Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of the word "foobar". Your search should be case-sensitive (that applies both to filenames and the word "foobar"). Note that an occurrence of "foobar" only counts as a word if it is either at the beginning of the line or preceded by a non-word-constituent character, or, similarly, if it is either at the end of the line or followed by a non-word- constituent character. Word-constituent characters are letters, digits and underscores.

Answers

Answer 1

Answer:

grep -R  '^foobar'.c > variable && grep -R  'foobar$'.c >> variable

echo $variable | ls -n .

Explanation:

Bash scripting is a language used in unix and linux operating systems to interact and automate processes and manage files and packages in the system. It is an open source scripting language that has locations for several commands like echo, ls, man etc, and globbing characters.

The above statement stores and appends data of a search pattern to an already existing local variable and list them numerically as standard out 'STDOUT'.


Related Questions

Algorithm
Read marks and print letter grade according to that.

Answers

Answer:

OKAYYYY

Explanation:

BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE

Write a program that reads the input.txt file character by character and writes the content of the input file to output.txt with capitalize each word (it means upper case the first letter of a word and lowercase remaining letters of the word)

Answers

Answer:

def case_convertfile( file_name):

    with open(" new_file","x") as file:

         file.close( )

    with open("file_name", "r") as txt_file:

     while True:

            word = txt_file.readline( )

            word_split= word.split(" ")

            for word in word_split:

                  upper_case = word.uppercase( )

                  file= open("new_file","w+")

                  file= open("new_file","a+")

                  file.write(upper_case)

     txt_file.close( )

     file.close( )

Explanation:

This python function would open an existing file with read privilege and a new file with write and append privileges read and capitalize the content of the old file and store it in the new file.

Giving BRANLIEST IFF CORRECT What is the label called for each column in a database? Field File Record Title

Answers

Answer:

Title

Explanation:

the others describe other items in a database

Answer:

Title

Explanation: idek but I got it correct on a quiz

3. Coaxial/telephone cable sends
during the data transmission
signal

Answers

Answer:

high frequency signal.

What is resource management in Wireless Communication? Explain its advantages

Answers

Answer:

This is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel.

Explanation:

Radio Resource Management is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel. Its aim is to effectively manage the radio network infrastructure. Its advantages include;

1. It allows for multi-users communication instead of point-to-point channel capacity.

2. it increases the system spectral efficiency by a high order of magnitude. The introduction of advanced coding and source coding makes this possible.

3. It helps systems that are affected by co-channel interference. An example of such a system is the wireless network used in computers which are characterized by different access points that make use of the same channel frequencies.

Which of the factors below is NOT a cause of online disinhibition?
O Anonymity
O Lack of nonverbal cues
Lack of tone of voice
Smartphones

Answers

Answer:

Lack of tone of voice

Explanation:

Remember, online disinhibition refers to the tendency of people to feel open in communication via the internet than on face to face conversations.

A lack of tone voice isn't categorized as a direct cause of online disinhibition because an individual can actually express himself using his tone of voice online. However, online disinhibition is caused by people's desire to be anonymous; their use of smartphones, and a lack of nonverbal cues.

what level of security access should a computer user have to do their job?

Answers

Answer:

A computer user should only have as much access as required to do their job.

Explanation:

A computer user should not be able to access resources outside of their job requirement, as this poses a potential attack vector for an insider threat.  By limiting the scope of resources to just what is needed for the user's specific job, the threat to the system or company can be mitigated with additional access control features for the computer user.  Never allow permission higher than what are needed to accomplish the task.

Cheers.

3. How many bytes of storage space would be required to store a 400-page novel in which each page contains 3500 characters if ASCII were used? How many bytes would be required if Unicode were used? Represent the answer in MB

Answers

Answer:

A total of 79.3mb will be needed

What does filtering a record do?
O It suppress some records and shows others.
O It removes records from the document permanently.
O It sorts all the data in the record.
O It arranges all the information in one column.​

Answers

Answer:

It sorts all the data in record.

