StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Positional Parameters (UNIX) - Article Example

Comments (0) Cite this document
Summary
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Positional Parameters (UNIX)
Read TextPreview

Extract of sample "Positional Parameters (UNIX)"

OF PHOENIX ONLINE Introduction to Unix POS/420 r4 Walt Saiko POS 420 Introduction to UNIX of Phoenix Online Week 3 Individual Assignment
Date 20 September 2008
Problem Description:
Project 5.2 Page 198
The first exercise involved interaction with the user in the form of giving the user instructions to enter five parameters, the positional parameters are used here and the user is prompted to enter the correct number of arguments.
The first terminal window is my script, displayed by typing "cat Project5-2".
The second and third screen show two consecutive runs of the script, one with insufficient argument and another with correct arguments.
Project 6-2 (page 245)
This assignment illustrated the proper use of the "case" statement. The "case" statement allows a conditional expression to be evaluated based on pattern-matching. "Case" is similar to an if-then-else clause, except that a "case" statement uses fewer lines of code.
The first terminal window is my script, displayed by typing "cat Project6.2".
Next five screens show three consecutive runs of the script by passing various number of parameters.
(a) With 0 parameter
(b) 1 parameter
With 2 parameters
(d) With 3 parameters
(e) With unspecified parameters
The second exercise was a continuation of the first exercise in interacting with the user.
Similar to the first exercise, an instruction was given to the user. This time, however, the user was asked to input his or her name, as there were no items to pick from a list.
The name entered by the user was compared to my name, and an appropriate response was echoed to the user, depending on the results of the comparison.
The first terminal window is my script, displayed by typing "cat scriptname".
The second terminal windows is two consecutive runs of my script. The first run uses a random name, while the second run uses my name as input.
In each case, an appropriate output is displayed. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Positional Parameters (UNIX) Article Example | Topics and Well Written Essays - 500 words”, n.d.)
Positional Parameters (UNIX) Article Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1504512-positional-parameters-unix
(Positional Parameters (UNIX) Article Example | Topics and Well Written Essays - 500 Words)
Positional Parameters (UNIX) Article Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1504512-positional-parameters-unix.
“Positional Parameters (UNIX) Article Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1504512-positional-parameters-unix.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Positional Parameters (UNIX)

Practical UNIX Security

However, these modules require frequent updates for virus definitions and new threats, which may affect the network anytime. Every now and then, new threats are designed and developed by hackers or cyber criminals. In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to intrude into the network. In addition, hackers and cyber criminals are exploring efficient codes day by day to improve the hacking software, in order to breach in to classified information, banks, online websites etc. As the threats and vulnerabilities are infinite, no one can memorize them in order to take a measured approach, the initial step is to identify the vulne...
10 Pages(2500 words)Assignment

Practical UNIX Security

...?Running Head: UNIX Security UNIX Security Unix is the operating system which was foremost developed in 1960s and is under regular development since that time. Operating system can be understood as the group of programs responsible for making the computer work (Peek Jerry, 2002). It is a multi-user, stable, multi tasking system for severs, laptops and desktops. Unix systems are also equipped with graphical user interface in the same way as Microsoft Windows, which gives an easy to use atmosphere. However, knowledge of unix is essential for operating Unix systems as it is not covered by a graphical program, for instance, in telnet session. There are various versions of Unix available however they are slightly different. The most admired...
10 Pages(2500 words)Assignment

Positional argument: Green technologies

..., the advantages outweigh the disadvantages of the implementation of green technology in business enterprises. It does not only bring benefits to business in terms of revenues and cost, but it also brings a positive impact to the environment. If all companies adapt to these innovations, the harmful effects of global warming will be prevented. Natural resources, like the rivers and forests will also be conserved and maintained to its original state. This is a perfect solution to the deterioration of the environment which has been damaged by constant elements emitted from production processes. Works Cited Cohen, Nevin. Green Business: An A to Z Guide. Thousand Oaks: SAGE Publications Inc, 2011. Print. Information Resources Management...
3 Pages(750 words)Essay

Benign Paroxysmal Positional Vertigo

...Benign Paroxysmal Positional Vertigo Patient Information Leaflet If you suffer from severe attacks of vertigo with a false sense of rotational motionwhen you suddenly change your position, you are suffering from benign paroxysmal positional vertigo. What is benign paroxysmal positioning vertigo (BPPV) Brief, sometimes severe attacks of rotatory vertigo with and without nausea, which are triggered by rapid changes in head position relative to gravity. What are the known triggers Typical triggers include lying down or sitting up in bed, turning around in bed, and also bending over to tie the shoelaces, or extending the head in order to look up or do something above the head. When does it occur It occurs most commonly in the morning. Many...
6 Pages(1500 words)Essay

Linux vs HP-UNIX

... and number] in format: 12 May 2002] Linux vs HP-UNIX UNIX as an operating system is uniquely exceptional through its file system and the ability to coordinate the naming of resources as well as accessing the same resources. An idea was therefore adopted to "design a network-level protocol, called 9P, to enable machines to access files on remote systems." (Pike et al) Bell Labs As UNIX worked toward being a reputable file system and operating system, but, as this type of file system and operating system becomes redundant another more powerful user friendly operating system called Linux. Kernel Many of the new operating systems tend to implement two classes of processes. In the older versions of UNIX (pre- 8 ), these included normal UNIX...
4 Pages(1000 words)Essay

