Table of Contents
1 Introduction
2 Running sed
2.1 Overview
2.2 Command-Line Options
2.3 Exit status
3 sed scripts
3.1 sed script overview
3.2 sed commands summary
3.3 The s Command
3.4 Often-Used Commands
3.5 Less Frequently-Used Commands
3.6 Commands for sed gurus
3.7 Commands Specific to GNU sed
3.8 Multiple commands syntax
3.8.1 Commands Requiring a newline
4 Addresses: selecting lines
4.1 Addresses overview
4.2 Selecting lines by numbers
4.3 selecting lines by text matching
4.4 Range Addresses
5 Regular Expressions: selecting text
5.1 Overview of regular expression in sed
5.2 Basic (BRE) and extended (ERE) regular expression
5.3 Overview of basic regular expression syntax
5.4 Overview of extended regular expression syntax
5.5 Character Classes and Bracket Expressions
5.6 regular expression extensions
5.7 Back-references and Subexpressions
5.8 Escape Sequences - specifying special characters
5.8.1 Escaping Precedence
5.9 Multibyte characters and Locale Considerations
5.9.1 Invalid multibyte characters
5.9.2 Upper/Lower case conversion
5.9.3 Multibyte regexp character classes
6 Advanced sed: cycles and buffers
6.1 How sed Works
6.2 Hold and Pattern Buffers
6.3 Multiline techniques - using D,G,H,N,P to process multiple lines
6.4 Branching and Flow Control
6.4.1 Branching and Cycles
6.4.2 Branching example: joining lines
7 Some Sample Scripts
7.1 Joining lines
7.2 Centering Lines
7.3 Increment a Number
7.4 Rename Files to Lower Case
7.5 Print bash Environment
7.6 Reverse Characters of Lines
7.7 Text search across multiple lines
7.8 Line length adjustment
7.9 Reverse Lines of Files
7.10 Numbering Lines
7.11 Numbering Non-blank Lines
7.12 Counting Characters
7.13 Counting Words
7.14 Counting Lines
7.15 Printing the First Lines
7.16 Printing the Last Lines
7.17 Make Duplicate Lines Unique
7.18 Print Duplicated Lines of Input
7.19 Remove All Duplicated Lines
7.20 Squeezing Blank Lines
8 GNU sed’s Limitations and Non-limitations
9 Other Resources for Learning About sed
10 Reporting Bugs
Appendix A GNU Free Documentation License
Concept Index
Command and Option Index
Next: Introduction, Up: (dir) [Contents][Index]
GNU sed
This file documents version 4.8 of GNU sed, a stream editor.
Copyright © 1998–2020 Free Software Foundation, Inc.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”.
• Introduction: Introduction
• Invoking sed: Invocation
• sed scripts: sed scripts
• sed addresses: Addresses: selecting lines
• sed regular expressions:
Explanation:
Carlie was asked to review a software project for her company to determine specific deadlines. Which part of project management must she consider?
Analysis
Resources
Scope
Time
Answer:
Resources
Explanation:
Answer:
scope
Explanation:
What is the difference between Information Technology and Communication Technology?
Answer:
Explanation:
information tech is technology that teaches you information, and communication tech is tech that lets you talk to family and friends and meet new people.
Answer:
The main difference between information technology and communication technology is that Information technology is a subject that is use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise whereas a Communication technology is the use of computers to communicate with family and friends.
How to get passed administrattor on macbook air to get games and stuff.
Answer:
You need to use the name and password of the main owner of the computer/the account you made when you first got it. Then, you should be able to download apps and use it if you have your apple ID set up.
Explanation:
what specific Philippine law discusses copyright? elaborate?
Answer: Republic Act No. 8293 "Intellectual Property Code of the Philippines".
Explanation:
The Republic Act No. 8293 is the Intellectual Property Code of the Philippines. It is the Philippine law that discusses copyright. This law protects copyrights, intellectual property, trademarks, and patents.
Examples of copyright that are protected under the law are photographic works, drawings, audiovisual works, and cinematographic works.
HELP!!
Why is email etiquette important? (1 point)
Email is rarely used to communicate via technology.
With more and more written communication through technology, it is important to sound competent and qualified and for your meaning to be clear.
Not many classes are taken online.
