М
Молодежь
К
Компьютеры-и-электроника
Д
Дом-и-сад
С
Стиль-и-уход-за-собой
П
Праздники-и-традиции
Т
Транспорт
П
Путешествия
С
Семейная-жизнь
Ф
Философия-и-религия
Б
Без категории
М
Мир-работы
Х
Хобби-и-рукоделие
И
Искусство-и-развлечения
В
Взаимоотношения
З
Здоровье
К
Кулинария-и-гостеприимство
Ф
Финансы-и-бизнес
П
Питомцы-и-животные
О
Образование
О
Образование-и-коммуникации

Составить предложения на яз со след.предложениями на тему "money" lost.spend.save.win.waste.changed.fee.present.borrow.buy. ( надо)

👇
Ответ:
OT7
OT7
06.03.2020

My friend lost his money and we didn't go to the cinema.

I spend all my pocket money on CDs.

If you want to save money, don't take much with you.

They won 1000 dollars and spent the money on a trip.

I can't give you a change.

We bought that present on my money.

Can I borrow a little money?

The monthly fee is 2000 roubles.

4,4(36 оценок)
Открыть все ответы
Ответ:
wolfbz
wolfbz
06.03.2020
У русских в рационе широко распространены супы, в особенности борщи и щи. На завтрак большинство россиян едят кашу или бутерброды с чем-либо. Традиционная русская еда включает в себя: блины, супы, пельмени и пироги.  Широко распространены и хлопья. Салаты русские готовят чаще по праздникам, нежели в обычные дни. Так же со времен пельменей, блинов и прочих мучных (или не полностью мучных) изделий появились вареники. В России  на праздники часто готовят бутерброды с икрой. В обычные же дни русские делают это редко. Пироги русские часто делают с фруктами, ягодами или овощами. Однако, есть те, кто предпочитают начинку из яиц, семечек или мяса.
 
На английский в данный момент не могу;(
4,4(93 оценок)
Ответ:
serovik24
serovik24
06.03.2020

1. Carefully control your behavior on social networks. Virtuoso scammers are very adept at using personal information with which they can easily crack security codes and gain access to other accounts. Over the past few years, this method of cyberattack has become one of the most common.

2. For the safety of your accounts, restrict access to the inner circle of friends and relatives. Never share personal information with new online friends. Try not to advertise data containing birth dates, email addresses or pet names that can be used as passwords. All this information can be very useful for a professional hacker.

3. Do not use debit cards online. Unauthorized debit card payments are withdrawn directly from your bank account, and even if you report a violation immediately, it will take more than one week to restore the previous balance. In the case of a credit card in a similar situation, when contesting suspicious payments, the client has access to his accounts. Both types of cards have notification functions either by e-mail or in the form of SMS text, which makes it possible to quickly interrupt unauthorized actions. Visa is a leader in security solutions for its credit cards.

4. Beware of messages of this kind: “Attention! Your account has been hacked. You must call to verify your account. Send us a message and we will call you back. ”

5. Do not become a victim of Clickjacking. This type of attack is fraught with hyperlinks under what, at first glance, looks like harmless content. However, clicking the link opens a channel for malware that can invade your computer or transfer your personal information.

6. Do not be reckless in using any Wi-Fi connection. Wi-Fi hotspots are most often unsafe because they do not encode information transmitted on the Internet. Moreover, the tools used by hackers allow them to “peek” over your shoulder and fetch usernames, passwords or other information that provides access to financial accounts. Cellular network in this regard is more secure.

7. In the email messages and on the website, look carefully at the URLs, even if they contain the names of the reputable financial institutions you deal with. The most common catch is a combination of a legitimate website name and fake. These addresses very often lead to mime sites, which under the appearance of a legitimate guise hide affiliation with hacking activities. Sometimes the URL may be genuine, but when you click on the link, it takes you to another site.

8. Never click on messages sent by e-mail and offering to update personal data. In most cases, such requests are triggered after you enter your account via a non-email address.

9. Do not use the same password for different accounts. Choose unusual characters, numbers, and spaces for passwords. As an added precaution, fill out security questions with fictitious, easy-to-remember answers, rather than facts that might reveal your personal information.

10. Install antivirus and antispyware software on your computer. Make sure that these programs work and are updated automatically.

Объяснение:

4,8(62 оценок)
Это интересно:
Новые ответы от MOGZ: Английский язык
logo
Вход Регистрация
Что ты хочешь узнать?
Спроси Mozg
Открыть лучший ответ