《香港人常犯的撩冷英文錯誤 之 for example》
for example 唔可以當such as咁用架。
e.g.唔可以話 I like fruit, for example, apples, oranges, and pears.
---- 同埋係呢句句子如果用such as嘅話,such as前面冇comma㗎嘛。
應該講 I like fruit. For example, I love pears, oranges and pears.
或者應該講 I like fruit. I love, for example, pears, oranges and pears.
-----------------------------------------------------------------
幫你改撩冷錯誤:https://www.patreon.com/finnieslanguagearts?fan_landing=true
英文差要從基礎學起:https://finnieslanguagearts.teachable.com/p/adult-foundation
同時也有7部Youtube影片,追蹤數超過7萬的網紅sherrybyw,也在其Youtube影片中提到,Big thanks to Ollie (Head of Talent at Golden Gate Ventures) for filming this series with me! • Timestamps • 0:35 Job searching platforms in SEA 1:54...
「e.g. for example」的推薦目錄:
- 關於e.g. for example 在 與芬尼學英語 Finnie's Language Arts Facebook 的最佳貼文
- 關於e.g. for example 在 唐家婕 - Jane Tang Facebook 的最佳解答
- 關於e.g. for example 在 โปรแกรมเมอร์ไทย Thai programmer Facebook 的最佳貼文
- 關於e.g. for example 在 sherrybyw Youtube 的最佳貼文
- 關於e.g. for example 在 Eric's English Lounge Youtube 的最讚貼文
- 關於e.g. for example 在 Official AdhwArdell Youtube 的最佳解答
- 關於e.g. for example 在 What's the difference between "eg" and "ex."? [closed] 的評價
- 關於e.g. for example 在 Using abbreviations ie, and eg, correctly in a sentence. 的評價
e.g. for example 在 唐家婕 - Jane Tang Facebook 的最佳解答
Breaking‼️
美東時間1月5日傍晚,川普以國家安全為由,用行政命令方式禁止阿里支付寶、微信支付、QQ錢包在內的8款中國應用程式(App)。
行政命令發佈後45天,禁止任何人與實體與這8款中國應用程式(App)進行交易。
按照日程,美國下任政府將在15天後,1月20日上任。
—
美國商務部長在同一時間發聲明表示,已指示商務部按行政命令執行禁令,「支持川普總統保護美國人民隱私與安全,免於受到中國共產黨的威脅。」
—
▫️8款App:
支付寶(Alipay)、掃描全能王(CamScanner)、QQ錢包(QQ Wallet)、茄子快傳(SHAREit)、騰訊QQ(Tencent QQ)、阿里巴巴旗下海外短視頻應用VMate、微信支付(WeChat Pay)和辦公型App WPS Office。
圖三:美國商務部聲明
圖四:美國國安顧問聲明
—
▫️白宮行政命令全文:
The White House
Office of the Press Secretary
FOR IMMEDIATE RELEASE
January 5, 2021
EXECUTIVE ORDER
- - - - - - -
ADDRESSING THE THREAT POSED BY APPLICATIONS AND OTHER SOFTWARE DEVELOPED OR CONTROLLED BY CHINESE COMPANIES
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency with respect to the information and communications technology and services supply chain declared in Executive Order 13873 of May 15, 2019 (Securing the Information and Communications Technology and Services Supply Chain). Specifically, the pace and pervasiveness of the spread in the United States of certain connected mobile and desktop applications and other software developed or controlled by persons in the People's Republic of China, to include Hong Kong and Macau (China), continue to threaten the national security, foreign policy, and economy of the United States. At this time, action must be taken to address the threat posed by these Chinese connected software applications.
By accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information. This data collection threatens to provide the Government of the People's Republic of China (PRC) and the Chinese Communist Party (CCP) with access to Americans' personal and proprietary information -- which would permit China to track the locations of Federal employees and contractors, and build dossiers of personal information.
The continuing activity of the PRC and the CCP to steal or otherwise obtain United States persons' data makes clear that there is an intent to use bulk data collection to advance China's economic and national security agenda. For example, the 2014 cyber intrusions of the Office of Personnel Management of security clearance records of more than 21 million people were orchestrated by Chinese agents. In 2015, a Chinese hacking group breached the United States health insurance company Anthem, affecting more than 78 million Americans. And the Department of Justice indicted members of the Chinese military for the 2017 Equifax cyber intrusion that compromised the personal information of almost half of all Americans.
