Skip to main content

Google tez : refer and earn upto rs 9000... Free..Into your bank account..

These days foreign companies are actively investing in Indian market because they understand business potential and ever-growing opportunity in India. There are plenty of examples such as Amazon, Uber and the list goes on. Now search engine giant Google has made its way in India by launching Tez android application. Not just android but even iOS users can enjoy this app on their iPhones.
Proof
:-

Google Tez Refer & Earn Offer

1] First of all, download Tez app from here on your android phone.
2] Now open it and enter your mobile number. Make sure that the number you have provided is already linked with any of your bank account.
3] After adding mob number, Tez will start searching for the bank accounts and it will show you on the screen. Select the one which you want to set as a default for making & receiving payments.
4] Once the above step is over, start sending money or try making payment from Tez. If you don’t have anyone who is using Tez, then you can use number 8182835372 and send any amount (even 1 Rupee) on it. This is not our number, we have chosen random spycoupon user & published his refer code here. Again, we are not forcing you to send money. It’s all up to you!
5] As soon as you complete the transaction, you get 51 Rs bonus!
6] Now head over to the app’s homepage and swipe upwards until you see following options:
Tez referral code

7] There are 2 options : Rewards & Offers. You have to select 2nd option as shown in the screenshot.
8] On the next page, you will see the Tez Refer & Earn Offer. It says:
tez refer and earn

Invite Friends to Tez and You Each Get 51 Rs. You will both be paid when you friend makes his first payment.
9] Simply click on invite friends and note down your referral link. Share it using whatsapp, direct messaging or in any other way you are convenient with.
10] Your friend has to download Tez from your link & make any payment using UPI.

Google Tez App Referral Code

Actually, there is nothing like Tez refer code and it’s not required at all. Only important thing is your referral link and you can easily generate it using the steps mentioned above.
GOOGLE TEZ OFFERDETAILS
Tez Referral codeSend Re 1 to 8182835372
BenefitsRs 51 cashback
Valid forNew users
Maximum earnings9000 Rs
Last date1 April 2018

Terms & Conditions

1] This offer is valid till 1st April 2018.
2] You can earn maximum 9000 Rs per account from this Google Tez app referral program.
3] Invited friend must be a new/first time user of Tez. If he has already installed and used the app before then you will not get referral bonus.
4] All the money earned from this campaign can be withdrawn to your bank account.

Comments

Post a Comment

share your thoughts ....

Popular posts from this blog

QWERTY-keyboard when this idean came

QWERTY QWERTY   / ˈ k w Éœr t i /  is the most common modern-day  keyboard layout . The name comes from the first six  keys  appearing on the top left letter row of the keyboard and read from left to right: Q-W-E-R-T-Y. The QWERTY design is based on a layout created for the  Sholes and Glidden typewriter  and sold to  Remington  in 1873. It became popular with the success of the Remington No. 2 of 1878, and remains in use on electronic keyboards due to the  network effect  of a standard layout and a belief that  alternatives  fail to provide very significant advantages. [ 1 ]  The use and adoption of the QWERTY keyboard is often viewed as one of the most important case studies in  open standards  because of the widespread, collective adoption and use of the product. [ 2 ] History and purposes [ edit ] Keys are arranged on diagonal columns, to give space for the levers. Main article:  Sholes and Glidden typewriter Still used to this day, the QWERTY layout was devised

just more way to disable autorun.inf

Auto run.Inf this is a instruction file associated with the Auto run function. It is a simple text configuration file that instructs the OS (operating system) which executable to start which icon to use which additional menu commands to make available etc Auto run.inf must be located in the root directory of a volume.That is CD,DVD,of Floppy Disk or Pen drive. It is mainly used by the manufacturer on what actions to taken when their CD-ROM when it is inserted. In OS, when autorun.inf is enabled (Normally by default it is enabled ) then by inserting the Cd or DVD the content of the medium is automatically executed. This is to avoid the user intervention and help the low level knowledge of computer literacy people. But Virus programmer taken this as advantage and make virus instruction in autorun.inf text file. TYPICAL AUTORUN.INF A typical autorun.inf file looks like below. [autorun] open=setup.exe icon=setup.exe,0 label=GameProgram SIMPLE METHOD NOT TO GET INFECTED BY AUTORUN.INF:

how to write a Factorial program in PROLOG.

