Alfred Aho Brian Kernighan Peter Weinberger gawk awk GUN. GNU linux. gawk

Size: px
Start display at page:

Download "Alfred Aho Brian Kernighan Peter Weinberger gawk awk GUN. GNU linux. gawk"

Transcription

1 awk linux/unix awk linux/unix ( ) awk Alfred AhoBrian KernighanPeter Weinbergergawk awk GUN awk gawk GNU linux Bell awk GNU awk gawk awk [options] 'script' var=value file(s) awk [options] -f scriptfile var=value file(s) fs -F: awk nnn -mf Bell awk nnn -mr awk

2 awk gawk awk awk awk unix unix \x func fs ****= ^^=fflush (grep Posix ) [[:alpha:]] program-text -f bug pattern {action $ awk '/root/' test$ awk '$3 < 100' test action action

3 3 RS / / $2>%1 ~( )~!( ) BEGIN END BEGIN END! " #%$" #& -. +, *!"# / * :9<;!"$%& / !") B C / * #*%)+, 3 " D EF 'GH I)J -./( 0%)$!*% K L M N OP 3 0!!%* Q R S! T UV W * XY * $01&$&,2 " #)Z\[ ]^ '_<`@F a ')( (* $10% b * ')()* '= >@? A (*

4 F %! c %!$d e f g 78 * i j " # ')(\h 'GH `@F $"%*!0# 0 k l J\m%$on@p 1 q<r@s t u % 6 " # 3 * %! 3 * -x *+, 3 " 'GH I -x * " # ')(\h 'GH I -x *! ')(\h 'GH I vow!10%",2 y 3z * -./(* S!<`@F (* S! E 1 h (* " h { [ *! ')(\h 'GH S! E 1 h (* vow!,!, y 3z " h { S! ~ ')(\h 'GH I 678(* 9<; * < 9:;-<:: ƒ I => # 8 ^?? ˆ vow<š AAB n^ CCDDB T@Œ A h `@F Ž 9 $ :;@ $ 9B S $ <::: 99 ˆ š$ " #šœo_ < 3 )vow<š n^ J ˆ R awk ORS RS

5 $0 $ awk '{print $0' test test NR NR 1$ awk '{print NR,$0' test test NF tab awk $ awk '{print $1,$3' test test () FS tab -F FS $ awk -F: '{print $1,$5' test $awk -F'[:\t]' '{print $1,$3' test tab OFS OFS$ awk -F: '{print $1,$5' test$1$5 unix Sed Grep gawk awk 6E 64 6C 6D 6

6 6 6F 6G Grep $ awk '$1 ~/^root/' root test test conditional expression1? expression2: expression3 $ awk '{max = {$1 > $3? $1: $3: print max' test $1 max $3 max $ awk '$1 + $2 < 100' test 100 $ awk '$1 > 5 && $2 < 10' test, 5 10 $ awk '/root/,/mysql/' mysql test root

7 $ cat /etc/passwd awk -F: '\ NF!= 7{\ printf("line %d,does not have 7 fields:%s\n",nr,$0)\ $1!~ /[A-Za-z0-9]/{printf("line %d,non alpha and numeric user id:%d: %s\n,nr,$0)\ $2 == "*" {printf("line %d, no password: %s\n",nr,$0)' cat awkawk (NF) 7 printf "line?? does not have 7 fields" printf no alpha and numeric user id" no passwd $ awk '/^(no so)/' test----- no so $ awk '/^[ns]/{print $1' test----- n s $ awk '$1 ~/[0-9][0-9]$/(print $1' test----- $ awk '$1 == 100 $2 < 50' test $ awk '$1!= 10' test $ awk '/test/{print $1 + 10' test----- test 10 $ awk '{print ($1 > 5? "ok "$1: "error"$1)' test $ awk '/^root/,/^mysql/' test---- root mysql mysql root

8 awk Variable = expression$ awk '$1 ~/test/{count = $2 + $3; print count' test,,awk count test 4 awkscript month=4 year= awk test month year test BEGIN $ awk '{$2 = + $1; print ' awk 100$1 $2 test, $2 $ awk '$1 == "root"{$1 ="test";print' root test test mary!"# BEGIN awk OFS, RS FS $ awk 'BEGIN{FS=":"; OFS="\t"; ORS="\n\n"{print $1,$2,$3 (FS) (OFS) test (ORS) $ awk 'BEGIN{print "TITLE TEST"!#$ END $ awk 'END{print "The number of records is" NR' test awk awk $ awk -F: -f $ awk -F: '{IGNORECASE=1; $1 == "MARY"{print NR,$1,$2,$NF'test IGNORECASE 1 awk shell $ awk '$1 = 100 {print $1 > "output_file" ' test 100 output_file >> getline getline NF,NR 0 FNR getline -1 1

