Chapter 07 Scripting Quicktest Professional Page 1

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 07 Scripting Quicktest Professional Page 1 Chapter 07 Scripting Quicktest Professional Page 1 SCRIPTING EXCEL ............................................................................................................... 2 CREATING AND TERMINATING AN INSTANCE OF MS-EXCEL ............................................... 2 RETURNING A COLLECTION OF DISK DRIVES ..................................................................... 3 BINDING TO A SPECIFIC DISK DRIVE ................................................................................. 3 ENUMERATING DISK DRIVE PROPERTIES ........................................................................... 4 ENSURING THAT A DRIVE IS READY .................................................................................. 4 MANAGING FOLDERS ............................................................................................................. 5 BINDING FOLDERS ............................................................................................................ 5 VERIFYING THAT A FOLDER EXISTS .................................................................................. 6 CREATING A FOLDER ........................................................................................................ 6 DELETING A FOLDER ......................................................................................................... 7 COPYING A FOLDER AND ITS CONTENTS ........................................................................... 8 MOVING A FOLDER AND ITS CONTENTS ............................................................................ 9 RENAMING A FOLDER ..................................................................................................... 10 ENUMERATING FOLDER PROPERTIES ............................................................................... 11 MANAGING FOLDER ATTRIBUTES ................................................................................... 12 MANAGING FILES ................................................................................................................ 18 BINDING TO A FILE ......................................................................................................... 18 VERIFYING THAT A FILE EXISTS ..................................................................................... 19 DELETING A FILE ............................................................................................................ 20 COPYING A FILE .............................................................................................................. 21 MOVING A FILE ............................................................................................................... 22 RENAME A FILE .............................................................................................................. 23 MANAGING FILE PROPERTIES .......................................................................................... 23 READING AND WRITING TEXT FILES .................................................................................. 27 READING TEXT FILES ...................................................................................................... 30 WRITE TO TEXT FILES ..................................................................................................... 34 MANAGING FILES AND FOLDERS USING WMI.................................................................... 36 COMPARING WMI AND THE FILE SYSTEM OBJECT ............................................................ 37 MANAGING FILES AND FOLDERS USING THE WINDOWS SHELL OBJECT ........................... 40 FOLDERS AND FOLDERS OBJECT ......................................................................................... 41 WIN 32_D IRECTORY CLASS ............................................................................................. 41 THE FILE SYSTEM OBJECT OBJECT ...................................................................................... 51 THE FSO OBJECT MODEL ............................................................................................... 51 PROGRAMMING THE FILE SYSTEM OBJECT ....................................................................... 53 THE FILE SYSTEM OBJECT PROPERTIES AND METHODS ..................................................... 53 DRIVES COLLECTION OBJECT ......................................................................................... 74 DRIVE OBJECT ................................................................................................................ 75 FOLDERS COLLECTION OBJECT ....................................................................................... 80 FOLDER OBJECT .............................................................................................................. 83 FILES COLLECTION OBJECT ............................................................................................. 91 FILE OBJECT ................................................................................................................... 93 TEXT STREAM OBJECT ....................................................................................................101 Q&A ...................................................................................................................................106 HOW TO ENUMERATE FOLDERS AND FOLDER PROPERTIES ? ...........................................106 HOW TO ENUMERATE ALL THE FOLDERS ON A COMPUTER ?...........................................108 HOW TO ENUMERATE THE SUBFOLDERS OF A FOLDER ?..................................................108 HOW TO RENAME ALL THE FILES IN A FOLDER ?.............................................................109 Dani Vainstein Working with Files Page 1 of 112 Chapter 07 Scripting Quicktest Professional Page 2 CAN I READ A TEXT FILE FROM THE BOTTOM UP ?............................................................109 HOW CAN I COUNT THE NUMBER OF LINES IN A TEXT FILE ?.............................................110 HOW CAN I COUNT THE NUMBER OF TIMES A WORD APPEARS IN A LOG FILE ?..................110 APPENDIX 5.A .....................................................................................................................111 Scripting Excel Drives, files and folders are the lifeblood of any organization; this makes file system administration one of the most important responsibilities assigned to system administrators. Of course, file system administration is also one of the more difficult responsibilities to carry out, simply because files and folders are scattered on multiple hard disks and