Rewrite the junk script of this chapter to be menu driven. Use the select command.
What will be an ideal response?
In this case, list the possible functions (junk, purge, and list). In the case of junking files, a
secondary menu will be necessary where the user can select which files are to be junked.
Computer Science & Information Technology
You might also like to view...
The plot area and the chart area are the two background elements of an Excel chart
Indicate whether the statement is true or false
Computer Science & Information Technology
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
A. Alice's private key B. Bob's public key C. Alice's public key D. Bob's private key
Computer Science & Information Technology