• This form of the verb is also known as the ‘V2’ form of the verb.
  • Examples of Present (Root ) form of verb




    Download 71,29 Kb.
    bet3/24
    Sana10.01.2024
    Hajmi71,29 Kb.
    #134047
    1   2   3   4   5   6   7   8   9   ...   24
    Bog'liq
    english 30 mavzu
    7-maruza, Asal, 2021 Itimoiy ish 16 aIshchi Dastur — копия 10 — копия, 17-Amaliy mashgulot, 6-ma\'ruza. Furyе qatоrining yaqinlashishi, Antarktda, Magnitomexanik hodisalar, 1.8, Abdulahad Muhammadjonov. Qadimgi Buxoro (2001), yillik hisobot rasmsiz, Oqsillar, Stajirovka rejasi 2-илова, file (2), Ekinlarni sug\'orish asoslari (Z.Artukmetov), Sanoq sistemalar
    Examples of Present (Root ) form of verb:

    • Nisha love watching movies with my friends. (Base form – love)

    • Preeti finish my homework before 6 p.m. everyday.(Base form – finish)

    • Chinki play really well. (Root verb – play)

    2. Simple past form of a verb
    The simple past form of the verb is a verb used to refer to or denote any action that took place in the past or the work that is already done. This form of the verb is also known as the ‘V2’ form of the verb. This form of verb is generally formed by adding (-ed)/(-d) at the end of the main or root verb. 

    What is Information Security?


    Information security is the practice of protecting information by mitigating information risks. It involves the protection of information systems and the information processed, stored and transmitted by these systems from unauthorized access, use, disclosure, disruption, modification or destruction. This includes the protection of personal information, financial information, and sensitive or confidential information stored in both digital and physical forms. Effective information security requires a comprehensive and multi-disciplinary approach, involving people, processes, and technology.
    Information Security is not only about securing information from unauthorized access. Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information can be a physical or electronic one. Information can be anything like Your details or we can say your profile on social media, your data on mobile phone, your biometrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media, etc.
    During First World War, Multi-tier Classification System was developed keeping in mind the sensitivity of the information. With the beginning of Second World War, formal alignment of the Classification System was done. Alan Turing was the one who successfully decrypted Enigma Machine which was used by Germans to encrypt warfare data.
    Effective information security requires a comprehensive approach that considers all aspects of the information environment, including technology, policies and procedures, and people. It also requires ongoing monitoring, assessment, and adaptation to address emerging threats and vulnerabilities.
    Why we use Information Security?
    We use information security to protect valuable information assets from a wide range of threats, including theft, espionage, and cybercrime. Information security is necessary to ensure the confidentiality, integrity, and availability of information, whether it is stored digitally or in other forms such as paper documents. Here are some key reasons why information security is important:
    Protecting sensitive information: Information security helps protect sensitive information from being accessed, disclosed, or modified by unauthorized individuals. This includes personal information, financial data, and trade secrets, as well as confidential government and military information.


    Download 71,29 Kb.
    1   2   3   4   5   6   7   8   9   ...   24




    Download 71,29 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Examples of Present (Root ) form of verb

    Download 71,29 Kb.