В
Все
М
Математика
О
ОБЖ
У
Українська мова
Д
Другие предметы
Х
Химия
М
Музыка
Н
Немецкий язык
Б
Беларуская мова
Э
Экономика
Ф
Физика
Б
Биология
О
Окружающий мир
Р
Русский язык
У
Українська література
Ф
Французский язык
П
Психология
А
Алгебра
О
Обществознание
М
МХК
В
Видео-ответы
Г
География
П
Право
Г
Геометрия
А
Английский язык
И
Информатика
Қ
Қазақ тiлi
Л
Литература
И
История
nikita1424
nikita1424
18.08.2021 10:30 •  Английский язык

Study the two photographs. in 1.5 minutes be ready to compare and contrast the photographs:

• give a brief description of the photos (action, location)
• say what the pictures have in common
• say in what way the pictures are different
• say which of the concerts presented in the pictures you’d prefer
• explain why

you will speak for not more than 2 minutes (12–15 sentences). you have to talk continuously.

Показать ответ
Ответ:
starikovavarvar
starikovavarvar
10.06.2021 05:57

ответ:

объяснение:

хех, ну давайте попробуем:

ви лив он зе ёрс. итс зе фифс ларджест оф зе найн мэйн планетс ин зе солар систем. итс зе сёрд планет фром зе сан. зе сан ис джаст уан оф мэни старс ин зе милки вэй гэлакси. зе ёрс мувс раунд зе сан. зе ёрс лук блу фром спэйс бекос севенти пёсент ис каверд виз вате. зе ра фо оушенс он зе ёрс. зе пасифик, зе атлантик, зе индиан энд зе арктик. зе оушнс контейн найнти севен пёсент оф олл ватер он зе ёрс. зе дистанс фром поул ту поул ис твенти саузэнд киломейтес

0,0(0 оценок)
Ответ:
Illia1Z
Illia1Z
30.10.2022 18:03

the term "computer security "isn't used very frequently.

is the term "computer security "used very frequently?

the content of computer isn't vulnerable to several risks unless the computer is connected to other computers to form a network.us the content of computer vulnerable to several risks unless the computer is connected to other computers to form a network?

3) the use of computer networks, especially the internet, hasn't become widely spread.has the use of computer networks, especially the internet become widely spread?

4) сonfidentiality doesn't mean that information cannot beaccessed by unauthorized parties.

does сonfidentiality mean that information cannot beaccessed by unauthorized parties?

5) integrity doesn't mean that information is protected against unauthorized changes that are not detectable to authorized users.does integrity mean that information is protected against unauthorized changes that are not detectable to authorized users?

6) authentication doesn't mean that the users are those persons who they claim to be.does authentication mean that the users are those persons who they claim to be?

7) availability doesn't mean that resources are accessible by authorized parties.does availability mean that resources are accessible by authorized parties?

8) other important factors of computer security professionals don't call the access control and nonrepudjation.do other important factors of computer security professionals call the access control and nonrepudjation?

9) privacy isn't perhaps the most important aspect of computer security for everyday internet users.is privacy perhaps the most important aspect of computer security for everyday internet users?

10) it isn't now very important that individuals are able to maintain control over what information is collected about them, how it is used, who may use it, and what purpose it is used for.is it now very important that individuals are able to maintain control over what information is collected about them, how it is used, who may use it, and what purpose it is used for?

можете отметить мой ответ как лучшее ? !

0,0(0 оценок)
Популярные вопросы: Английский язык
Полный доступ
Позволит учиться лучше и быстрее. Неограниченный доступ к базе и ответам от экспертов и ai-bota Оформи подписку
logo
Начни делиться знаниями
Вход Регистрация
Что ты хочешь узнать?
Спроси ai-бота