Alfred Aho Brian Kernighan Peter Weinberger gawk awk GUN. GNU linux. gawk
|
|
- Alexandrina Dawson
- 5 years ago
- Views:
Transcription
1 awk linux/unix awk linux/unix ( ) awk Alfred AhoBrian KernighanPeter Weinbergergawk awk GUN awk gawk GNU linux Bell awk GNU awk gawk awk [options] 'script' var=value file(s) awk [options] -f scriptfile var=value file(s) fs -F: awk nnn -mf Bell awk nnn -mr awk
2 awk gawk awk awk awk unix unix \x func fs ****= ^^=fflush (grep Posix ) [[:alpha:]] program-text -f bug pattern {action $ awk '/root/' test$ awk '$3 < 100' test action action
3 3 RS / / $2>%1 ~( )~!( ) BEGIN END BEGIN END! " #%$" #& -. +, *!"# / * :9<;!"$%& / !") B C / * #*%)+, 3 " D EF 'GH I)J -./( 0%)$!*% K L M N OP 3 0!!%* Q R S! T UV W * XY * $01&$&,2 " #)Z\[ ]^ '_<`@F a ')( (* $10% b * ')()* '= >@? A (*
4 F %! c %!$d e f g 78 * i j " # ')(\h 'GH `@F $"%*!0# 0 k l J\m%$on@p 1 q<r@s t u % 6 " # 3 * %! 3 * -x *+, 3 " 'GH I -x * " # ')(\h 'GH I -x *! ')(\h 'GH I vow!10%",2 y 3z * -./(* S!<`@F (* S! E 1 h (* " h { [ *! ')(\h 'GH S! E 1 h (* vow!,!, y 3z " h { S! ~ ')(\h 'GH I 678(* 9<; * < 9:;-<:: ƒ I => # 8 ^?? ˆ vow<š AAB n^ CCDDB T@Œ A h `@F Ž 9 $ :;@ $ 9B S $ <::: 99 ˆ š$ " #šœo_ < 3 )vow<š n^ J ˆ R awk ORS RS
5 $0 $ awk '{print $0' test test NR NR 1$ awk '{print NR,$0' test test NF tab awk $ awk '{print $1,$3' test test () FS tab -F FS $ awk -F: '{print $1,$5' test $awk -F'[:\t]' '{print $1,$3' test tab OFS OFS$ awk -F: '{print $1,$5' test$1$5 unix Sed Grep gawk awk 6E 64 6C 6D 6
6 6 6F 6G Grep $ awk '$1 ~/^root/' root test test conditional expression1? expression2: expression3 $ awk '{max = {$1 > $3? $1: $3: print max' test $1 max $3 max $ awk '$1 + $2 < 100' test 100 $ awk '$1 > 5 && $2 < 10' test, 5 10 $ awk '/root/,/mysql/' mysql test root
7 $ cat /etc/passwd awk -F: '\ NF!= 7{\ printf("line %d,does not have 7 fields:%s\n",nr,$0)\ $1!~ /[A-Za-z0-9]/{printf("line %d,non alpha and numeric user id:%d: %s\n,nr,$0)\ $2 == "*" {printf("line %d, no password: %s\n",nr,$0)' cat awkawk (NF) 7 printf "line?? does not have 7 fields" printf no alpha and numeric user id" no passwd $ awk '/^(no so)/' test----- no so $ awk '/^[ns]/{print $1' test----- n s $ awk '$1 ~/[0-9][0-9]$/(print $1' test----- $ awk '$1 == 100 $2 < 50' test $ awk '$1!= 10' test $ awk '/test/{print $1 + 10' test----- test 10 $ awk '{print ($1 > 5? "ok "$1: "error"$1)' test $ awk '/^root/,/^mysql/' test---- root mysql mysql root
8 awk Variable = expression$ awk '$1 ~/test/{count = $2 + $3; print count' test,,awk count test 4 awkscript month=4 year= awk test month year test BEGIN $ awk '{$2 = + $1; print ' awk 100$1 $2 test, $2 $ awk '$1 == "root"{$1 ="test";print' root test test mary!"# BEGIN awk OFS, RS FS $ awk 'BEGIN{FS=":"; OFS="\t"; ORS="\n\n"{print $1,$2,$3 (FS) (OFS) test (ORS) $ awk 'BEGIN{print "TITLE TEST"!#$ END $ awk 'END{print "The number of records is" NR' test awk awk $ awk -F: -f $ awk -F: '{IGNORECASE=1; $1 == "MARY"{print NR,$1,$2,$NF'test IGNORECASE 1 awk shell $ awk '$1 = 100 {print $1 > "output_file" ' test 100 output_file >> getline getline NF,NR 0 FNR getline -1 1
