wholesale k gold jewelry Who has the explanation of the DOS command.

wholesale k gold jewelry I need to use it urgently. I want to take the exam ... thanks .........

5 thoughts on “wholesale k gold jewelry Who has the explanation of the DOS command.”

  1. luxury wholesale jewelry Winver --------- Check the Windows version
    WMIMGMT.MSC ---- Open the Windows Management Architecture (WMI)
    WUPDMGR ---------------- Windows update program
    WScript --------windows脚本宿主设置rnwrite----------写字板rnwinmsd---------系统信息rnwiaacmgr--- ---- Scanner and camera wizard
    winchat ----------- XP comes with LAN chat

    Mem.exe ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- nmsconfig.exe --- System configuration utility
    mplayer2 ------- Simple Widnows Media Player
    MSPaint -------------------------------------------------------------- ---- Remote desktop connection
    mplayer2 ------- Media player
    magnify -------------------------------------------- -Open the console
    mobsync -------- Synchronous command
    nDXDIAG --------- Check DirectX information
    drwtsn32 ----------------医生rndevmgmt.msc--- 设备管理器rndfrg.msc-------磁盘碎片整理程序rndiskmgmt.msc---磁盘管理实用程序rndcomcnfg--- ---- Open the system component service
    DDESHARE ------- Open the DDE sharing settings
    dvdplay ------------ DVD player
    at/?> Pour in the notepad

    net stop messenger ----- Stop meal service
    net start messenger ---- Start meal service
    notePad ------------------------- rnnslookup-------网络管理的工具向导rnntbackup-------系统备份和还原rnnarrator-------屏幕“讲述人” r NNTMSMGR.MSC ---- Mobile Storage Manager
    NTMSOPRQ.MSC --- Mobile store administrator operating requests
    netStat -An ---- (TC) command check Check the interface

    SYNCAPP -------- Create a briefcase
    sysetit ---------------------------------------------------------------------- Signature verification program
    sndoldRC32 ------- Posterior
    shrpubw -------- Create a shared folder
    SECPOL.MSC ----- Local security strategy nsyskey- -------- System encryption, once encryption, cannot be unlocked, protect the dual password of the Windows XP system
    Services.msc --- Local service settings
    sndvol32 ------- Volume control control程序rnsfc.exe--------系统文件检查器rnsfc /scannow---windows文件保护rnrntsshutdn-------60秒倒计时关机Command
    toursTart ------- XP Introduction (roaming XP program after installation)
    taskmgr ------------ n
    eventvwr ----------------------------------------------------- --- Event Viewer
    eudCedit -------------------- Open the resource manager

    packager ------------------------------------------------------------ Object packaging program
    perfmon.msc ---- Computer performance monitoring program
    progman ----------------------------------- nRSOP.MSC ------------------------------------------------R nregedt32 ---------
    rononce -P --- 15 seconds to shut down
    Regsvr32 /u * .dll ---- Stop DLL file run
    Regsvr32 /u zipfldr.dll ------ Cancel ZIP support

    cmd.exe ------------ CMD command prompt
    chkdsk.exe ----- CHKDSK disk check
    certmgr.msc ---- Certificate management utility
    Calc ---------------------------Charmap -------- The starting character mapping table
    Cliconfg -------- SQL Server client network utility
    clipbrd -------- ------------ Start
    compmgmt.msc --- Computer Management
    CLEANMGR ------- Waste Turnish
    CIADV.MSC -------

    oSK-- ---------- Open the screen keyboard
    odbcad32 ------- ODBC data source manager
    oobe /msoobe /a ---- check whether XP activates
    lusrmgr. MSC ---- The user and group of this machine
    logoff ---------- Logging out the command

    iexpress ------- The Trojan tied tool, the system comes with

    nslookup ------------- IP address detector

    fsmgmt.msc ----- Share folder manager

    utilman ------------------------------------------------------ --- Auxiliary tool manager

    gpedit.msc ----- Group strategy

    content in the content of

    Enter box
    In Windows, Microsoft provides a new way to start the program: Run
    Open [Start] ----- [Run], you can directly start some specific programs, which can directly start some specific programs. Such as: Enter NotePad.exe to start notepad, enter XDICT.EXE to start Jinshan Ci Fa, and so on.

    What is the principle of startup? It's very simple, under the registry HKEY_LOCAL_MACHINESOFTWAREMICROSOFTWINDWINDOWS App Paths, you can see many secondary main keys, each secondary primary key corresponds to a content that can be entered inside.

    The main key of the ACDSee.exe as an example: there are 2 string on the right, the default corresponds to the absolute path of this program, and Path corresponds to the directory where this program is located.

    The customized method is very simple: create a new secondary primary key (for example: .exe) under the App Paths, and then modify the path of the procedure you want to start on the right (eg: C : Program Filesmy App.exe), and then create a new string Path to modify the directory where the program is located (for example :: C: Program Filesmy APP).

    Then you can enter the program in the run: .exe to start the program C: Program Filesmy App.exe.

