1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
15

If you know batch coding, can you see if there is anything wrong with this script, or if you can make any suggestions to modify

the code?
thanks

@echo off
cls
color df
title Website Opener
echo type in "website" to go to open website ( you dont need to include the www. Or you can type "program" instead to open a program)
set /p a=
if %a%== program goto start_pro
if %a%== website goto website
) Else (
exit

:website
cls
echo okay! what website do you want to open?
set /p a=Website:
start www.%a%
exit



:start_pro
cls
title Open A Program
echo what is the program you want to open?
set /p a=
if exist %a% then
if not exist %a% exit
start %a%
Computers and Technology
1 answer:
zzz [600]3 years ago
8 0
There isn't an opening and closing parentheses for the else statement. PM me. I know a lot of batch...
You might be interested in
What is the meaning of Re:?
adelina 88 [10]

Answer:

In Email's Subject Line “Re:” most commonly understood as “Reply/Response” to an Email. “Re: ” is not taken as abbreviation of Regards/Reference. For Reference, Abbreviation is “Ref.”Explanation:

5 0
3 years ago
Read 2 more answers
Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
postnew [5]

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

6 0
2 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
Apps and applications are both software but have a number of significant differences
kipiarov [429]
Apps do a single function where applications do multiple functions
7 0
3 years ago
18. which of these components is responsible for providing instructions and processing for a computer? a. cpu b. ssd c. ram d. r
cricket20 [7]

The components that is responsible for providing instructions and processing for a computer is a. CPU.

<h3>What area of the computer executes commands?</h3>

This command center's central processing unit (CPU) is a sophisticated, large-scale collection of electrical circuitry that carries out pre-stored program instructions. A central processing unit is a must for all computers, big and small.

Note that the CPU, RAM, and ROM chips are all located on the motherboard. The "brain" of the computer is known as the Central Processing Unit (CPU). It carries out instructions (from software) and directs other parts.

Learn more about CPU from

brainly.com/question/26991245
#SPJ1

7 0
1 year ago
Other questions:
  • A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is true if the el
    10·1 answer
  • Most keyboards today are in a
    8·1 answer
  • Don't pat any attention to this
    7·2 answers
  • When might be the best time to start saving for retirement?
    5·2 answers
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
    6·1 answer
  • Why are free web based providers so popular?
    12·1 answer
  • While developing a network application, a programmer adds functionally that allows her to access the running program without aut
    14·1 answer
  • What do you suggest for Father's Day?​
    7·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!