why should these directory and it content exist? these are files on the pc of the TEACHER... if they are not on YOUR computer, that is perfectly normal...
Ohh .., the first time i was thinking, that i need that files
Quote:
why?
Because i can not do the same exercises. For example:
a) I try to make the first exercise with:
$ cd /cygdrive/c/data/downloads
and show me that i dont have that file or directory (see the attach ex.1)
b) But i try with the next command:
$ pwd
and show a different thing (ex.2)
c) Also i try with a another command:
$ ls
and show me nothing again (ex.3)
Quote:
you don't created it!
I need to create the same folders or dont matters and i do something wrong !?
Hello - I am FTPing file from remote unix box to my unix box.
I am FTPing file around 2AM. some time, the complete fle is not ftping.. I am missing data in the FTP file. It happens few times in a month. Whenever, i miss the data, the file size is always 60106. The actual file size is not that... (4 Replies)
I have written a perl scripts which loads the data.
Now i want to modify the script, to Archive the Input file after the successful load of data.
Can anyone please share it and help me ....
Thanks. (2 Replies)
Hi,
I have thousands of data in 1 file that need to be sorted out. My file is like below:-
File1.txt
condition 1
scaf_27 CDS 48317 48517 "e_gww2.27.12.1" Id 35277
scaf_27 stop_cod 48317 48319 "e_gww2.27.12.1"
scaf_27 CDS 48518 49107 "e_gww2.27.12.1" ... (4 Replies)
hello everyone,
I have a task to input missing data into a file. example of my data below:
Wed Feb 01 09:00:02 EST 2012,,,0.4,0.3,,0.3,,0.3,,0.5,,0.3,,,0.4,0.3,
Wed Feb 01 09:00:11 EST 2012,,,,,,,0.2,,,,,,,,,,
Wed Feb 01 09:00:22 EST... (23 Replies)
Dear All members,
i have some trouble here, i want to ask your help. The case is:
I have some data, it's like:
-ABCD1234
-ABCD1235
-ABCD1237
-BCDE1111
-BCDE1112
-BCDE1114
there is some missing data's sequence (the format is: ABCD = name 1234 = sequence).
I want to print the... (2 Replies)
Let me start off by saying I am a self taught sometimes scripter so what you will see below won't be pretty.
I have created a script to parse through a file with a large amount of data and simply pull out what I need. In doing this I create several files and then paste them together in order to... (2 Replies)
Hello masters,
I am filtering data based on completeness. A (Name , Group) combination in File2 is only complete when it has data for all subgroups specified in File1.
All incomplete (Name , Group) combinations do not appear in the output.
So for example , Name1 Group 1 in File2 is... (6 Replies)
I am learning AWK by trying out examples whenever I need a specific conversion. I would like to edit the 'before.txt' so that all the missing data points between 140-150 are added and shown as 0.
before.txt
145 2
148 13
149 17
to below,
140 0
141 0
142 0
143 0
144 0
145 2
146 0... (5 Replies)
Discussion started by: numareica
5 Replies
LEARN ABOUT PLAN9
attach
ATTACH(5) File Formats Manual ATTACH(5)NAME
attach, session, nop - messages to initiate activity
SYNOPSIS
Tnop tag[2]
Rnop tag[2]
Tsession tag[2] chal[8]
Rsession tag[2] chal[8] authid[28] authdom[48]
Tattach tag[2] fid[2] uid[28] aname[28] ticket[72] auth[13]
Rattach tag[2] fid[2] qid[8] rauth[13]
DESCRIPTION
The nop request does nothing overt but may be used to synchronize the channel between two service hosts initially.
The session request is used to initialize a connection between a client and a server. All outstanding I/O on the connection is aborted.
The set of messages between session requests is called a session. The host's user name (authid) and its authentication domain (authdom)
identify the key to be used when authenticating to this host. The exchanged challenges (chal) are used in the authentication algorithm.
If authid is a null string no authentication is performed in this session.
The tag should be NOTAG (value 0xFFFF) for a nop or session message.
The attach message serves as a fresh introduction from a user on the client machine to a server. The message identifies the user (uid) and
may select the file tree to access (aname). The ticket and auth arguments contains authorization data derived from the exchanged chal-
lenges of the session message; see auth(6).
As a result of the attach transaction, the client will have a connection to the root directory of the desired file tree, represented by
fid. An error is returned if fid is already in use. The server's idea of the root of the file tree is represented by the returned qid.
ENTRY POINTS
An attach transaction will be generated for kernel devices (see intro(3)) when a system call evaluates a file name beginning with Pipe(2)
generates an attach on the kernel device pipe(3). The mount system call (see bind(2)) generates an attach messages to the remote file
server. When the kernel boots, an attach is made to the root device, root(3), and then an attach is made to the requested file server
machine.
SEE ALSO auth(6)ATTACH(5)