9 $ awk 'BEGIN{ "date" getline d; print d' getline test d linux date $ awk 'BEGIN{"date" d; split(d,mon); print mon[2]' getline getline test shell dsplit date d mon mon $ awk 'BEGIN{while( "ls" getline) getline ls print' ls geline BEGIN $ awk 'BEGIN{printf "What is your name?"; getline name < "/dev/tty" $1 ~name {print "Found" name on line NR "." END{print "See you," name "." test What is your name?", name getline name print END See you name $ awk 'BEGIN{while (getline < "/etc/passwd" > 0) lc++; print /etc/passwd lc lc'awk lc 1 getline -1 0 while (getline < -1 "/etc/passwd") awk close() $ awk '{print $1, $2 "sort" ' test END linux sort,end {close("sort")awd print system awk linux$ awk 'BEGIN{system("clear")' fflush fflush(""), awk C %& ž Ÿ {if (expression){ statement; statement;... $ awk '{if ($1 <$2) print $2 "too high"' test
10 $ awk '{if ($1 < $2) {count++; print "ok"' ok test. count %&' ž Ÿ {if (expression){ statement; statement;... else{ statement; statement;... $ awk '{if ($1 > 100) print $1 "bad" ; else print "ok"' test $1 100 $1 bad, ok $1 count $1 %&'%& $ awk '{if ($1 > 100){ count++; print $1 else {count--; print $2' test $1 100 count ž Ÿ {if (expression){ statement; statement;... else if (expression){ statement; statement;... else if (expression){ statement; statement;... else { statement; statement;... awk :while for special for $ awk '{ i = 1; while ( i <= NF ) { print NF,$i; i++' NF( ), i test 1 i 1 i NF. $ awk '{for (i = 1; i<nf; i++) print NF,$i' test breadkcontinue break continue {for ( x=3; x<=nf; x++) if ($x<0){print "Bottomed out!"; break {for ( x=3; x<=nf; x++)
11 3 if ($x==0){print "Get next item"; continue next awk {if ($1 ~/test/){next else {print exit awk END 0 awk $ awk {name[x++]=$2;end{for(i=0;i<nr;i++) print i,name[i]' test 1 name name xawk x END for special for {for (item in arrayname){ print arrayname[item] G;<;H )ö I%!JKLM0%&H' (H IJLLG * š I * * count["test"] for for (index_value in array) statement $1 :$ awk '{count[$1]++ END{for(name in count) print name,count[name]' count test delete $ awk '{line[x++]=$1 END{for(x in line) delete(line[x])' test line special for
12 sub sub (regular expression, substitution string): sub (regular expression, substitution string, target string) $ awk '{ sub(/test/, "mytest"); print ' testfile $ awk '{ sub(/test/, "mytest"); $1; print ' testfile gsub gsub sub gsub (regular expression, substitution string) gsub (regular expression, substitution string, target string) $ awk '{ gsub(/test/, "mytest"); print ' testfile $ awk '{ gsub(/test/, "mytest"), $1 ; print ' testfile test mytest mytest index 1 index(string, substring) $ awk '{ print index("test", "mytest") ' testfile test mytest 3 length
13 length( string ) length $ awk '{ print length( "test" ) ' $ awk '{ print length ' testfile test testfile substr 1 substr( string, starting position ) substr( string, starting position, length of string ) $ awk '{ print substr( "hello world", 7,11 ) ' world RLENGTH 0match RSTART substr match match( string, regular expression ) $ awk '{start=match("this is a test",/[a-z]+$/); print start' $ awk '{start=match("this is a test",/[a-z]+$/); print start, RSTART, RLENGTH ' 11 RSTART RLENGTH 11(start)11(RSTART) 4(RLENGTH) toupper tolower gawk toupper( string )
