1 00:00:00,000 --> 00:00:01,800 [No audio] 2 00:00:01,800 --> 00:00:04,770 What are the IT components? Combining 3 00:00:04,770 --> 00:00:08,670 the IT components how a technology is 4 00:00:08,670 --> 00:00:12,630 built? The basic IT component is 5 00:00:12,660 --> 00:00:15,720 hardware, then you have the operating 6 00:00:15,720 --> 00:00:17,880 system. Hardware, again is just like a 7 00:00:17,880 --> 00:00:21,330 piece of brick. It is nothing without an 8 00:00:21,330 --> 00:00:23,220 operating system. So you install the 9 00:00:23,220 --> 00:00:25,590 operating system on top of the hardware. 10 00:00:26,130 --> 00:00:28,860 Then, once you have the operating system, 11 00:00:28,860 --> 00:00:30,720 then you install applications or 12 00:00:30,720 --> 00:00:33,060 software on it. These are the 13 00:00:33,060 --> 00:00:35,940 applications that are used by the users. 14 00:00:36,240 --> 00:00:39,330 So, if you have a hardware, you have an 15 00:00:39,390 --> 00:00:41,700 operating system, right, but there is no 16 00:00:41,700 --> 00:00:44,490 application. So you still have a useless 17 00:00:44,490 --> 00:00:47,280 computer without a proper use of it. 18 00:00:48,180 --> 00:00:49,770 Then you have a networking. So 19 00:00:49,770 --> 00:00:51,900 networking are the ones that actually 20 00:00:51,900 --> 00:00:55,710 combine or put all computers together in 21 00:00:55,710 --> 00:00:57,840 a network so they could talk to each 22 00:00:57,930 --> 00:01:00,990 other. Then of course, you have security, 23 00:01:00,990 --> 00:01:03,270 once your computers are on the network, 24 00:01:03,540 --> 00:01:05,910 you become vulnerable. And once you are 25 00:01:05,910 --> 00:01:07,650 vulnerable, you have to have certain 26 00:01:07,650 --> 00:01:09,660 type of security. And there are many 27 00:01:09,660 --> 00:01:12,120 security devices software that are out 28 00:01:12,120 --> 00:01:13,410 there, that are implemented in the 29 00:01:13,410 --> 00:01:16,080 corporate environment to secure your 30 00:01:16,080 --> 00:01:19,410 environment. The other enterprise level 31 00:01:19,410 --> 00:01:23,130 IT components are high level security, 32 00:01:23,430 --> 00:01:26,340 storage, storage, there are many 33 00:01:26,340 --> 00:01:29,160 different stories like EMC storage, 34 00:01:29,160 --> 00:01:32,580 NetApp storage, Hitachi, so many storage 35 00:01:32,580 --> 00:01:34,950 that are dedicated, provide a dedicated 36 00:01:34,950 --> 00:01:38,790 storage resources to the IT components. 37 00:01:39,030 --> 00:01:41,220 Then of course, we have a database. When 38 00:01:41,220 --> 00:01:44,520 you have tons and tons and millions and 39 00:01:44,520 --> 00:01:46,680 millions of records, that you need to 40 00:01:46,680 --> 00:01:50,070 retrieve, then creating spreadsheet or 41 00:01:50,070 --> 00:01:54,360 local data of the spreadsheet is not 42 00:01:54,360 --> 00:01:57,480 really efficient or not optimized. So 43 00:01:57,480 --> 00:02:00,030 how do you make them more efficient is 44 00:02:00,030 --> 00:02:02,190 by putting them into a database. So 45 00:02:02,190 --> 00:02:04,260 that's where the database is born. So 46 00:02:04,260 --> 00:02:06,330 but anyways for all these components are 47 00:02:06,330 --> 00:02:08,639 together makes the IT components. 48 00:02:08,639 --> 00:02:09,856 [No audio]