Предмет: Другие предметы, автор: baltiimperia

Не большое сочинение на румынском языке про "Моду в будущем"

Ответы

Автор ответа: andreiboxing1
3
Tendințele modei din lumea modernă se dezvoltă rapid și în mod clar . Cred că moda în viitor va purta sloganul " frumos si confortabil " . Ar trebui să fie haine confortabile si practice , pentru că la un haine tot mai activ stil de viață , incomode și nepractice vor pierde beneficiile lor . Îmbrăcăminte , desigur , trebuie să fie frumos . Sperăm că în viitor vom vedea o mai mare varietate de stiluri , decât acum . Moda viitorului , facem noi înșine. Și cât de rapid și precis se va dezvolta , depinde de noi .
Похожие вопросы
Предмет: Оʻzbek tili, автор: dilfuzailhomova
Предмет: Английский язык, автор: Asddfghjkl90
3 What is the logical relationship between the concepts “breach - compliance ”:
a) general and specific b) cause and effect c) method and purpose d) contrast
4 A hacker and a cracker differ mostly in the ___ of their activity.
a) method b) purpose c) nature d) location
5 Which of these is synonymous to the word “cyberbullying”:
a) cyberslacking b) cyberstalking c) cybersquatting d) cyberloafing
6 Modifying data for fun and profit is known as ___.
a) phishing b) spoofing c) data diddling d) phreaking
7 One can filter any of these EXCEPT FOR:
a) fraud b) a list of customers c) incoming e-mail d) traffic
8 What is the logical relationship between “malware” and “a virus”:
a) general – specific b) method – purpose c) part – whole d) equivalence
9 Names of all crimes which consist in taking sth in a manner forbidden by law, rules, or custom contain the root ___. a) cide b) jack c) tap d) cyber

10 Choose the correct preposition: Anyone subject ___ cybercrime should be protected by law. a) of b) in c) to d) with
11 The words “trolling”, “cyberbullying”, “cyberstalking” relate to:
a) ill-treatment of people online
b) loss of confidential information
c) stealing sb’s property
d) deceiving people
12 The concepts of “keylogging”, “mousetrapping”, “pharming” relate to all of these EXCEPT FOR:
a) manipulation of people
b) loss of confidential information
c) blackmailing
d) deceiving people
13 The words “hijacking”, “pagejacking”, “clickjacking” relate to:
a) loss of confidential information
b) illegal takeover
c) stealing sb’s property
d) deceiving people
14 The words “piracy”, “bootlegging”, “copyright” relate to:
a) ill-treatment of people online
b) loss of confidential information
c) stealing sb’s intellectual property
d) deceiving people
15 All of these are synonymous to the word “disseminate ” EXCEPT FOR:
a) promote b) spread c) propagate d) promulgate
16 Purchasing a domain name that contains a well-known trademark or commercial name to sell it to the rightful owner for a big profit is known as ___.
a) cyberslacking b) cybersquatting c) cybercide d) cyberbullying
17 He is a convicted credit-card ___.
a) fraudster b) fraud c) fraudulent d) fraudulence
18 All of these collocate with the noun “worm” EXCEPT FOR:
a) install b) commit c) download d) detect
19 The difference between “copyright” and “copyleft” concerns mostly
the authors’ ___ (their) work. a) income from b) manner of c) method of d) interest in
20 A blackhat and a whitehat differ mostly in the ___. a) colour b) size c) shape d) purpose