subject

Students will create a BASH shell script to process the data contained in an external file. The external file contains particle names and their momentums (one particle per line) collected during a particle accelerator test at CERN. Write a BASH shell script that uses a combination of the Linux commands cat, cut, grep, numaverage, numbound, uniq, sort, and wc to summarize the data contained in an external file Note 1: Students should use the man command to learn more about each of the above Linux commands. Note 2: Students should avoid using any Linux commands other than those listed above to complete their BASH script. The script should accept the name of the external file as a command-line argument The script should display the total number of particles recorded in the file The script should summarize the data of each unique particle (species): Note 1: Do NOT create temporary files to store data - chain commands together with piping. Note 2: All decimal values should be displayed to six (6) decimal places. Name of particle species Total number of occurrences of the species Minimum momentum of the species Maximum momentum of the species Average momentum of the species Two (2) data files are provided for use with the BASH script: small. dat and large. dat Use the small. dat file to test and perfect the BASH script Use the large. dat file to produce the output you will include in the Linux Lab submission

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 15:10
Chiko bought 75 shares of stock at $19.58 per share. he received dividends of $73.42 during the year. at the end of the year, his stock was valued at $22.14. what was his purchase price?
Answers: 2
question
Computers and Technology, 22.06.2019 03:50
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
question
Computers and Technology, 22.06.2019 18:30
Which of the following is an example of intellectual properly! oa. new version of a novelb. journal of ideasc. pages of a bookood. lines of a poem
Answers: 2
question
Computers and Technology, 22.06.2019 22:30
Alex’s family members live in different parts of the world. they would like to discuss the wedding plans of one of their distant relatives. however, alex wants all the family members to talk to each other simultaneously so that they can make decisions quickly. which mode of internet communication should they use? a. blog b. email c. wiki d. message board e. instant messaging
Answers: 2
You know the right answer?
Students will create a BASH shell script to process the data contained in an external file. The exte...
Questions
question
Spanish, 14.07.2019 21:20
Questions on the website: 13722363