Rewrite the junk script of this chapter to be menu driven. Use the select command.

What will be an ideal response?

In this case, list the possible functions (junk, purge, and list). In the case of junking files, a
secondary menu will be necessary where the user can select which files are to be junked.

Computer Science & Information Technology

You might also like to view...

The plot area and the chart area are the two background elements of an Excel chart

Indicate whether the statement is true or false

Computer Science & Information Technology

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

A. Alice's private key B. Bob's public key C. Alice's public key D. Bob's private key

Computer Science & Information Technology