Even though companies and employers use a lot of email communication, they don't really care if you are clear with your communication
Answer:
B
Explanation:
Which of the following is NOT a reason to include comments in programs?
a. Comments help the computer decide whether certain components of a program
are important.
b .Comments help programmers debug issues in their own code
c. Comments help document how code was written for other programmers to use
d. Comments enable programmers to track their work throughout the development
process
Answer:
A Would be correct!
Explanation:
The reason for this is because in a code when you use the comment out the compiler will skip over it and will not do anything and will skip it. So the comment can help the computer do anything!
HOPE THIS HELPED MAKE ME THE BRAINLIST!
Using programming concepts, the option that is NOT a reason to include comments in a code is:
a. Comments help the computer decide whether certain components of a program are important.
-------------------------
Usually, codes are very long, and each person is responsible for a part of the problem. The parts have to be intervened with each other, and thus, sometimes a programmer will have to look at another part of the code, not coded by him. Thus, for the programmer and other people working in the project to understand, comments are important.Additionally, the comments are used to help the programmers debug their own code, as they can go part by part and see what is done in each part, also helping them work throughout the development process.In a program, there may be some components that end up not being necessary, but this is not decided by comments, and thus, option A is not a reason to include comments in programs.A similar problem is given at https://brainly.com/question/13527834
WILL MARK AS BRAINLIEST
Describe the environmental issues in India and list ways that technology has been used to address these issues.
India has been having to engineer better technology to better prepare people in india for the brutal monsoon seasons in india
Which holds all of the essential memory that tells your computer how to be
a computer (on the motherboard)? *
O Primary memory
Secondary memory
2. Which of the following fonts is most legible for a block of text? What font size and color would you choose if you were writing a block of text in a formal business document? (1 point)
Answer:
Color: Black
Font: Times New Roman
Size: 12
Explanation:
Answer:
Times new roman
front 12
color:black
Explanation:
Times new roman
front 12
color:black
write a program that reads in a number n and prints out n rows each containing n star charactersg
In python:
rows = int(input("How many rows would you like? "))
i = 0
while i < rows:
print("*" * rows)
i += 1
I hope this helps!
What information is required for a complete citation of a website source?
A: the title, volume number, and page numbers
B: the responsible person or organization and the website URL
C: the responsible person or organization, date accessed, and URL
D: the responsible person or organization and the date accessed
Answer:
C: the responsible person or organization, date accessed, and URL
Explanation:
sa kumbensiyon naihalal si andres bonofacio bilang
Answer:
the contemporary Supremo (supreme leader) of the Katipunan
Low level security is designed to detect and impede _____ some unauthorized external activity Some None Most All
Answer:
Low-level security is designed to detect and impede some unauthorized external activity.
Examples of low-level security systems include:
Basic physical obstacles to defense Locks for increased-security Simple lighting coverage Standard alarm SystemsExplanation
Protection devices that prevent and track any unwanted external actions are called Low-Level security measures.
Other obstacles to the installation of the security system, such as reinforced doors, fences, high-security locks, and window bars and grates, are often installed after simple physical protection barriers and locks have been created.
Also, a simple lighting system that could not be more complex than the standard security lighting systems over windows and doors and a regular security warning system that will be an unattended unit that offers monitoring capability and sound warnings at the location of unwanted entry.
Storage facilities, convenience shops, and small business premises are some of the locations that incorporate low-level security devices.
Cheers
Cleary specifying the theme to be used for a site
before building it provides which main advantage:
site navigation
site consistency
O
a clear message
O O O
improved readability
Answer: site consistency
Answer:
B) Site Consistency
Explanation:
Which of the following is another word for a copyeditor?
microeditor
macroeditor
assignment editor
assistant editor
Answer: speaking of microeditor
Explanation: thats not the only thing i know of thats micro :0
14. Convert 11110111 from binary to denary
(1 Point)
converting 11110111 from binary to denary = 247
Answer:
247
Explanation:
Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database:
The complete question is:
Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database:
a. Display the SMemberID and SMemberName for all staff members.
b. Display the CCID, CCName, and CCIndustry for all corporate clients.
c. Display the BuildingID, BNoOfFloors, and the manager’s MFName and MLName for all buildings.
d. Display the MFName, MLName, MSalary, MBDate, and number of buildings that the manager manages for all managers with a salary less than $55,000.
e. Display the BuildingID and AptNo, for all apartments leased by the corporate client WindyCT.
f. Display the InsID and InsName for all inspectors whose next inspection is scheduled after 1-JAN-2014. Do not display the same information more than once.
g. Display the SMemberID and SMemberName of staff members cleaning apartments rented by corporate clients whose corporate location is Chicago. Do not display the same information more than once.
h. Display the CCName of the client and the CCName of the client who referred it, for every client referred by a client in the music industry.
i. Display the BuildingID, AptNo, and ANoOfBedrooms for all apartments that are not leased.
