Solved

What are two backslashes in a path?

Posted on 2010-11-23
3
626 Views
Last Modified: 2012-06-27
A file path has single backslashes as follows:

POSEK = C:\isi\POSEK_30.1

Now, consider a path with two backslashes:

HOMESHARE = \\n1xpaffn4.au.fu.some.com\userdata\tankl

What is the meaning of two backslashes?


Thanks!
0
Comment
Question by:naseeam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
athomsfere earned 350 total points
ID: 34198434
Thats the UNC or network path. The \\ is for the server the share is on.

So \\n1xpaffn4.au.fu.some.com
is the server the folders \userdata\tankl reside on.
0
 
LVL 21

Assisted Solution

by:Ivano Viola
Ivano Viola earned 150 total points
ID: 34198512
Two backslashes are used when referring to a location on the network.
Example: \\MyServer\MyFiles
This path refers to a server that hosts a folder share named My Files.

C:\MyServer\MyFiles would refer to a folder structure located on your computer. If you go to the C: drive on your computer you would then see a folder named MyServer which has a folder named MyFiles inside.
0
 
LVL 1

Author Closing Comment

by:naseeam
ID: 34198725
Thanks for great answers.  They are extremely helpful.

Also, the response was very fast.
0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Suggested Courses
Course of the Month6 days, 12 hours left to enroll

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question