In light of these risks, many executive departments and agencies (agencies) have prohibited the use of Chinese connected software applications and other dangerous software on Federal Government computers and mobile phones. These prohibitions, however, are not enough given the nature of the threat from Chinese connected software applications. In fact, the Government of India has banned the use of more than 200 Chinese connected software applications throughout the country; in a statement, India's Ministry of Electronics and Information Technology asserted that the applications were "stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India."
The United States has assessed that a number of Chinese connected software applications automatically capture vast swaths of information from millions of users in the United States, including sensitive personally identifiable information and private information, which would allow the PRC and CCP access to Americans' personal and proprietary information.
The United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.
Accordingly, I hereby order:
Section 1. (a) The following actions shall be prohibited beginning 45 days after the date of this order, to the extent permitted under applicable law: any transaction by any person, or with respect to any property, subject to the jurisdiction of the United States, with persons that develop or control the following Chinese connected software applications, or with their subsidiaries, as those transactions and persons are identified by the Secretary of Commerce (Secretary) under subsection (e) of this section: Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office.
(b) The Secretary is directed to continue to evaluate Chinese connected software applications that may pose an unacceptable risk to the national security, foreign policy, or economy of the United States, and to take appropriate action in accordance with Executive Order 13873.
(c) Not later than 45 days after the date of this order, the Secretary, in consultation with the Attorney General and the Director of National Intelligence, shall provide a report to the Assistant to the President for National Security Affairs with recommendations to prevent the sale or transfer of United States user data to, or access of such data by, foreign adversaries, including through the establishment of regulations and policies to identify, control, and license the export of such data.
(d) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted before the date of this order.
(e) Not earlier than 45 days after the date of this order, the Secretary shall identify the transactions and persons that develop or control the Chinese connected software applications subject to subsection (a) of this section.
Sec. 2. (a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate the prohibition set forth in this order is prohibited.
(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.
Sec. 3. For the purposes of this order:
(a) the term "connected software application" means software, a software program, or group of software programs, designed to be used by an end user on an end-point computing device and designed to collect, process, or transmit data via the Internet as an integral part of its functionality.
(b) the term "entity" means a government or instrumentality of such government, partnership, association, trust, joint venture, corporation, group, subgroup, or other organization, including an international organization;
(c) the term "person" means an individual or entity;
(d) the term "personally identifiable information" (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
(e) the term "United States person" means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec. 4. (a) The Secretary, in consultation with the Secretary of the Treasury and the Attorney General, is hereby authorized to take such actions, including adopting rules and regulations, and to employ all powers granted to me by IEEPA, as may be necessary to implement this order. All agencies shall take all appropriate measures within their authority to implement this order.
(b) The heads of agencies shall provide, in their discretion and to the extent permitted by law, such resources, information, and assistance to the Department of Commerce as required to implement this order, including the assignment of staff to the Department of Commerce to perform the duties described in this order.
Sec. 5. Severability. If any provision of this order, or the application of any provision to any person or circumstance, is held to be invalid, the remainder of this order and the application of its other provisions to any other persons or circumstances shall not be affected thereby.
Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
January 5, 2021.
e.g. for example 在 โปรแกรมเมอร์ไทย Thai programmer Facebook 的最佳貼文
++++🔥 ความปลอดภัยกับการโค้ดดิ่ง 🔥+++
การเขียนหน้าเว็บ ที่มีแบบฟอร์มให้กดอัพโหลดไฟล์
...พอกด upload
...ไฟล์นั้นจะถูกนำไปวางบน server ปั๊บ
.
ถ้าเราเขียนโค้ดฝั่ง server ไม่ระมัดระวัง ตัวละก็ ...ฮึๆๆๆ
ก็จะมีรูรั่ว เมื่อhacker เห็น
ก็จะยิ้มหน้าบานเป็นจานดาวเทียม
เขาสามารถโจมตีช่องโหว่ได้ไม่ยากเย็นอะไรนัก
.
ซึ่งจะขอยกตัวอย่างภาษา PHP มาเป็นกรณีศึกษาแล้วกัน
:
😉 สำหรับวิธีโจมตีนี้
อาศัยความง่ายของ php ที่แค่วางไฟล์บน server ในทันใด
เราก็สามารถเรียกไฟล์นั้น ผ่าน url ให้ทำงานได้เลย ในทันที
...ดูง่ายมั๊ยละ!!!!!
