Bitsadmin complete command in Windows
The bitsadmin complete command completes the mission. Downloaded files are not available until you use this command. Use the bitadmin complete command after the job has switched to "transferred" status. If not, only those files that have been successfully transferred are ready for use.
Syntax
bitsadmin / complete
Parameters
ParameterDescriptionJob Display name of the task or GUID.For example
When the status of the mission is changed to TRANSFERRED, BITS has successfully transferred all the files in that task. However, files are not available until you use the / complete command . If multiple tasks use myDownloadJob as a generic name, you must replace myDownloadJob with the GUID of the task, so that each task has a unique identifier.
C:> bitsadmin / complete myDownloadJob
See more:
- Command bitsadmin addfileset in Windows
- Bitsadmin addfile command in Windows
The command bitadmin addfilewithranges in Windows
3.7 ★ | 3 Vote
You should read it
- Bitsadmin getfilestransferred and bitsadmin commands getminretrydelay
- Order bitsadmin getnotifycmdline, getnotifyflags, getnotifyinterface
- The bitsadmin getbytestransferred and bitsadmin commands getcompletiontime in Windows
- Bitsadmin command getproxylist, getproxyusage and getreplydata
- The bitsadmin geterrorcount command and bitsadmin getfilestotal in Windows
- The command bitadmin addfilewithranges in Windows
- Bitsadmin command getaclflags and bitsadmin getbytestotal in Windows
- Bitsadmin cancel command in Windows
May be interested
- What is Spear Phishing?you may have encountered spear phishing. when using this technique, cyber criminals will send you a message from an audience you know, asking you to provide your personal information.
- Learn about Brute Force attackbrute force attack mechanism has its advantages. it can also be used to check network security and recover forgotten passwords.
- How to use the public USB charging port safely?not much about the convenience of these public charging ports, but what about safety? can these smartphone saviors cause any harm to users?
- How does ROM memory work?rom read-only memory (read-only memory) is an integrated circuit programmed with specific data from the time of production. rom is used not only in computers, but in most electronic devices, other information technology, and this memory is sometimes considered as a firmware.
- Learn about .io domain names.io is a domain name chosen by many technology companies and startups.
- [Theory] What is Proxy Server?probably a lot of people have heard from proxy, or server proxy, or proxy server! so do you know exactly what it is? in the article below, tipsmake.com will introduce you to this proxy concept.