Also a schema of the HAFH database is attached.
Answer:
Using SQL's SELECT, FROM, WHERE syntax, find below the queries for each question.
a.
SELECT SMemberID , SMemberName
FROM staffmember
b.
SELECT CCID, CCName, CCIndustry
FROM corpclient
c.
SELECT b.BuildingID, b.BNoOfFloors, m.MFName, m.MLName
FROM building b, manager m
WHERE b.ManagerID = m.ManagerID
d.
SELECT m.MFName, m.MLName, m.MSalary, m.MBDate, count(*) as buildings
FROM building b, manager m
WHERE m.MSalary<55000
AND b.ManagerID = m.ManagerID
GROUP BY m.ManagerID
e.
SELECT b.BuildingID, a.AptNo
FROM building b, apartment a, corpclient c
WHERE c.CCName = "WindyCT"
AND c.CCID = a.CCID
AND a.BuildingID = b.BuildingID
f.
SELECT DISTINCT i.InsID, i.InsName
FROM inspector i, inspecting x
WHERE i.InsID = x.InsID
AND x.DateNext > "2014-01-01"
g.
SELECT DISTINCT s.SMemberID, s.SMemberName
FROM staffmember s, cleaning c, apartment a, corpclient cc
WHERE s.SmemberID = c.SmemberID
AND c.AptNo = a.AptNo
AND a.CCID = cc.CCID
AND cc.CCLocation = "Chicago"
h.
SELECT cc1.CCName, cc2.CCName
FROM corpclient cc1, corpclient cc2
WHERE cc1.CCIDReferencedBy = cc2.CCID
AND cc2.CCIndustry = "Music"
i.
SELECT a.BuildingID, a.AptNo, a.ANoOfBedrooms
FROM apartment a
WHERE a.CCID NOT IN (SELECT c.CCID FROM corpclient c)
Read the following code:
x = 1
while(x < 26)
print(x)
x = x + 1
There is an error in the while loop. What should be fixed? (5 points)
Select one:
a. Add a colon to the end of the statement
b. Begin the statement with the keyword count
c. Change the parentheses around the test condition to quotation marks
d. Use quotation marks around the relational operator
For a while loop to function properly, it needs a colon after it.
Answer choice A is correct.
Your game design company has recently asked all employees to use a specific personal information management application (PIM) to increase workplace efficiency. The PIM is collaborative, so contacts, calendar entries, and notes are shared across the team. Several team members are resistant to the idea, saying it interrupts their workflow, and they prefer their own way of handing contacts, notes, etc. Others don’t want their own notes to be seen by their coworkers.
Answer:For example, an office worker might manage physical documents in a filing cabinet by placing them in folders organized alphabetically by project name, or might manage digital documents in folders in a hierarchical file system.
Explanation:
Write a program named palindromefinder.py which takes two files as arguments. The first file is the input file which contains one word per line and the second file is the output file. The output file is created by finding and outputting all the palindromes in the input file. A palindrome is a sequence of characters which reads the same backwards and forwards. For example, the word 'racecar' is a palindrome because if you read it from left to right or right to left the word is the same. Let us further limit our definition of a palindrome to a sequence of characters greater than length 1. A sample input file is provided named words_shuffled. The file contains 235,885 words. You may want to create smaller sample input files before attempting to tackle the 235,885 word sample file. Your program should not take longer than 5 seconds to calculate the output
In Python 3,
MY CODE: palindromefinder.py
import sys
def is_Palindrome(s):
if len(s) > 1 and s == s[::-1]:
return true
else:
return false
def main():
if len(sys.argv) < 2:
print('Not enough arguments. Please provide a file')
exit(1)
file_name = sys.argv[1]
list_of_palindrome = []
with open(file_name, 'r') as file_handle:
for line in file_handle:
lowercase_string = string.lower()
if is_Palindrome(lowercase_string):
list_of_palindrome.append(string)
else:
print(list_of_palindrome)
If you can adjust my code to get program running that would be ideal, but if you need to start from scratch that is fine.