    Note! The system rely on the name of the secondary main key to identify the program. Even if you do not use the .exe to establish the secondary main key, and use sssss.exe to create the secondary main key, if the content of any PATH is the same as the above example, enter sssss.exe The startup program is still the program C: Program Filesmy App.exe.

    wupdmgr widnows update
    shutdown -A shutdown
    about: Home Log in the homepage
    ... (three half -angle points) My computer
    dvdplay DVD player
    FSMGMT shared console
    The desktop opens the folder of the desktop
    .. (two points) Open C: Documents and settings
    . Device
    Clipbrd clipboard viewer
    Control open the control panel
    eventvwr event viewer
    MSTSC remote desktop
    nWin2000 command complete works [post] -> Windows 2K/2003 server rnaccwiz.exe > Wizard for walking you through setting up your machine for your mobility needs. 辅助工具向导rnacsetups.exe > ACS setup DCOM server rnactmovie.exe > Direct Show setup tool 直接显示安装工具 rnappend.exe > Allows programs to open data in specified as if they were in the current directory. 允许程序打开制定目录中的数据rnarp.exe > NETWORK Display and modify IP - Hardware addresses 显示和更改计算机的The corresponding list of IP and hardware physical addresses
    at.exe> ​​at is a scheeling utility also included with unix plan operation task
    atmadm.exe> ​​displays for atm call manager. ATM calls manager statistics
    attrib. Exe> Display and Modify for Files and Folders Display and change the attributes of files and folders
    autochk.exe> ​​Used to Check and Repair Windows File Sys TEMS detection and repair file system
    autoconv.exe> ​​automates the file system raing reBoots automatically conversion system
    autofmt.exe> ​​automates the file format procestes ring ( Ring ( RingLoots in the startup process .exe > Used for long file names 使用长文件名格式rnbootok.exe > Boot for registry rnbootvrfy.exe > Bootvrfy.exe, a program included in Windows 2000 that notifies the system that startup was . Bootvrfy. exe can be run on a local or remote computer. The notification starts successfully
    cacls.exe> ​​Displays or Modifies Access Control Lists (ACLS) of Files. ncdplayer.exe> ​​Windows CD Player CD player
    change.exe> ​​Change {user | port | logon} related to the terminal server
    CHARMAP.Exe> CHARACTER MAP characters > Same as use "Change Logon" Start or Disable Session Record
    CHGPORT.EXE> Same as use "Change Port" to change port (terminal service)
    CHGUSR.Exe> The "Change User" to change the user. (Terminal service)
    chkdsk.exe> ​​Check the Hard Disk for Error Similar To Scandisk 3 Stage Specify A Drive Letter disk detection program
    chkntfs.exe> ​​Same as use chkds K But for NTFS NTFS disk detection program
    cidaemon.exe> ​​Component of Ci FILER Service to form a CI document service
    cipher.exe> ​​Displays or Alters the of [Files] on NTFS.文件或目录rncisvc.exe > Content Index -- Its the content indexing service for I 索引内容rnckcnv.exe > Cookie Convertor 变换Cookie rncleanmgr.exe > Disk Cleanup, popular with Windows 98 磁盘清理rncliconfg.exe > SQL Server Client Network Utility SQL客户网络工具rnclipbrd.exe > Clipboard viewer for Local will allow you to connect to other 剪贴簿查看器rnclipsrv.exe > Start the clipboard Server 运行Clipboard service
    clspack.exe> ​​clspack userd to create a file listing of system package. Prompt is nothing to say!
    cmdl32.exe> ​​Manager Auto-DOWNLOAD automatic download connection management
    cmmgr32.exe> ​​Manager
    cmmon32.exe> ​​Manager Monitor Monitor
    CMSTP.EXE> Manager PROFILE Manager Manager configuration file installation program
    ComClust.exe> ​​About Cluster Server cluster
    comp.exe> ​​comclust add, remove, or job a cluster. > Displays or Alters the of Files on NTFS. Show or change the compression state of the file on the file on the NTFS partition
    cons.exe> ​​console IME IME IME IME IME IME table
    Control.exe> ​​Starts The Control Panel control panel
    convert. Exe> Convert file system to NTFS conversion file system to NTFS
    convlog.exe> ​​Converts MS IIS Log Files conversion IIS log file format to NCSA format
    cprofile.exe> ​​Copy Profiles conversion display mode
    cscrift. > MS Windows Scripts Host Version 5.1 较本宿主版本rncsrss.exe > Client Server Runtime Process 客户服务器Runtime进程rncsvde.exe > Comma Separated Variable Import/Export Utility 日至格式转换程序rndbgtrace. Exe> and Terminal Server related
    dcomcnfg.exe> ​​Display the Current DCOM. DCOM configuration attribute
    dcphelp.exe>?
    dcpromo.exe> ​​PROMOTE A Domain to Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi Adsi -Adweight > DIS Play DDE Shares on Local or Remote Computer DDE sharing
    ddmprxy.exe> ​​
    Debug.exe> ​​Runs debug, a program test and editing too.
    DFRGFAT.EXE> Defrag Fat FILE SYSTEM FAT partition Disk Fragmentation program
    DFRGNTFS.Exe> Defrag NTFS FILE SYSTEM NTFS Disk Fragmentation program
    dfs_cmd_.exe> ​​A DFS TREE configuration. ndfsinit.exe> ​​File System distributed file system initialization
    dfssvc.exe> ​​File System Server distributed file system server
    diantz.exe> ​​MS Cabinet Maker makes CAB file
    diskperf.exe> ​​Starts Physical disical COUNTERS disk performance counter
    dllhost.exe> ​​dllhost is user version of Windows 2000. DLLHOST is the hedost process for all com . > Disk Manager Service disk management service