9 $ awk 'BEGIN{ "date" getline d; print d' getline test d linux date $ awk 'BEGIN{"date" d; split(d,mon); print mon[2]' getline getline test shell dsplit date d mon mon $ awk 'BEGIN{while( "ls" getline) getline ls print' ls geline BEGIN $ awk 'BEGIN{printf "What is your name?"; getline name < "/dev/tty" $1 ~name {print "Found" name on line NR "." END{print "See you," name "." test What is your name?", name getline name print END See you name $ awk 'BEGIN{while (getline < "/etc/passwd" > 0) lc++; print /etc/passwd lc lc'awk lc 1 getline -1 0 while (getline < -1 "/etc/passwd") awk close() $ awk '{print $1, $2 "sort" ' test END linux sort,end {close("sort")awd print system awk linux$ awk 'BEGIN{system("clear")' fflush fflush(""), awk C %& ž Ÿ {if (expression){ statement; statement;... $ awk '{if ($1 <$2) print $2 "too high"' test

10 $ awk '{if ($1 < $2) {count++; print "ok"' ok test. count %&' ž Ÿ {if (expression){ statement; statement;... else{ statement; statement;... $ awk '{if ($1 > 100) print $1 "bad" ; else print "ok"' test $1 100 $1 bad, ok $1 count $1 %&'%& $ awk '{if ($1 > 100){ count++; print $1 else {count--; print $2' test $1 100 count ž Ÿ {if (expression){ statement; statement;... else if (expression){ statement; statement;... else if (expression){ statement; statement;... else { statement; statement;... awk :while for special for $ awk '{ i = 1; while ( i <= NF ) { print NF,$i; i++' NF( ), i test 1 i 1 i NF. $ awk '{for (i = 1; i<nf; i++) print NF,$i' test breadkcontinue break continue {for ( x=3; x<=nf; x++) if ($x<0){print "Bottomed out!"; break {for ( x=3; x<=nf; x++)

11 3 if ($x==0){print "Get next item"; continue next awk {if ($1 ~/test/){next else {print exit awk END 0 awk $ awk {name[x++]=$2;end{for(i=0;i<nr;i++) print i,name[i]' test 1 name name xawk x END for special for {for (item in arrayname){ print arrayname[item] G;<;H )ö I%!JKLM0%&H' (H IJLLG * š I * * count["test"] for for (index_value in array) statement $1 :$ awk '{count[$1]++ END{for(name in count) print name,count[name]' count test delete $ awk '{line[x++]=$1 END{for(x in line) delete(line[x])' test line special for

12 sub sub (regular expression, substitution string): sub (regular expression, substitution string, target string) $ awk '{ sub(/test/, "mytest"); print ' testfile $ awk '{ sub(/test/, "mytest"); $1; print ' testfile gsub gsub sub gsub (regular expression, substitution string) gsub (regular expression, substitution string, target string) $ awk '{ gsub(/test/, "mytest"); print ' testfile $ awk '{ gsub(/test/, "mytest"), $1 ; print ' testfile test mytest mytest index 1 index(string, substring) $ awk '{ print index("test", "mytest") ' testfile test mytest 3 length

13 length( string ) length $ awk '{ print length( "test" ) ' $ awk '{ print length ' testfile test testfile substr 1 substr( string, starting position ) substr( string, starting position, length of string ) $ awk '{ print substr( "hello world", 7,11 ) ' world RLENGTH 0match RSTART substr match match( string, regular expression ) $ awk '{start=match("this is a test",/[a-z]+$/); print start' $ awk '{start=match("this is a test",/[a-z]+$/); print start, RSTART, RLENGTH ' 11 RSTART RLENGTH 11(start)11(RSTART) 4(RLENGTH) toupper tolower gawk toupper( string )

14 » µ» u u & ¼ ¼ F F t t ¼ ¼ tolower( string ) $ awk '{ print toupper("test"), tolower("test") ' split FS split( string, array, field separator ) split( string, array ) $ awk '{ split( "20:18:00", time, ":" ); print time[2] ' time 18 systime ( ) systime() $ awk '{ now = systime(); print now ' strftime C strftime systime( [format specification][,timestamp] ) ª «% ± ²³ <± - µ '( - µ -N ¹@b -4 ¹@b º5» - - ½ p ¾ +,<u@ '( +,<u@ %¼ µ '*( '*N (» -& µ O;P;QQ 9 À Á Â - µ $ k l S S!<`@F % -2 _ ½ p ¾ ^ Ã P8t % -$ _ ½ p ¾ ^ Ã KPt

