Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Create a Bourne shell script

You have created the directory structure and some base files to be used by the Web server and Web site. For the Web site to be created in a production environment, you need to package your commands in a script so that the patching team can run them on the production environment. Your task for this assignment is the following:

Create a Bourne shell script. The script should do the following:

1. Explain what the script will do and who is the author in a comment area.
2. cd to your home directory
3. Show your current working directory.
4. List the contents of the current directory.
5. Create the directory structure and create the files as defined in the previous Individual Project.
6. For each directory and file, test to see if the file or directory already exists; if it does exist, do not recreate; if it is missing, create it.
7. In the end, generate a directory listing showing the structure and content of the new directories.
8. At the beginning of the script, set a variable called INSTALL_DIRECTORY that will contain the location of the directory into which the Web server will be installed. At the end of the script, display the contents of this variable along with a message to the installer about the location in which the directories were created.

A small hint for creating the content of the httpd.conf file: use the echo command in your script. The script is not interactive and should create all objects automatically. Also, the ServerRoot and DocumentRoot should contain correct values based on your directory names.

If you need to test that directories are created or not based on them already existing, remove files and directories ahead of time to ensure you know the exact state of your environment.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91977081
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Section 26 in the smith textbook elementary information

Section 2.6 in the Smith textbook ( elementary information security 2nd edition) offers a list of 6 high-level security controls. Pick two of them and describe how you personally experience those controls in use on perso ...

What are the key principles and tenets that any educated

What are the key principles and tenets that any educated person should know regarding the science of economics and their applicability in the world today?

Task you want to calculate a students gpa for a number of

Task: You want to calculate a student's GPA for a number of classes taken by the student during a single semester. (In C# (C sharp)) Inputs: 1. the student's name 2. Class names for the classes taken by the student 3. Cl ...

If the probability that an individual suffers from a bad

If the probability that an individual suffers from a bad reaction from an injection of a given serum is 0.001, determine the probability that out of 2000 individuals (a) exactly 3, (b) more than 2 individuals will suffer ...

Write a c functionnbspescapechar s char tnbspthat converts

Write a C function escape(char s[], char t[]) that converts the characters newline and tab into two character sequences n and t as it copies the string t to the string s. Use the C switch statement. Also write the revers ...

This is a scilab question only and must be answered in

This is a SCILAB QUESTION ONLY AND MUST BE ANSWERED IN SCILAB LANGUAGE PLEASE or else I will not be able to understand, Please show every step, many thanks in advance!!! Consider the polynomial: Find the value q(x = 6), ...

What are some analysis and crime investigative methods that

What are some analysis and crime investigative methods that could be used in identifying gangs and/or gang activities?

What are the minimum numbers of keys and pointers in btree

What are the minimum numbers of keys and pointers in Btree (i) interior nodes and (ii) leaves, when: a) n = 10; i.e., a block holds 10 keys and 11 pointeis. b) n = 11; i.e., a block holds 11 keys and 12 pointers.

Question this discussion focuses on mapping cloud security

Question: This discussion focuses on mapping cloud security controls to existing frameworks or regulations. You will need to create 1 new thread AND post AT LEAST 2 comments on other students' threads. Here's how to get ...

Inside the oncreate method fill in the code so that we set

Inside the onCreate method, fill in the code so that we set the layout and GUI defined in activity_main.xml? public void onCreate( Bundle savedInstanceState ){ super.onCreate(savedInstanceState); // Your code goes here }

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As