Write a Shell program in C that can handle pushd, popd , and dirs commands supported by many shell programs including bash, tcsh and zsh. examples/how it works: The user enters pushd + [directory] The user enters popd The user enters dirs
Q: Write ARM assembly language to find the average of 5 pass marks. If the student passed the class put...
A: Start. Reserve two-byte memories Initialize the data segment. Set AX as 00. Add the numbers in AL re...
Q: 1. Why we need Artificial Intelligence?
A: Note:- As per guidelines, we are entitled to answer the first question only. Artificial Intelligenc...
Q: MCQS OF SOFTWARE QUALITY ASSURANCE 1.Testing the application as a whole for the modification in any ...
A: Note: Since the question is multipart we are advised to do only first three parts. Kindly post other...
Q: Code division multiplexing and time division multiplexing are compared and contrasted.
A: Introduction: Multiple data streams are integrated for simultaneous transmission across a shared fre...
Q: How crucial is software development? Four more characteristics, in your opinion, should be incorpora...
A: Introduction: Software development's ability to create and provide value to its users cannot be emp...
Q: 1 Write a python program that will calculate the function exp(x) Make sure your program meets...
A: 1. code: import mathdef expo(x): summ = 0.0 n = 0 while math.exp(x) - summ > 0.0000001...
Q: Suppose that the address of the branch instruction (beq) is 0x2000,0000. Is it possible to use this ...
A: yes it is possible. use jr to jump to the address 0x2001,0000. jump instruction uses the current PC...
Q: Write a function validate_date(date_string) which takes in a datestring and checks if the datestring...
A: Given The answer is given below.
Q: Read the article and answer the following question in your own word Artist’s link: https://timo...
A: According to the information given:- We ahve to define ASCII , Unicode, Code point,Unicode sandwich ...
Q: Encryption protects secrecy, integrity, authenticity, and nonrepudiation in what ways? Give at least...
A: Encryption is a technique utilized in information security wherein a user has access to data through...
Q: Print both the value(s) of lambda and the corresponding Photon energy ONLY where the Photon Energy i...
A: The lambda function is used find the wavelength when photon energy is given
Q: LWC Assignment: Create a LWC component to display the output: Data Binding Example Hello, Jhon Ron! ...
A: Lightning Web Components uses core Web Components standards and provides only what’s necessary to pe...
Q: the cloud?
A: given - What can you store on the cloud?
Q: What role does DCT play in picture processing?
A: Intro The question is about role does DCT play in picture processing and here is the solution in the...
Q: Give a regular expression that denotes the language of this automaton. . Show the derivation.
A: An expression that represents a regular language is termed as a regular expression. It consists of s...
Q: Which method is used to ensure that legacy systems continue to evolve?
A: Introduction: Hardware for the system Legacy systems may have been developed for hardware that is no...
Q: The length of both the search and the lookahead buffer is 8 (3 bits for coding the distance and the ...
A: Lets see the solution in the next steps
Q: What is a Cloud Technology?
A: Users can access storage, data, software, and servers over the cloud using any internet-connected de...
Q: 1.Am I limited to only one operating system per computer? 2. What is the product key? 3. what is a c...
A: answer is
Q: Software Engenering This requirement is not testable (that is, I can’t verify that I’m meeting i...
A: I will this question in simple examples 1) Assume there are two and they are using WhatsApp for comm...
Q: 1. Varying the computer responses can help hold the student’s attention. Modify the script so that ...
A: # get a questionare of 5 questions# for each question find if answer is correct or inncorect# if in ...
Q: 6. Design the following GUI by using Swing concept ( No action is required) FontViewer O X JAC444 Mi...
A: Import necessary classes. Extend the JFrame class. Create an object of frame. Create a label. Cre...
Q: Compute the DTFT of the following signals: i) x[n] =[ ii) x[n] = [1, -2, 1]
A: Here is the detailed explanation of the solution
Q: A command that can print this out: | full name in caps | JHUMPA LAHIRI 1 ΝΕIL GAIMAΝ 1 ΝΕIL GAIMAΝ |...
A: According to above question, the output is a column with name of people from a table . Assuming tabl...
Q: FOR UNIX, please give a description of these commands UNIX Command Description ...
A: Linux Cystem Admin Command: A system administrator is responsible for the configuration, care, and r...
Q: Brief information about matlab software
A: MATLAB software is a programming platform which is designed to analyse and design the products and s...
Q: Explain the differences between physical and wireless communication routes.
A: Introduction: The distinctions between physical and wireless communication channels
Q: ve an example of activities of the last network construction. (A must finish before B can start, and...
A: Lets see the solution.
Q: -Problem -3 -Create a flowchart design that depicts the solving of the following problem: Asks user ...
A: Please refer to the following step for the complete solution of the problem above.
Q: Who was the person responsible for developing the vacuum tubes that were utilized in the earliest co...