14 » µ» u u & ¼ ¼ F F t t ¼ ¼ tolower( string ) $ awk '{ print toupper("test"), tolower("test") ' split FS split( string, array, field separator ) split( string, array ) $ awk '{ split( "20:18:00", time, ":" ); print time[2] ' time 18 systime ( ) systime() $ awk '{ now = systime(); print now ' strftime C strftime systime( [format specification][,timestamp] ) ª «% ± ²³ <± - µ '( - µ -N ¹@b -4 ¹@b º5» - - ½ p ¾ +,<u@ '( +,<u@ %¼ µ '*( '*N (» -& µ O;P;QQ 9 À Á Â - µ $ k l S S!<`@F % -2 _ ½ p ¾ ^ Ã P8t % -$ _ ½ p ¾ ^ Ã KPt
15 Š Ý 9 ¼ Æ. -R = K ¹ K»ÅÄ SÆ6 - ½ -+ ½ p ¾ ^ à p ¾ ^ à ¹\È 'É - KPt ^ à ' +;5+( Ê - ½ p ¾ ^ à -3 ½ p ¾ ^ à SÆ6! µ ' µç - ½ p ¾ ^ à µ ' µç ( - ½ p ¾ ^ à SÆ6! µ ' µ S ; º5» - Ë Ì Í µ 'O;P;QQ( ; º%¼ -S Ë Ì Í & 'KP ( - Î 3 " ^ à -E )¹\È ¼Ï -T '5&,( -- Ð ' Ñ '-( 'QQ( Ç J S! µ J S! µ >@? ( >@? ( $ awk '{ now=strftime( "%D", systime() ); print now ' $ awk '{ now=strftime("%m/%d/%y"); print now ' ÒoÓ ÔÕ P'( Ù%Ú<Û '( Ý y 3 '( '( Þ, '( ßáà f 3 ö '( 3 '( Ö Ø Ü U'( â ã ä '( å æ '(y 3 '( Þ, $ç è é ê '( ë<ìs! s g í g î t g 3 awk function name ( parameter, parameter, parameter,... ) {
16 statements return expression # the return statement and expression are optional ()*+) awk '{printf("%s,",$1)' filename
17 AWK 0.awk 3 : 1.awk awknawk gawk gawk awk 2. awk 1) [opion] 'awk_script' input_file1 [input_file2...] awk option -F fs : IFS fs awk -f filename : filename awk_script -v var=value : awk_script 2) awk_script #!/bin/awk -f shell 3) awk_script : awk -f awk input_file(s) 3. awk 1) awk_script : NEWLINE awk_script awk_cmd awk_cmd awk_cmd awk : awk_pattern { actions awk_script awk_script 2) : awk ' BEGIN { actions awk_pattern1 { actions... awk_patternn { actions END { actions ' inputfile BEGIN { actions END { actions 3) awk awk : BEGIN awk actions ( $2 ) awk $0 1 shell $1 IFS 2 actions awk_cmd awk_pattern actions awk_cmd awk_cmdawk
18 awk awk END actions 4) iput_file awk 5) awk_cmd actions awk_pattern awk_cmd actions (print $0) awk_cmd awk_pattern actions 6) END BEGIN END BEGIN awk_script awk_script awk_script BEGIN { actions awk input_file awk 7) awk 8) awk awk 4.awk_pattern awk_pattern actions actionsawk_pattern : 1) awk_pattern: /regexp/ awk : \ ^ $. [] () * // regexp + : awk grep sed 1 0? : awk grep sed : awk '/ *\$0\.[0-9][0-9].*/' input_file 2) awk_pattern ( actions $1,$2)/regexp/ : : < > <= >= ==!= : value ~ /regexp/ value /regexp/ value!~ /regexp/ value /regexp/ : awk '$2 > 10 {print "ok"' input_file awk '$3 ~ /^d/ {print "ok"' input_file &&() () /regexp/!() /regexp/ : awk '($1 < 10 ) && ($2 > 10) {print "ok"' input_file awk '/^d/ /x$/ {print "ok"' input_file awk_script eg: awk '(tot+=$6); END{print "total points :" tot ' input_file // awk 'tot+=$6 {print $0 END{print "total points :" tot ' input_file //