Open your python-3 console and import the following .py file
#necessary to import file
import sys
#define function
def palindrome(s):
return len(s) > 1 and s == s[::-1]
def main():
if len(sys.argv) < 3:
print('Problem reading the file')
exit(1)
file_input = sys.argv[1]
file_output = sys.argv[2]
try:
with open(file_input, 'r') as file open(file_output, 'w') as w:
for raw in file:
raw = raw.strip()
#call function
if palindrome(raw.lower()):
w.write(raw + "\n")
except IOError:
print("error with ", file_input)
if __name__ == '__main__':
main()
Implement the following logic in C++, Use appropriate data types. Data types are represented as either numeric (num) or string.
start
string name
string address
num item //use int
num quantity
num price //use double as data type
num SIZE = 6
num VALID_ITEM [SIZE] = 106, 108, 307, 405, 457, 688 //use int as data type
num VALID_ITEM_PRICE [SIZE] = 0.59, 0.99, 4.50, 15.99, 17.50, 39.00 //use double as data type
num i
bool foundIt = false
string MSG_YES = "Item available"
string MSG_NO = "Item not found" get name, address, item, quantity
i = 0
while i < SIZE
if item == VALID_ITEM [i] then
foundIt = true
price = VALID_ITEM_PRICE [i]
endif
i = i + 1
endwhile
if foundIt == true then
print MSG_YES
print quantity, " at " , price, " each"
print "Total ", quantity * price
else
print MSG_NO
endif
stop
Answer:
Follows are the modified code in c++ language:
#include<iostream>//header file
#include<string>//header file
using namespace std;
int main()//main method
{
string name,address, MSG_YES, MSG_NO;//defining string variable
int item,quantity,size=6, i=0;//defining integer variable
double price;//defining double variable
int VALID_ITEM[]={106,108,307,405,457,688};//defining integer array and assign value
double VALID_ITEM_PRICE[]={0.59,0.99,4.50,15.99,17.50,39.00};//defining double array and assign value
bool foundIt=false;//defining bool variable
MSG_YES="Item available";//use string variable to assign value
MSG_NO = "Item not found"; //use string variable to assign value
cout<<"Input name: ";//print message
cin>>name;//input value in string variable
cout<<"Input Address: ";//print message
cin>>address;//input value in string variable
cout<<"Input Item: "<<endl;//print message
cin>>item;//input value in string variable
cout<<"Input Quantity: "<<endl;//print message
cin>>quantity;//input value in string variable
while(i <size)//defining while that checks i less then size
{
if (item ==VALID_ITEM[i]) //use if block to match item in double array
{
foundIt = true;//change bool variable value
price = VALID_ITEM_PRICE[i];//hold item price value in price variable
}
i++;//increment the value of i
}
if (foundIt == true)//use if to check bool variable value equal to true
{
cout<<MSG_YES<<endl;//print value
cout<<"Quantity "<<quantity<<" at "<<"Price "<<price<<"each"<<endl;//print value
cout<<"Total"<<quantity*price;//calculate the total value
}
else//else block
cout<<MSG_NO;//print message
}
Output:
please find the attached file.
Explanation:
In the above given C++ language modified code, four-string variable " name, address, MSG_YES, and MSG_NO", four integer variable "item, quantity, size, and i", and "integer and double" array is defined, that holds values.
In the string and integer variable "name, address, and item, quantity", we input value from the user-end and use the while loop, which uses the if block to check the "item and quantity" value from the user end and print its respective value.
PLEASE HURRY!!!
Look at the image below!
Answer:A and E
Explanation:
The last three are strings while the other choices are integers.
Putting ' ' or " " around something makes it a string and the input is asking the user to input a string.
Nowadays computer games are mostly available on external
hard disk.
Is it true or false?
Answer:
false
Explanation:
because a lot of times they are downloads without the disk
It is false that nowadays computer games are mostly available on external hard disk.
What is hard disk?A hard disk drive (HDD) is a type of computer storage device that uses magnetic storage to store and retrieve digital information.
Hard disks are usually located inside the computer and are used to store the operating system, applications, and user data such as documents, pictures, and videos.
Computer games can be stored on a variety of devices, including internal hard drives, external hard drives, solid state drives, and even cloud storage.
While external hard drives may be a popular option for some users, computer games can be installed and played from a variety of storage devices depending on user preferences and hardware capabilities.
Thus, the given statement is false.
For more details regarding hard disk, visit:
https://brainly.com/question/9480984
#SPJ2
(PYTHON)
Ask the user if they want to multiply two numbers entered from the keyboard. If they type "YES" ask for two numbers and multiply them. What happens if they type Yes, yes, yes, try a few combinations.