Explanation:

third one is verified

"The principle of ______________ states that programs tend to access data and instructions nearby recently used data and instructions."

Answers

Answer:

Locality of reference.

Explanation:

In computing, The principle of locality of reference is the probability of a processor to repeatedly access the same set of memory locations within a small time interval. This reference of locality can be spatially based (repetitive usage of data within the same location on the computer memory), or temporally based (repetitive usage of a particular data or resources within a shot time interval). The ability of some computing system to perform this action increases their predictability, and efficiency of memory hierarchy use, among other abilities.

What type of function is being performed when a router screens packets based on information in the packet header

Answers

Answer:

"Router screening" is the correct option.

Explanation:

A router that philters packets like a firewall. For certain instances, the whole firewall system is such a single scanning router.Often connected to a network stage as well as a container-filter firewall has been the scanning router firewall. This rather firewall operates by filtering protocol characteristics from received packets.

So that the above seems to be the correct approach.

________ databases are better than relational databases at handling unstructured data such as audio clips, video clips, and pictures.

Answers

Answer:

"Object-oriented" would be the correct choice.

Explanation:

An object-oriented database seems to be a database that subscribes to a framework containing object-depicted details. Throughout the context of the relational database management system, object-oriented is a unique product that is not as popular and most well-known as traditional web applications.This indicates that internet connectivity to existing records has to implement the previously defined connections for interacting components established by that same containers.

the property of doing work automatically by the computer​

Answers

Answer:

Automation

Explanation:

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?


LAN


PAN


WAN


MAN

Answers

Answer:

PAN

Explanation:

For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.

What are the PAN  network type is Marco using?

The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).

A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.

Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.

Learn more about network type here:

https://brainly.com/question/29515062

#SPJ2

3. What are the first steps that you should take if you are unable to get onto the Internet? (1 point)
O Check your router connections then restart your router.
O Plug the CPU to a power source and reboot the computer.
O Adjust the display properties and check the resolution
Use the Control Panel to adjust the router settings.​

Answers

Answer:

Check your router connections then restart your router.

Explanation:

When the internet connection is not displaying properly then the first step is to check the router. The network icon on the internet displays the availability of internet. Adjust the router and see if the router is working properly. If not restart the router so that it adjusts its settings to default. The connection will be available on the computer and internet will start working normally.

If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.

Answers

Answer:

Answered below

Explanation:

The DNS server is said to be a caching-only DNS server.

A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.

Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.

The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

who is considered as the father of computer science?​

Answers

Charles Babbage is known as father of computer science because he designed the original programmable computer .

I hope it helps and if you want to have good answer follow me, I will be your second sight on your any problems♥️♥️

You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component should you check first

Answers

Answer:

Pick up roller

Explanation:

you should first check the pickup roller component. This component is the part of the printer that picks paper up from the paper tray. The pickup roller links the printer and the paper. When the printer printer is running, the roller would take paper from the paper tray for the printer to print on. One of the issues it can have is Paper jam where the roller would stop turning so that it will no longer be picking papers up from the tray.

Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted

Answers

format please? i cant understand

Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives an error if the last item entered violates the heap condition. Use will enter at most 7 numbers. Example runs and comments (after // ) are below. Your program does not print any comments. An output similar to Exp-3 and Exp-4 is expected.
Exp-1:
Enter a number: 65
Enter a number: 56 // this is first item (root,[1]) in the heap three. it does not violate any other item. So, no // this is third [3] number, should be less than or equal to its root ([1])
Enter a number: 45 // this is fourth number, should be less than or equal to its root ([2])
Enter a number: 61 // this is fifth number, should be less than or equal to its root ([2]). It is not, 61 > 55. The 61 violated the heap.
Exp-2:
Enter a number: 100
Enter a number: 95 1/ 95 < 100, OK
Enter a number: 76 // 76 < 100, OK
Enter a number: 58 // 58 < 95, OK
Enter a number: 66 1/ 66 < 95, OK
Enter a number: 58 // 58 < 76, OK
Enter a number: 66 // 66 < 76, OK
Exp-3:
Enter a number: -15
Enter a number: -5
-5 violated the heap.
Exp-4:
Enter a number: 45
Enter a number: 0
Enter a number: 55
55 violated the heap.