19 awk ARGC ARGV FILENAME FNR FS RS NF NR OFS ORS 1awk '/101/' file file 101 awk '/101/,/105/' file awk '$1 == 5' file awk '$1 == "CT"' file awk '$1 * $2 >100 ' file awk '$2 >5 && $2<=15' file 2awk '{print NR,NF,$1,$NF,' file file awk '/101/ {print $1,$2 + 10' file file 10 awk '/101/ {print $1$2' file awk '/101/ {print $1 $2' file file 4 3df awk '$4> ' 4awk -F " " '{print $1' file awk 'BEGIN { FS="[: \t ]" {print $1,$2,$3' file FS="[: \t ]" Sep=" " Sep : awk -F $Sep '{print $1' file awk -F '[ :\t ]' '{print $1' file TAB awk -F '[][]' '{print $1' file [] 5awk -f awkfile file awkfile cat awkfile -- /101/{print "\047 Hello! \047" -- ' Hello! '.\047 {print $1,$2 6awk '$1 ~ /101/ {print $1' file 101 7awk 'BEGIN { OFS="%" {print $1,$2' file OFS="%"
20 8awk 'BEGIN { max=100 ;print "max=" max BEGIN {max=($1 >max?$1:max); print $1,"Now max is "max' file 1? 2: ( 3 if 1) 2 else 3 awk '{print ($1>4? "high "$1: "low "$1)' file 9awk '$1 * $2 >100 {print $1' file awk '{$1 == 'Chi' {$3 = 'China'; 7 print' 3 file 7 awk '{$7 %= 3; print $7' file 11awk '/tom/ {wage=$2+$3; printf wage' file wage 12awk '/tom/ {count++; END {print "tom was found "count" times"' file END 13awk 'gsub(/\$/,"");gsub(/,/,""); cost+=$4; END {print "The total is $" cost>"filename"' file filename gsub $, $1, $2, $4, awk '{gsub(/\$/,"");gsub(/,/,""); if ($4>1000&&$4<2000) c1+=$4; else if ($4>2000&&$4<3000) c2+=$4; else if ($4>3000&&$4<4000) c3+=$4; else c4+=$4; END {printf "c1=[%d];c2=[%d];c3=[%d];c4=[%d]\n",c1,c2,c3,c4"' file if else if awk '{gsub(/\$/,"");gsub(/,/,""); if ($4>3000&&$4<4000) exit; else c4+=$4; END {printf "c1=[%d];c2=[%d];c3=[%d];c4=[%d]\n",c1,c2,c3,c4"' file exit END awk '{gsub(/\$/,"");gsub(/,/,""); if ($4>3000) next; else c4+=$4;
21 END {printf "c4=[%d]\n",c4"' file next 14awk '{ print FILENAME,$0 ' file1 file2 file3>fileall fileall file1file2file3 15awk ' $1!=previous 3 { close(previous); previous=$1 {print substr($0,index($0," ") +1)>$1' fileall 16awk 'BEGIN {"date" getline d; print d' getline d date 17awk 'BEGIN {system("echo "Input your name:\\c""); getline d;print "\nyour name is",d,"\b!\n"' getline name awk 'BEGIN {FS=":"; while(getline< "/etc/passwd" >0) { if($1~"050[0-9]_") print $1' /etc/passwd 050x_ 18awk '{ i=1;while(i<nf) {print NF,$i;i++' file while awk '{ for(i=1;i<nf;i++) {print NF,$i' file for type file awk -F "/" ' { for(i=1;i<nf;i++) { if(i==nf-1) { printf "%s",$i else { printf "%s/",$i ' for if awk 'BEGIN { for(j=1;j<=12;j++) { flag=0; printf "\n%d \n",j; for(i=1;i<=31;i++) { if (j==2&&i>28) flag=1; if ((j==4 j==6 j==9 j==11)&&i>30) flag=1; if (flag==0) {printf "%02d%02d ",j,i 19 ' awk Flag=abcd awk '{print '$Flag'' abcd awk '{print "$Flag"' $Flag
44 - Text formating with awk Syntax: awk -FFieldSeperator /SearchPatern/ {command} File z.b. awk '/ftp/ {print $0}' /etc/services
44 - Text formating with awk Syntax: awk -FFieldSeperator /SearchPatern/ {command} File z.b. awk '/ftp/ {print $0}' /etc/services Exercises: awk: less /etc/passwd awk -F: '{print $1}' /etc/passwd awk -F:
More informationLecture #13 AWK Part I (Chapter 6)
CS390 UNIX Programming Spring 2009 Page 1 Lecture #13 AWK Part I (Chapter 6) Background AWK is a pattern-scanning and processing language. Named after authors (Alfred Aho, Peter Weinberger, Brian Kernighan).