    dmremote.exe> ​​Part of disk disk management service
    dns.exe> ​​DNS DNS
    doskey.exe> ​​RECalls Windows and Creates Macros command line creates Hong Kong R NDOSX.Exe> DOS Extender Dos extension
    dplaysvr.exe> ​​Direct Play Helper directly run help
    drwatson.exe> ​​DR Watson for 2000 FAULT DETECTOR Error Test
    DRWTSN32.exe> ​​DR WATSS FOR 2000 Viewer and Manager Dr. Huasheng Show and Configuration Management
    DTCSetup.exe> ​​Installs MDTC
    DVDPlay.exe> ​​Windows 2000 DVD Player DVD Play
    dxdiag.exe> ​​Direct-X Direc T-x diagnostic tool
    edlin.exe> ​​line-oriented text editor. )
    ewlin.exe> ​​line-oriented text editor. TYPE Word Creation Program
    eventvwr.exe> ​​Windows 2000 Event Viewer Event Viewer
    evnt_cmd_.exe> ​​event to trap; TOOL
    evntwin.exe> ​​Event to trap setup
    exexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexexeeexeexeeexex. To binary Format conversion EXE file to binary
    expand.exe> ​​Expand files that have ben to decompress
    extrac32.exe> ​​Cab file utility
    fastopen. Hard Disk and Stores The in Memory for Fast Access. Quick access to the hard disk file in the memory
    faxcover.exe> ​​FAX COVER PAGE EDITOR fax editing
    faxqueue.exe> ​​Display Fax Queuue .exe> ​​FAX Wizard for Sending Faxes Send Fax Guide
    FAXSVC.Exe> Starts Fax Server Start Fax Service
    FC.EXE> Compares Two Files OF Files and Their. nfind.exe> ​​Searches for a Text String in File or Files Find the text line in the file
    findstr.exe> ​​Searchs for Strings in Files Finding the line
    finger.exe a user a ND Displays On that User Finger user also shows the statistical results
    fixmapi.exe> ​​Fix Mapi Files Fix Mapi File
    FLATTEMP.Exe> ENable or Disable allows or disables the temporary file directory
    fontView.exe> ​​diPl FONTS in a FONT FILE display the fonts in the font file
    Forcedos.exe> ​​Forces a file to start in dos mode. .exe > File Transfer Protocol used to transfer files over a network 就是FTP了rngdi.exe > Graphic Device Interface 图形界面驱动rngrovel.exe > rngrpconv.exe > Program Manager Group Convertor 转换程序管理Membership group
    help.exe> ​​Displays Help for Windows 2000 Commands Display help
    hostname.exe> ​​Display hostname. nieshwiz.exe> ​​Customize Folder Wizard custom folder direction
    iexpress.exe> ​​Create and setup packages for install
    iisreSet.exe> ​​Restart Iis admin service IIS service. > Keyboard Language Indicator Applet keyboard Language indicator
    ipconfig.exe> ​​Windows 2000 IP. or IP安全监视器rnipxroute.exe > IPX Routing and Source Routing Control Program IPX路由和源路由控制程序rnirftp.exe > Setup FTP for wireless 无线连接rnismserv.exe > Intersite messaging Service 安装或者删除Service Control Manager中的服务rnjdbgmgr.exe > Microsoft debugger for java 4 Java4的调试器rnjetconv.exe > Convert a Jet Engine Database 转换Jet Engine数据库rnjetpack.exe > Compact Jet Database . Compressed Jet database
    jView.exe> ​​Command-line loader for java java command line loader
    krnl386.exe> ​​core component for Windows 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 20-year-old Change the drive of the drive
    lcwiz.exe> ​​License Wizard for Local or Remote Systems. The license complies with the guide
    ldifde.exe> ​​LDIF CMD Line Manager LDIF directory. License Manager terminal service license agreement management
    lights.exe> ​​Display Status Lights Display connection conditions
    LLSMGR.Exe> Windows 2000 License Manager 2000 licenses
    lnkstub.exe> ​​
    locator.exe> ​​RPC local remote positioning
    lodctr.exe> ​​load perfmon counters .exe> ​​Log Current User OFF. Logging out the user
    lpq.exe> ​​Displays Status of a Remote LPD Queue to display the state of the remote LPD printing queue, showing that it was sent to a UNIX -based printing task
    lpr. Exe> send a proprint job to a network printer. UNIX client printer is usually sent to the printer server that connects the printing device connecting the printing device.
    LSASS.Exe> LSA and Server DLL Run LSA and Server's DLL
    LSERVER.Exe> Specifies the New DMain for the Default Server's new DNS domain
    oS2.exe> ​​AN OS/ 2 warp server (OS2/O) OS/2
    os2srv.exe> ​​an OS/2 warp server OS/2
    os2ss.exe> ​​an OS/2 warp server OS/2
    oSk.exe> On Screen Keyboard 屏幕键盘rnpackager.exe > Windows 2000 Packager Manager 对象包装程序rnpathping.exe > of Ping and Tracert 包含Ping和Tracert的程序rnpax.exe > is a POSIX program and path names Used as arguments must be specified in posix format. Use "// c/users/default" intends of "c: usersdefault. For the floating point division error. Check the floating point error of Pentium
    perfmon.exe> ​​Starts Windows Monitor Performance Monitor
    PING.EXE> Packet Internet For BackWard with Unix is ​​compatible with Unix
    print.exe> ​​cmd line userd to propiles print text file or display the print queue. rnprogman.exe > Program manager 程序管理器rnproquota.exe > Profile quota program rnpsxss.exe > POSIX Subsystem Posix子系统应用程序rnqappsrv.exe > Displays the available terminal servers on the Network
    The program available on the network server
    qProcess.exe> ​​Display About Processes Local or Remote information locally or remotely displayed (required terminal service)
    Query.ery User PROcesss And Sessions query process and dialogue