Answers

Answer:

Following are the code to this question:

#include<iostream>//import header file

using namespace std;

int main()//defining main method

{

int ar[7];//defining 1_D array that stores value      

int i,x=0,l1=1,j; //defining integer variable

for(i=0;i<7;i++)//defining for loop for input value from user ends  

{

cout<<"Enter a Number: ";//print message

cin>>ar[i];//input value in array

if(l1<=2 && i>0)//using if block that checks the array values  

{

x++;//increment the value of x by 1  

}

if(l1>2 && i>0)//using if block that checks the array values  

{

l1=l1-2;//using l1 variable that decrases the l1 value by 2  

}

j=i-x;//using j variable that holds the index of the root of the subtree

if(i>0 && ar[j]>ar[i])// use if block that checks heap condition  

{

l1++; //increment the value of l1 variable

}

if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule  

{

cout<<ar[i]<<" "<<"Violate the heap";//print message with value

break;//using break keyword  

}

}

return 0;

}

Output:

1)

Enter a Number: -15

Enter a Number: -5

-5 Violate the heap

2)

Enter a Number: 45

Enter a Number: 0

Enter a Number: 55

55 Violate the heap

Explanation:

In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.

the part of the computer that contains the brain , or central processing unit , is also known the what ?

Answers

Answer:

system unit

Explanation:

A system unit is the part of a computer that contains the brain or central processing unit. The primary device such as central processing unit as contained in the system unit perform operations hence produces result for complex calculations.

The system unit also house other main components of a computer system like hard drive , CPU, motherboard and RAM. The major work that a computer is required to do or performed is carried out by the system unit. Other peripheral devices are the keyboard, monitor and mouse.

Đánh giá hoạt động thanh toán điện tử của sinh viên

Answers

Answer:

CMON BRO

Explanation:

I DUNNO YOUR LAGUAGE

Create a python program that display this
Factorial Calculator
Enter a positive integer: 5
5! = 1 x 2 x 3 x 4 x 5
The factorial of 5 is: 120
Enter a positive integer: 4
4! = 1 x 2 x 5 x 4
.
The factorial of 4 is: 24
Enter a positive integer: -5
Invalid input! Program stopped!​

Answers

Answer:

vxxgxfufjdfhgffghgfghgffh

Write steps to Delete data from ‘Datagridview’

Answers

Explanation:

private void btnDelete_Click(object sender, EventArgs e)

{

if (this.dataGridView1.SelectedRows.Count > 0)

{

dataGridView1.Rows.RemoveAt(this.dataGridView1.SelectedRows[0].Index);

}

}

Do each of the following in the main function:
a) Write the function prototype for function zero, which takes a double array big_nums and does not return a value.
b) Write the function call for the function in part a.
c) Write the function prototype for function add1AndSum, which takes an integer array one_small and returns an integer.
d) Write the function call for the function described in part c.

Answers

Answer:

a)

void zero(double big_nums[]);  

b)

zero(big_nums)  

c)

int add1AndSum (int one_small[]);

d)

add1AndSum(one_small);

Explanation:

a)

void zero(double big_nums[]);  

in this statement:

zero is the name of the function

void is used as the function does not return a value.

The function zero takes an array parameter i.e. big_nums[]

big_nums is the name of the array

big_nums[] array has a data type double

b)

zero is the name of the function

In part a) function zero has a parameter which is the array big_nums. So in order to call this function an array has to be passed as a parameter to this function.