More informationLecture 5 C Programming Language
Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the
More informationControl Flow Statements. Execute all the statements grouped in the brackets. Execute statement with variable set to each subscript in array in turn
Command Short Description awk cmds file(s) Invokes the awk commands (cmds) on the file or files (file(s)) $1 $2 $3... Denotes the first, second, third, and so on fields respectively in a file $0 Denotes
More informationPointers & Arrays. CS2023 Winter 2004
Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this
More informationUNIX II:grep, awk, sed. October 30, 2017
UNIX II:grep, awk, sed October 30, 2017 File searching and manipulation In many cases, you might have a file in which you need to find specific entries (want to find each case of NaN in your datafile for
More informationThis file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.
Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts
More informationPersonal Conference Manager (PCM)
Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her
More informationLinux shell & shell scripting - II
IBS 574 - Computational Biology & Bioinformatics Spring 2018, Tuesday (02/01), 2:00-4:00PM Linux shell & shell scripting - II Ashok R. Dinasarapu Ph.D Scientist, Bioinformatics Dept. of Human Genetics,
More informationGAWK(1) Utility Commands GAWK(1)
NAME gawk pattern scanning and processing language SYNOPSIS gawk [POSIX or GNU style options ] f program-file [ ]file... gawk [POSIX or GNU style options ] [ ] program-text file... DESCRIPTION Gawk is
More informationAPPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC
APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date
More informationMAWK(1) USER COMMANDS MAWK(1)
NAME mawk pattern scanning and text processing language SYNOPSIS mawk [ W option] [ F value] [ v var=value] [ ] program text [file...] mawk [ W option] [ F value] [ v var=value] [ f program-file] [ ][file...]
More informationBanner 8 Using International Characters
College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating
More informationPointers. CS2023 Winter 2004
Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able
More informationGAWK. Team Members: Amit Wadhwa Nithya Chandrasekaran
GAWK The University of Arizona Computer Science Department College of Science CSC 520, Spring 2008 Principles of Programming Languages Dr. Christian Collberg Team Members: Amit Wadhwa Nithya Chandrasekaran
More informationMAWK(1) USER COMMANDS MAWK(1)
NAME mawk pattern scanning and text processing language SYNOPSIS mawk [ W option] [ F value] [ v var=value] [ ] program text [file...] mawk [ W option] [ F value] [ v var=value] [ f program-file] [ ][file...]
More informationASCII Code - The extended ASCII table
ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage
More informationCartons (PCCs) Management
Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,
More informationMastering Modern Linux by Paul S. Wang Appendix: Pattern Processing with awk
Mastering Modern Linux by Paul S. Wang Appendix: Pattern Processing with awk The awk program is a powerful yet simple filter. It processes its input one line at a time, applying user-specified awk pattern
More informationERNST. Environment for Redaction of News Sub-Titles
ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or
More informationCS434 Compiler Construction. Lecture 3 Spring 2005 Department of Computer Science University of Alabama Joel Jones
CS434 Compiler Construction Lecture 3 Spring 2005 Department of Computer Science University of Alabama Joel Jones Outline: Parsing Without Parsing Announcement: All future class meetings will be in 370
More informationOOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement
OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment
More informationAdorn. Serif. Smooth. v22622x
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs
More informationAdorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on
More informationLecture 2. Regular Expression Parsing Awk
Lecture 2 Regular Expression Parsing Awk Shell Quoting Shell Globing: file* and file? ls file\* (the backslash key escapes wildcards) Shell Special Characters ~ Home directory ` backtick (command substitution)
More informationVersion /10/2015. Type specimen. Bw STRETCH
Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a
More informationBUCKLEY. User s Guide
BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make
More informationSession: Shell Programming Topic: Advanced Commands
Lecture Session: Shell Programming Topic: Advanced Commands Daniel Chang Text File Processing Reading and filtering text files cut - Print specific columns from a text file awk - Print specific lines from
More informationUNIX Shell Programming
$!... 5:13 $$ and $!... 5:13.profile File... 7:4 /etc/bashrc... 10:13 /etc/profile... 10:12 /etc/profile File... 7:5 ~/.bash_login... 10:15 ~/.bash_logout... 10:18 ~/.bash_profile... 10:14 ~/.bashrc...