A: Answer: John Ambrose Fleming
Q: What kind of worries and challenges arise from the use of an unintegrated information system?
A: Introduction: Computer failure and loss are key issues resulting in unnecessarily high costs and cos...
Q: Consider a two-link network where Host A is connected to the router by a 1 Mbps link with 10 ms prop...
A: please find the handwritten solution in step 2
Q: Brief information about matlab software
A: Introduction: MATLAB combines a desktop environment optimized for iterative analysis and design with...
Q: Q10 Data consistency is a big deal in data processing. a. What needs to be sacrificed, to ensure hig...
A: Data Consistency: In database systems, consistency (or correctness) refers to the condition that eac...
Q: A sequence is defined by ao = 2, a1 = 1, %3D and an = 2an-1 + an-2 - 1 (for n > 2). What is the valu...
A: an = nth term a0 = first term = 2 a1 = second term = 1 a5 = fifth term
Q: John von Neumann's birthplace is unknown.
A: Introduction: John von Neumann was a talented mathematician and physicist who lived in the early twe...
Q: Vhich of the following are true, explain why: 1. log(n) = O(n) 2. n= 0(log n) 3. log? (n) = O(n) 4. ...
A: 10 condition are valid
Q: Using the following Relational database Schema write queries to retrieve the specified information. ...
A: here i write simple query to retrieve all tuples from song table: ==================================...
Q: Prepare a presentation using the presentation program you chose, on one of the following topics:
A:
Q: What is Onion network?
A: Here is your Solution .
Q: Provide a description for the Str copy variable.
A: Introduction: The Str copy function copies the source string to the destination string.
Q: Brief information about matlab software
A: A software is collection of applications integrated to achieve a particular execution of task.
Q: A web browser uses a non-persistent http/1.0 to download (GET) three images of sizes 1 MB, 500 KB an...
A: The answer is
Q: Give a short history of computer systems and their progress in relation to technology and trends.
A: INTRODUCTION: HISTORY OF TECHNOLOGY: As technology has progressed, computer systems, in particular, ...
Q: Describe the elements that influence transmission delay.
A: Introduction: The Transmission Delay Influencing Factors
Q: Which of the following are true, explain why: 5. log(n) = Q(n) 6. n= 2(log n) 7. 5n³ + 7n + 13 = O(n...
A: Lets see the correct statement in the next steps
Q: Using doc function, determine what the dot-asterisk (.*) operator does in matlab
A: % In the below help doc you will find the matlab operator and sp char % In that under Arithmetic o...
Q: 3. A program executes 200 billion instructions. It executes on an IBM processor that has an average ...
A: Here is the detailed explanation of the solution
Q: mize the function f(x)=2x2between the range 0-31 using genetic algorithm approach for one step only....
A: Lets see the solution.
Q: Given the following branch instruction and location, answer the following questions about it. Addres...
A: Given that: 0X10000 , 0Xb5000184At present, the PC is at 0X10000 * Type of branch Instruction: Her...
Write a Shell
Step by step
Solved in 2 steps
- TASK: Build a simple shell.DESCRIPTION:Write a shell program in C similar to "csh" that takes commands from thekeyboard. In particular, your shell prompt must be the current time(instead of, say, % as is common in UNIX).Make it simple; that is, do not allow it to handle background processes,it can ignore the control-C key, and especially, do not design it tointerpret shell scripts.You will need the following system calls:forkwaitpidone of execv, execve, execvp (read the manual pages).You must NOT use the C library function "system".Write two c++ programs to implement a distributed version of a multithreaded Huffman decompressor using the one in project 1 The server program The user will execute this program using the following syntax: ./exec_filename port_no < input_filename where exec_filename is the name of your executable file, port_no is the port number to create the socket, and input_filename is the name of the file with the alphabet's information. The port number will be available to the server program as a command-line argument. The server program receives from STDIN the alphabet's information (using input redirection). The input file has multiple lines, where each line contains information (character and frequency) about a symbol from the alphabet. The input file format is as follows: A char representing the symbol. An integer representing the frequency of the symbol. Example Input File: E 3 G 3 F 1 H 2 Given the previous input file, the expected output for the server program is: Symbol: C,…Write two c++ programs to implement a distributed version of a multithreaded Huffman decompressor using the one in project 1 The server program The user will execute this program using the following syntax: ./exec_filename port_no < input_filename where exec_filename is the name of your executable file, port_no is the port number to create the socket, and input_filename is the name of the file with the alphabet's information. The port number will be available to the server program as a command-line argument. The server program receives from STDIN the alphabet's information (using input redirection). The input file has multiple lines, where each line contains information (character and frequency) about a symbol from the alphabet. The input file format is as follows: A char representing the symbol. An integer representing the frequency of the symbol. Example Input File: E 3 G 3 F 1 H 2 Given the previous input file, the expected output for the server program is: Symbol: G,…
- Write a simple shell program in C. The shell program executes to accept commands from the user and executes the command in a child process. This is a very basic version of a shell command program. You can assume that the executables for the commands that the user may enter do exist in the (/bin/) directory. The shell program is very basic, it does not support command line arguments nor advanced features such as piping.In C write a program that takes a file name and two strings as command line arguments, and writes the longer of the two strings to the file with the given name. If the given strings are the same length, write the first string given to the file. If the user does not provide the correct number of command line arguments, print an error message and exit the program with a non-zero exit code.Write a C program that: takes an input file name from the command line; checks argc for correct invocation (otherwise, prints error and quits); opens that file if possible; prints a message confirming that the file has been opened successfully; and closes the file. For 3rd point program should print an error message in the event that the file cannot be opened successfully.
