1 00:00:00,330 --> 00:00:06,600 So now let's talk about this environment where it goes so fast, I would expect the theory and then 2 00:00:06,600 --> 00:00:10,010 we'll see how to access that environment where we're seeing this pasture. 3 00:00:10,320 --> 00:00:16,980 So this environment, where was a special type of variables and this system uses these variables to 4 00:00:16,980 --> 00:00:18,590 check the boundaries. 5 00:00:18,810 --> 00:00:20,780 So you take the ping, right. 6 00:00:20,790 --> 00:00:24,150 So people will be somewhere in the system. 7 00:00:24,180 --> 00:00:31,590 Patrick, the notion that you do or any other part and if that part is included in the pathway of the 8 00:00:31,590 --> 00:00:36,060 environment variable, then you can execute this comment from here. 9 00:00:37,080 --> 00:00:42,480 In other words, you need to go into the territory and you need to open the common from there and you 10 00:00:42,480 --> 00:00:44,520 need to execute the binary data in itself. 11 00:00:45,390 --> 00:00:50,530 So this is the usual environment where there are some other environment variables as well. 12 00:00:50,820 --> 00:00:57,630 So let's go and see this one first opened the flight explorer and become this Pewsey and click on properties. 13 00:00:59,640 --> 00:01:02,690 So this window open has been changed because of the. 14 00:01:03,420 --> 00:01:06,320 So let's go and click on this advancer system to. 15 00:01:08,410 --> 00:01:10,330 Now, in this environment, variables. 16 00:01:14,120 --> 00:01:20,470 So these are the environment values, these are the user variables you can see here, the part of them 17 00:01:20,480 --> 00:01:20,800 for that. 18 00:01:20,820 --> 00:01:24,080 So there are two terms for you, just the connection. 19 00:01:24,470 --> 00:01:26,540 You can do the content in the temperature. 20 00:01:26,570 --> 00:01:29,060 So this is the part to click on this. 21 00:01:29,060 --> 00:01:34,280 You can see here the part has been set for the python. 22 00:01:34,610 --> 00:01:44,780 So if I open this current prompt and run python, then it will be because the python part here has been 23 00:01:44,780 --> 00:01:47,570 set to this part of it variable. 24 00:01:47,580 --> 00:01:53,470 So whenever this current project has been looking for the Python binary, which Acardo, but rather 25 00:01:53,510 --> 00:01:56,220 if it's not found in the scripts, it will go to the spot. 26 00:01:56,240 --> 00:02:00,470 So if it's only here, then it will execute the binary from there. 27 00:02:01,610 --> 00:02:07,280 So the disadvantage of this environment where it was, you can see here, there are so many variables 28 00:02:07,280 --> 00:02:07,700 as well. 29 00:02:08,990 --> 00:02:15,150 I also recommend to add the system where it was like, if you want to execute a program, you need to 30 00:02:15,150 --> 00:02:18,310 add to the system was you can see here, these are the system. 31 00:02:18,320 --> 00:02:22,760 It was you can see the party command prompt for that is Besch. 32 00:02:23,840 --> 00:02:30,190 And you can see from the two two binaries, though, if you want to execute anybody displays that system 33 00:02:30,440 --> 00:02:31,790 that you do and need to execute. 34 00:02:32,390 --> 00:02:39,830 So these are the other system which was considered part based processor architecture, foster family, 35 00:02:39,830 --> 00:02:40,450 etc.. 36 00:02:42,680 --> 00:02:51,570 Concede power share models, but and attempt using them and when the winter is saving those for us or 37 00:02:51,570 --> 00:02:58,720 whenever if any program is addressing this winter, it means that it's exhausting this those and using 38 00:02:58,970 --> 00:02:59,630 the system. 39 00:02:59,630 --> 00:03:01,070 So that's OK. 40 00:03:01,100 --> 00:03:02,660 So these are the environmental rules. 41 00:03:02,930 --> 00:03:05,330 Now, let's go see how to access. 42 00:03:05,330 --> 00:03:07,770 Are these using these, uh, partial. 43 00:03:08,610 --> 00:03:19,120 So first thing you need to do is display this environment where so it's, uh, looking for the object. 44 00:03:19,130 --> 00:03:22,140 You can just sit there and we call on. 45 00:03:22,190 --> 00:03:25,170 So tricker mounted as a further object. 46 00:03:25,190 --> 00:03:31,180 So if you click and you'll see all of these system and the user variables. 47 00:03:34,230 --> 00:03:37,780 And there are some more variables here. 48 00:03:37,800 --> 00:03:44,280 You can see our data and program first of the program as the program was 686 and you show a bit version 49 00:03:44,520 --> 00:03:48,510 and you can see the computer name here as well and see the driver data. 50 00:03:48,630 --> 00:03:54,120 And you can see the, uh, coming from the taxi and the home. 51 00:03:54,120 --> 00:03:56,030 But this is my users user. 52 00:03:56,460 --> 00:03:57,480 This see the default home. 53 00:03:57,490 --> 00:03:59,970 But you can see login software. 54 00:04:00,270 --> 00:04:06,630 If you want to log on to this remote desktop or neglection, you need to enter this one. 55 00:04:06,640 --> 00:04:08,880 This is like a domain name for this one computer. 56 00:04:09,300 --> 00:04:12,510 Now the person says it's only one person. 57 00:04:12,840 --> 00:04:19,600 It's OK for us, OK, one report and windows empty. 58 00:04:19,710 --> 00:04:21,780 And but you can see the part here. 59 00:04:23,670 --> 00:04:32,190 As even this program for etc. and you can see all of the involvement there was, which we have seen 60 00:04:32,190 --> 00:04:36,930 from the, uh, graphical user interface, you can see the user user profile and Willdan. 61 00:04:38,290 --> 00:04:46,270 Now, what we want to do is if you want to access particular data and we call on you to for that, but 62 00:04:46,870 --> 00:04:47,440 that's it. 63 00:04:47,470 --> 00:04:50,590 But now I reject only the part. 64 00:04:51,940 --> 00:05:00,190 So you can see this is are the values in the past and see the three MySQL, Shell, etc. 65 00:05:01,320 --> 00:05:05,760 So you can also access other variables as well, let's say username. 66 00:05:08,020 --> 00:05:15,700 So I do want to do is you need to sit down and I need to speak with these names, there is an M m m 67 00:05:15,940 --> 00:05:23,380 or public business model, but etc. So let's go in and access this computer. 68 00:05:28,140 --> 00:05:29,640 So we got this computer. 69 00:05:29,870 --> 00:05:37,350 So this is how you access this particular variable in this environment, we're using this data and the 70 00:05:37,470 --> 00:05:40,630 value of the name of the variable and you'll get the value. 71 00:05:41,220 --> 00:05:43,330 So that's how far this involvement. 72 00:05:43,740 --> 00:05:49,530 This is a very short video, but it's very helpful when you want to get that data like environment where 73 00:05:49,530 --> 00:05:51,190 we lose our values and system. 74 00:05:51,330 --> 00:05:51,750 It was.