So in this statmenent zero(big_nums) the array big_nums is passed to the zero function. You can also declare a new  double type array with a different name in main() function and can pass this to the zero function as:

double array[ ] = { 20.6, 30.8, 5.1};

zero(array);

Look at the following program for the better understanding of part a) and b)

#include <iostream>   //for using input output functions

using namespace std;  //to access objects like cin cout

void zero (double big_nums[]);   // function prototype

int main() {  //start of main() function

double a[ ] = { 20.6, 30.8, 5.1};  // double type array a with elements

zero(a);    }   //calls zero function passing array a to the function

void zero(double big_nums[]){      // function zero with double type array big_nums as parameter and the function returns no value

   int i;    

   for(i=0;i<3;++i)     {

        cout<<big_nums[i];     }  }  //prints the elements of array

c)

add1AndSum is the name of the function

int is used as the function does not return an integer.

The function add1AndSum takes an integer array parameter i.e. one_small[]

one_small is the name of the array

one_small[] array has a data type int

d)

add1AndSum is the name of the function

In part c) function add1AndSum has a parameter which is the array one_small. So in order to call this function an array has to be passed as a parameter to this function.

So in this statement add1AndSum(one_small); the array one_small is passed to the add1AndSum function. You can also declare a new  int type array with a different name in main() function and can pass this to the add1AndSum function.

3. Explain why the process of project planning is iterative and
why a plan must be continually reviewed during a software
project.
Ans:​

Answers

Answer:

because they inspecting or checking how there works good or not good there are under there work what a result cause they want a good and beautiful work

They're inspecting or checking how there works good or not good there are beneath there job what a result because they want a nice and beautiful work.

What is project planning?

The discipline of project planning focuses on how to complete a project within a predetermined timeframe, often with predetermined stages and resources. According to one method of project planning, the first stage is to set definable goals. scheduling the deliverables definition.

A project plan is made in order to effectively provide a result for the internal or external client. Project deliverables include, for instance, software products, design documentation, and other assets listed in the project plan. Deliverables for projects are frequently asked for as software products.

A project plan is a group of official documents that describe the execution and control phases of the project. The strategy considers risk management, resource management, and communications in addition to scope, cost, and schedule baselines.

Thus, They're inspecting or checking how there works good or not good.

For more information about project planning, click here:

https://brainly.com/question/27992266

#SPJ2

By Using the following schema, answer the following SQL queries and commands: Product(P_code.P_name, P_price, P_on_hand,vend_code) Vender(vend_code, vend_fname, vend_areacode, vend_phone) 1- find the venders names who sell products in TN-5 area and their names include "dan". 2- find the code, name and vender code of product that has price between 1500S and 2500S and the product that has price between 48005 and 5600S. 3- Find the name, and code of venders who had 5 microwaves that has price less than 3500S. 4- Find the phone numbers of venders who sell Televisions. 5- Delete the records of venders who their first name is 'smith'

Answers

Explanation:

answer me pls i need sol bbbd

In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not include hardware or software choices. Group of answer choices

Answers

Answer:

"Conceptual" is the correct answer.

Explanation:

SDLC would be a particular implementation of a software administration that defines the processes responsible for the creation of such an organization or project, through preliminary feasibility studies to accomplished program activities.The conceptual design seems to be the very first phase of the cycle of brand management, using designs as well as other diagrams or models. It offers an implementation of the study product as a result of a collection of interconnected values and principles about what it will do, function, and look in a user-friendly way.

1. Cases Prudence has a special (cubic) die. The values on its face are the integers from 1 to 6, but they are not arranged ae in a normal die. When Prudence first tosses the die, the sum of the values on the four side faces is 15. In her second toss, the sum of these values is 12. Find what value appears in the face opposite 6 on Prudence’s special die. (Hint: what are possible values for the top and bottom face when the sum of the side faces is 12).

Answers

Answer:

The definition of the subject in question is presented in section elsewhere here.

Explanation:

The total value of almost all of the quantities mostly on unique die features will indeed be:  

⇒  [tex]1+2+3+4+5+6[/tex]

⇒  [tex]21[/tex]

The number of the 4 lateral sides throughout the first tossing will be 15, therefore determines the total of both top and bottom features would be:

⇒  [tex]21-15[/tex]

⇒  [tex]6[/tex]

The compositions including its {top and bottom} current valuations that give a total of Six include {1, 5}, {5, 1}, {2, 4}, as well as {4, 2}. Consequently, because neither of those variations includes Six, it indicates that six doesn't really feature on the very first toss mostly on high or low hand.  

