67067
Using Answer File and UDF Values During Setup
During Setup, keys and values are substituted between the answer file and the
UDF, depending on the following scenarios:
S If a key is specified in the answer file but not in the UDF, the value
specified in the answer file is used.
/ If a key is not specified in the answer file but is
specified in the UDF, the
value specified in the UDF is used.
S If a key is specified in the answer file and also referenced by the unique ID
in the UDF, the value specified in the UDF is used.
/ If a key is not specified in the answer file and is specified in the UDF, but
the value is left blank, no value will be used for that paranie ter. This might
result in the user being prompted for the information.
S If a section or key is used in the UDF, but there is no section or key with
that name in the answer file, Setup will create and use the UDF section.
For morę information about substituting sections, keys, and values
between the answer file and the UDF, see the Microsoft Windows XP
ProfessionalResource Kit, and the Help files in the
¥¥Tools¥Deploy.cab folder
on the Windows XP Professional compact disc.
Wyszukiwarka
Podobne podstrony:
img026 Migration Tool for NetWare lUsers and groups are migrated I to the domain controIIer The domaBasic Patterns Heel and turn are worked with the first and fourth needles on the right and wronSleeve seam The sleeve and gusset are sewn to the shirt fabric and lining in rwo steps: the raw edgeSummary These equations, together with the definitions 4.15 and 4.20, are regarded as the basie laws00424 ?4589320c2ec691373ff85747154741 428 Pignatiello & Ramberg the process is in-control or isS5003131 8 Experlments with the larger shaft furnace were still unaucceaaful even after using two tuHydrogen Production and DeliveryDistributed Reforming Using Natural Gas and Renewable Liquids DeveloC3 - Acquaintance with forecasting methods using simple linear and multiple regression analysis C4 -166. The using of complementary and alternative medicine by patients suffering froTitle: Analysis, Using and Understanding Financial Statements of the Firm Lecture hours: 20 StudyPassive operating system fingerprinting using neural networks and induction of decision rules BartosxSharingDo you want to access your local files when using remote desktops and applications? Permit awięcej podobnych podstron