Benign paroyxsmal positional vertigo

... degeneration from the utricular otoliths of the cupula. These particles float freely within the endolymph of the canal instead of being firmly attached to the cupula, and the "heavy conglomerate", which almost fills the canal, is assumed to be the cause of the positioning vertigo. The movement of the conglomerate causes either an ampullofugal or an ampullopetal deflection of the endolymph depending on the direction of the sedimentation. A valid model of the pathophysiology of BPPV must be able to predict the direction, latency, duration and fatigability of the typical nystagmus, as well as changes in these parameters due to other head manoeuvres. Liberatory Manoeuvre: The efficacy of positioning or liberatory manoeuvres of the head can...
4 Pages(1000 words)Essay

Priority and Positional Goods

...Introduction There are so many theorists all over the world that deal with various issues in the society. There is psychology, philosophy and also science based theorists who have been there since long time ago. This paper is dealing with theorists choosing between sifficientarism and prioritism. Why or why they don’t need to choose between the two aspects. (Alston, 1999) Sen is one of the theorists that are renown in the economy field. He has actually made imperative contributions on distributive justice and philosophical thinking. All these have various contributions that take some form of criticism. There is also the aspect of taking positions that are quite inadequate. It is important that clear distinctions be carried out...
6 Pages(1500 words)Case Study

Analysis that Compares and Contrasts UNIX/Linux and MS Windows

... Analysis that Compares and Contrasts UNIX/Linux and MS Windows Introduction If a computer can be considered to be as a body then the operating system is nothing less than the life and soul of the body that gives it meaning, purpose and allows it to interact with the various parts that make up the computer. In the modern computer environment, the operating systems run by the majority of the world’s personal computers have become divided on the lines of MS Windows and UNIX/Linux both of which have their plusses and minuses. As described by Beckman and Hirsch (2001), Windows XP dominates the landscape of personal computers but other operating systems such as Mac OS X and UNIX/Linux are certainly making inroads into the Microsoft dominated...
9 Pages(2250 words)Essay

UNIX

Now however we are presented with the 3D interface that somehow accusingly is deemed not viable. The 3D interface has been hailed as the road to incredible virtual landscape discovery. It couples sound and graphic and enables a faster multiple file copying and file location.
The purpose of this paper is to examine the phenomenon of 3D feature in the operating systems of Mac OS, the widespread Linux, Windows and more emphatically UNIX. Apart from its impact on the IT world we will consider a review and evaluation of multiple desktops, program launchers, file browsers, task switchers from a 3D standpoint.
The UNIX system has sold incredible number of software to a host of other software developers from Linux, Solaris, to Mac...
8 Pages(2000 words)Essay

Analysis of Salient Macroeconomic Parameters of India

...Macro Economy of India Introduction India is a second largest country in terms of population in the world and has been registering second highest growth rate after China in terms of GDP for last several years. The paper examines the salient macroeconomic parameters of India to assess the real strength of the country. GDP In the year 2007 India’s GDP reached $1trillion mark for the first time making it the twelfth-largest economy of the world. How India’s GDP progressed in last few years can be seen from the following table. The GDP has been measured in trillion dollars in terms of purchasing power parity (PPP) perspective instead of pure exchange rate conversion so that true strength of economy can be assessed. Year 2002...
2 Pages(500 words)Assignment

File management in UNIX

...File management in UNIX A UNIX file system is a method of managing large amounts of data by storing and organizing them in a chronological manner (Pfleeger et al, 2003). Also known as file access rights, file protection on the other hand is a system that allows a user to create a file that has restricted access to only a few selected people. Editing abilities, which involves write and delete privileges are normally the same in a UNIX system since it allows one to overwrite a file with a different one. An individual who creates a file is considered the owner and thus has the sole permission to manage that file (Garfinkel, et al, 2003). The owner therefore is the only person who can change the protection system of that particular file...
2 Pages(500 words)Essay

Statistical Parameters of the Company ABC

... Scope of Work The company ABC has provided quarterly sales data for years from the year 2000 through 2004. The data set consists of 20 values. This assignment uses the values of the data set to study statistics of the past performance of the company and predict the future quarterly sales for years 2005 and 2006. In studying the past performance, the assignment compares the past quarterly sales through statistical parameters such as mean, median, quartiles, and bar chart. The future quarterly sales are predicted using regression analysis and moving average method. Quarterly Sales Comparison. Table 1 displays the past quarterly sales values for years from 2000 to 2004. The analysis focuses on sales in each quarter of years...
4 Pages(1000 words)Essay

