Description
Reports the Universal Time Coordinate (UTC) time on a computer.
This script was tested using Python 2.2.2-224 for Microsoft Windows, available from ActiveState.
Supported Platforms
Windows Server 2003 |
Yes |
Windows XP |
Yes |
Windows 2000 |
No |
Windows NT 4.0 |
No |
Windows 98 |
No |
Script Code
import win32com.client
strComputer = "."
objWMIService = win32com.client.Dispatch("WbemScripting.SWbemLocator")
objSWbemServices = objWMIService.ConnectServer(strComputer,"root\cimv2")
colItems = objSWbemServices.ExecQuery("Select * from Win32_UTCTime")
for objItem in colItems:
print "Day: ", objItem.Day
print "Day Of Week: ", objItem.DayOfWeek
print "Hour: ", objItem.Hour
print "Milliseconds: ", objItem.Milliseconds
print "Minute: ", objItem.Minute
print "Month: ", objItem.Month
print "Quarter: ", objItem.Quarter
print "Second: ", objItem.Second
print "Week In Month: ", objItem.WeekInMonth
print "Year: ", objItem.Year
For online peer support, join the microsoft.public.windows.server.scripting community on the msnews.microsoft.com news server. To provide feedback or report bugs in sample scripts or the Scripting Guide, please contact Microsoft TechNet.
Disclaimer
The sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.
分享到:
相关推荐
We introduce a method to dynamically construct highly concurrent linked lists on modern graphics processors. Once constructed, these data structures can be used to implement a host of algorithms ...
Uses WMI to return information about all the audio and video codec files installed on a computer. This script requires both Windows PowerShell and the corresponding version ...
标题中的"Alist安装包+快速启动-停止脚本"表明这个压缩包包含了Alist的安装程序以及用于快速启动和停止Alist服务的脚本,这对于用户的日常使用和维护来说非常实用。 首先,我们需要了解Alist的基本工作原理。Alist...
This time period (1970s) also corresponds with the introduction of high-performance computer systems (supercomputers), which since that time have increased relentlessly in power, by approximately a ...
An ISP earns its money by charging each of the the ISPs that connect to the IXP a relatively small fee, which may depend on the amount of traffic sent to or received from the IXP. 15. Google's ...
An applied introduction to modern computer vision, focusing on a set of computational techniques for 3-D imaging, this book covers a wide range of fundamental problems encountered within computer ...
Give a divide and conquer algorithm for the following problem: you are given two sorted lists of size m and n, and are allowed unit time access to the ith element of each list. Give an O(lg m + lgn) ...
时区列表 该软件包包含基于常规选项的一系列时区。 它不遵循任何完整的数据集,但几乎包含所有基本时区。...import timezones from 'timezones-list' ; // or var timezones = require ( 'timezones-list' ) ;
描述中提到的 "Displays a list of the SMS messages stored on the ICC." 意味着该程序能够读取并显示集成电路卡(ICC)上的短信消息列表。ICC通常指的是SIM卡,因为SIM卡是手机中最常见的集成电路卡类型。这个功能...
Changing the Values of List Items with Index Assignment x List Concatenation x The in Operator x Removing Items from Lists with del Statements x Lists of Lists x Methods x The len() Function x The ...
[1] This paper will provide such a project model and is donated to the FreeBSD Documentation project where it can evolve together with the project so that it can at any point in time reflect the way ...
Changing the name or domain only changes the domain SID if the computer was previously associated with a domain.To understand the problem that cloning can cause, it is first necessary to understand ...
Computer Security Reading List
Downey <br>Table of Contents Contributor List Chapter 1: The way of the program Chapter 2: Variables and types Chapter 3: Function Chapter 4: Conditionals and recursion ...
When a large number of networked PCs without local disk boot off the network at the same time, the traffic on the network is similar to the commute at rush hour. To prevent massive reboot ...
Click the Driver tab> update Driver> Search Computer for Drivers> Allow me to choose from a list of available drivers on my computer; Click the "Have disk ..." button; Navigate to the folder of the ...