IDENTIFYING DIFFERENT CONTENT OF USERS IN INFORMATION SYSTEMS

Authors

  • N. Sh. Tojiyev Teacher, Samarkand Institute of Economics and Services

DOI:

https://doi.org/10.17605/OSF.IO/B2ZXQ

Abstract

(Matthew 24:14; 28:19, 20) Today, the extent to which this system is protected plays an important role in the development of information systems and the development of its project. The protection of information systems is significant not only by how strongly the authentication and identification system is installed, but also by the extent to which users' rights are limited.

Downloads

Published

2023-02-27

How to Cite

N. Sh. Tojiyev. (2023). IDENTIFYING DIFFERENT CONTENT OF USERS IN INFORMATION SYSTEMS. Open Access Repository, 4(02), 177–179. https://doi.org/10.17605/OSF.IO/B2ZXQ