What is the proper way to refer to the system root folder?

a. &systemroot&
b. %systemroot%
c. %system%
d. &system&

Answer: b. %systemroot%

Computer Science & Information Technology

You might also like to view...

The main threat involving wireless access points is unauthorized access to the network. The principal approach for preventing success is the __________ standard for port-based network access control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are requested to update personal information, such as passwords or credit card numbers?

A. pharming B. typo squatting C. phishing D. pretexting

Computer Science & Information Technology