More information7. IP. » &!'() (IS: intermediate system) !"#$% *+'() (ES: end system) Copyright 2000, Suguru Yamaguchi, All right reserved
7. IP»!"#$%» &!'() (IS: intermediate system) *+'() (ES: end system) 1 ISES ES: End System!"#$Ethernet%&' ()*+,'-./ Ethernet IS: Intermediate System =>?@&+12/AB$CD EF FDDI ES: End System 0 FDDI%&'12!"#$345
More informationHoneyBee User s Guide
HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is
More informationAWK: The Duct Tape of Computer Science Research. Tim Sherwood UC San Diego
AWK: The Duct Tape of Computer Science Research Tim Sherwood UC San Diego Duct Tape Research Environment Lots of simulators, data, and analysis tools Since it is research, nothing works together Unix pipes
More informationAdorn. Slab Serif Smooth R E G U LAR. v22622x
s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,
More informationSANJAY GHODAWAT POLYTECHNIC
EXPERIMENT NO. 01 Name of Experiment Implement following commands with their options: ps and kill. df and du mount and umount. (4 Hours) Prerequisite of. / execution of Basic knowledge about linux command.
More information1. Oracle Mobile Agents? 2. client-agent-server client-server
1. Oracle Mobile Agents?!"#$ application software system%. &'( )'*+, -. */0 1 23 45 678 9:; >?, %@ +%. - 6A(mobility) : B? CDE@ F GH8!" * channel #I 1 = / 4%. ()'*, &', LAN) - * application
More informationAwk. 1 What is AWK? 2 Why use AWK instead of Perl? 3 Uses Of AWK. 4 Basic Structure Of AWK Programs. 5 Running AWK programs
Awk Author: Reuben Francis Cornel 1 What is AWK? AWK is a programable filter developed with the aim of using it to generate formatted reports from data. Althought is uses addresses like sed to perform
More informationUSB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual
USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product
More informationCommunication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 201 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/01 G2: ESC 02/14 06/01 G3: ESC 02/15 06/01 C0: -- C1: -- NAME:
More informationContrast. user s guide
N Contrast chu U77777777V user s guide c P font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.
More informationModules. CS2023 Winter 2004
Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationState of Connecticut Workers Compensation Commission
State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,
More informationCassandra: Distributed Access Control Policies with Tunable Expressiveness
Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer
More informationCommunication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:
More information) $ G}] }O H~U. G yhpgxl. Cong
» Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã
More information124 DISTO pro 4 / pro 4 a-1.0.0zh
0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0
More informationConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing
ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide
More information% echo $SHELL /usr/local/bin/bash. % sh $
% echo $SHELL /usr/local/bin/bash % sh $ #!/bin/sh chmod +x test.sh./test.sh my=test export my set my=test setenv my test $ export PAGER=/usr/bin/less % setenv PAGER /usr/bin/less $ current_month=`date
More informationIII. CLAIMS ADMINISTRATION
III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800
More informationAwk. Table of Contents. Last updated - Sun Jun 28 08:33:00 EDT 2009
1 de 50 17/09/2009 10:38 Script Unix Tutorial Work with Other IT Pros to Solve Your Shell Script Needs for Free! UNIX.ITtoolbox.com Alcatel-Lucent LTE Learn How LTE can Help Meet Growing Demand for Advanced
More informationBold U S E R S G U I D E
Yana Regular Bold Italic USER S GUIDE S S S font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.
More informationKurt Schmidt. October 19, 2017
duction duction Dept. of Computer Science, Drexel University October 19, 2017 duction duction Works well with record-type data Reads input file(s) a line (record) at a time Parses each record into fields
More informationAdorn. Slab Serif BOLD. v x. user s gu ide
Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions
More informationGAWK(1) Utility Commands GAWK(1)
GAWK NAME gawk pattern scanning and processing language SYNOPSIS gawk [ POSIX or GNU style options ] f program-file [ ]file... gawk [ POSIX or GNU style options ] [ ] program-text file... pgawk [ POSIX
More informationFall 2006 Shell programming, part 3. touch
touch Touch is usually a program, but it can be a shell built-in such as with busybox. The touch program by default changes the access and modification times for the files listed as arguments. If the file
More informationAppendix C. Numeric and Character Entity Reference
Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your
More informationBanks Tupas Certification Service for Service Providers
Banks Tupas Certification Service for Service Providers Service description and guidelines Version 2.1 3 October 2005 SERVICE DESCRIPTION 2 (21) CHANGE LOG Version Page Comment V2.0 All Message structure
More informationAdorn. Serif. v x. user s gu ide
Adorn f Serif t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to
More informationAdvanced training. Linux components Command shell. LiLux a.s.b.l.