multiple computers throughout the organization. Scripts can help make file system management much easier, particularly when the files and folders managed, are located on remote computers. Creating and Terminating an Instance of MS-Excel Let's start with the simplest possible script, one that creates an instance of Microsoft Excel and then adds a new workbook to that instance: Set oXlsApp = CreateObject ("Excel.Application" ) oXlsAp.Workbooks.Add By running the preceding script, you really did create a brand-new instance of Microsoft Excel. Press CTRL-ALT-DEL and take a look at the Processes tab in the Task Manager. You should see an instance of Excel.exe By default, any time you use a script to create an instance of a Microsoft Office application, that application runs in a window that is not visible on screen. Excel is there; you just can't see it This is a real, live instance of Microsoft Excel. As you'll soon see, you can programmatically read data from it or, for that matter, do pretty much anything else you can do with Excel. The only functionality you lose when Excel runs in an invisible window is the ability to type something on the keyboard and have the application reacts to those keystrokes. And that's what makes the default behavior useful. Suppose you were running a script that created a report using Excel, and suppose Excel was visible the whole time the script was running. A user (even yourself) could accidentally hit a key on the keyboard and ruin the entire report. A user (even yourself) could simply close Excel, ruining not only the report, but also causing your script to blow up. (After all, the script will be trying to send commands to an instance of Excel that no longer exists.) By running Excel invisibly, you can sidestep problems like that. What if you would like Excel to be visible on screen? No problem just set the Visible property to True. Set oXlsApp = CreateObject ("Excel.Application" ) oXlsAp.Workbooks.Add oXlsApp.Visible = True Dani Vainstein Working with Files Page 2 of 112 Chapter 07 Scripting Quicktest Professional Page 3 Wait 10 MsgBox "The script is now complete." What happens when you run this script? Well, an instance of Excel will be created, and it will appear on your screen. There will be a 10-second pause, and then a message will appear telling you that the script is now complete. When you click OK, the script will immediately terminate (as soon as Microsoft® VBScript reaches the end of a script, the script process terminates). Returning a Collection of Disk Drives Before you can manage disk drives on a computer, you need to know which disk drives are actually available on that computer. The FileSystemObject allows you to return a collection of all the drives installed on a computer, including removable drives and mapped network drives (in other words, any drive with a drive letter). To return this collection, create an instance of the FileSystemObject , and then create a reference to the Drives property.
Recommended publications
  • Windows® Scripting Secrets®
    4684-8 FM.f.qc 3/3/00 1:06 PM Page i ® WindowsSecrets® Scripting 4684-8 FM.f.qc 3/3/00 1:06 PM Page ii 4684-8 FM.f.qc 3/3/00 1:06 PM Page iii ® WindowsSecrets® Scripting Tobias Weltner Windows® Scripting Secrets® IDG Books Worldwide, Inc. An International Data Group Company Foster City, CA ♦ Chicago, IL ♦ Indianapolis, IN ♦ New York, NY 4684-8 FM.f.qc 3/3/00 1:06 PM Page iv Published by department at 800-762-2974. For reseller information, IDG Books Worldwide, Inc. including discounts and premium sales, please call our An International Data Group Company Reseller Customer Service department at 800-434-3422. 919 E. Hillsdale Blvd., Suite 400 For information on where to purchase IDG Books Foster City, CA 94404 Worldwide’s books outside the U.S., please contact our www.idgbooks.com (IDG Books Worldwide Web site) International Sales department at 317-596-5530 or fax Copyright © 2000 IDG Books Worldwide, Inc. All rights 317-572-4002. reserved. No part of this book, including interior design, For consumer information on foreign language cover design, and icons, may be reproduced or transmitted translations, please contact our Customer Service in any form, by any means (electronic, photocopying, department at 800-434-3422, fax 317-572-4002, or e-mail recording, or otherwise) without the prior written [email protected]. permission of the publisher. For information on licensing foreign or domestic rights, ISBN: 0-7645-4684-8 please phone +1-650-653-7098. Printed in the United States of America For sales inquiries and special prices for bulk quantities, 10 9 8 7 6 5 4 3 2 1 please contact our Order Services department at 1B/RT/QU/QQ/FC 800-434-3422 or write to the address above.
    [Show full text]
  • CA Arcserve Backup for Windows Command Line Reference Guide
    CA ARCserve® Backup for Windows Command Line Reference Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only and are subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be used or disclosed by you except as may be permitted in a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • Sys-Manage Copyright2 User Manual
    Sys-Manage User Manual CopyRight2 CopyRight2 User Manual (C) 2001-2021 by Sys-Manage Copyright © 2012 by Sys-Manage. All rights reserved. This publication is protected by Copyright and written permission should be obtained from the publisher prior any prohibited reproduction, storage in retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. Sys-Manage Informatica SL Phone: +1 (408) 345-5199 Phone: +1 (360) 227-5673 Phone: +44 (0) 8455273028 Phone: +49-(0)69-99999-3099 Phone : +34-810 10 15 34 Mail: [email protected] Web: http://www.Sys-Manage.com YouTube: www.YouTube.com/SysManage Twitter: www.twitter.com/SysManage Facebook: www.facebook.com/pages/Sys-Manage/153504204665791 Use of trademarks: Microsoft, Windows, Windows NT, XP, Windows Vista, Windows7, Windows8 and the Windows logo are ® trademarks of Microsoft Corporation in the United States, other countries, or both. All other company, product, or service names may be trademarks of others and are the property of their respective owners. Page 2 / 212 Document Version 1.52 02-15-2021 CopyRight2 User Manual (C) 2001-2021 by Sys-Manage ABSTRACT ............................................................................................................................................................ 8 REQUIREMENTS ................................................................................................................................................. 9 USAGE SCENARIOS .........................................................................................................................................