.
*** หมายเหตุ แต่ถ้าเป็นภาษาโปรแกรมมิ่งบางภาษา
ที่เข้มงวดความปลอดภัย
การโจมตีแบบนี้จะยาก
เพราะโปรแกรมเมอร์ต้อง config ไฟล์สคริปต์ก่อน
สคริปต์นั้นถึงจะประมวลผลได้
:
:
แต่ในโพสต์นี้จะขอยกตัวอย่างโค้ด PHP ที่มีช่องโหว่นะครับ
ก็ตามรูปที่โพสต์ จะประกอบไปด้วย
:
1) หน้าฟอร์ม HTML (index.html) เอาไว้ให้อัพโหลดไฟล์ (ฝั่ง browser)
2) เมื่อ user กดอัพโหลดไฟล์ ...ไฟล์นั้นจะถูกส่งไปยัง server
3) ฝั่ง server จะใช้ภาษา PHP ง่ายๆ (upload.php) รับไฟล์ที่ส่งเข้ามา แล้วนำไปวางไว้ที่โฟล์เดอร์ใดที่หนึ่งในเครื่อง เช่น uploads
:
😱 ซึ่งการเขียนโค้ดที่ง่ายเกิ๊นไปเช่นนี้
จะเป็นช่องโหว่ให้ hacker
สามารถอัพโหลดไฟล์อันตรายขึ้นไปวางบน server ได้ชิวๆๆ
:
🤔 ดังนั้นเราต้องป้องกันการโจมตีด้วยวิธีนี้ อาทิ
- ต้องเข้มงวดเรื่องนามสกุลไฟล์ว่า ไฟล์ชนิดอะไรที่ห้าม upload (เช่น .php ห้ามทำเด็ดขาด)
- หรือจะใช้ API หรือไลบรารี่ ทำการเชคไฟล์ให้ดีๆ ว่ามีชนิดถูกต้อง
- เชค contet-type ใน header request
- จำกัดขนาดไฟล์ รวมทั้งตรวจสอบชื่อไฟล์ดีๆ
- ไดเรคทอรี่ที่จะอัพโหลดไฟล์ขึ้นไปวาง ควรไม่มีสิทธิในการรันสคริปต์ใดๆ
- ฝั่ง server ควรติดตั้งซอฟต์แวร์ scanner เอาไว้สแกนหาไฟล์แปลกปลอมของ hacker ที่หลอกเข้ามาฝั่งตัว
- ในหน้าฟอร์ม (HTML) เปลี่ยนวิธีส่ง request จากเดิม ที่ใช้ put หรือ get ให้หันมาใช้วิธี post แทน
- และวิธีการอื่นๆ ที่ไม่ได้กล่าวถึง
+++++++++++++++
เขียนโดย โปรแกรมเมอร์ไทย thai programmer
รักกันก็กระทืบ like ชังกันอย่าด่าเยอะมันเจ็บ
.
รายละเอียดเพิ่มเติม
https://www.defensecode.com/…/web_vul…/form-file-upload.html
.
++++ ++++ Safety with the code 🔥 +++
Writing pages with forms to upload files
... Poke upload
... That file will be put on a pump server
.
If we write server side code, I'm not careful. I'm not careful. Haha.
There will be a leak when hacker sees it
I'll smile on my face as a satellite dish
He can attack the loophole. It's not that difficult.
.
Which one would like to sample PHP language as a case study.
:
😉 for how to attack this
Live the simplicity of php that just puts a file on server instantly.
We can call that file through url to work instantly.
... How easy is it!!!!!
.
*** note but if it's some programming language
Safety strictly
This kind of attack will be hard.
Because the programmer has to config the script file first.
That script is processed.
:
:
But in this post, I will give you an example of a PHP code that has a loophole.
As photos posted will include.
:
1) HTML (index. html) to upload file (browser side)
2) When user presses upload file... that file will be sent to server.
3) server side will use PHP language simply (upload. php) Receive the file sent in and put it on a folder of any of the devices such as uploads.
:
😱 Which one of these simple code writing goes like this?
Gonna be a loophole for hacker
Can upload a dangerous file to place on server. Chilling.
:
🤔 So we need to prevent attack this way. This week.
- Must be strict on file extensions. What type of file that cannot upload (e.g.. php don't do it.)
