Preview

NT2460

Satisfactory Essays
Open Document
Open Document
271 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2460
What does the /w switch do? Why it is use?
Answer: The /W switch specifies the warning level of the MIDL compiler. The warning level indicates the severity of the warning. /W Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. Warning levels range from 1 to 4, with a value of zero meaning to display no warning information. The highest-severity warning is level 1. The following table describes the warnings for each warning level The /W switch is used with all products installing with SCCM/SMS so it doesn't do anything product specific. The W switch tells the machine to wait and let the first install finish before it tries to start the second install.
What switch is used to remove a role?
Answer: ServerManagerCmd.exe command-line tool can be used to Install / Remove Server 2008 Roles and Features from command line. This command-line tool can be integrated into a script to manage roles and features.
Usage: ServerManagerCmd.exe
Installs and removes roles, role services and features. Also displays the list of all roles, role services, and features available, and shows which are installed on this computer. For additional information about the roles, roles services, and features that you can specify using this tool, refer to the Help for Server Manager.
What is the command to start the DHCP Server service? Answer: # /usr/sadm/admin/bin/dhcpmgr &

The DHCP Manager window opens, displaying the Addresses tab if the server is configured as a DHCP server or no tabs if the server is configured as a BOOTP relay agent.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The /w switch does some pretty cool stuff? The cool stuff it does is Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. In the Roles Summary or Features Summary areas of the Server Manager main window, click either Remove Roles or Remove Features, depending on the software that you want to remove. Follow the instructions that are provided by the wizard as you progress through the removal.…

    • 258 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab #9

    • 650 Words
    • 3 Pages

    c. Through the system configuration setup. This can be reached through running msconfig command under the run dialog. Once inside you can see all running services, boot services, startup services, and system services. Another method of checking the running services is through the processes tab of the ctr+Shift+esc command. This will show all running processes and allow the user to shut them down.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Windows domain controller, which controls the Active Directory. These are both critical steps in enabling the…

    • 364 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What is the primary tool used by system administrators to apply policy settings in Active Directory?…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

                 Manage Concurrent Programs & Executables Manage Responsibilities Manage Request Groups and Request Sets Manage Data Groups Running Utilities Manage Folders, Lookups, Profile Options and Profile Values Query Optimization & Gathering Statistics RAC Management Manage Document Sequences Administering Globalization Managing KFF, DFF Managing Value Sets, Values Managing New Customizations and Updates…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You can then use the Services Control Manager to start, stop, pause, resume, and configure your service. Different from other applications, the service executable must be installed before it can work. You must create an installation component for the service, which installs and registers the service, and creates its entry with the Services Control Manager.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    none

    • 1536 Words
    • 7 Pages

    is usually code for the /o/ sound and letter c is always code for the /s/ sound. Slash marks…

    • 1536 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    windows 7 boot process

    • 346 Words
    • 2 Pages

    10. SMSS.EXE loads the rest of the registry, configures the environment to run the Win32…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ZTE MF65 User Manual

    • 2007 Words
    • 13 Pages

    In the case of such event, cool the device in a well-ventilated place before turning…

    • 2007 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    At the time of execution adadmin prompts you to verify and enter several information pertaining to your applications installation like APPL_TOP location ,ORACLE_HOME.adadmin log file name,batch size etc.…

    • 543 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Configuration of Business Objects XI with Active Directory is a two-step process: 1) Configure Active Directory on a Windows 2003 Server and make it a Primary Domain Controller. 2) Install and Configure Business Objects XI to authenticate against Active Directory created in Step 1.…

    • 1330 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1430

    • 369 Words
    • 2 Pages

    A bash script is a file containing a list of commands to be executed by the bash shell. Bash scripts have many uses that they can be used for. For example, you could write a simple bash script that will change the background color on your screen. Also with bash scripts, you can run them when you want to. They don’t have to be run right away, you have the freedom to do it when you want to.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Deploying Windows 7 Lesson 3 Objectives • Understand enterprise deployments • Capture an image file • Modify an image file • Deploy an image file Understanding Enterprise Deployments Careful planning is required and the following objectives must be considered: – Create standardized computing environments – Minimize user interaction at the workstation – Ensure continued functionality of all hardware and software resources – Minimize interruption of user productivity Steps to Deploy an Enterprise Workstation 1. Build a deployment share. 2. Perform a reference computer installation. 3.…

    • 943 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Web Page and Site

    • 6324 Words
    • 26 Pages

    For Personalization feature, you will be using 3 users as the owner of the site. The credentials details are as follows: Please refer to this whenever you are asked to enter the respective username and password.…

    • 6324 Words
    • 26 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer.…

    • 285 Words
    • 1 Page
    Satisfactory Essays