    [Show full text]
  • CA Arcserve Backup for Windows Release Summary
    CA ARCserve® Backup for Windows Release Summary r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
    [Show full text]
  • The Extended FAT File System
    Linux Conference October 26- 28, 2011 Prague , Czech Republic Linux Development Center The Extended FAT file system Differentiating with FAT32 file system Keshava Munegowda , Venkatraman S Texas Instruments (India) Pvt Ltd Bangalore. Dr. G T Raju Professor and Head, Computer Science and Engineering Department, 1 R N S Institute of Technology, Bangalore, India. ExFAT Linux Development Center Agenda Ø FAT file system Ø Need for ExFAT file system Ø ExFAT file system organization Ø Boot Sector of FAT and ExFAT Ø Snapshot of Boot Sector of ExFAT Ø Directory Entries of FAT Ø Directory Entries of ExFAT Ø Clusters Heap Ø Up-Case Table Ø Snapshot of Root directory Ø Performance Benchmarking in Linux Ø Performance Benchmarking in Windows 2 Ø References ExFAT Linux Development Center FAT File system Minimum 1 BPB sector BPB - BIOS Parameter Block – BIOS : Basic Input-Output System FAT1 – Also Called as “Boot Sector” or “Volume Boot Record” – Specifies FAT2 • Number of sectors in the storage partition/disk/device Cluster 2 • Number of FATs ( File Allocation Table) Cluster 3 • Sectors per cluster Cluster 4 …………. Data FAT1 – File Allocation Table …………. clusters - Linear linking (chain) of data clusters of the …………. file/directory FAT2 – Backup of FAT1 FILE.TXT cluster3 cluster7 EOF Data clusters - Group of physical/logical sectors/blocks Clusters chain / Linked list of 3 clusters - Contains directories or Files data ExFAT Linux Development Center Need For ExFAT file system l FAT File system limited to support only 32GB. – FAT does not support Higher size SDXC cards. l NTFS – Security features – Optional for Removable storage devices – Meta data overhead for file/directory – Write caching mechanism for performance optimizations causes the data corruption in when 4 removable storage device is unplugged.
    [Show full text]
  • PKZIP® 2.50 Command Line User's Manual Copyright © 1997 PKWARE, Inc
    PKZIP® 2.50 Command Line User's Manual Copyright © 1997 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any other language in whole or in part, in any form or by any means, whether it be electronic, mechanical, magnetic, optical, manual or otherwise, without prior written consent of PKWARE, Inc. PKWARE, INC. DISCLAIMS ALL WARRANTIES AS TO THIS SOFTWARE, WHETHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, FUNCTIONALITY, DATA INTEGRITY OR PROTECTION. PKWARE, the PKWARE logo, and PKZIP are registered trademarks of PKWARE, Inc. Trademarks of other companies mentioned in this documentation appear for identification purposes only and are the property of their respective companies. Table of Contents Chapter 1 Welcome to PKZIP 1 Introduction 2 About This Manual 2 Your Work Environment: The Command Line 3 Using Help 3 Getting License Information 4 Getting Version Information 5 Using PKWARE Technical Support 6 Using Internet/Usenet 6 Using CompuServe 7 Using the PKWARE BBS 7 Before You Call 7 Calling a PKWARE Technical Support Representative 8 Using the PKWARE Customer Support Form 8 Chapter 2 The Basics 11 Introduction 12 Using the Tutorials 12 Conventions Used in the Tutorials 13 Using Sample Files and Directories 13 Preparing Your Workspace 13 .ZIP File Naming Conventions 14 Compressing Files: Learning the Basics 14 Compressing a Single File in the Current
    [Show full text]
  • Veritas Backup Exec.Pdf
    VERITAS Backup Exec™ for Windows NT/2000 White Paper Table of Contents Introduction: .................................................................................................................................................................1 The VERITAS/Microsoft Partnership..............................................................................................................................2 The Microsoft Standard .............................................................................................................................................2 More Than Backup ....................................................................................................................................................2 The MTF Tape Format Standard ................................................................................................................................2 Microsoft Windows 2000 Rapid Deployment Program...............................................................................................2 Field Proven Solutions ..............................................................................................................................................3 Product and Scalability.................................................................................................................................................3 Microsoft Windows 2000...........................................................................................................................................3 Protecting Windows
    [Show full text]
  • Technical Reference Guide
    PDT 3200 Technical Reference Guide PDT 3200 Technical Reference Guide 70-31468-01 Revision A — July, 1997 ii Symbol Technologies, Inc. One Symbol Plaza, Holtsville N.Y. 11742 PDT 3200 Technical Reference Guide 70-31468-01 Revision A July, 1997 1997 by Symbol Technologies, Inc. All rights reserved. No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Symbol. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an Òas isÓ basis. All software, including Þrmware, furnished to the user is on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each software or Þrmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Symbol. The user agrees to maintain SymbolÕs copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part.