- or use API or Library to check your file correctly.
- contet-type shake in header request
- limit file size and check good file name
- Directory to upload file over to lay should not have any script running rights.
- server side should install scanner software to scan for foreign file of hacker who has tricked into his side.
- In the form (HTML), change the way to send request from the original put or get, turn to the post method instead.
- And other ways not mentioned
+++++++++++++++
Written by Thai programmer thai coder
If you love each other, stomp like each other. Don't scold too much. It hurts.
.
More details.
https://www.defensecode.com/public/web_vulns/form-file-upload.html
.Translated
e.g. for example 在 sherrybyw Youtube 的最佳貼文
Big thanks to Ollie (Head of Talent at Golden Gate Ventures) for filming this series with me!
• Timestamps •
0:35 Job searching platforms in SEA
1:54 Tips for job hunting in the tech industry in Singapore
4:25 Tips for getting a job at a VC
10:12 How to answer: “Why do you want to go into VC?”
11:15 Investment Analyst interview example (+ an impressive applicant’s answer)
16:19 Why networking is important
16:42 Jobs in tech in SEA
17:07 Living & working in other SEA countries
18:30 Job prospect: Technical (e.g. Software engineer, data scientist)
22:18 Job prospect: Operation (e.g. HR)
24:05 Job prospect: Sales
24:40 Job prospect: Product & UX/UI
25:02 Job prospect: Digital marketing
25:14 Job prospect: Finance
Watch the previous episodes!
Part 1 (Work visas)
https://bit.ly/31LgB0y
Part 2 (Job application & interview tips)
https://bit.ly/34AEB9t
• Mentioned websites and resources •
JobsDB https://sg.jobsdb.com
JobStreet https://www.jobstreet.com.sg
Monster https://www.monster.com.sg
Glints https://glints.com/sg
AngelList https://angel.co
Tech in Asia https://www.techinasia.com
KRAsia https://kr-asia.com
DealStreetAsia https://www.dealstreetasia.com
e27 https://e27.co
#singapore #expat #jobhunting
? Instagram http://www.instagram.com/sherrybyw
☀️ Facebook http://www.facebook.com/sherrybyw
? TikTok https://bit.ly/2ZRS1Kn
Let's chat!
For random questions - sherry@abrushofbeauty.com
For business inquiries - info@abrushofbeauty.com
•••••••••••••••••••••••••••• CAMERA, EQUIPMENT, AND MUSIC ••••••••••••••••••••••••••••••••
Music by Gil Wanders - Dreams - https://thmatc.co/?l=1CB95E97
Canon EOS 70D
Canon EF-S 24mm f/2.8
e.g. for example 在 Eric's English Lounge Youtube 的最讚貼文
期待的政治英文影片第二集出爐了!!! 今天探討的是三位政治大咖的英文口語。再次聲明,此影片的目的不在於比較英文能力,而是提供學習者英文口語的實際操作和可以注意的小細節。對我而言,英文是一種工具,我並不覺得台灣的政治人物一定需要擁有驚人的外語能力。以下是影片中提到的一些資訊,請看完再發表評論:
關於韓市長的「晶晶體」: http://bit.ly/2kENRVv
★★★★★★★★★★★★
英文口語評估指標
• 是否到達溝通目的
• 考量語境/當下場景
• 詞彙資源
• 文法範圍和正確度
• 連貫性和流暢度還有發音
★★★★★★★★★★★★
韓國瑜(1957年6月17日-),中華民國政治人物,中國國民黨,現任高雄市市長,中華民國陸軍軍官學校專修學生班40期、東吳大學英國語文學系文學學士、國立政治大學東亞研究所法學碩士。
EDIT: New Sample (08.21.2019): https://youtu.be/1xrcXcZvAko?t=148 (請先看完我們的分析)
最先去搜尋的是ICRT全英文的專訪,但是大部分影片和錄音檔都被刪除,只留下一些片段: https://youtu.be/zDYhd7XiSUQ?t=12 (Vid 1)
•prosperious -- prosperous Kaohsiung
•We will hire the English teacher so that we can save money -- cause, effect relationship?
•intelligible English pronunciation but spoke in short phrases
https://youtu.be/3helP_n9jY8?t=481 (Vid 2)
•唸稿子的時候有適當的停頓, 英文語調也有上下的起伏
•met--made, we have made the impossible possible
•in everyone eyes--in everyone’s eyes
•longing for better tomorrow --longing for a better tomorrow
•整體上來說沒有什麼問題...
•很難去評估真正的英文口語能力,畢竟是念稿子
•從詞彙量而言,至少足夠回應一般生活類問題
•因為句子還蠻短的,所以沒有什麼語法錯誤
•口音是一定有的,但是算標準,可以聽得懂
•短句的流暢度沒有大問題,但是連貫性可以增加
★★★★★★★★★★★★
郭台銘(英文名:Terry Gou,1950年10月18日-),中華民國企業家,新北板橋人,籍貫山西省晉城縣,臺灣省立板橋中學初中部、中國海事專科學校(今臺北海洋科技大學)航運管理科畢業,是鴻海科技集團(富士康)和鴻海精密的董事長兼總經理。以個人資產705億美元名列富比士億萬富翁列表中的第7大富豪,同時也是臺灣首富。2019年4月17日,郭台銘宣布投入中國國民黨的2020年中華民國總統選舉黨內初選。
郭台銘 - 企業領袖高峰會演講 APEC CEO Summit 2013: https://youtu.be/c733wqJup_I?t=175
•聽完他的對答覺得講得很好
•應該已經在商業界上運用英文三十幾年了
•1985就建立在美國一家分公司
•因為是商業場合,講的話算官方但直接
•以流暢度來說,會給高的評分
•英文詞彙上應用專業術語 (e.g., key components, technology integration)
•不熟悉字型的變化 morphology/word form--manufacture, manufacturing, manufacturer --we emerged as an electronics manufacturer; we innovation designer --no be verb; we are use all component and integration --we utilize component integration testing?, etc.)
•發音也蠻多問題的
•猜測他應該是有在練英文口語
•應該沒有太多寫作上的需求
•猜測他學習英文的方式是蠻自然的
•沒有花額外的時間在學習文法,刻意的去修正自己的錯誤
•學習英文的只是為了工作需求
•說話有連貫性也有技巧,但是無法精準表達意思
•在特定場景的口說上應該是沒有問題,因為重複性高而且大概可以猜出他會講什麼
•說實話,表現超出預料
★★★★★★★★★★★★
柯文哲(1959年8月6日-),中華民國著名外科醫師、無黨籍政治人物。現任臺北市市長。國立臺灣大學醫學院臨床醫學研究所博士畢業,曾任臺大醫院急診部醫師、臺大醫院創傷醫學部主任、臺大醫學院教授,2014年宣布參選臺北市市長選舉,並以「在野大聯盟」為號召,同年當選臺北市第15任直轄市市長,成為臺北市改制直轄市後首位無黨籍市長。2018年,參選臺北市市長並成功連任。
https://youtu.be/ffIxQ27jUdQ?t=159
•首先媒體對柯市長太嚴格了
•常講英文的時候是為了開玩笑「柯式幽默」
•在這個影片當中他確實有看稿子
•and da today
•today (stress on the second syllable )
•medical (stress on first syllable)
•metary -- military
• problems cause by L1 interference
•從語音結構上來看,中文是一種「音節計時語言(syllable-timed language)及「聲調語言」(tone language),每個字由一個音節構成,唸起來各音節輕重相當且時間大致等長,而且每個字有自己的聲調;但英語是一種「重音計時語言」(stress-timed language)及「語調語言」(intonation language),每個字的音節數不一,由各音節是否有重音來決定其輕重、長短與音階高低,而重音落於何處也會決定其語意之不同。
-campus.cavesbooks.com.tw
•One of the most noticeable features of English is that some of its syllables are strong while many others are weak” (Roach, 2000, p81). English stress pattern is manifested through syllable length, loudness and pitch. In other words, stressed syllables are longer, louder and higher pitched than unstressed ones. Sometimes one word that is stressed differently may have different grammatical functions and meanings, for example, the homographs “record” (verb) and “record” (noun). “Record” has the stress on second syllable when it is a verb, and it has stress on the first when it is a noun. The shift of the stress even makes a noticeable difference to the sound of the vowels, for instance, “e” in noun “REcord” is pronounced as /e/, but /ɪ/ in verb “reCORD”.