And then let's look at second tossed situation. Throughout this particular instance, the total amount obtained would be 12.

Which means it has to be the number of top and bottom:

⇒  [tex]21-12[/tex]

⇒  [tex]9[/tex]

{4, 5},{5, 4}, {6, 3}, and {3, 6} seem to be the {top, bottom} facial variations that provide a total of Nine.  

Currently regarding all the tosses, {6, 3} and perhaps {3, 6} have been the only situations wherein the 6 emerge towards top or bottom. Then the value of the unique die mostly on face identical to 6 must've been 3.

Other Questions
what is a 200% increase of 50 What are the advantages and disadvantages of using price controls and subsidies to support American agriculture? 1. What does the acronym LASER stand for? What characteristic of a laser makes it suitable for today's experiment? The arrangement of leaves on a tree branch that reduces overlapping and overshadowingof leaves from sunlight is referred to as leaf This ensures exposure of most of the leaves to sunlight for maximum ..to take place in the of leaf cells. The grana contains numerousmolecules which trap light.for .of water, producing atoms required for the process of carbon (IV) oxidein the lightstage of photosynthesis which takes place in the..of the chloroplast. What ion will be formed by the phosphorus atom shown below when it has a stable set of valence electrons? 3.87 moles of iron bromide yielded10.4 moles of sodium bromide A bagel company bakes a specialty bagel that it sells by the dozen every day. These specialty bagels can only be baked early in the morning before the store opens for business. The company estimates that the daily demand (in dozens) for its specialty bagel is distributed as follows: Specialty bagels arc sold by the dozen only at a cost of $9.00 per dozen. The cost to make one bagel is $0.50. Leftover specialty bagels arc sold by the dozen the next day for a 50% discount. The optimal number of specialty bagels that should be baked tomorrow (in dozens) is:________ a) 5 dozen. b) 4 dozen. c) 3 dozen. d) 2 dozen. I NEED HELP PLEASE I GIVE 5 STARS ! please help me out, name all 3 parts of the atom. Differentiate community health and environmental health.Need answer asap 7 10/3 x 3 1/10= Can you explain step by step to meThanks Town B is 250 km from town A on a bearing of 080.Town C is 250 km from town B on a bearing of 220.What is the bearing from town A to town C? Seacrest Company has 15,000 shares of cumulative preferred 2% stock, $50 par and 50,000 shares of $5 par common stock. The following amounts were distributed as dividends: Year 1 $30,000 Year 2 12,000 Year 3 45,000Required:Determine the dividends per share for preferred and common stock for each year. The Making Ethical Decisions box "Good Finance or Bad Medicine" has an important message for managers who make financial decisions. Which of the following statements summarizes this message?A. Managers must balance good economic decisions with socially forward thinking. B. Checking academic credentials of recently graduated doctors is imperative due to the cost of lawsuits that patients may file if they learn that they were served by a surgeon without a license. C. The support of a good law firm is worth every penny a hospital might pay. The finance manager should always budget for a legal team. D. Financial decisions must be based on what insurance companies are willing to pay. Merchandise purchases are paid in full during the month following purchase. Accounts payable for merchandise purchases on June 30, which will be paid during July, total $139,398. Salaries, Advertising and Rent Payment expenses are all paid in cash in the month incurred. Depreciation expense is shown on the income statement each month. Equipment costing $10,498 will be purchased for cash during August. Calculate total cash payments budgeted for August. Someone pls help . Thank you sm !! f (x) = x - 5. Find f'(x) and its domain. The date the directors vote to pay a dividend is called the: Multiple Choice Date of declaration. Date of record. How can you guess the name of the element using the chemical formula ? I need help ASAP!! Please explain how to solve the problem