    [Show full text]
  • PKZIP 6.0 Command Line User's Manual
    PKZIP® 6.0 Command Line User’s Manual Copyright © 1997-2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any other language in whole or in part, in any form or by any means, whether it be electronic, mechanical, magnetic, optical, manual or otherwise, without prior written consent of PKWARE, Inc. PKWARE, INC., DISCLAIMS ALL WARRANTIES AS TO THIS SOFTWARE, WHETHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, FUNCTIONALITY, DATA INTEGRITY, OR PROTECTION. PKWARE IS NOT LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES. Portions of this software include RSA BSAFE ® cryptographic or security protocol software from RSA Security Inc. PKWARE, the PKWARE logo, the zipper logo, PKZIP, PKUNZIP, and PKSFX are registered trademarks of PKWARE, Inc. Trademarks of other companies mentioned in this documentation appear for identification purposes only and are the property of their respective companies. RSA and BSAFE are registered trademarks of RSA Security Inc. ii Disclaimer Table of Contents WELCOME TO PKZIP...........................................................................................1 Overview: ..........................................................................................................................1 Sections in This Chapter:.................................................................................................1 Introduction
    [Show full text]
  • Acronis Backup & Recovery 11
    Acronis Backup & Recovery 11 Server for Linux Update 0 User Guide Copyright © Acronis, Inc., 2000-2011. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Third party code may be provided with the Software and/or Service. The license terms for such third-parties are detailed in the license.txt file located in the root installation directory. You can always find the latest up-to-date list of the third party code and the associated license terms used with the Software and/or Service at http://kb.acronis.com/content/7696 2 Copyright © Acronis, Inc., 2000-2011 Table of contents 1 Introducing Acronis Backup & Recovery 11 ...............................................................................
    [Show full text]
  • Command Line Users Manual
    Command Line Users Manual PKZIP® Command Line SecureZIP® Command Line Copyright © 1997-2011 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any other language in whole or in part, in any form or by any means, whether it be electronic, mechanical, magnetic, optical, manual or otherwise, without prior written consent of PKWARE, Inc. PKWARE, INC., DISCLAIMS ALL WARRANTIES AS TO THIS SOFTWARE, WHETHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, FUNCTIONALITY, DATA INTEGRITY, OR PROTECTION. PKWARE IS NOT LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES. PKWARE, the PKWARE logo, the zipper logo, PKZIP, PKUNZIP, SecureZIP, and PKSFX are registered trademarks of PKWARE, Inc. Deflate64 is a trademark of PKWARE, Inc. Trademarks of other companies mentioned in this documentation appear for identification purposes only and are the property of their respective companies. 2011-10-25 iii Table of Contents 1 THE BASICS ................................................................................................. 1 About This Manual ..................................................................................................... 1 Conventions in This Guide ........................................................................................ 2 An Overview of What PKZIP Does ............................................................................ 2 Supported
    [Show full text]
  • 1 Learning Objectives After Completing This Chapter, You Will Be
    Learning Objectives After completing this chapter, you will be able to: 1. Define operating system. 2. Define enhancements. 3. Explain the function and purpose of OS 3. Use the DIR command to display the files on version numbers. the screen. 4. List some of the types of system configura- 4. Use the VER command to determine which tions. version of Windows is being used. 5. Explain the need and procedure for booting 5. Use the CLS command to clear the screen. the system. 6. Use the DATE and TIME commands to set or 6. Explain the function of disk files. change the date and time on the computer. 7. Explain the function of and rules for file 7. Make a copy of a disk. specifications. 8. End a computer work session. 8. List and explain the importance of the two Chapter Overview types of computer files. Most people who use computers are really 9. Describe the function and purpose of com- interested in application software. They want mands. programs that are easy to use and that help them 10. Compare and contrast internal and external solve specific problems. However, before you can commands. use application software, you must know at least 11. Explain the function and purpose of the DIR, the basics of using the operating system. No VER, and CLS commands. computer can work without an operating system 12. Explain the purpose of and the procedure for in RAM. The Windows operating system takes using the DATE and TIME commands. care of mandatory functions for computer 13. Explain the legal and ethical ramifications of operations such as handling the input and output copying disks that were not purchased.
    [Show full text]