Sponsored Content
Top Forums Programming Code review: recursion in circular array, reduce two functions to one? Post 303014964 by RudiC on Saturday 24th of March 2018 08:51:34 AM
Old 03-24-2018
Ohhh - got it . . . Try - recent bash (ksh) required -
Code:
animals=(Lion Tiger Panther Cougar Cheetah Leopard)
DLT=1
IDX=3
for i in {1..20}
  do    echo $IDX: ${animals[IDX]}
        (( IDX % (${#animals[@]}-1) )) || (( DLT *= -1 ))
        (( IDX += DLT))
  done
3: Cougar
4: Cheetah
5: Leopard
4: Cheetah
3: Cougar
2: Panther
1: Tiger
0: Lion
1: Tiger
2: Panther
3: Cougar
4: Cheetah
5: Leopard
4: Cheetah
3: Cougar
2: Panther
1: Tiger
0: Lion
1: Tiger
2: Panther


Last edited by RudiC; 03-24-2018 at 10:10 AM..
This User Gave Thanks to RudiC For This Post:
 

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Can some review my code would be appreicated?

I am getting an error "ftpNotes.sh: syntax error at line 8 : `<<' unmatched" #!/bin/ksh PATH=/usr/sbin/:/usr/bin:/usr/ucb:/etc:/usr/local/bin:. cd $HOME if ;then if ; then echo 'DSC file already ftp to epm server' else ftp -n epmdev00 <<SCRIPT... (1 Reply)
Discussion started by: sibghat
1 Replies

2. Shell Programming and Scripting

Can someone review my code tell me where I am going wrong?

Started writing my code. my read input is not even asking nor working? And I get a EOF script error. echo "1) aragorn.domain.net" echo "2) marvel.domain.net" echo "3) athena.domain.net" echo "4) gandalf.domain.net" echo "5) griffin.domain.net" echo "What server would you like... (4 Replies)
Discussion started by: chrchcol
4 Replies

3. Shell Programming and Scripting

Tricky array substitution in functions

Hello, Please tell me if there is a better way to get the number of elements from an array that is passed to a function. This is what works on Solaris 8 (ksh) but it looks odd: loop_array() { array_name=$2 b1='\${\#' b2='}' nr_elements=`eval echo... (6 Replies)
Discussion started by: majormark
6 Replies

4. Programming

[ C ] multidemensional array pass to functions

Please excuse my ineptitude for a bit as I've been spoiled for the past few months with only writing perl code instead of C. So ok, I've been thinking about some code to change the crc32 values that are held within central directory headers of zip files. Because I'm lazy I decided to just... (3 Replies)
Discussion started by: VRoemer
3 Replies

5. Shell Programming and Scripting

How to reduce code.....

Hi All, Could some one help me to reduce the code... if then ./plist -m "$queuename" |grep $2|awk '{print $3}' >unlock.log elif then ./plist -m "$queuename" |grep $2|awk '{print $4}' >unlock.log else ./plist -m "$queuename" |grep $2|awk '{print $5}' >unlock.log . . . . ... (1 Reply)
Discussion started by: harshakusam
1 Replies

6. Shell Programming and Scripting

Passing array to functions in ksh script

Let me know if there is a way to pass array to a funtion in ksh script. function isPresent { typeset member member=$1 dbList=$2 echo '$1:' $1 echo '$2' $dbList The array will be at the second position....something like this isPresent 12 <array> if then echo... (3 Replies)
Discussion started by: prasperl
3 Replies

7. Programming

c++ code to check whether a list is circular or not

hi all, i need c++ code to check whether a list is circular or not... please help (8 Replies)
Discussion started by: vidyaj
8 Replies

8. Shell Programming and Scripting

Need help on Assigning a Array variable from Background Functions

I have a question on how can I assign a output of a function to a variable which is executed in background. Here is my example $ cat sample_program.sh #!/bin/ksh exec_func () { sleep 1 v=`expr $1 + 100` print $v } export OUT_ARR date for i in 1 2 do OUT_ARR=`exec_func $i` &... (1 Reply)
Discussion started by: mohan_kumarcs
1 Replies

9. Shell Programming and Scripting

Reduce the number of lines by using Array

I have the following code to count the number of how many times the name occurred in one file. The code is working fine and the output is exactly what I want. The problem is the real code has more than 50 names in function listname which cause function name to have more than 50 case ,and function... (14 Replies)
Discussion started by: samsan
14 Replies
TIGERCRON(8)						      Administrator Commands						      TIGERCRON(8)

NAME
tigercron - Cron utility for Tiger UNIX Security Checker SYNOPSIS
tigercron [controlfile] [-B basedir] [tigeroptions...] DESCRIPTION
Tigercron is used to run periodically checks from the Tiger UNIX Security Checker. Tigercron reads a control file which is usually located in '/etc/tiger/cronrc' although it can also be specificied as the first argument when calling the program. The format of this control file is the same as for the cron program, each line indicates when different checks from Tiger will be run. The user can indicate where Tiger is installed through the -B basedir parameter, any other additional options provided in the command line will be passed on to configure to configure Tiger based on them (as described in tiger (8)). Tigercron runs the specified checks and compares their reports with previous stored reports (under /var/log/tiger). It will then mail the user defined in '/etc/tiger/tigerrc' (Tiger_Mail_RCPT) the results. When a module is run, tigercron checks: o If Tiger_Cron_Template is set to Y in tigerrc. If it is, it checks if there is a template stating which are the expected results. o If Tiger_Cron_CheckPrev is set to Y in tigerrc. If it is, it checks if there is a previous run of the module it can check against. A differential report is generated depending on the module reports and previous run and is sent through e-mail. These reports provide an easy way to detect intrusions even if no configuration of templates has been done. In the event of an intrusion a Tiger check might detect something specific (file changes, new processes, new users, etc.) and this alert mechanism provides a way to turn Tiger into a Host Intru- sion Detection System (HIDS). The ability of it to work as a proper HIDS is based on a good customization of the cronrc file. Modules that check events to which the host is most exposed to should be run often in order to detect deviations from normal behaviour. OPTIONS
Tigercron uses the same options as Tiger. A controlfile can be defined also to override the default. FILES
/etc/tiger/tigerrc Configuration file for the Tiger tool. /etc/tiger/cronrc Configuration file for the Tigercron tool. /var/log/tiger Location of the log messages generated by Tiger when run through cron /var/lib/tiger/work Working directory used by Tiger scripts to create temporary files. SEE ALSO
tigexp(8),tiger(8),cron(8),crontab(5) The deficiencies of using tigercron as a HIDS are described in the file README.hostids which is provided with the package. In Debian GNU/Linux you will find this (and other related) documentation at /usr/share/doc/tiger/ BUGS
Currently Tigercron has only one alert mechanism (mail) and signatures are not supported. Thus, alerts could be faked. Also, it is depen- dant on cron and will not work if cron is not working. AUTHOR
This manpage was written by Javier Fernandez-Sanguino. Security 19 September 2003 TIGERCRON(8)
All times are GMT -4. The time now is 01:38 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy