शब्दांच्या मागचे शब्द: भाग २ -अगत्य , अगतिक, अगम्य, गमक, गमावणे

अगत्य , अगतिक, अगम्य, गमक, गमावणे

संस्कृतमध्ये ‘ये गत्यर्थाः ते ज्ञानार्थाः’ असा सिद्धांत आहे, म्हणजेच जेवढे ‘गमनार्थक’ धातू आहेत ते ‘ज्ञानार्थक’ समजावे. ‘गमने’ यात सतत गमनाची (जाणण्याची, वाटण्याची तसेच हलण्याची, जाण्याची) क्रिया आहे. सरस्वती जशी ज्ञानाची देवता आहे तशीच ती गमनाची द्योतक – नदीदेवता आहे ही कल्पना या सिद्धांताच्या मुळाशी आहे. या अनुषंगाने पुढील शब्दार्थ पाहू-

गम्य = गम् + य = जाणण्यायोगे असे ज्ञान
अगम्य = अ + गम् + य = न जाणण्याजोगे/ न समजण्याजोगे
अगतिक = अ + गम् (गति) + क = गति कुंठित झालेला (अगति), निरुपाय अवस्थेत सापडलेला.
अगत्य = अगति + य = अनिवार्य, आवश्यक, जरुरी, कळकळ, आग्रह या अर्थाने रूढ झाला. हा शब्द ‘अगतिक’ पासून निष्पन्न झाला.

गमावणे = गम् म्हणजे जाणे, गमव म्हणजे जावयास लावणे यावरून फुकट घालवणे, हरवणे.
गमक = चिन्ह, दाखला, कारण

TOP 10 TRENDING ON NEWSINTERPRETATION

Chinese Hackers Secretly Breached Asian Telecom Networks for Years Without Being Detected

A new report by cybersecurity firm Sygnia reveals that...

Massive Espionage Blunder Jeopardizes US Spying on Houthis

Leaked text messages between top US officials may have...

BlackLock’s Dirty Secrets Exposed After Researchers “Hack the Hackers”

Cybersecurity researchers hacked into the systems of a ransomware...

APT36 Hackers fakes India Post to Deploy Malware on Windows and Android

Deceptive Website Targets Windows and Android Users In a recent...

DeepSeek Impersonation Ads Infect Users with Malware

Fake DeepSeek Ads Trick Users into a Trap Cybercriminals are...

Solar Power at Risk: Security Flaws Threaten Global Grids

Solar power is growing fast around the world, especially...

SparrowDoor 2.0: Chinese Hackers Deploy Powerful Malware in Global Attacks

A group of Chinese hackers called FamousSparrow is in...

U.S. Security Officials’ Private Info Is Accessible Online

Private Contact Information Easily Accessible The private contact details of...

Hackers Target Airports’ System with $10 Million Ransom Demand; Malaysia Refuses to Pay

Malaysia was recently hit by a major cyberattack. The...

Majorana 1 Quantum Chip: Overcoming Instability in Quantum Systems

Quantum computing is transforming the way complex problems are...

Massive Espionage Blunder Jeopardizes US Spying on Houthis

Leaked text messages between top US officials may have...

BlackLock’s Dirty Secrets Exposed After Researchers “Hack the Hackers”

Cybersecurity researchers hacked into the systems of a ransomware...

APT36 Hackers fakes India Post to Deploy Malware on Windows and Android

Deceptive Website Targets Windows and Android Users In a recent...

DeepSeek Impersonation Ads Infect Users with Malware

Fake DeepSeek Ads Trick Users into a Trap Cybercriminals are...

Solar Power at Risk: Security Flaws Threaten Global Grids

Solar power is growing fast around the world, especially...

SparrowDoor 2.0: Chinese Hackers Deploy Powerful Malware in Global Attacks

A group of Chinese hackers called FamousSparrow is in...

U.S. Security Officials’ Private Info Is Accessible Online

Private Contact Information Easily Accessible The private contact details of...

Related Articles

Popular Categories

error: Content is protected !!