Advanced training Linux components Command shell LiLux a.s.b.l. alexw@linux.lu Kernel Interface between devices and hardware Monolithic kernel Micro kernel Supports dynamics loading of modules Support
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationBanks' TUPAS certification service for service providers
Banks' TUPAS certification service for service providers service provider's FK Federation of Finnish Financial Services for service providers CHANGE LOG Version Page Comment V2.0 All Message structures
More informationSheila. Regular Bold. User s Guide
Sheila Regular Bold User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your
More informationNAME nawk pattern-directed scanning and processing language. SYNOPSIS nawk [ F fs ][ v var=value ][ prog f progfile ][file... ]
nawk NAWK NAME nawk pattern-directed scanning and processing language SYNOPSIS nawk [ F fs ][ v var=value ][ prog f progfile ][file... ] DESCRIPTION Nawk scans each input file for lines that match any
More informationTo provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.
200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015
More informationYou 2 Software
PrismaCards Enter text for languages with exotic fonts You 2 Software http://www.you2.de info@you2.de Introduction To work in PrismaCards and other programs with complex fonts for different languages you
More informationCMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes
Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter
More informationGetting round your Mac with Shortcut Keys
The Mac has many useful keyboard shortcuts but these do depend on you knowing the difference between the following keys: Shift Fn Ctrl Alt (Also referred to as Option) Command (Also referred to as the
More informationAWKREFERENCE. Copyright :48:32, FSF, Inc. (all)
AWKREFERENCE CONTENTS Action Statements... 7 Arrays... 11 AwkProgram Execution... 4 Bit Manipulation Functions (gawk)... 16 Bug Reports... 2 Closing Redirections... 12 Command Line Arguments (standard)...
More informationADORN. Roman. v x. user s gu ide
ADORN f Roman t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to
More informationESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange
TYPE: 9-character graphic character set REGISTRATION NUMBER: 9 DATE OF REGISTRATION: ESCAPE SEQUENCE G: ESC /8 / G: ESC /9 / G: ESC / / G: ESC / / C: C: NAME Extended African Latin alphabet coded character
More informationCMPT 470 Based on lecture notes by Woshun Luk
* ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationData Manipulation with AWK. Evangelos Pournaras, Izabela Moise
Data Manipulation with AWK Evangelos Pournaras, Izabela Moise Evangelos Pournaras, Izabela Moise 1 AWK A "Swiss knife" for data manipulation, retrieval, formatting, processing, transformation, prototyping
More informationChemistry Hour Exam 2
Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total
More informationProbabilistic analysis of algorithms: What s it good for?
Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like
More informationSecond Year March 2017
Reg. No. :... Code No. 5052 Name :... Second Year March 2017 Time : 2 Hours Cool-off time : 15 Minutes Part III COMPUTER APPLICATION (Commerce) Maximum : 60 Scores General Instructions to Candidates :
More informationOracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.
More informationO Type of array element
! " #! $ % % # & : ; a ontiguous sequene of variables. all of the sae type. Eah variable is identified by its index. Index values are integers. Index of first entry is. ' ( ) * + May /,. - ( & ( ( J K
More informationAWKREFERENCE. Copyright :39:42, FSF, Inc. (all)
AWKREFERENCE CONTENTS Action Statements... 9 Arrays... 7 AwkProgram Execution... 5 Bit Manipulation Functions (gawk)... 17 Bug Reports... 2 Closing Redirections... 13 Command Line Arguments (standard)...
More informationLecture 2. Awk C Compiler: Tools and Compilation C Libraries: Static and Dynamic
Lecture 2 Awk C Compiler: Tools and Compilation C Libraries: Static and Dynamic 1 AWK 2 Introduction to AWK Written by Alfred Aho, Peter Weinberger, Brian Kernighan in 1977. awk is primarily a filter that
More informationAWK - BUILT-IN FUNCTIONS
AWK - BUILT-IN FUNCTIONS http://www.tutorialspoint.com/awk/awk_built_in_functions.htm Copyright tutorialspoint.com The AWK has a number of functions built into it that are always available to the programmer.
