Typical systems name resources from a distinguished root node, controlled by the system administrator. |
Lazy programs may only look in system paths, so users can't reconfigure them. Thoughtful programs must check both system and user paths for configuration information. |