15 Š Ý 9 ¼ Æ. -R = K ¹ K»ÅÄ SÆ6 - ½ -+ ½ p ¾ ^ à p ¾ ^ à ¹\È 'É - KPt ^ à ' +;5+( Ê - ½ p ¾ ^ à -3 ½ p ¾ ^ à SÆ6! µ ' µç - ½ p ¾ ^ à µ ' µç ( - ½ p ¾ ^ à SÆ6! µ ' µ S ; º5» - Ë Ì Í µ 'O;P;QQ( ; º%¼ -S Ë Ì Í & 'KP ( - Î 3 " ^ à -E )¹\È ¼Ï -T '5&,( -- Ð ' Ñ '-( 'QQ( Ç J S! µ J S! µ >@? ( >@? ( $ awk '{ now=strftime( "%D", systime() ); print now ' $ awk '{ now=strftime("%m/%d/%y"); print now ' ÒoÓ ÔÕ P'( Ù%Ú<Û '( Ý y 3 '( '( Þ, '( ßáà f 3 ö '( 3 '( Ö Ø Ü U'( â ã ä '( å æ '(y 3 '( Þ, $ç è é ê '( ë<ìs! s g í g î t g 3 awk function name ( parameter, parameter, parameter,... ) {

16 statements return expression # the return statement and expression are optional ()*+) awk '{printf("%s,",$1)' filename

17 AWK 0.awk 3 : 1.awk awknawk gawk gawk awk 2. awk 1) [opion] 'awk_script' input_file1 [input_file2...] awk option -F fs : IFS fs awk -f filename : filename awk_script -v var=value : awk_script 2) awk_script #!/bin/awk -f shell 3) awk_script : awk -f awk input_file(s) 3. awk 1) awk_script : NEWLINE awk_script awk_cmd awk_cmd awk_cmd awk : awk_pattern { actions awk_script awk_script 2) : awk ' BEGIN { actions awk_pattern1 { actions... awk_patternn { actions END { actions ' inputfile BEGIN { actions END { actions 3) awk awk : BEGIN awk actions ( $2 ) awk $0 1 shell $1 IFS 2 actions awk_cmd awk_pattern actions awk_cmd awk_cmdawk

18 awk awk END actions 4) iput_file awk 5) awk_cmd actions awk_pattern awk_cmd actions (print $0) awk_cmd awk_pattern actions 6) END BEGIN END BEGIN awk_script awk_script awk_script BEGIN { actions awk input_file awk 7) awk 8) awk awk 4.awk_pattern awk_pattern actions actionsawk_pattern : 1) awk_pattern: /regexp/ awk : \ ^ $. [] () * // regexp + : awk grep sed 1 0? : awk grep sed : awk '/ *\$0\.[0-9][0-9].*/' input_file 2) awk_pattern ( actions $1,$2)/regexp/ : : < > <= >= ==!= : value ~ /regexp/ value /regexp/ value!~ /regexp/ value /regexp/ : awk '$2 > 10 {print "ok"' input_file awk '$3 ~ /^d/ {print "ok"' input_file &&() () /regexp/!() /regexp/ : awk '($1 < 10 ) && ($2 > 10) {print "ok"' input_file awk '/^d/ /x$/ {print "ok"' input_file awk_script eg: awk '(tot+=$6); END{print "total points :" tot ' input_file // awk 'tot+=$6 {print $0 END{print "total points :" tot ' input_file //

19 awk ARGC ARGV FILENAME FNR FS RS NF NR OFS ORS 1awk '/101/' file file 101 awk '/101/,/105/' file awk '$1 == 5' file awk '$1 == "CT"' file awk '$1 * $2 >100 ' file awk '$2 >5 && $2<=15' file 2awk '{print NR,NF,$1,$NF,' file file awk '/101/ {print $1,$2 + 10' file file 10 awk '/101/ {print $1$2' file awk '/101/ {print $1 $2' file file 4 3df awk '$4> ' 4awk -F " " '{print $1' file awk 'BEGIN { FS="[: \t ]" {print $1,$2,$3' file FS="[: \t ]" Sep=" " Sep : awk -F $Sep '{print $1' file awk -F '[ :\t ]' '{print $1' file TAB awk -F '[][]' '{print $1' file [] 5awk -f awkfile file awkfile cat awkfile -- /101/{print "\047 Hello! \047" -- ' Hello! '.\047 {print $1,$2 6awk '$1 ~ /101/ {print $1' file 101 7awk 'BEGIN { OFS="%" {print $1,$2' file OFS="%"

20 8awk 'BEGIN { max=100 ;print "max=" max BEGIN {max=($1 >max?$1:max); print $1,"Now max is "max' file 1? 2: ( 3 if 1) 2 else 3 awk '{print ($1>4? "high "$1: "low "$1)' file 9awk '$1 * $2 >100 {print $1' file awk '{$1 == 'Chi' {$3 = 'China'; 7 print' 3 file 7 awk '{$7 %= 3; print $7' file 11awk '/tom/ {wage=$2+$3; printf wage' file wage 12awk '/tom/ {count++; END {print "tom was found "count" times"' file END 13awk 'gsub(/\$/,"");gsub(/,/,""); cost+=$4; END {print "The total is $" cost>"filename"' file filename gsub $, $1, $2, $4, awk '{gsub(/\$/,"");gsub(/,/,""); if ($4>1000&&$4<2000) c1+=$4; else if ($4>2000&&$4<3000) c2+=$4; else if ($4>3000&&$4<4000) c3+=$4; else c4+=$4; END {printf "c1=[%d];c2=[%d];c3=[%d];c4=[%d]\n",c1,c2,c3,c4"' file if else if awk '{gsub(/\$/,"");gsub(/,/,""); if ($4>3000&&$4<4000) exit; else c4+=$4; END {printf "c1=[%d];c2=[%d];c3=[%d];c4=[%d]\n",c1,c2,c3,c4"' file exit END awk '{gsub(/\$/,"");gsub(/,/,""); if ($4>3000) next; else c4+=$4;

