Batch Commands

Batch Commands is a special set of commands that are found only in batch files and enable special actions.

What is Batch Commands?

A special set of commands that are generally found only in batch files and enable special actions such as conditional processing. Any command supported by an operating system can be included in a batch file, but the commands listed in the table that follows are generally found only in batch files. These commands are all supported by Microsoft Windows 2000, while earlier versions of Windows might support only a subset of them.

Batch Commands
Batch Commands

Batch File Commands

callCalls one batch program from another while allowing the calling program to continue running
echoToggles command-echoing on or off
endlocalRestores environment variables set by a setlocal command
forUsed to run a specified command for each file in a set of files
gotoJumps to a specific line that is labeled in a batch file
ifUsed to perform conditional processing of commands
pauseSuspends processing of the batch file and waits for the user to respond
remUsed to insert remarks (comments) in a batch file for documentation purposes
setlocalInitiates localization of environment variables in a batch file
shiftUsed to change the position of replaceable parameters in a batch file


Articles posted after being checked by editors.

Recent Content

link to Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

Public Key Infrastructure, also known as PKI, is a set of services that support the use of public-key cryptography in a corporate or public setting. A public key infrastructure (PKI) enables key pairs to be generated, securely stored, and securely transmitted to users so that users can send encrypted transmissions and digital signatures over distrusted public networks such as the Internet.
link to Digital Signature

Digital Signature

Digital Signature is an electronic signature that you can use to sign a document being transmitted by electronic means such as e-mail. Digital signatures validate the identity of the sender and ensure that the document they are attached to has not been altered by unauthorized parties during the transmission.