Parameters of Ethical Decision Making

... exits in front of the advantage putting everyone in the original position. Other ethical decision making approaches include utilitarian, universalism, moral rights and cost-benefit approach (Brooks and Dunn, 2010). Ethical decision making according to the utilitarian approach suggests that any action taken should always be for the good to the majority. The two major contributors of this ethical decision making approach are John Stuart Mill and Jeremy Bentham. Utilitarianism is considered a consequentialist classical approach of normative ethics that places actions as right or wrong based on the overall good and happiness. Act utilitarianism also called direct utilitarianism isolates certain actions under specific conditions while Rule...
2 Pages(500 words)Assignment

Securing Windows and Unix/Linux Servers

...Securing Windows and Unix/Linux Servers Introduction Operators of Windows and Unix Linux servers, which provide network services, should always ensure the servers’ security because of the servers’ vulnerabilities. Attacks against windows and Unix networks have also been on the increase and this calls for better methods of securing the servers. This report explains importance of securing the systems and possible solution to threats to the systems. Importance of Securing Windows and Unix/Linux Servers There are several risks that computer servers are exposed to and the risks necessitate the servers’ protection. One of the reasons for securing these servers is to protect sensitive data company. Such data may relate to identity, property...
3 Pages(750 words)Case Study

UNIX SHELLS

...UNIX Shells Introduction Unveiled in 1960s, UNIX is a requisite operating system whose enhancements since then up to date present users with heightened enjoyment as well as flexibility while using a computer (Ramesh, 2010). This is especially undertaking varied tasks that entail numerous commands whereby without its speed their execution would not have been possible in the current state of technological knowhow. To execute these tasks, it normally utilizes shells whose role encompasses acting as an interface amid the user and kernel whereby after login by the user the program scrutinizes the availed information to align appropriately (Ramesh, 2010). Hence, interpreting login commands that will result to the anticipated result. Undeniably...
2 Pages(500 words)Essay

Engineering parameters

... Engineering parameters Material cost This is the amount of money that engineers invest in the production of the product. It is different from cost of labor. It sums up the cost of parts of a machine. It is important in calculation the total cost of producing a product. Material type This is a key that is used to put materials of the same nature and attributes together. It is important for reporting purpose and scope of its usage. It dictates the number assignment, number range intervals, procurement type, and inventory management requirement. dB rating < 55dB This is the level of noise in decibels. It represents the maximum level of noise allowed in the engineering work. Force req. to open <5lbf This is the opening force requirements...
1 Pages(250 words)Essay

Physiological Parameters in Male College Students

...Physiological Parameters in Male College Students Introduction The role of physical activity on various health parameters has been well established. There is strong evidence that regular physical activity reduces the risk of various cardio-respiratory disorders. On the other hand physical inactivity has been related to the development of various diseases like diabetes, obesity and hypertension. Increased levels of physical activity may also attribute to a longer life span (National Institute for Health and Care Excellence, 2008) (Joint Health Survey Unit, 1999). Planned exercise programs are beneficial for achieving and maintaining long term weight loss by increasing the energy expenditure and metabolization of fat leading to decreased...
6 Pages(1500 words)Lab Report

The Positional Risks in ACME Development Corporation ADC Project

...Running head: Group 3 Group Project Affiliation December 2008 This paper will discuss the risk responses against the identified risks in the ACME Development Corporation (ADC) project of software purchase. I will present the risk response and the Weighted Scorecard regarding the list of functional requirements for a scheduling tool that is needed to purchase for ADC. ACME Development Corporation (ADC) wants to buy the scheduling tool from any software company. Our aim is to identify the positional risks and the response to those risks for neutralizing them. For this purpose we have to plan and manage the project in such a way that our actions and responses are according to particular method and technique. So according to this argument we...
14 Pages(3500 words)Case Study

Communications Mechanisms and Methodologies within the Unix

...1 Introduction It is possible for an operating system to be matured as well as state of the art simultaneously? If it is UNIX, then the answer would be “Yes.” UNIX has contributed in the Information technology sector for the last 25 years. Millions of installations conducted on various platforms and UNIX has proved to be organized and scalable. UNIX invented in 1969, by the computer scientists Dennis Ritchie and Kenneth Thompson employed at AT&T bell labs. Operating systems are compared by their functionality and performance. UNIX has contributed immensely in recent years. UNIX communication capabilities has also contributed in High performance computing sector as a company named Computer Associated International implemented a powerful...
6 Pages(1500 words)Research Paper

Effects Of Neuromuscular Electrical Stimulation Parameters

...Effects Of Neuromuscular Electrical Stimulation Parameters TABLE OF CONTENT Effects Of Neuromuscular Electrical Stimulation Parameters 1 TABLE OF CONTENT 1 IV. LIST OF FIGURES 7 V. ABBREVIATIONS 8 VI. ABSTRACT 10 The human motor cortex has been shown to undergo reorganization depending upon the alterations in the afferent inputs. Long term and repetitive voluntary activation of muscle spindle fibers have known to induce transient changes in cortical circuitry. Functional electrical stimulation (FES) used initially as rehabilitative adjunct for gait training but recently, its potential to induce residual muscle activity post-injury has been recognized. Due to this mechanism, functional electrical stimulation is now widely involved...
80 Pages(20000 words)Dissertation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic Positional Parameters (UNIX) for FREE!

Contact Us