More informationUse of AWK / SED Prof. Navrati Saxena TA: Rochak Sachan
Use of AWK / SED Prof. Navrati Saxena TA: Rochak Sachan 1 CONTENTS 1. AWK 1.1 WHAT IS AWK? 1.2 GENERAL SYNTAX OF AWK 1.3 DOING ARITHMETIC WITH AWK 1.4 VAR. IN AWK 1.4 AWK MISCELLANEOUS 2. SED 2.1 WHAT
More informationTable of Contents. Evaluation Copy
Table of Contents Perspective... 1-2 grep... 1-3 sort... 1-7 head and tail... 1-10 tr... 1-11 cut... 1-13 od... 1-15 paste... 1-16 split... 1-17 uniq... 1-18 sed... 1-19 gawk... 1-21 more and less... 1-25
More informationIPv6 Servic es. LONG Net w ork
IP Servic es in LONG Net w ork Carlos Ralli Ucendo Telefonica Research & Development Overview IP Distributed Labs LONG: Building a distributed IP Lab. LONG Backbone LONG Global View LONG IP Services Examples
More informationA Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1
A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1 Fernanda Baião Department of Computer Science - COPPE/UFRJ Abstract Federal University of Rio de Janeiro - Brazil baiao@cos.ufrj.br
More informationTable of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs
Summer 2010 Department of Computer Science and Engineering York University Toronto June 29, 2010 1 / 36 Table of contents 1 2 3 4 2 / 36 Our goal Our goal is to see how we can use Unix as a tool for developing
More information[DP19] DN-500CD. Serial Command Protocol Guide
[DP19] Serial Command Protocol Guide Ver. 1.2 January 16, 2017 inmusic Brands, Inc. 1 1 Contents 2 General... 3 2.1 RS-232C Control... 3 3 Specification... 4 3.1 RS-232C Control... 4 4 Communication Protocol...
More informationsed Stream Editor Checks for address match, one line at a time, and performs instruction if address matched
Week11 sed & awk sed Stream Editor Checks for address match, one line at a time, and performs instruction if address matched Prints all lines to standard output by default (suppressed by -n option) Syntax:
More information1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI
' þ ³ š ³ œ ³ 2006 1 Swing! " # &%' ()+-,./0 1 2 45-6 &8% 9 : ; < = >@? 2006A 5 B? 18 C@D E F : G HJILK-M!NPO-Q R S-I!T R!U V-W X Y!Z[N GUI\ ] ^ O-Q R S _a` b-w!c dje!f g Swing Wh i Z j k l m n N VisualEditor
More informationData Analysis in Geophysics ESCI Bob Smalley Room 103 in 3892 (long building), x Tu/Th - 13:00-14:30 CERI MAC (or STUDENT) LAB
Data Analysis in Geophysics ESCI 7205 Bob Smalley Room 103 in 3892 (long building), x-4929 Tu/Th - 13:00-14:30 CERI MAC (or STUDENT) LAB Lab 21, 11/07/13 Computers make it easier to do a lot of things,
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012
CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats
More informationcommands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes
Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with
More informationRegular expressions: Text editing and Advanced manipulation. HORT Lecture 4 Instructor: Kranthi Varala
Regular expressions: Text editing and Advanced manipulation HORT 59000 Lecture 4 Instructor: Kranthi Varala Simple manipulations Tabular data files can be manipulated at a columnlevel. cut: Divide file
More informationService Segment Version 3
Message Implementation Service Segment Version 3 Rev 2000-02-01 Swedish Bankers Association Svenska Bankföreningen sed96a-e.xxx 20 August 1998 ver 2.0 Page 1 Revisions - Service segments Date: Changes:
More informationConsider the following program.
Consider the following program. #include int do_sth (char *s); main(){ char arr [] = "We are the World"; printf ("%d\n", do_sth(arr)); } int do_sth(char *s) { char *p = s; while ( *s++!= \0 )
More informationprintf: formatted printing So far we have just been copying stuff from standard-in, files, pipes, etc to the screen or another file.
Printing printf: formatted printing So far we have just been copying stuff from standard-in, files, pipes, etc to the screen or another file. Say I have a file with names and phone numbers. I would like
More informationRegex, Sed, Awk. Arindam Fadikar. December 12, 2017
Regex, Sed, Awk Arindam Fadikar December 12, 2017 Why Regex Lots of text data. twitter data (social network data) government records web scrapping many more... Regex Regular Expressions or regex or regexp
More informationA Tale of Two Tabulators
A Tale of Two Tabulators Richard A. O Keefe Computer Science, University of Otago November 2001 Abstract For a software engineering class, I present an example where a simple obvious English requirement
More informationTopic 4: Grep, Find & Sed
Topic 4: Grep, Find & Sed grep: a tool for searching for strings within files find: a tool for examining a directory tree sed: a tool for "batch editing" Associated topic: regular expressions 1 Motivation
More informationAdorn. Bouquet. v x. user s gu ide
Adorn Bouquet f 9a0 v2226222x user s gu ide t v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.
More information