I hope this helps! If you have anymore questions, I'll do my best to answer them.
Before inserting a preformatted table of contents, what must you do first?
apply heading styles to text
update the table of contents
navigate to the Review tab and the Table of Contents grouping
navigate to the Insert Table of Contents dialog box
Answer: apply heading styles to text.
Explanation:
Which of the following industries does not use technology?
Medicine
Marketing and advertising
Law enforcement
Arts and entertainment
None of the above
Answer:
None of the above
Explanation:
Medicine uses technology to research
Advertiseres use platforms like Instagram to share the product they are promoting
Law enforcement uses tech to pull up databases of people's records
Arts and entertainment use them to create (in some cases), share, and sell their art.
Hope this helps!
Answer:
E
Explanation: got it right on edge 2020
Implement a class Balloon that models a spherical balloon that is being filled with air. The constructor constructs an empty balloon. Supply these methods:
void addAir(double amount) adds the given amount of air.
double getVolume() gets the current volume.
double getSurfaceArea() gets the current surface area.
double getRadius() gets the current radius.
Supply a BalloonTester class that constructs a balloon, adds 100cm^3 of air, tests the three accessor methods, adds another 100cm3 of air, and tests the accessor methods again.
Answer:
Here is the Balloon class:
public class Balloon { //class name
private double volume; //private member variable of type double of class Balloon to store the volume
public Balloon() { //constructor of Balloon
volume = 0; } //constructs an empty balloon by setting value of volume to 0 initially
void addAir(double amount) { //method addAir that takes double type variable amount as parameter and adds given amount of air
volume = volume + amount; } //adds amount to volume
double getVolume() { //accessor method to get volume
return volume; } //returns the current volume
double getSurfaceArea() { //accessor method to get current surface area
return volume * 3 / this.getRadius(); } //computes and returns the surface area
double getRadius() { //accessor method to get the current radius
return Math.pow(volume / ((4 * Math.PI) / 3), 1.0/3); } } //formula to compute the radius
Explanation:
Here is the BalloonTester class
public class BalloonTester { //class name
public static void main(String[] args) { //start of main method
Balloon balloon = new Balloon(); //creates an object of Balloon class
balloon.addAir(100); //calls addAir method using object balloon and passes value of 100 to it
System.out.println("Volume "+balloon.getVolume()); //displays the value of volume by getting value of volume by calling getVolume method using the balloon object
System.out.println("Surface area "+balloon.getSurfaceArea()); //displays the surface area by calling getSurfaceArea method using the balloon object
System.out.println("Radius "+balloon.getRadius()); //displays the value of radius by calling getRadius method using the balloon object
balloon.addAir(100); //adds another 100 cm3 of air using addAir method
System.out.println("Volume "+balloon.getVolume()); //displays the value of volume by getting value of volume by calling getVolume method using the balloon object
System.out.println("Surface area "+balloon.getSurfaceArea()); //displays the surface area by calling getSurfaceArea method using the balloon object
System.out.println("Radius "+balloon.getRadius()); } } //displays the value of radius by calling getRadius method using the balloon object
//The screenshot of the output is attached.
Write some code that assigns True to the variable is_a_member if the value assigned to member_id can be found in the current_members list. Otherwise, assign False to is_a_member. In your code, use only the variables current_members, member_id, and is_a_member.
Answer:
current_members = [28, 0, 7, 100]
member_id = 7
if member_id in current_members:
is_a_member = True
else:
is_a_member = False
print(is_a_member)
Explanation:
Although it is not required I initialized the current_members list and member_id so that you may check your code.
After initializing those, check if member_id is in the current_members or not using "if else" structure and "in" ("in" allows us to check if a variable is in a list or not). If member_id is in current_members, set the is_a_member as True. Otherwise, set the is_a_member as False.
Print the is_a_member to see the result
In the example above, since 7 is in the list, the is_a_member will be True
which type of memory helps in reading as well as writing data and modify data
Answer:
RAM (Random access memory)helps in reading aswell as writing data
The IP address and the port are both numbers. Which statement is true?
A computer has many IP addresses and many ports.
A computer has one IP address and many ports.
A computer has one IP address and one port,
Acomputer has many IP addresses and one port.
Answer:
A computer has one IP address and many ports.
Explanation:
Answer:
A computer has one IP address and many ports.
Explanation: