WC
StatisticsThe number of words, lines, and characters in the file.
WC syntax
[Root @ WWW ~] #WC[-LWM] Options and parameters:-L: only list rows;-W: Only the number of words listed (one English word );-M: The number of characters;
WC
Fork
Usage: fork/directory/script. Sh
Fork is the most common. It uses/directory/script. Sh directly in the script to call the script. Sh script.
Run a sub-shell script to execute the call. When Sub-shell is executed, parent-shell is still
Step 1: Master several if statement branches
The following is the most complete if format. You can delete it as needed in actual use.
If condition; then
// Action
Elif conditon: then
// Action
... Several intermediate Elif
Else
//
In shell scripts, quotation marks are usually used, but what are the differences between quotation marks?
Single quotesPurpose: To prevent text conversion. Except for the single quotation marks, all words in the single quotation marks are output as
#! /Bin/bash # script filename: addbook. bsh # comment: add info to datafile # datafile: Conn. dat # initialize the variables datafile = "Conn. dat " name =" " phone =" " address =" " email =" " # Check in argument list then add info to
I haven't written the script for a long time, and I forgot it. I tried to write it today. I have to check many things. I will write something simple or difficult every day, there are no technical skills. In short, it is good to practice more.
The
Table 4-3 lists the commands supported by the EFI Shell Interface on the unit-based HP integrity server.
When npartition is active but the operating system has not been booted, you can access the EFI shell from the npartition console.
You can use
Shell function return value, two common methods:Return,Echo
1) Return StatementThe Return Value of the shell function, which can be the same as that of other languages, returned through the return statement.Example:
#!/bin/sh function test() {
Getting started with Linux shell scripts -- wget command usage
Wget is an open-source software developed in Linux, written by Hrvoje Niksic, and subsequently transplanted to various platforms including windows. It has the following functions and
Introduction
Sed is an online editor that processes a row of content at a time. During processing, the currently processed rows are stored in the temporary buffer, called the pattern space. Then, the SED command is used to process the content in the
Hill sorting was named by computer scientist Donald L. Shell. He discovered the hill Sorting Algorithm in 1959. Hill sorting is based on insert sorting, but a new feature is added, which greatly improves the execution efficiency of insert
From: http://www.diybl.com/course/3_program/shell/shelljs/200862/119742.html
A regular expression is a text mode consisting of common characters (such as characters A to Z) and special characters (such as metacharacters. This mode describes one or
Mainly shell several common operations: 1 shell and awk combined with 2 shell string operations 3 shell file operations and awk combined 4 file MD5 verification 5 results output 6 passing parameters, etc.
The following content cannot be
Merge and split files:1. SortCommand Format:Sort-CMU-O output_file [other options] + pos1 + pos2 input_file-C: whether the test file has been classified.-M combines two classification files.-U: delete all duplicate rows.-O stores the output file
Preface
The time complexity of determining whether an element exists in an array is generally O (N), because the common practice is to traverse the array and check whether the data to be searched exists.
Here is a method for determining
I. Introduction
For the purpose of compressing program resources and registering and protecting program resources, the shell can be divided into two types: Compressed shell and encrypted shell.UPX aspcak telock pelite nspack...Armadillo asprotect
Notes for shell script programs: variables can be directly used without prior declaration; the variable does not have any data type. The default value is a string; no space is allowed on any side of the equal sign of the value assignment operation.
1. Configure the vro and go to http: // 192.168.0.1/to start setting.
Select "forwarding rules" -- "virtual server" -- configure as follows, IP address for your local IP Address
Select "forwarding rules" -- "DMZ" host -- configure as follows, IP
Position:
65 pages of Chinese entity books
104 pp. Of an English PDF ebook
The content of the file datafile is as follows:
Steve Blenheim: 238-923-7366: 95 Latham Lane, Easton, PA 83755: 11/12/56: 20300 Betty Boop: 245-836-8357: 635 cutesy Lane,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.