SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Basic structure for KSH with ARRAYs.


                                 ######EOF######
                                 #!/bin/ksh

                                 +--------------------------------------------------
                                 |
                                 |Description           : Default KSH-ARRAY
                                 |Author                : Marcos de Benedicto
                                 |Date                  : 08/02/2013
                                 |Version               : 1.0
                                 |
                                 +--------------------------------------------------
  Define KSH ARRAY, name and
                                 set -A ARRAY main ind_1
                       vector
                                 main()
                                 {
                                                       RC=$1
                                                       MSG=$2                                                      This vector is a return code
                                                                                                                   control and centralize exit
                                                       [ ${RC} -eq 0 ] && echo "Exec Ok!" || echo "Exec Not OK!"   command.

                                                       exit ${RC}
                                 }

                                 ind_1()
                                 {
Program execution and return
                                                       PROGRAM EXEC
          code identification.
                                                       ${ARRAY[0]} $?
                                 }

                                 ${ARRAY[1]}
                                 ######EOF######                        Start ARRAY, call vector 1.

Weitere ähnliche Inhalte

Andere mochten auch (11)

Target audience questionnire
Target audience questionnireTarget audience questionnire
Target audience questionnire
 
Rough cut feedback questionnaire
Rough cut feedback questionnaireRough cut feedback questionnaire
Rough cut feedback questionnaire
 
Evaluacion de proyectos
Evaluacion de proyectosEvaluacion de proyectos
Evaluacion de proyectos
 
United Nations Agreement
United Nations AgreementUnited Nations Agreement
United Nations Agreement
 
Arte programa segundo tempo
Arte programa segundo tempoArte programa segundo tempo
Arte programa segundo tempo
 
Diferencia entre los Tipos de virus
Diferencia entre los Tipos de virusDiferencia entre los Tipos de virus
Diferencia entre los Tipos de virus
 
Adaptations in fishes
Adaptations in fishesAdaptations in fishes
Adaptations in fishes
 
Justificacion
JustificacionJustificacion
Justificacion
 
NdP_Akamon, mejor empresa española de social gaming en los premios e digital
NdP_Akamon, mejor empresa española de social gaming en los premios e digitalNdP_Akamon, mejor empresa española de social gaming en los premios e digital
NdP_Akamon, mejor empresa española de social gaming en los premios e digital
 
Probleminhas avaliativos
Probleminhas avaliativosProbleminhas avaliativos
Probleminhas avaliativos
 
Fume tabaco
Fume tabacoFume tabaco
Fume tabaco
 

Mehr von Ohio University

Transformar a tecnologia em busca diferencial competitivo
Transformar a tecnologia em busca diferencial competitivoTransformar a tecnologia em busca diferencial competitivo
Transformar a tecnologia em busca diferencial competitivoOhio University
 
Gerenciamento de serviços de TI
Gerenciamento de serviços de TIGerenciamento de serviços de TI
Gerenciamento de serviços de TIOhio University
 
eboxx® - Central Monitoring
eboxx® - Central Monitoringeboxx® - Central Monitoring
eboxx® - Central MonitoringOhio University
 
Mediation Group Livestream Example
Mediation Group Livestream ExampleMediation Group Livestream Example
Mediation Group Livestream ExampleOhio University
 
Gerencia de Serviços de TI
Gerencia de Serviços de TIGerencia de Serviços de TI
Gerencia de Serviços de TIOhio University
 
Control-M 800 - Infrastructure Example
Control-M 800 - Infrastructure ExampleControl-M 800 - Infrastructure Example
Control-M 800 - Infrastructure ExampleOhio University
 
Logística de Materiais - Supply Chain
Logística de Materiais - Supply ChainLogística de Materiais - Supply Chain
Logística de Materiais - Supply ChainOhio University
 
Retail Integration Bus (RIB)
Retail Integration Bus (RIB)Retail Integration Bus (RIB)
Retail Integration Bus (RIB)Ohio University
 
Webserver Architecture Example
Webserver Architecture ExampleWebserver Architecture Example
Webserver Architecture ExampleOhio University
 
