Помогите составить вопросы

  • Задайте вопросы к словам.
    1.These(1) boys(2) usually get good marks(3). 2.Our(1) teacher(2) always spoke English at our(3) lessons(4). 3.My(1) wife(2) is writing letters and telegrams(3) now. 4.I am an engineer. 5.Those(1) girls(2) were economists(3).

  • Задайте вопросы к словам.
    1.These(1) boys(2) usually get good marks(3). 2.Our(1) teacher(2) always spoke English at our(3) lessons(4). 3.My(1) wife(2) is writing letters and telegrams(3) now. 4.I am an engineer. 5.Those(1) girls(2) were economists(3).

    Умоляю помогите?

  • Помогите пожалуйста очень надо!!! Составить разделительные вопросы по следующим предложения.
    Lunch is realy
    She is still asleep
    This isn't very difficult
    It's not wrong
    It isn't hot
    The weather is nice
    There is nobod in
    You are interested in it
    The shop is closed

  • Lunch is realy
    She is still asleep
    This isn't very difficult, is it?
    It's not wrong, is it?
    It isn't hot, is it?
    The weather is nice, isn't it?
    There is nobod in, is there?
    You are interested in it, aren't you?
    The shop is closed, isn't it?

  • помогите составить диалог со специальными вопросами на тему "как я провел зимние каникулы"
    заранее спасибо!

  • помогите пожалуйста составить 10 общих вопросов начиная с Did (тема новый год или зимние каникулы)заранее спасибо =)

  • Помогите, пожалуйста составить 10 вопросов к тексту, к любым предложениям, только выделите их.

    Computer crimes
    More and more the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
    These facts have not been lost on criminals or would-be criminals. A recent Stanford Research Institute study of computer abuse was based on 160 case histories, which probably are just the proverbial tip of the iceberg. After all, we only know about the unsuccessful crimes. How many successful ones have gone undetected is anybody's guess.
    Here are a few areas in which computer criminals have found the pickings all too easy.
    Banking. All but the smallest banks now keep their accounts on computer files. Someone who knows how to change the numbers in the files can transfer funds at will. For instance, one programmer was caught having the computer transfer funds from other people's accounts to his wife's checking account. Often, traditionally trained auditors don't know enough about the workings of computers to catch what is taking place right under their noses.
    Business. A company that uses computers extensively offers many opportunities to both dishonest employees and clever outsiders. For instance, a thief can have the computer ship the company's products to addresses of his own choosing. Or he can have it issue checks to him or his confederates for imaginary supplies or services. People have been caught doing both.
    Credit Cards. There is a trend towards using cards similar to credit cards to gain access to funds through cash-dispensing terminals. Yet, in the past, organized crime has used stolen or counterfeit credit cards to finance its operations. Banks that offer after-hours or remote banking through cash-dispensing terminals may find themselves unwillingly subsidizing organized crime.
    Theft of Information. Much personal information about individuals is now stored in computer files. An unauthorized person with access to this information could use it for blackmail. Also, confidential information about a company's products or operations can be stolen and sold to unscrupulous competitors. (One attempt at the latter came to light when the competitor turned out to be scrupulous and turned in the people who were trying to sell him stolen information.)
    Software Theft. The software for a computer system is often more expensive than the hardware. Yet this expensive software is all too easy to copy. Crooked computer experts have devised a variety of tricks for getting these expensive programs: printed out, punched on cards, recorded on tape or otherwise delivered into their hands. This crime has even been perpetrated from remote terminals that access the computer over the telephone.

  • Здравствуйте!!!!Помогите мне пожалуйса, мне нужно задать 5 типов вопросов к этому тексту
    GuideGuide dogs are specially trained to help blind people

  • Помогите ,пожалуйста составить 5 вопросов разных типов к предложению из текста:In 1964 Disney Productions bought a piece of central Florida and began transforming it into one of the world's most magnetic tourist attractions.

  • Помогите пожалуйста записать вопросы к предложениям:Mag walked in the park.The weather was fine.