    QUSER.Exe> Display About a user logged on display information (required terminal service)
    qwinsta.exe> ​​Display About Terminal Sessions. .exe> ​​Start the Remote Access Admin Service Starts Remote access service
    rasautou.exe> ​​Creates a Ras to create a RAS connection
    rasdial.exe> ​​dial a dial
    ras.exe> ​​starts a ras ras ras ras ras ras ras ras ras Connect
    rcp.exe> ​​Copies a file from and to a RCP Service. Copy files between the Windows 2000 computer and running remote case port monitoring program RSHD
    rdpclip.exe> Files Between a Termation and Client Console Session. The terminal and local replication and paste files
    RcoVer.exe> ​​recovers read or defered disk recovering the readable information from bad or defective disks.
    Redir.exe> ​​Starts The Service Run to Service
    REGEDT32.Exe> 32-Bit Register Service 32-bit registration service
    regini.exe> ​​Modify from with Within a scrip nRegister.exe> ​​register a program so it can have spiecial execution. Register a program containing special running characters
    Regsvc.exe> ​​ nRegsvr32.exe> ​​registers and dlls. As to how and when design KNow. Register and anti -register DLL
    regtrace.exe> ​​Options to tarne debug options for failing to MP Trace
    trace
    regwiz.exe> ​​Wizard .exe> ​​Replace Files replaced files in the target directory in the file of the same name in the source directory.
    RESET.EXE> Reset An Active section Reset activity part
    rexec.exe> ​​Runs Commands on Remote Hosts Running the Rexec Service. Run the remote computer running Rexec service. The REXEC command can verify the username on the remote computer before executing the specified command. This command can be used only after installing the TCP/IP protocol.
    risetup.exe> ​​starts the remote service wizard. Run remote installation guide service
    route.exe> ​​Display or Edit the Current Routing Tables. It's!
    router.exe> ​​Router Software that runs either on a deficated dos or on an OS/2 system. Route software is in DOS or OS/2 system
    RSH.Exe> Running commands on the remote computer running RSH service
    rsm.exe> ​​Mounts and Remote System Media Configure remote system media
    rsnotify.exe> ​​Remote Storage RECALL remote storage notification
    RSVP.Exe> Resourc Source appointment agreement
    runas.exe> ​​run a program as another user allows users to run specified tools and programs with other permissions nrundll32.exe> ​​Launcher A 32-Bit Dll Program program
    runonce .exe> ​​causes a program to run right startup running program and then start the menu
    rwinsta.exe> ​​reset the session subsystem Hardware to Known Initial Values. .exe> ​​DOES Not Write to E: Winntuseer.dmp is not written in User.dmp
    scardsvr.exe> ​​Smart Card Resource Server Card Energy Management Server
    SCHUPGR.EXE> It will read the schema update (.LDF FILES) And Upgrade the schema. (Part of adsi) Read the plan update file and update plan
    secedit.exe> ​​Starts Security Editor Help Automatic Security Configuration Management
    SERVIEXE> Controls ALL The SVICS ALL The SVICS ALL SEHESVIESVIESVIESVIESVIESVIESVIESVIESVIESVIESVIESVIESVIESVIESVIESVIESESRLS ALL SEHESVIESVIS 3 Control all services务rnsethc.exe > Set High Contrast - changes colours and display mode Logoff to set it back to normal 设置高对比rnsetreg.exe > Shows the Software State Key values ​​显示软件发布的国家语言rnsetup .exe> ​​GUI BOX PROMPTS You to Goto Control Panel to Configure System Installation program (transfer to the control panel)
    Setver.exe> ​​Set Version for Files Set the MS-DOS version number r reported to the program report to the program report to the program report nsfc.exe > System File Checker test and check system files for integrity 系统文件检查rnsfmprint.exe > Print Services for Macintosh 打印Macintosh服务rnsfmpsexe.exe > rnsfmsvc.exe > rnshadow .exe> ​​Monitor Another Terminal Services Session. Monitor the other in another middle server
    share.exe> ​​Windows 2000 and MS-DOS subsystems do not use the command. The acceptance of this command is just to compatible with the MS-DOS file
    shmgrate.exe> ​​
    shrpubw.exe> ​​Create and Share Folders
    sigverif.exe> ​​File Signature. .exe> ​​Serial Keys Utility serial number Making tools
    smlogsvc.exe> ​​Logs and Alerts performance log and alarm
    sms.exe> ​​ nsndrec32.exe> ​​ R R R R R > Display the current volume 显示声音控制信息rnsnmp.exe > Simple Network Protocol used for Network Mangement 简单网络管理协议rnsnmptrap.exe > Utility used with SNMP SNMP工具rnsol.exe > Windows Solitaire Game Cards
    sort.exe> ​​Compares Files and Folders Read the input, sort data, and write the results on the screen, files and other devices
    spoolsv.exe> ​​Part of the Spooler Service for Printing r nsprestrt.exe> ​​
    srvmgr.exe> ​​Starts the Windows Server Manager server manager
    stimon.exe> ​​Monitor nstisvc.exe> ​​service
    subst.exe> A PATH with A Drive Letter associated the path with the driver's disk
    svchost.exe> ​​svchost.exe is a generalic host process name that services that are run from dynamic-links . .exe > Creates Windows Briefcase. 创建Windows文件包rnsysedit.exe > Opens Editor for 4 system files 系统配置编辑器rnsyskey.exe > Encrypt and secure system database NT账号数据库按群工具rnsysocmgr.exe > Windows 2000 Setup 2000 Installation program
    sysstray.exe> ​​Starts the Systray in the LOWER RIGHT CORNER.

