Write a filter that takes a list of files as input and outputs the basename (page 447) of each file in the list.

What will be an ideal response?


$ cat base
read fn
while [ "a$fn" != "a" ]
do
basename "$fn"
read fn
done

Computer Science & Information Technology

You might also like to view...

Maps allocate keys to values and cannot contain duplicate keys, i.e., the key-to-value mapping is a __________ mapping.

a. many-to-many. b. many-to-one. c. one-to-many. d. one-to-one.

Computer Science & Information Technology

What are two questions the team should ask of itself after a two-week sprint cycle has been completed?

What will be an ideal response?

Computer Science & Information Technology

You cannot change or delete data in a linked Access table

Indicate whether the statement is true or false

Computer Science & Information Technology

As the network engineer, you are given the following subnet IDs: 172.32.64.0, 172.32.168.0, and 172.32.192.0. Which of the following masks could be applied to this network?

A) 255.255.128.0 B) 255.255.192.0 C) 255.255.224.0 D) 225.255.248.0

Computer Science & Information Technology