21 END {printf "c4=[%d]\n",c4"' file next 14awk '{ print FILENAME,$0 ' file1 file2 file3>fileall fileall file1file2file3 15awk ' $1!=previous 3 { close(previous); previous=$1 {print substr($0,index($0," ") +1)>$1' fileall 16awk 'BEGIN {"date" getline d; print d' getline d date 17awk 'BEGIN {system("echo "Input your name:\\c""); getline d;print "\nyour name is",d,"\b!\n"' getline name awk 'BEGIN {FS=":"; while(getline< "/etc/passwd" >0) { if($1~"050[0-9]_") print $1' /etc/passwd 050x_ 18awk '{ i=1;while(i<nf) {print NF,$i;i++' file while awk '{ for(i=1;i<nf;i++) {print NF,$i' file for type file awk -F "/" ' { for(i=1;i<nf;i++) { if(i==nf-1) { printf "%s",$i else { printf "%s/",$i ' for if awk 'BEGIN { for(j=1;j<=12;j++) { flag=0; printf "\n%d \n",j; for(i=1;i<=31;i++) { if (j==2&&i>28) flag=1; if ((j==4 j==6 j==9 j==11)&&i>30) flag=1; if (flag==0) {printf "%02d%02d ",j,i 19 ' awk Flag=abcd awk '{print '$Flag'' abcd awk '{print "$Flag"' $Flag

44 - Text formating with awk Syntax: awk -FFieldSeperator /SearchPatern/ {command} File z.b. awk '/ftp/ {print $0}' /etc/services

44 - Text formating with awk Syntax: awk -FFieldSeperator /SearchPatern/ {command} File z.b. awk '/ftp/ {print $0}' /etc/services 44 - Text formating with awk Syntax: awk -FFieldSeperator /SearchPatern/ {command} File z.b. awk '/ftp/ {print $0}' /etc/services Exercises: awk: less /etc/passwd awk -F: '{print $1}' /etc/passwd awk -F:

More information

Lecture #13 AWK Part I (Chapter 6)

Lecture #13 AWK Part I (Chapter 6) CS390 UNIX Programming Spring 2009 Page 1 Lecture #13 AWK Part I (Chapter 6) Background AWK is a pattern-scanning and processing language. Named after authors (Alfred Aho, Peter Weinberger, Brian Kernighan).

More information

Lecture 5 C Programming Language

Lecture 5 C Programming Language Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the

More information

Control Flow Statements. Execute all the statements grouped in the brackets. Execute statement with variable set to each subscript in array in turn

Control Flow Statements. Execute all the statements grouped in the brackets. Execute statement with variable set to each subscript in array in turn Command Short Description awk cmds file(s) Invokes the awk commands (cmds) on the file or files (file(s)) $1 $2 $3... Denotes the first, second, third, and so on fields respectively in a file $0 Denotes

More information

Pointers & Arrays. CS2023 Winter 2004

Pointers & Arrays. CS2023 Winter 2004 Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this

More information

UNIX II:grep, awk, sed. October 30, 2017

UNIX II:grep, awk, sed. October 30, 2017 UNIX II:grep, awk, sed October 30, 2017 File searching and manipulation In many cases, you might have a file in which you need to find specific entries (want to find each case of NaN in your datafile for

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

Linux shell & shell scripting - II

Linux shell & shell scripting - II IBS 574 - Computational Biology & Bioinformatics Spring 2018, Tuesday (02/01), 2:00-4:00PM Linux shell & shell scripting - II Ashok R. Dinasarapu Ph.D Scientist, Bioinformatics Dept. of Human Genetics,

More information

GAWK(1) Utility Commands GAWK(1)

GAWK(1) Utility Commands GAWK(1) NAME gawk pattern scanning and processing language SYNOPSIS gawk [POSIX or GNU style options ] f program-file [ ]file... gawk [POSIX or GNU style options ] [ ] program-text file... DESCRIPTION Gawk is

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

MAWK(1) USER COMMANDS MAWK(1)

MAWK(1) USER COMMANDS MAWK(1) NAME mawk pattern scanning and text processing language SYNOPSIS mawk [ W option] [ F value] [ v var=value] [ ] program text [file...] mawk [ W option] [ F value] [ v var=value] [ f program-file] [ ][file...]

More information

Banner 8 Using International Characters

Banner 8 Using International Characters College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating

More information

Pointers. CS2023 Winter 2004

Pointers. CS2023 Winter 2004 Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able

More information

GAWK. Team Members: Amit Wadhwa Nithya Chandrasekaran

GAWK. Team Members: Amit Wadhwa Nithya Chandrasekaran GAWK The University of Arizona Computer Science Department College of Science CSC 520, Spring 2008 Principles of Programming Languages Dr. Christian Collberg Team Members: Amit Wadhwa Nithya Chandrasekaran

More information

MAWK(1) USER COMMANDS MAWK(1)

MAWK(1) USER COMMANDS MAWK(1) NAME mawk pattern scanning and text processing language SYNOPSIS mawk [ W option] [ F value] [ v var=value] [ ] program text [file...] mawk [ W option] [ F value] [ v var=value] [ f program-file] [ ][file...]

More information

ASCII Code - The extended ASCII table

ASCII Code - The extended ASCII table ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage

More information

Cartons (PCCs) Management

Cartons (PCCs) Management Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,

More information

Mastering Modern Linux by Paul S. Wang Appendix: Pattern Processing with awk

Mastering Modern Linux by Paul S. Wang Appendix: Pattern Processing with awk Mastering Modern Linux by Paul S. Wang Appendix: Pattern Processing with awk The awk program is a powerful yet simple filter. It processes its input one line at a time, applying user-specified awk pattern

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

CS434 Compiler Construction. Lecture 3 Spring 2005 Department of Computer Science University of Alabama Joel Jones

CS434 Compiler Construction. Lecture 3 Spring 2005 Department of Computer Science University of Alabama Joel Jones CS434 Compiler Construction Lecture 3 Spring 2005 Department of Computer Science University of Alabama Joel Jones Outline: Parsing Without Parsing Announcement: All future class meetings will be in 370

More information

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment

More information

Adorn. Serif. Smooth. v22622x

Adorn. Serif. Smooth. v22622x s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

More information

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on

More information

Lecture 2. Regular Expression Parsing Awk

Lecture 2. Regular Expression Parsing Awk Lecture 2 Regular Expression Parsing Awk Shell Quoting Shell Globing: file* and file? ls file\* (the backslash key escapes wildcards) Shell Special Characters ~ Home directory ` backtick (command substitution)

More information

Version /10/2015. Type specimen. Bw STRETCH

Version /10/2015. Type specimen. Bw STRETCH Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a

More information

BUCKLEY. User s Guide

BUCKLEY. User s Guide BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make

More information

Session: Shell Programming Topic: Advanced Commands

Session: Shell Programming Topic: Advanced Commands Lecture Session: Shell Programming Topic: Advanced Commands Daniel Chang Text File Processing Reading and filtering text files cut - Print specific columns from a text file awk - Print specific lines from

More information

UNIX Shell Programming

UNIX Shell Programming $!... 5:13 $$ and $!... 5:13.profile File... 7:4 /etc/bashrc... 10:13 /etc/profile... 10:12 /etc/profile File... 7:5 ~/.bash_login... 10:15 ~/.bash_logout... 10:18 ~/.bash_profile... 10:14 ~/.bashrc...

More information

7. IP. » &!'() (IS: intermediate system) !"#$% *+'() (ES: end system) Copyright 2000, Suguru Yamaguchi, All right reserved

7. IP. » &!'() (IS: intermediate system) !#$% *+'() (ES: end system) Copyright 2000, Suguru Yamaguchi, All right reserved 7. IP»!"#$%» &!'() (IS: intermediate system) *+'() (ES: end system) 1 ISES ES: End System!"#$Ethernet%&' ()*+,'-./ Ethernet IS: Intermediate System =>?@&+12/AB$CD EF FDDI ES: End System 0 FDDI%&'12!"#$345

More information

HoneyBee User s Guide

HoneyBee User s Guide HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is

More information

AWK: The Duct Tape of Computer Science Research. Tim Sherwood UC San Diego

AWK: The Duct Tape of Computer Science Research. Tim Sherwood UC San Diego AWK: The Duct Tape of Computer Science Research Tim Sherwood UC San Diego Duct Tape Research Environment Lots of simulators, data, and analysis tools Since it is research, nothing works together Unix pipes

More information

Adorn. Slab Serif Smooth R E G U LAR. v22622x

Adorn. Slab Serif Smooth R E G U LAR. v22622x s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,

More information

SANJAY GHODAWAT POLYTECHNIC

SANJAY GHODAWAT POLYTECHNIC EXPERIMENT NO. 01 Name of Experiment Implement following commands with their options: ps and kill. df and du mount and umount. (4 Hours) Prerequisite of. / execution of Basic knowledge about linux command.

More information

1. Oracle Mobile Agents? 2. client-agent-server client-server

1. Oracle Mobile Agents? 2. client-agent-server client-server 1. Oracle Mobile Agents?!"#$ application software system%. &'( )'*+, -. */0 1 23 45 678 9:; >?, %@ +%. - 6A(mobility) : B? CDE@ F GH8!" * channel #I 1 = / 4%. ()'*, &', LAN) - * application

More information

Awk. 1 What is AWK? 2 Why use AWK instead of Perl? 3 Uses Of AWK. 4 Basic Structure Of AWK Programs. 5 Running AWK programs

Awk. 1 What is AWK? 2 Why use AWK instead of Perl? 3 Uses Of AWK. 4 Basic Structure Of AWK Programs. 5 Running AWK programs Awk Author: Reuben Francis Cornel 1 What is AWK? AWK is a programable filter developed with the aim of using it to generate formatted reports from data. Althought is uses addresses like sed to perform

More information

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product

More information

Communication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages.

Communication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 201 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/01 G2: ESC 02/14 06/01 G3: ESC 02/15 06/01 C0: -- C1: -- NAME:

More information

Contrast. user s guide

Contrast. user s guide N Contrast chu U77777777V user s guide c P font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.

More information

Modules. CS2023 Winter 2004

Modules. CS2023 Winter 2004 Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules

More information

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

Cassandra: Distributed Access Control Policies with Tunable Expressiveness

Cassandra: Distributed Access Control Policies with Tunable Expressiveness Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer

More information

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:

More information

) $ G}] }O H~U. G yhpgxl. Cong

) $ G}] }O H~U. G yhpgxl. Cong » Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã

More information

124 DISTO pro 4 / pro 4 a-1.0.0zh

124 DISTO pro 4 / pro 4 a-1.0.0zh 0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0

More information

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide

More information

% echo $SHELL /usr/local/bin/bash. % sh $

% echo $SHELL /usr/local/bin/bash. % sh $ % echo $SHELL /usr/local/bin/bash % sh $ #!/bin/sh chmod +x test.sh./test.sh my=test export my set my=test setenv my test $ export PAGER=/usr/bin/less % setenv PAGER /usr/bin/less $ current_month=`date

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

Awk. Table of Contents. Last updated - Sun Jun 28 08:33:00 EDT 2009

Awk. Table of Contents. Last updated - Sun Jun 28 08:33:00 EDT 2009 1 de 50 17/09/2009 10:38 Script Unix Tutorial Work with Other IT Pros to Solve Your Shell Script Needs for Free! UNIX.ITtoolbox.com Alcatel-Lucent LTE Learn How LTE can Help Meet Growing Demand for Advanced

More information

Bold U S E R S G U I D E

Bold U S E R S G U I D E Yana Regular Bold Italic USER S GUIDE S S S font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.

More information

Kurt Schmidt. October 19, 2017

Kurt Schmidt. October 19, 2017 duction duction Dept. of Computer Science, Drexel University October 19, 2017 duction duction Works well with record-type data Reads input file(s) a line (record) at a time Parses each record into fields

More information

Adorn. Slab Serif BOLD. v x. user s gu ide

Adorn. Slab Serif BOLD. v x. user s gu ide Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions

More information

GAWK(1) Utility Commands GAWK(1)

GAWK(1) Utility Commands GAWK(1) GAWK NAME gawk pattern scanning and processing language SYNOPSIS gawk [ POSIX or GNU style options ] f program-file [ ]file... gawk [ POSIX or GNU style options ] [ ] program-text file... pgawk [ POSIX

More information

Fall 2006 Shell programming, part 3. touch

Fall 2006 Shell programming, part 3. touch touch Touch is usually a program, but it can be a shell built-in such as with busybox. The touch program by default changes the access and modification times for the files listed as arguments. If the file

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

Banks Tupas Certification Service for Service Providers

Banks Tupas Certification Service for Service Providers Banks Tupas Certification Service for Service Providers Service description and guidelines Version 2.1 3 October 2005 SERVICE DESCRIPTION 2 (21) CHANGE LOG Version Page Comment V2.0 All Message structure

More information

Adorn. Serif. v x. user s gu ide

Adorn. Serif. v x. user s gu ide Adorn f Serif t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to

More information

Advanced training. Linux components Command shell. LiLux a.s.b.l.

Advanced training. Linux components Command shell. LiLux a.s.b.l. Advanced training Linux components Command shell LiLux a.s.b.l. alexw@linux.lu Kernel Interface between devices and hardware Monolithic kernel Micro kernel Supports dynamics loading of modules Support

More information

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:

More information

Banks' TUPAS certification service for service providers

Banks' TUPAS certification service for service providers Banks' TUPAS certification service for service providers service provider's FK Federation of Finnish Financial Services for service providers CHANGE LOG Version Page Comment V2.0 All Message structures

More information

Sheila. Regular Bold. User s Guide

Sheila. Regular Bold. User s Guide Sheila Regular Bold User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your

More information

NAME nawk pattern-directed scanning and processing language. SYNOPSIS nawk [ F fs ][ v var=value ][ prog f progfile ][file... ]

NAME nawk pattern-directed scanning and processing language. SYNOPSIS nawk [ F fs ][ v var=value ][ prog f progfile ][file... ] nawk NAWK NAME nawk pattern-directed scanning and processing language SYNOPSIS nawk [ F fs ][ v var=value ][ prog f progfile ][file... ] DESCRIPTION Nawk scans each input file for lines that match any

More information

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts. 200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015

More information

You 2 Software

You 2 Software PrismaCards Enter text for languages with exotic fonts You 2 Software http://www.you2.de info@you2.de Introduction To work in PrismaCards and other programs with complex fonts for different languages you

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

Getting round your Mac with Shortcut Keys

Getting round your Mac with Shortcut Keys The Mac has many useful keyboard shortcuts but these do depend on you knowing the difference between the following keys: Shift Fn Ctrl Alt (Also referred to as Option) Command (Also referred to as the

More information

AWKREFERENCE. Copyright :48:32, FSF, Inc. (all)

AWKREFERENCE. Copyright :48:32, FSF, Inc. (all) AWKREFERENCE CONTENTS Action Statements... 7 Arrays... 11 AwkProgram Execution... 4 Bit Manipulation Functions (gawk)... 16 Bug Reports... 2 Closing Redirections... 12 Command Line Arguments (standard)...

More information

ADORN. Roman. v x. user s gu ide

ADORN. Roman. v x. user s gu ide ADORN f Roman t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to

More information

ESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange

ESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange TYPE: 9-character graphic character set REGISTRATION NUMBER: 9 DATE OF REGISTRATION: ESCAPE SEQUENCE G: ESC /8 / G: ESC /9 / G: ESC / / G: ESC / / C: C: NAME Extended African Latin alphabet coded character

More information

CMPT 470 Based on lecture notes by Woshun Luk

CMPT 470 Based on lecture notes by Woshun Luk * ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM

More information

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:

More information

Data Manipulation with AWK. Evangelos Pournaras, Izabela Moise

Data Manipulation with AWK. Evangelos Pournaras, Izabela Moise Data Manipulation with AWK Evangelos Pournaras, Izabela Moise Evangelos Pournaras, Izabela Moise 1 AWK A "Swiss knife" for data manipulation, retrieval, formatting, processing, transformation, prototyping

More information

Chemistry Hour Exam 2

Chemistry Hour Exam 2 Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

Second Year March 2017

Second Year March 2017 Reg. No. :... Code No. 5052 Name :... Second Year March 2017 Time : 2 Hours Cool-off time : 15 Minutes Part III COMPUTER APPLICATION (Commerce) Maximum : 60 Scores General Instructions to Candidates :

More information

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011 Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.

More information

O Type of array element

O Type of array element ! " #! $ % % # & : ; a ontiguous sequene of variables. all of the sae type. Eah variable is identified by its index. Index values are integers. Index of first entry is. ' ( ) * + May /,. - ( & ( ( J K

More information

AWKREFERENCE. Copyright :39:42, FSF, Inc. (all)

AWKREFERENCE. Copyright :39:42, FSF, Inc. (all) AWKREFERENCE CONTENTS Action Statements... 9 Arrays... 7 AwkProgram Execution... 5 Bit Manipulation Functions (gawk)... 17 Bug Reports... 2 Closing Redirections... 13 Command Line Arguments (standard)...

More information

Lecture 2. Awk C Compiler: Tools and Compilation C Libraries: Static and Dynamic

Lecture 2. Awk C Compiler: Tools and Compilation C Libraries: Static and Dynamic Lecture 2 Awk C Compiler: Tools and Compilation C Libraries: Static and Dynamic 1 AWK 2 Introduction to AWK Written by Alfred Aho, Peter Weinberger, Brian Kernighan in 1977. awk is primarily a filter that

More information

AWK - BUILT-IN FUNCTIONS

AWK - BUILT-IN FUNCTIONS AWK - BUILT-IN FUNCTIONS http://www.tutorialspoint.com/awk/awk_built_in_functions.htm Copyright tutorialspoint.com The AWK has a number of functions built into it that are always available to the programmer.

More information

Use of AWK / SED Prof. Navrati Saxena TA: Rochak Sachan

Use of AWK / SED Prof. Navrati Saxena TA: Rochak Sachan Use of AWK / SED Prof. Navrati Saxena TA: Rochak Sachan 1 CONTENTS 1. AWK 1.1 WHAT IS AWK? 1.2 GENERAL SYNTAX OF AWK 1.3 DOING ARITHMETIC WITH AWK 1.4 VAR. IN AWK 1.4 AWK MISCELLANEOUS 2. SED 2.1 WHAT

More information

Table of Contents. Evaluation Copy

Table of Contents. Evaluation Copy Table of Contents Perspective... 1-2 grep... 1-3 sort... 1-7 head and tail... 1-10 tr... 1-11 cut... 1-13 od... 1-15 paste... 1-16 split... 1-17 uniq... 1-18 sed... 1-19 gawk... 1-21 more and less... 1-25

