wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Life of an army person

profile
Tara Prajapati
Nov 20, 2021
8 Likes
2 Discussions
177 Reads

            The life of a soldier is not easy. It is considered to be the most challenging job one can do. The life of a soldier is based on sacrifice and selflessness.

        As soon as he joins the army, his duty to safeguard his country begins. He is trained to win the battle.Soldiers are the greatest asset of a country. Because have to fight whenever the country needs them without even thinking about themselves or their loved ones.   

       The life of a soldier is all about commitment. Commitment towards the safety of the country. The safety of the country lies in his own hands and he should be ready to protect it at all cost. The life of a soldier is very disciplined because he should be prepared in the best way even if anything worse happens in the future. Rigorous training is provided both physically and mentally so that when the time comes he should be prepared.   

         Being a soldier is pride in itself. My heartfelt salute to such brave soldiers. 

                                                                     Jai Hind!! 


Comments ()


Sign in

Read Next

Memory Management

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Memory heirchy

Blog banner

IO Buffers

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Deadlock and Starvation

Blog banner

Compromising Mobile Platforms

Blog banner

Beatbox

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Hacking Mobile Platforms

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Dr. Venkadavarahan

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Uniprocessor and Types

Blog banner

"Audit" In Data Science

Blog banner

undefined

Blog banner

The Golden Temple , Amritsar

Blog banner

COMMUNICATION

Blog banner

Social Engineering Attacks

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

GIS Mapping

Blog banner

Ethical Hacking

Blog banner

MailChimp

Blog banner

Inventory management software system

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Security issues

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Developments in Modern Operating Systems

Blog banner

Direct Memory Access

Blog banner

INSTAGRAM

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Memory Management

Blog banner

File Allocation Methods

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Direct Memory Access

Blog banner

Firewall in Computer Network

Blog banner

Mobile Survey

Blog banner

Riddhi Miyani 53003220140

Blog banner