Solved

How does windows scheduled task work?

Posted on 2008-10-06
4
194 Views
Last Modified: 2012-05-05
More specifically, I'd like to know what happens when a scheduled .bat file is run. Does it pop up on the system as double-clicking or does it run in the background?
What if it's invoked by some other process?
0
Comment
Question by:nopopo
  • 3
4 Comments
 
LVL 1

Expert Comment

by:fragopi
ID: 22657905
nopopo,

As far as schedulling the batch goes, here is how you would do it:

1. create you batch file
2. create a shortcut to you batch file (put it in the same folder as your batch)
3. right click on the shortcut you created and click in properties. The short cut window editor will be displayed. In the tab "Shortcut" change the Run field to Minimized (this is what does the trick)
4 create your task schedule for your batch.
5. after the task is created, right click on the task and click properties. The task window editor will be displayed
6. In the "Task" tab change the Run field to use the batch shortcut (use the full path to the shortucut)

That is it for the batch.

As far as being invoked by another process, it will depend on "what" this other process means.

If the batch file you scheduled (the way describe above) calls a 2nd batch file, the second batch file will be 'hidden' too.

If it is an application you developed, yes you can do it, but the actual implementation will depend on the language you use for developement.

Hope this helps.
0
 

Author Comment

by:nopopo
ID: 22660106
Hi fragopi,
Thanks.
By default, does scheduled task come out hidden or visible as a dialog?
By default, can I see the process in the task manager?
Thanks
0
 
LVL 1

Accepted Solution

by:
fragopi earned 500 total points
ID: 22667924
Hi nopopo,

1- now window for the task scheduler is displayed when the task run
2 - yes the process can be seen in the task manager

0
 
LVL 1

Expert Comment

by:fragopi
ID: 22667928
My apologies, in my last post I meant

1. NO window....
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
sccm report 1 40
Windows 10 Blue Screen of Death Minidump analysis request 9 56
Windows IPv6 DHCP server 8 37
Comctl32.ocx problem - Office 2016 Pro Win 10 7 27
Several part series to implement Internet Explorer 11 Enterprise Mode
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now