- WAP in c++ that reads the file FIRST.TXT and creates a new file named SECOND.TXT, to contain only those words from the file FIRST.TXT which start with a lowercase vowel. [ plz give correct answer i have to prepare for my exams ]Networking, TCP/IP requires one computer to function as the server and another to function as the client. The two computers must communicate using the same “language”. You will be building the server and the client. Write the program in C The Server Must accept commands in the form: PUSH “filename” fileSize <<<bytes>>> PUSH means that the client will be sending you a file. You need to store it with the filename sent. You must expect and require fileSize bytes. Respond to the client with “OK”. PULL “filename” PULL means that the client wants this file back. Respond with the number of bytes (use stat()), and then send all of the bytes to the client. Then respond with “OK” (a different send()). The server should take two parameters – the directory to work in and the port. The server should not shutdown. The server must have an accept() loop to allow multiple clients to connect (one at a time).Write a C program that gets a source file name from a user. If the file does not exist, it will generate a proper error and exits.If the file exists, it also gets the name of two more files from the user, say destination1 and destination2. These files don’t need to exist as they are files that need to be written to. If the files cannot be opened for writing, a proper error will be generated. The program then reads the source file line by line. It will copy every line that has a digit in it to destination 2 and lines that have no digit in them to destination 1. Feel free to use ctype’s isdigit() function to identify digit characters. Example: If source file is:Hi My name is VeriaHello My name is John. How can I help you?I have a problem with my giga bit internet. The speed should be around 1000 but it’s just 200 Sure! I can help with that. Can I have your number in case we get disconnected? Sure! My number’s 647-123-1234 First file (destination 1) should be Hi My name is Veria Hello…
- Computer Science Write a C/C++ program, call it findExt, to find all files in a directory hierarchy, whose extensions are in the extension list provided as arguments to the program. Your program should print the whole pathnames of the found files. Synopsis: findExt <extension-list> [-t target-directory] When target-directory is missing, the working directory (./) will be the target directory Some sample runs: $ findExt txt pdf That is, find all files whose extensions are either txt or pdf in the directory hierarchy ./ $ findExt jpg -t $HOME //target directory is home directory That is, find all files whose extensions is jpg in the directory hierarchy $HOME Requirement: - You must use the system call nftw() that allows you to walk across a file tree. This system call will do all the recursive walk and each time it visits a file or a directory, it will call your own function (a function that you pass as a parameter).Language: Python Goal: implement decryption in the attached code block import argparse import os import time import sys import string # Handle command-line arguments parser = argparse.ArgumentParser() parser.add_argument("-d", "--decrypt", help='Decrypt a file', required=False) parser.add_argument("-e", "--encrypt", help='Encrypt a file', required=False) parser.add_argument("-o", "--outfile", help='Output file', required=False) args = parser.parse_args() encrypting = True try: ciphertext = open(args.decrypt, "rb").read() try: plaintext = open(args.encrypt, "rb").read() print("You can't specify both -e and -d") exit(1) except Exception: encrypting = False except Exception: try: plaintext = open(args.encrypt, "rb").read() except Exception: print("Input file error (did you specify -e or -d?)") exit(1) def lrot(n, d): return ((n << d) & 0xff) | (n >> (8 - d)) if encrypting: #…using c++ In this assignment you are going to implement your own version of university library system,Thesystem will have two different sides , the first one is to help the librarian to do his job and the other side for admin to manage every one permissions in the system , so You should provide the following features in your system: Admin view o Add/remove Studentso Add/remove librarian o Add/remove other admins Librarian viewo Add/Delete bookso Issue/Return bookso View bookso View Issued bookso Log in /log outo Search for the book(id/name) Simple backend for your system , You could use a file each row should represent itemo Books File should be something like:Id , Book Name, Author Name, Available quantity, Issued Quantity1,Oliver Twist, Charles Dickens,98,2In the previous the first row was the name of each column , you can do that or handle it in your code , id =1 , Book Name =Oliver Twist ..Etc. Tables neededo Books Id Book Name Author Name Available quantity Issued…