless the -n option is present. I don't mind using temporary file for this script. The
How would I write a shell script to locate executable files? This script takes a list of file names from the command line and determines which would be executed had these names been given as commands. The search path should be based only on the user's PATH environment variable. I don't want to use use the Unix which comman
Your company is assigned the network address 188.8.131.52. You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What is the correct subnet mask for the network? a. 0.0.0.0 b. 255.255.0.0 c. 255.255
What is the solution needed to support the high bandwidth applications and growth potential for a multimedia development firm?
You have been contracted to build a network for a multimedia development firm that currently uses a 10-Mbps Ethernet network. The company requires a high-bandwidth network for the multimedia team, which constantly views and manipulates large files across the network. The company is expecting moderate growth. You are to come up
For your convenience, I have attached a formatted MS Word file containing information on the subject of price discrimination, and the conditions under which price discrimination becomes unlawful. I have also also added reference sources to this posting which might prove useful in helping to increase your understanding of the fe
This posting contains a formatted MS Word file, which contains information on a buyer's perception of product and pricing, including value consciousness, price consciousness, and prestige sensitivity.
Buyer's perceptions of a product and its price are an important influence on pricing. Value consciousness, price consciousness, and prestige sensitivity are three ways of describing these perceptions. Discuss how these characteristics influence the buying decision for one of the following products: a new house, an airline ticket
Do some research on peer-to-peer networks (e.g., you may search "crime activity peer to peer networks", "crime activity P2P", "pornography P2P", "child pornography peer to peer network", etc.). What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a repor
Please assist me on designing the ERD from the file attached. Any help will be very much appreciated.
Need help transforming 2 relations into Domain/Key Normal Form. See attached file for full problem description.