  2. military cremation jewelry wholesale suppliers 1. Format of the DIR command:

    dir [d:] [Path] [name] [/a] [: attrib] [/o: [sorted] [/s] [/l] [/c [h]

    (1) DIR/A: ATTRIB default contains all files (system files. Hidden files)

    attrib [:] [h/- H] Only display hidden files or non-implicit files.

    [r/-R] ​​Only read only files or non-read files

    [s/-s ] Only display system files or non-system files

    [A/-A] Only display files or non-archive files

    (2)/o [:] sorted: The default is completely in the order of letters. The subdirectory is displayed before the file

    /o [n/-n]: according to the order of the letter or in the order name/reverse display

    [E/-E]: According to the extension of the order of the alphabet/reverse display

    [d/-d]: according to the time order/reverse display

    [s/- s]: According to the size from large to small or/reverse display

    [g/-g]: Press the sub-directory to file or file first in the subdirectory

    ( 3)/s parameter: List of all files in the current directory and its sub -directory

    column names: DIR/S/A/O: N C:> PRN

    will be All subdires and files on the C drive are printed and output according to the subordinates and the order of the subdirectory and file letters

    (4) parameter: will only display the file name and extension name
    n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n R n (5) /L parameter: All lowercase letters to file or subdirectory list

    training:

    dir /a series of current directory all files (including hidden hidden Including system files)

    DIR /AH column hidden file (including subdirectory (implicit) DIR /A-H

    DIR /AS system file dir /a-s r

    DIR /AD column subprime directory DIR /A-D

    DIR /O according to the order of letters

    dir /b only display file name and extension

    Second, Attrib [ r | -r] [ a | -a] [ s | -S] [ h] [d:] [name] [/s]

    The (file) attribute of the default ATTRIB name display file

    attrib IO.Sys (or child directory)

    shr C: IO.Sys specified as a system (s) hidden (H) ) Read (R) file

    can also attribute to the file attribute of the expansion name SYS

    parameter [ r | -r] to set the file attribute

    [ a | -a] Put the file attribute settings or release the archive attribute

    [ h | -h] to set or lift the implicit attribute of the file attribute (especially for the subdirectory)

    /s parameters activate all the files of the current and current sub -directory

    It can be used to find files

    N
    attrib news86 column NEWS86's document attribute

    attrib r report.txt is set to read only the Attrib -S -H Record.txt n
    attrib A:*.*.*.*

    attrib -a a:*. Bak

    xcopy A: B: /A to copy all the logos on the plate as the "archive" attribute to
    xcopy A: B: /m to copy all files on the plate to the back of the B disk and move the archive attribute

    . . "Represents the current directory". "Represents the father directory

    cd .... Back to the parent directory (ancestor directory) of the superior directory (ancestral catalog)
    ncd A: The current directory of the D drive Change to the root directory

    cd A: XX changes the current directory of the A disk to the subdirectory xx

    cd ..98 Back to the parent directory first, then enter the 98 in the parent directory Subtraction

    cd .. Return to the parent directory

    cd98 enter the 98 sub-directory under the root directory

    4. Copy [/y] [/- Y] [ /v] [ /b]

    copy /y without prompts, cover all files

    /-y Question)

