Suppose a system has not implemented any deadlock prevention and avoidances measurement. Therefore, it has to run the deadlock detection algorithm in case deadlock has occurred in a system. Following two strategies can be adopted to recover the system from a deadlock.
In your opinion, which option will be considered more suitable to recover the system from a deadlock? Write a concise and to the point answer with valid reasons.
Write a bash script to check whether the input number is EVEN, ODD or neither EVEN nor
Consider a file “data.txt” which contains several records. Each record contains ID(7chars), 1 space, First name (10 chars),1 space, Second name (8 chars), 1space, marks in physics( 3chars), 1space, marks in chemistry(3 chars), 1space, marks in mathematics(3 chars) and anewline character. Sample file content is as shown below:
71723 Ram Sen 70 72 75
91924 Raghubir Yadav 82 73 80
53425 Ram Chauhan 93 81 86
44917 Ratan Yadav 95 79 91
ii) If the programis run with numeric argument ($./info.sh 44917), it will assume it as ID of student and will output ID, first name, second name and the average score of that student. If ID does not match, the program should display “record not found”.
Consider a file “data.txt” which contains several records. Each record contains ID(7chars), 1 space, First name (10 chars),1 space, Second name (8 chars), 1space, marks in physics( 3chars), 1space, marks in chemistry(3 chars), 1space, marks in mathematics(3 chars) and anewline character. Sample file content is as shown below:
71723 Ram Sen 70 72 75
91924 Raghubir Yadav 82 73 80
53425 Ram Chauhan 93 81 86
44917 Ratan Yadav 95 79 91
Write a shell program info.sh to achieve the following
i) If the programis run without any argument ($./info.sh), it has to display the first name, second name and average score of each student in the file.
choose the command sequence to delete the TEST directory.
choose the correct option to identify the user id(UID) under linux
w
who
finger
id
pwd
is-I
grep UID/etc/userID
df- h
none
identify the correct IP address
10.10.10.10
10.255.1.4
192.35.2.0
255.1.256.5.254
13.14.15.16
127.0.0.1
128.0.1.2.5
Write a shell script that demonstrates your ability to organize interactive communication
of its potential user with the UNIX environment in a friendly manner.
1. A user starts the program typing the program name and first his/her first name
and then the ID number as two parameters of the program
2. Program shall ask the secret key to run the program; a user should program this
secret key in advance. If the user enters correct secret key it should move to next
step (3), else it should prompt to enter correct key for four times and then exit the
program.
3. The program welcomes the user somehow mentioning his/her ID number first,
then his/her name and then displays the date and the time of the execution
4. The program displays five codes and names of the five countries team that has
played Football (one code and name per line) and asks the user to guess which
the one is best football team. The codes for Brazil, Argentina, Nepal, China and
England are BRZ, ARG, NEP, CHI and ENG respectively.
What happen if you open your excel for the first time?
Assume that you are working as system administrator and managing the Access modes of software System, Explain the File Permissions with respect to users by executing commands and show the output. (Select and name any Software Application of your choice).