More information

IPv6 Servic es. LONG Net w ork

IPv6 Servic es. LONG Net w ork IP Servic es in LONG Net w ork Carlos Ralli Ucendo Telefonica Research & Development Overview IP Distributed Labs LONG: Building a distributed IP Lab. LONG Backbone LONG Global View LONG IP Services Examples

More information

A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1

A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1 A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1 Fernanda Baião Department of Computer Science - COPPE/UFRJ Abstract Federal University of Rio de Janeiro - Brazil baiao@cos.ufrj.br

More information

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs Summer 2010 Department of Computer Science and Engineering York University Toronto June 29, 2010 1 / 36 Table of contents 1 2 3 4 2 / 36 Our goal Our goal is to see how we can use Unix as a tool for developing

More information

[DP19] DN-500CD. Serial Command Protocol Guide

[DP19] DN-500CD. Serial Command Protocol Guide [DP19] Serial Command Protocol Guide Ver. 1.2 January 16, 2017 inmusic Brands, Inc. 1 1 Contents 2 General... 3 2.1 RS-232C Control... 3 3 Specification... 4 3.1 RS-232C Control... 4 4 Communication Protocol...

More information

sed Stream Editor Checks for address match, one line at a time, and performs instruction if address matched

sed Stream Editor Checks for address match, one line at a time, and performs instruction if address matched Week11 sed & awk sed Stream Editor Checks for address match, one line at a time, and performs instruction if address matched Prints all lines to standard output by default (suppressed by -n option) Syntax:

More information

1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI

1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI ' þ ³ š ³ œ ³ 2006 1 Swing! " # &%' ()+-,./0 1 2 45-6 &8% 9 : ; < = >@? 2006A 5 B? 18 C@D E F : G HJILK-M!NPO-Q R S-I!T R!U V-W X Y!Z[N GUI\ ] ^ O-Q R S _a` b-w!c dje!f g Swing Wh i Z j k l m n N VisualEditor

More information

Data Analysis in Geophysics ESCI Bob Smalley Room 103 in 3892 (long building), x Tu/Th - 13:00-14:30 CERI MAC (or STUDENT) LAB

Data Analysis in Geophysics ESCI Bob Smalley Room 103 in 3892 (long building), x Tu/Th - 13:00-14:30 CERI MAC (or STUDENT) LAB Data Analysis in Geophysics ESCI 7205 Bob Smalley Room 103 in 3892 (long building), x-4929 Tu/Th - 13:00-14:30 CERI MAC (or STUDENT) LAB Lab 21, 11/07/13 Computers make it easier to do a lot of things,

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats

More information

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with

More information

Regular expressions: Text editing and Advanced manipulation. HORT Lecture 4 Instructor: Kranthi Varala

Regular expressions: Text editing and Advanced manipulation. HORT Lecture 4 Instructor: Kranthi Varala Regular expressions: Text editing and Advanced manipulation HORT 59000 Lecture 4 Instructor: Kranthi Varala Simple manipulations Tabular data files can be manipulated at a columnlevel. cut: Divide file

More information

Service Segment Version 3

Service Segment Version 3 Message Implementation Service Segment Version 3 Rev 2000-02-01 Swedish Bankers Association Svenska Bankföreningen sed96a-e.xxx 20 August 1998 ver 2.0 Page 1 Revisions - Service segments Date: Changes:

More information

Consider the following program.

Consider the following program. Consider the following program. #include int do_sth (char *s); main(){ char arr [] = "We are the World"; printf ("%d\n", do_sth(arr)); } int do_sth(char *s) { char *p = s; while ( *s++!= \0 )

More information

printf: formatted printing So far we have just been copying stuff from standard-in, files, pipes, etc to the screen or another file.

printf: formatted printing So far we have just been copying stuff from standard-in, files, pipes, etc to the screen or another file. Printing printf: formatted printing So far we have just been copying stuff from standard-in, files, pipes, etc to the screen or another file. Say I have a file with names and phone numbers. I would like

More information

Regex, Sed, Awk. Arindam Fadikar. December 12, 2017

Regex, Sed, Awk. Arindam Fadikar. December 12, 2017 Regex, Sed, Awk Arindam Fadikar December 12, 2017 Why Regex Lots of text data. twitter data (social network data) government records web scrapping many more... Regex Regular Expressions or regex or regexp

More information

A Tale of Two Tabulators

A Tale of Two Tabulators A Tale of Two Tabulators Richard A. O Keefe Computer Science, University of Otago November 2001 Abstract For a software engineering class, I present an example where a simple obvious English requirement

More information

Topic 4: Grep, Find & Sed

Topic 4: Grep, Find & Sed Topic 4: Grep, Find & Sed grep: a tool for searching for strings within files find: a tool for examining a directory tree sed: a tool for "batch editing" Associated topic: regular expressions 1 Motivation

More information

Adorn. Bouquet. v x. user s gu ide

Adorn. Bouquet. v x. user s gu ide Adorn Bouquet f 9a0 v2226222x user s gu ide t v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.

More information