    /v copy after copying

    /b to display

    copy w1.wps con/b to put the WPS file in the WPS file in Display on the screen without having to enter the WPS status

    copy ..98 All the files in the 98 sub -directory under the parent directory to the current subdirectory

    copy. The files under the 97 sub -directory in the directory are copied to the current directory

    Copy. *.* File

    copy nul a.abc to clear the A.ABC file (change the length of the file to 0)
    ncopy file name con additional command or content to the text file

    Copy Con file name creation file (F6 deposit exit)

    Copy Con PRN to detect the switch of the printer

    five, XCopy command

    xcopy [source] [d: date] [/p] [/s] [/e] [/v] [/y]

    xcopy [d: date] xcopy a: B:/d : 08/18/98/s/v Copy 98.08.18 files

    xcopy [/p] prompt to create subdirectory

    xcopy [/s] connected child directory together Copy. Note: If there is no this child directory on the target disk, and at the end of the target

    , the end of the disk is not ended by "", then the prompt will be a file name or directory name on the target

    [f = file, d = directory]?

    Press D]? You should select the D key

    xcopy [/v] with a comparison

    *: (1) Xcopy does not copy the system and hidden files. Copy the attribute

    xcopy [ /y] Whether there is a prompt when covering, /y without prompt

    If: If the target disk or child directory name is omitted, copy it to the current directory

    6. Del /p

    plus /p can be prompted before deleting

    . If you add the child directory name after DEL All files (implicit. System. Except for only files) are deleted,

    Add /p to confirm.

    7. UNDELETE [name] /au

    Moly recover the files that meet (can be recovered) without prompting, and put the first letter to "#". If the existence of

    0 1 2-9 A-Z "order plus.

    , such as: Undelete *.dbf/AU will be fully recovered with the file of" DBF ", and starting with"#"as the file r as the file

    Name, /List only lists recoveable files without recovery

    undelete /lo AD put UNDELETE in memory

    /unload to unload the memory

    /s [Drive] Monitor the specified driver

    undelete/scooperly

    The UNDELETE stay in memory, and create a hidden Sentry subdirectory to delete the files deleted by the C drive
    n nThe corresponding recovery command can use undelete to fully restore the file name (very complete)

    The most commonly used UNDELETE *. *

    deltree /y [drive: path]

    Deltree to delete the sub -directory and file, although some files are system files or implicit files

    . When it can be matched with a passing character, it will delete the qualified files and sub -sub -sub -submissions and subdires. Directory

    , such as:? Undelete *.dbf/AU will be fully recovered to the file of "DBF", and the start of "#" as the file

    name. R name.

    /list only lists recoveable files without recovery operations.

    undelete/load put UNDELETE into memory. Democratic.

    /s [Drive] Monitor the specified driver.

    undelete/scated to keep the UNDELETE in memory and create an implied Sentry subdirectory. The files of the C drive

    are managed by the file. The corresponding recovery command can use UNDELETE/DS to fully restore the file name (very complete).

    The most commonly used is UNDELETE * * .*

    eight, deltree /y [drive: Path]

    deltree to delete the subdires and files, although some files are systems or implicit.

    It can be equipped with a passing symbol, and it will delete the qualified file or subdirectory.

    If there are L1 file, L2 subdirectory, L3 file, L4 subdirectory
    n n n n n n n n n R nDeltree l*.* will delete all the above files and sub -directory, but confirm before deleting, if not deleted,

    The Y parameter is operated without confirmation when deleting.

    The file it deleted can be restored with undelete, but it cannot be restored to the subdirectory and the files under it. You can use the special

    Tools. Such as norton 8.0 et al..

    If using UNDELETE/s in advance ,? can find a complete file in the sentry subdirectory, but the name has been changed by

    .

    nine, dos = high [| low [umb | noumb]]

    dos = high, umbn (UMB).

    NOUMB does not manage the upper memory.

    n In order to install the program or driver into the upper memory, you must use DOS = UMB, which can save most of the conventional memory.

    R n
    It if HMA Not avoixble or LOAD DOWN LOW indicates that high -end memory can be used.

    The doS command that has been recorded before, you can use F7 to display, "" "" ↑ ↓ "to select, use F9 to enter

    The command number of the selected.

    doskey/restall again, the previous command line was revoked.

    DOSKEY/HISTORY display all the commands in the memory, which can be displayed in other files, abbreviated "/h".

    doskey dir = CLS is the same as CLS. r r r r

    DOSKEY/MACROS can display all the macro definitions. It can be used ">" "" "" "/m".

    doskey dir = recovery of the macro meaning of DIR.

    doskey p = Dir $ tdir*.exe/p $ TDIR C: $ TDIR C: $*

    $ t is the division of the command, and $*is the command of the command. The ending character

    doskey/insert ()? When re -entering the command, the modification of the old command is inserted or covered with

    cover status (default).

    eleven, emm386.exe

    This provides management of extended memory so that applications can use it like conventional memory.