-http://ec-concord.ied.edu.hk
•coal values -- core values
•freedom, tolerance, rule of law
•用詞大致上是正確的雖然還是有字形上(word form)的問題
•expensive -- expense
•每個句子都很短,但還是有溝通的功能
•蠻多文法的問題
•個人認為是有知識和魅力的一位候選人
•聽他用英文演講一段時間真的有困擾,因為沒重音,很難辨識重點
•講話沒有太多語調和節奏,在英文發音裡面是一個非常重要的環節
•會導致聽者需要完全專注他每一個字才能辨識他在說什麼
•不覺得每一個政治人物都需要英文,有專業和可靠的翻譯輔助,就覺得不會是一種困擾
•英文是一種工具,多一種工具就多一種選擇,但這種工具用不好時也有可能會造成一些誤解
★★★★★★★★★★★★
在此提供我的「心智圖詞彙攻略」課程: https://bit.ly/2teELDq
英文學習專頁: https://www.facebook.com/ericsenglishlounge/
還有Howard老師《會走路的翻譯機,神級英文學習攻略本》的傳送門 http://bit.ly/2DfGrhH
★★★★★★★★★★★★
同時也再次感謝炙瞳夢 RED FILM幾位大導演和貓哥的友情協助,幫我們拍攝和剪接出如此精彩的影片!
★★★★★★★★★★★★
e.g. for example 在 Official AdhwArdell Youtube 的最佳解答
Title : Wanitaku
Artist : Nadzmi Adhwa feat Ardell Aryana
Song : Aiman Sidek (AJ MUSIC Publishing)
Lyric : Aiman Sidek (AJ MUSIC Publishing)
Mixing By Amirudin Sulaiman(NAR Studio)
Idea Asal & Cerita : Nadzmi Adhwa & Nurul Hidayah
Pengarah Music Video : Kas Roshan
Maxis
To Download Caller Ringtones:
Dial *131*CODE#
E.g: *131* 77068#
To Dedicate Caller Ringtones:
Taip *131*CODE*601(Recipient Number)#
E.g: *131* 77068*6017XXXXXXX#
Digi
To Download:
Type CT (space) (CODE)& send to 20000
OR
Dial *233* DIGI CT CODE#
Montly fee is RM3.00 subsequent renewal at rm2 per song per month.
U Mobile
To Download Colour Tones:
SMS CRW(space) (code) to 28383 for Weekly content purchase (RM1/week)
SMS CRM(space) (code) to 28383 for Monthly content purchase (RM3/Monthly)
Celcom
Sms CMT(space)(code) send to 22990
Example for Billionaire 85936
SMS CMT 85936
Send to 22990
Or
Dial *323*(code)# and press CALL
Tunetalk
Sms TUNE(space)BUY(space)(Celcom CMT code) send to 22990
*Purchase each song at rm3 for the first month, subsequent renewal at rm2 per song per month.
Lyric WANITAKU :
Ku menunggu, ku menanti tibanya waktu
Ku mencari, cinta sejati untuk diriku
Di mana kamu, di mana kamu sayang
Aku terus mencari, terus mencari pujaan hati
Kamulah wanita pujaanhatiku
Kamulah wanita gadis idamanku
Tak ada yang bisa
Jadi sepertimu
Tak ada yang bisa
Jadi penggantimu
Ku menunggu, ku menanti tibanya waktu
Ku mencari, cinta sejati untuk diriku
Di mana kamu, di mana kamu sayang
Aku terus mencari, terus mencari pujaan hati
Kamulah wanita pujaan hatiku
Kamulah wanita gadis idamanku
Tak ada yang bisa
Jadi sepertimu
Tak ada yang bisa
Jadi penggantimu
Tak ada yang bisa, memberikan aku cinta
Selain dirimu, selain kamu saja
Akulah wanita pujaan hatimu
Akulah wanita gadis idamanmu
Kamulah wanita pujaan hatiku
Kamulah wanita gadis idamanku
Tak ada yang bisa
Jadi sepertimu
Tak ada yang bisa
Jadi penggantimu
Kamulah wanita pujaan hatiku
Kamulah wanita gadis idamanku
Kaulah wanitaku
Instagram : https://www.instagram.com/nadzmiadhwa/?hl=en
e.g. for example 在 What's the difference between "eg" and "ex."? [closed] 的推薦與評價
E.g. is short for exempli gratia and stands for "for example". Ex., if used to mean the same, is incorrect. Mostly ex. is used as short for exercise and not ... ... <看更多>