1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
11

A file with a .bat file extension is called a batch file. You can use a batch file to execute a group of commands, sometimes cal

led a script, from a command prompt. Do the following to learn to use a batch file?
Computers and Technology
1 answer:
Elan Coil [88]3 years ago
8 0

Answer:

Create a text file. And add this code in it:

@echo off

You are welcome to the batch programming!

And now save it with .bat file type. Give it any name you want.

And to run the bat file, double click the bat file. It will be running.

You can run it from command prompt as well. Type as below:

C:\folder\batch_name.bat.

Now, we can add as many commands in the file as we want, and we can do the batch programming.

Explanation:

Please check the answer section.

You might be interested in
which two functions are performed at the llc sublayer of the osi data link layer to facilitate ethernet communication? (choose t
Ivahew [28]

Answer:

implements CSMA/CD over legacy shared half-duplex media; enables IPv4 and IPv6 to utilize the same physical medium; integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper

Explanation:

I hope it helped . follow me on ig minisized._miyaa

8 0
3 years ago
Fast we need help What is binary code? Why do computers use binary code?
vfiekz [6]

Answer:

The digits: 0 and 1, are used by binary code to represent computer text or instructions and a bit string is assigned to each symbol or instruction. Computers use binary numbers because they have circuits that are either on or off, which gives them two states to work from to make calculations and run processes.

Hope this helped you!

Explanation:

3 0
3 years ago
Read 2 more answers
What is the function of series-parallel circuit
wel

Answer:

components are connected end-to-end in a line to form a single path for electron s to flow

Explanation:

If you put morw lamps into serious circuit, the lamps will be dimmer than they were before.

6 0
4 years ago
Write a Java program that calculates and prints the monthly pay check for an employee. The net pay is calculated after taking th
ycow [4]

Answer:

  import java.util.Scanner;

public class salary{

    public static void main(String []args){

       

       System.out.println("Enter the monthly pay: ");

       Scanner scn = new Scanner(System.in);

       double salary = scn.nextDouble();

       double result = salary-(salary*0.15*0.035*0.0575*0.0275*0.05)-75;

       

        System.out.println("The net salary is: "+result);

    }

}

Explanation:

first import the Scanner class for taking the input from user.

then, create the main function and print the message for enter the salary from user.   scn.nextDouble() store the value enter by user into the result.

after that, calculate the net salary by calculating the deduction amount and then subtract with salary.

finally, print the result on the screen.

8 0
4 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Other questions:
  • RDBMS stands for_________________
    12·1 answer
  • How do say phone in French?
    10·2 answers
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • The purpose of a memo is to communicate directions, advice , or information true or false
    8·2 answers
  • Which app is used to synchronize data among iOS devices and Windows desktops?
    7·2 answers
  • What does an executable file contain? Program instructions written in source code. Program instructions that have been compiled
    15·1 answer
  • In Java please:Re-type the code and fix any errors. The code should convert non-positive numbers to 1. if (userNum > 0) Syste
    10·1 answer
  • 9 Which of these words is used to begin a conditional statement? ​
    8·1 answer
  • After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next
    15·1 answer
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!