    The common usage is on config.

    Device = C: DOSHIMEM.Sys

    DEVICE = C: Dosemm386.exe Ram
    D = 64 Set the DMA memory quantity to 64K

    NOEMS to provide access to the upper memory, but it does not provide access to the extended memory.

    It, because Windows itself has a program for managing extension memory

    . It should be adopted by a manager in Windows. .dat> B (Compared with binary code)

    compared with two files, generally used as an access progress, modify the game storage file.
    0100 such as: 0000 05E4: 00 67

    The actual modifiers with Debug -E should be added with 0100, that is, 0000 06E4: 00 67

    "You can output the comparison result to the P file.

    13, format /q /u /s /n: sectors /f: size /c
    n /q parameter : Quickly formatting, only scan the file allocation table and root diverse area, only the formatted disk is effective.

    /u parameter: unconditional formatting, and without saving information on the original disk, can prevent "unformat".

    /s parameter "Command.

    /f: size size can be 160 180 320 360 720 1200 1440 2800

    : sector n. 160K 180K

    can format 360K disk on a 5 -inch high drive

    can be formatted by 8 sectors on 5 -inch high drivers for 8 .

    /c to re -test the bad sector. If a sector is marked as "bad", it will not be tested from the new test

    for the future. When using "/c", you can test from newly tested.

    . The UNFORMAT command

    It can be repaired by it to re -repair

    The bad hard disk partition table, but it does not work for the network disk.

    unformat drive: [/l] [/test] /p]

    /l display each file and sub -directory discovered by UNFORMAT. Without this switch, only those
    n n R n The broken files and sub -directory can be paused with CTRL S. Press any key to continue.

    /test only do a test, do not do the actual repair work, make the simulation process.

    /p Test it while printing.

    Note: This method cannot guarantee all the files, especially the disk of data after formatting.

    The files after recovery are stored in Subdir1 .... 2 .... 3 Waiting sub -directory.

    15. Interlnk grammar interlnk g = e, it can be in two or mouths through serial ports or mouths. Communication between machines.

    The E drives on the server end to the G drives of the client. For the client, all the

    operations to G's operation means that it means To access the server, the way to cancel the mapping is Interlnk g =

    The input interlnk separately to display all the mapping conditions. Only the driver can use.

    The driver symbols used by the Lastdrv.exe settings in config.?sys. It can be used as a

    end of 25 stitches, and another One end is the serial line of 9 stitches. The specific wiring method is as follows:

    5-7 2-15

    3-2 3

    7-- 4 4-12

    6 5-10

    3-3 6-11
    8 -5 15-2

    4 -20 13 -3

    9 needle 12-4

    10 -5

    11 -6
    n25- 25

    25 stitches 25 stitches

    16. Interlnk.exe and Internet

    interlnk.exe re -directional requests for customer drives or print interfaces to Another server driver

    The device or printer.

    grammar: add:

    Device = c: dosinterlnk.exe [Drive: n ] [/noprinter] [COM] [LPT]

    17. Memmaker [/batch] [session] [/swap: drive]

    Memory configuration, and write the configuration into AutoExec.bat and config.sys.

    In the process, you need to restart several machines.

    18. Memitem Memcolor Submenu menu option Include

    autoexec.bat is as follows: Config.sys as follows:

    path C: dos; c: ucdos [menu]
    r r
    DOSKEY MENUCOLOR = 15,1 (Forecast color 15, background color 1)

    mousemouse menuitem = Base_config, this is a base
    ngoto % config %-> Select item = cced_config, This is a cCED

    Optional prompt

    : base_config = base_config, 5

    goto exit-> jump out of the default to base_config, delay time 5 seconds

    : cCED_CONFIG [Common]

    c: dossmartdrv.exe /l device = c: doshimem.sys
    ngoto exit. r n
    : exit-> end [base_config]

    Device = c: dosemm386.exe ram

    dos = high, umb
    n n [CCED_CONFIG]

    Device = c: dossmartdrv.exe/dough_buffer
    nINCLUDE = BASE_CONFIG setting

    Requires to select.

    19. Mscdex.exe provides a program for reading and writing the optical drive
    nMSCDEX/D: DRIVE [/d: drive] [/e] [///// k] [/s] [/l: Letter]

    Typical: device = c: cdromcdrom.sys/d: mscd000 n
    autoEExec.bat DOSMSCDEX /D: MSCD000 /L: G

    Configuration One optical drive, the symbol is G

    parameter/d: drive1 is the optical drive identity number, which must be consistent with the symbols in config.sys. There may be multiple

    /d: MSCD000000 /D: MSCD001

    /E: Use the extension of the memory in the light driver.

    /s: Whether the optical is set to ms_net or windows
    /v display the memory when loading.

    /l: Letter assigned to the optical drive to the optical drive

    /m: number specifies the number of buffer

    The attention should be 😕 If you use SmartDrv.exe to accelerate the reading and writing ability of the optical drive, you should be in AutoExec.

    bat before the mscdex.?exe was written before Smartdrv.exe, and The use of SmartDrv.exe can greatly improve

    The read and write ability of the driver.