Cloud Infrastructure Layers - Basics
Cloud Infrastructure Layers - BasicsCloud Infrastructure Layers - Basics
Cloud Infrastructure Layers - BasicsOhio University
 
Sistema de Freio ABS+EBD
Sistema de Freio ABS+EBDSistema de Freio ABS+EBD
Sistema de Freio ABS+EBDOhio University
 
Oracle RMS - Performance
Oracle RMS - PerformanceOracle RMS - Performance
Oracle RMS - PerformanceOhio University
 
Control-M 6.4 Infrastructure
Control-M 6.4 InfrastructureControl-M 6.4 Infrastructure
Control-M 6.4 InfrastructureOhio University
 
Oracle Retail Introduction
Oracle Retail IntroductionOracle Retail Introduction
Oracle Retail IntroductionOhio University
 

Mehr von Ohio University (18)

Transformar a tecnologia em busca diferencial competitivo
Transformar a tecnologia em busca diferencial competitivoTransformar a tecnologia em busca diferencial competitivo
Transformar a tecnologia em busca diferencial competitivo
 
Gerenciamento de serviços de TI
Gerenciamento de serviços de TIGerenciamento de serviços de TI
Gerenciamento de serviços de TI
 
Applications Server
Applications ServerApplications Server
Applications Server
 
eboxx® - Central Monitoring
eboxx® - Central Monitoringeboxx® - Central Monitoring
eboxx® - Central Monitoring
 
Mediation Group Livestream Example
Mediation Group Livestream ExampleMediation Group Livestream Example
Mediation Group Livestream Example
 
Gerencia de Serviços de TI
Gerencia de Serviços de TIGerencia de Serviços de TI
Gerencia de Serviços de TI
 
Control-M 800 - Infrastructure Example
Control-M 800 - Infrastructure ExampleControl-M 800 - Infrastructure Example
Control-M 800 - Infrastructure Example
 
Logística de Materiais - Supply Chain
Logística de Materiais - Supply ChainLogística de Materiais - Supply Chain
Logística de Materiais - Supply Chain
 
Retail Integration Bus (RIB)
Retail Integration Bus (RIB)Retail Integration Bus (RIB)
Retail Integration Bus (RIB)
 
Webserver Architecture Example
Webserver Architecture ExampleWebserver Architecture Example
Webserver Architecture Example
 
Cloud Infrastructure Layers - Basics
Cloud Infrastructure Layers - BasicsCloud Infrastructure Layers - Basics
Cloud Infrastructure Layers - Basics
 
AWS VPC Objects
AWS VPC ObjectsAWS VPC Objects
AWS VPC Objects
 
Sistema de Freio ABS+EBD
Sistema de Freio ABS+EBDSistema de Freio ABS+EBD
Sistema de Freio ABS+EBD
 
Cache Content 3 Layers
Cache Content 3 LayersCache Content 3 Layers
Cache Content 3 Layers
 
Oracle RMS - Performance
Oracle RMS - PerformanceOracle RMS - Performance
Oracle RMS - Performance
 
Oracle SOA Suite 11g
Oracle SOA Suite 11gOracle SOA Suite 11g
Oracle SOA Suite 11g
 
Control-M 6.4 Infrastructure
Control-M 6.4 InfrastructureControl-M 6.4 Infrastructure
Control-M 6.4 Infrastructure
 
Oracle Retail Introduction
Oracle Retail IntroductionOracle Retail Introduction
Oracle Retail Introduction
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

KSH Arrays

  • 1. Basic structure for KSH with ARRAYs. ######EOF###### #!/bin/ksh +-------------------------------------------------- | |Description : Default KSH-ARRAY |Author : Marcos de Benedicto |Date : 08/02/2013 |Version : 1.0 | +-------------------------------------------------- Define KSH ARRAY, name and set -A ARRAY main ind_1 vector main() { RC=$1 MSG=$2 This vector is a return code control and centralize exit [ ${RC} -eq 0 ] && echo "Exec Ok!" || echo "Exec Not OK!" command. exit ${RC} } ind_1() { Program execution and return PROGRAM EXEC code identification. ${ARRAY[0]} $? } ${ARRAY[1]} ######EOF###### Start ARRAY, call vector 1.