answersLogoWhite

0

Substituting environment variable values

To enable the substitution of variable values at the command line or in scripts, enclose the variable name in percent signs (that is, %variablename%). By using percent signs, you ensure that Cmd.exe references the variable values instead of making a literal comparison. After you define variable values for a variable name, enclose the variable name in percent signs. Cmd.exe searches for all instances of the variable name and replaces it with the defined variable value. For example, if you create a script that contains different values (for example, user names) and you want to define the USERNAME environment variable for each user with these values, you can write one script using the variable USERNAME enclosed in percent signs. When you run this script, Cmd.exe replaces %USERNAME% with the variable values, which eliminates the need to perform this task manually for each user. Variable substitution is not recursive. Cmd.exe checks variables once. For more information about variable substitution, see For and Call

From the above Technet description, the % signs are used to ensure that "cmd.exe" does not literally use the term "systemroot" and references the systemroot variable correctly (So therefore %systemroot% is recognised correctly as the C:\ drive, if C:\ is your systemroot).

User Avatar

Wiki User

15y ago

Still curious? Ask our experts.

Chat with our AI personalities

CoachCoach
Success isn't just about winning—it's about vision, patience, and playing the long game.
Chat with Coach
DevinDevin
I've poured enough drinks to know that people don't always want advice—they just want to talk.
Chat with Devin
LaoLao
The path is yours to walk; I am only here to hold up a mirror.
Chat with Lao

Add your answer:

Earn +20 pts
Q: What do the percent signs in SystemRoot represent?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What does SFC.exe mean?

SFC.exe is the windows system file checker. It checks system files for corruption or unwanted changes. If sfc discovers that a protected file has been overwritten, it retrieves the correct version of the file from the %systemroot%\system32\dllcache folder, and then replaces the incorrect file. If %systemroot%\system32\dllcache folder is corrupted, you need to have the windows installation CD to replace damaged files. %systemroot% is usually C:\WINDOWS.


What command do you enter in the Explorer search box to access the Remote Admin share on the computer name Fin?

%systemroot% folder. Enter the path \computernameadmin$ to access the %systemroot% folder (most likely the C:Windows folder) on a remote computer. The admin$ administrative share is called the Remote Admin share.


How can you remove Download Trojan that has infected the file C WINDOWS isrvs sysupd.dll?

You need to run these 5 essential steps to remove all the spyware on your computer.1. Run Deckard's System Scanner (DSS)2. Run Malwarebytes Anti-Malware3. Run the anti spyware removal programs spybot4 Run Superantispyware5. Run a complete scan with free curing utility Dr.Web CureIt!Install threat fire which will enhance your antivirus protection1. back up your registry and your system, and/or setting a Restore Point2. Open Task Manager:Stop these processesdesktop.exe edmond.exe ffisearch.exe3.open registry start/run/regeditIf these keys are there delete and rebootHKEY_LOCAL_MACHINE\software\Microsoft\windows\currentversion\run\ffisHKEY_LOCAL_MACHINE\software\Microsoft\windows\currentversion\run\desktop search4. Open registry again and delete any of these keys if presentHKEY_CLASSES_ROOT\clsid\{5b4ab8e2-6dc5-477a-b637-bf3c1a2e5993}HKEY_CLASSES_ROOT\clsid\{950238fb-c706-4791-8674-4d429f85897e}HKEY_CLASSES_ROOT\mfiltis HKEY_LOCAL_MACHINE\software\Microsoft\windows\currentversion\policies\ext\clsid\{5b4ab8e2-6dc5-477a-b637-bf3c1a2e5993}HKEY_LOCAL_MACHINE\software\Microsoft\windows\currentversion\run\desktop searchHKEY_LOCAL_MACHINE\software\Microsoft\windows\currentversion\run\ffisHKEY_LOCAL_MACHINE\system\currentcontrolset\services\delprot5.Remove these files from windows if they're presentsystemroot+\isrvs\desktop.exe systemroot+\isrvs\edmond.exe systemroot+\isrvs\ffisearch.exe systemroot+\isrvs\isearch.xpi systemroot+\isrvs\mfiltis.dll systemroot+\isrvs\msdbhk.dll systemroot+\isrvs\sysupd.dll desktopdir+\virus hunter security.lnk desktopdir+\your platinum visa.lnk systemroot+\delprot.ini desktopdir+\big dick school for 2.95.URL desktopdir+\anal exploits.URL desktopdir+\evidence eraser.lnk desktopdir+\popup blocker stops popups.lnk desktopdir+\spyware avenger.lnk desktopdir+\virus hunter security.lnk desktopdir+\your platinum visa.lnk systemroot+\delprot.ini systemroot+\delprot.log delprot.sys5. Remove directory systemroot+\isrvs6.Reboot and it should be fineDO NOT EDIT YOUR REGISTRYUNLESS YOU KNOW WHAT YOU ARE DOING.Editing the registy can harm your computerYou can remove this Trojan horse by following these steps .


In what folder does Windows File Protection store an extra copy of system files?

By default files are stored in the following folder location: %systemroot%\system32\dllcache %systemroot% means wherever the Windows program files are stored. This is normally C:\Windows\System32\dllcache However it may vary from system to system and there may be several locations that look similar especially if multiple copies of Windows or XP or Vista have been installed. The easiest way to discover the current location is to: Open a command prompt box Type the following: CD %systemroot%\system32\dllcache The full path should be dispalyed to the left of the ">" Generally you should not mess with this folder! For more information look at http://support.microsoft.com/kb/222193


When a switch contains electricity what does it represent?

Usually a switch that is charged is an CLOSED CIRCUIT therefore is considered to represent 1 in binary.