    20. The use of MSD

    using MSD can be checked as a whole. Computer configuration and system information

    includes:? Drive parameters, computer CPU parameters, memory size parameters, display types, string. Based on this, it can be analyzed whether the new equipment has conflicts with the original equipment.

    and can also analyze the memory resident procedure to determine whether there is a virus in the memory. R n
    21, PROMPT DOS prompt

    $ q equal to $ T. Current time $ P The current driver symbol
    n $o $ N prompt $ n The current driver $ G is greater than the number $ L, which is more than the number $ b display "|" pipeline number
    n $ h hidden prompts $ E display "number
    n
    For other text, the text itself is prompt ljw directly, and it is displayed as LJW prompt

    prompt and only display the current driver number and greater than the number. r
    222 , RAMDRIVE.SYS uses memory as a virtual disk to use

    . All data should be existed in the memory and should be stored in the hard disk in time, otherwise after the power is dropped or crashed
    n n n n n n n n n n n n n n n n n n n n n n n n n n n n n After R n, all the data will be lost. The advantage is that it runs fast, but it cannot be used in Windows.

    for example: config.sys: device = c: dosrAmdrive.sys/size [/e | a]

    size is the number of bytes in the unit of K, that is, the size of the virtual disk established.
    n/e or/a They all use extended memory to establish a virtual disk. The premise of the number of parameters is that the memory management must be loaded first

    SUBST connects a driver with a subdirectory

    . As: the request of the A: L1L2 sub -directory is mapped as an S disk, then enter

    subst s: A: L1L2 to just

    The command using the DIR S: and other commands is the content in the A: L1L2 sub -directory. The other Copy Dels

    Specific mapping.

    It SUBST can be used to display various connection conditions

    Note 😕 You can use subst A: C: A to create a read and write disk for A. For For some installation software

    , it must be installed with a plate, and you can use all the software you want to install to C: A

    Then enter Subst A: C: A, and then turn to A: you can install the software.

    24. MEM /C /m /p /d conventional memory display program r

    /c shows the occupation of all memory resident procedures. It is divided into conventional memory and

    high -end memory occupation, and the total occupation status (conventional high -end reserved extension memory) r r

    /p paging display, pause between pages

    /m adds module names:/m msdos Display the occupation of DOS system memory.

    /d For a detailed example of conventional high -end reservation expansion memory

    through analysis, you can see if the memory occupies is reasonable, and whether various programs are loaded normally, so as to this base

    Based on the memory optimization tool Memmaker for various management, at the same time, it can also analyze the reasons why some programs crash

    . Existence is conducive to discovering and eliminating.

    25. The use of various pipeline tools "u003C>> u003Cu003C"

    The required input re -direction

    , such as: dir *.bat /b> p to output the file name of the Dir *.bat example to the P file.
    ntime u003Cu003CTime u003C P >> P.BAT

    only an Enter symbol in the file, then you can Add time to the p.bat file

    "> >>" "is to reintegrate the output generated by the command, such as in a file or printer. The content will be added into the file, and the content of the original file will be covered.

    "u003Cu003Cu003Cu003Cu003Cu003Cu003C" are the content that the command needs to be entered. u003Cp can be a time code or a car Enter in the batch, which can change the time.

    The "PRN" as a printer, "NULL" is an air device

    Con is the display

    Type p.bat> PRN can print P.Bat.

    copy null p can delete the P file

    copy con conne P can edit the P file on the screen, F6 can deposit the disk exit

    type P> PP complete the copy of p file to PP
    nType p | More can be suspended when the screen is full

    26. MOVE command

    move [y/-y] filename1 filename2

    R n, such as: MOVE C: DOS*.* C: CCED

    mad all the files in the DOS subdirectory to the CCED subdirectory

    /y |- When the Y parameter does not exist when the target directory needs to be created, whether the prompt appears

    It can be used to modify the name of the subdirectory name, such as Move Dos CCED

    changes the DOS directory name to CCED to CCED

    27. Append specifies the storage position of some special data files, such as User.dat PE2.pro and other non - *.

    exe * * *.bat file

    Format: Append [:] Termid the specified directory display before the existing directory display

    append [PATH] APPEND C: User and other

    28.

    Call calls another batch of processing files in one batch of processing commands

    (1) without ending the operation of the existing files, immediately return to the process after executing the program.

    (2) The call batch command command must be expanded with BAT as the extension

    (3) When calling the batch processing file, you can add the parameter (%1-%9) and the environment variables Such as% bum%

    (4) Pipeline tools and redirecting tools
    n 29. DEV ICE LOADHIGH

    Device Put the specified device driver into the memory

    The device driver is installed in high -end memory

    30. DEFRAG Optimized Disk

    LEGEND (Legend) Optimize R n The command executes the optimized processing of the specified disk (including checking file allocation table, the status of each file, correcting errors),

    In execution, you can follow the file name, time, expansion name Sort the files.

Leave a Comment

Shopping Cart