Description
Reports the Universal Time Coordinate (UTC) time on a computer.
This script was tested using Python 2.2.2-224 for Microsoft Windows, available from ActiveState.
Supported Platforms
Windows Server 2003 |
Yes |
Windows XP |
Yes |
Windows 2000 |
No |
Windows NT 4.0 |
No |
Windows 98 |
No |
Script Code
import win32com.client
strComputer = "."
objWMIService = win32com.client.Dispatch("WbemScripting.SWbemLocator")
objSWbemServices = objWMIService.ConnectServer(strComputer,"root\cimv2")
colItems = objSWbemServices.ExecQuery("Select * from Win32_UTCTime")
for objItem in colItems:
print "Day: ", objItem.Day
print "Day Of Week: ", objItem.DayOfWeek
print "Hour: ", objItem.Hour
print "Milliseconds: ", objItem.Milliseconds
print "Minute: ", objItem.Minute
print "Month: ", objItem.Month
print "Quarter: ", objItem.Quarter
print "Second: ", objItem.Second
print "Week In Month: ", objItem.WeekInMonth
print "Year: ", objItem.Year
For online peer support, join the microsoft.public.windows.server.scripting community on the msnews.microsoft.com news server. To provide feedback or report bugs in sample scripts or the Scripting Guide, please contact Microsoft TechNet.
Disclaimer
The sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.
分享到:
相关推荐
List the Codec Files on a Computer
We introduce a method to dynamically construct highly concurrent linked lists on modern graphics processors. Once constructed, these data structures can be used to implement a host of algorithms ...
Removing a node from the linked list, 83 4.5.2 Time complexity of linked lists, 86 4.5.3 Doubly linked lists, 87 4.6 Unit-time advance design, 87 4.6.1 Selecting a unit time, 90 4.6.2 Implementation,...
This time period (1970s) also corresponds with the introduction of high-performance computer systems (supercomputers), which since that time have increased relentlessly in power, by approximately a ...
Displays a list of the SMS messages stored on the ICC.
An applied introduction to modern computer vision, focusing on a set of computational techniques for 3-D imaging, this book covers a wide range of fundamental problems encountered within computer ...
Give a divide and conquer algorithm for the following problem: you are given two sorted lists of size m and n, and are allowed unit time access to the ith element of each list. Give an O(lg m + lgn) ...
and a section on the use of the object modelling language Alloy and its analyserforsp ecifying and exploring under-specified first-orderlogic models with respect to properties written in first-order ...
Changing the Values of List Items with Index Assignment x List Concatenation x The in Operator x Removing Items from Lists with del Statements x Lists of Lists x Methods x The len() Function x The ...
List all the Databases on a SQL Server
Advanced Topics in Computer Systems Reading List (UCB CS262A)
[1] This paper will provide such a project model and is donated to the FreeBSD Documentation project where it can evolve together with the project so that it can at any point in time reflect the way ...
Changing the name or domain only changes the domain SID if the computer was previously associated with a domain.To understand the problem that cloning can cause, it is first necessary to understand ...
Computer Security Reading List
Most electronics programmes now include a course on computer simulation that looks at the modelling methods used and considers the limitations and restrictions of these tools. Such courses are not ...
Downey <br>Table of Contents Contributor List Chapter 1: The way of the program Chapter 2: Variables and types Chapter 3: Function Chapter 4: Conditionals and recursion ...