67067

67067



Using Answer File and UDF Values During Setup

During Setup, keys and values are substituted between the answer file and the

UDF, depending on the following scenarios:

S If a key is specified in the answer file but not in the UDF, the value

specified in the answer file is used.

/ If a key is not specified in the answer file but is

specified in the UDF, the

value specified in the UDF is used.

S If a key is specified in the answer file and also referenced by the unique ID

in the UDF, the value specified in the UDF is used.

/ If a key is not specified in the answer file and is specified in the UDF, but

the value is left blank, no value will be used for that paranie ter. This might

result in the user being prompted for the information.

S If a section or key is used in the UDF, but there is no section or key with

that name in the answer file, Setup will create and use the UDF section.

For morę information about substituting sections, keys, and values

between the answer file and the UDF, see the Microsoft Windows XP

ProfessionalResource Kit, and the Help files in the

¥¥Tools¥Deploy.cab folder

on the Windows XP Professional compact disc.



Wyszukiwarka

Podobne podstrony:
img026 Migration Tool for NetWare lUsers and groups are migrated I to the domain controIIer The doma
Basic Patterns Heel and turn are worked with the first and fourth needles on the right and wron
Sleeve seam The sleeve and gusset are sewn to the shirt fabric and lining in rwo steps: the raw edge
Summary These equations, together with the definitions 4.15 and 4.20, are regarded as the basie laws
00424 ?4589320c2ec691373ff85747154741 428 Pignatiello & Ramberg the process is in-control or is
S5003131 8 Experlments with the larger shaft furnace were still unaucceaaful even after using two tu
Hydrogen Production and DeliveryDistributed Reforming Using Natural Gas and Renewable Liquids Develo
C3 - Acquaintance with forecasting methods using simple linear and multiple regression analysis C4 -
166.    The using of complementary and alternative medicine by patients suffering fro
Title: Analysis, Using and Understanding Financial Statements of the Firm Lecture hours: 20 Study
Passive operating system fingerprinting using neural networks and induction of decision rules Bartos
xSharingDo you want to access your local files when using remote desktops and applications? Permit a

więcej podobnych podstron