So to Write A prolog programming . First Fire up your SWI -PROLOG software. then you will see something like this . Welcome to SWI-Prolog (threaded, 64 bits, version 7.4.2) SWI-Prolog comes with ABSOLUTELY NO WARRANTY. This is free software. Please run ?- license. for legal details. For online help and background, visit http://www.swi-prolog.org For built-in help, use ?- help(Topic). or ?- apropos(Word). ?- _ 1. So now go to File>NEW.... and give any name to knowledge base file. I Give it factorial .pl 2.  now write the follwing fact and rules . fact(0,1) . fact(N,R):-  N>0, N1 is N-1, fact(N1,R1), R is N*R1. now press ctrl +s to save  . 3. now close this windows . 4. now in the main window goto file > Consult..... and select your factorial.pl 5. now you can type query like fact(5,X). it will return X=120. done..... here are some screen shot :

How to Protect an Email Account from being Hacked

If this is the case, then what is the reason for many people to lose their accounts? The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password. Are you confused? If so continue reading and you’ll come to know… Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams. 1 . WEBSITE SPOOFING =Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website

Dragon Age: Inquisition Digital Deluxe Edition + All DLCs (torrent) Repack Size: 20.1~23.9 GB

Brief : Dragon Age: Inquisition  is an  action role-playing video game  developed by  Bioware Edmonton  and published by  Electronic Arts . The third major game in the  Dragon Age  franchise,  Dragon Age: Inquisition  is the sequel to  Dragon Age: Origins  and  Dragon Age II . The game was released worldwide in November 2014 for  Microsoft Windows ,  PlayStation 3 ,  PlayStation 4 ,  Xbox 360 , and  Xbox One . Repack Size: 20.1~23.9 GB 

robot.txt what is this and how to use this

What do they do exactly? Robot.txt files tell your instructions to a search engine robot.. The first thing a search engine spider looks at when it is visiting a page is the robots.txt file. It looks for it because it wants to know what it should do. If you have instructions for a search engine robot, you must tell it those instructions. The most common problem people have with robot.txt files is that they don't know how to make them. If you can make web pages, you can also make a robot.txt file. The file is a text file, which means that you can use notepad, wordpad, or any other plain text editor. You can also make them in Frontpage or Dreamweaver by using the "code" view. You can even "copy and paste" them. So instead of thinking "I am making a robot.txt file", just think, "I am writing a note" they are the exact same process. However you would write a note or a letter on your computer will work for the robot.txt file. What should

Google Doodle how its born

About Doodles More Doodles Home About Doodles Doodle Store Doodles are the fun, surprising, and sometimes spontaneous changes that are made to the Google logo to celebrate holidays, anniversaries, and the lives of famous artists, pioneers, and scientists. How did the idea for doodles originate? In 1998, before the company was even incorporated, the concept of the doodle was born when Google founders Larry and Sergey played with the corporate logo to indicate their attendance at the  Burning Man  festival in the Nevada desert. They placed a  stick figure drawing  behind the 2nd "o" in the word, Google, and the revised logo was intended as a comical message to Google users that the founders were "out of office." While the first doodle was relatively simple, the idea of decorating the company logo to celebrate notable events was born. Two years later in 2000, Larry and Sergey asked current webmaster Dennis Hwang, an intern at the time, to pr

Tips to Enable or Disable Toast Notifications on Windows 8

Windows 8 is among the most incredible and interesting kind of Windows version from Microsoft. It has visually eye catching design, which is found in modern user interface that is meant for redesigning a number of operating systems, worked out for users. If you have used or seen someone using Windows 8 you could have noticed the toast notifications in this modern version of windows, which simply appears the moment you install or uninstall any application. There are many users who are well versed with the bubble notifications, which were found in the earlier versions of Windows seen via the taskbar. The new application platform in Windows 8 comes with an integrated notification system for installing or uninstalling a number of modern applications. The Windows 8 style application can employ a number of notifications types including the traditional toast notifications, live titles and lock screen. These can be managed by either disabling or enabling the notification of your applicatio

Java API call Example using GSON, org.json.json and Jackson [ Simple Get Call] and parsing result as JSON

import com.fasterxml.jackson.databind.JsonNode ; import com.fasterxml.jackson.databind.ObjectMapper ; import com.google.gson.* ; import org.json.JSONArray ; import org.json.JSONObject ; import java.io.* ; import java.net.HttpURLConnection ; import java.net.URL ; public class APICALL { public static void main (String[] args) throws IOException { // String url="https://mocki.io/v1/19a50724-c2e5-46a1-b457-543462cdfde2"; String url= "https://jsonplaceholder.typicode.com/users" ; String line ; StringBuilder resp= new StringBuilder() ; System. out .println(url) ; HttpURLConnection con= (HttpURLConnection) new URL(url).openConnection() ; con.setRequestMethod( "GET" ) ; con.setRequestProperty( "Accept" , "application/json" ) ; System. out .println(con.getResponseMessage()) ; System. out .println(con.getContentType()) ; InputStream inputStream=con.getInput

Download pocket tank delux with 295 weapons free total 295 weapons version 1.6

Download Pocket Tanks Deluxe Full Version Free With 295 Weapons Pack | Size: 30MB UPDATED 2019 /19/april Description: Pocket Tanks is a 1-2 player computer game for Windows and Mac OS X, created by Blitwise Productions, developer of Super DX-Ball and Neon Wars. Adapted from Michael Welch's earlier Amiga game Scorched Tanks, this newer version features modified physics, dozens of weapons ranging from simple explosive shells to homing missiles, and the ability to move the tank. It supports several expansion packs. At the moment, players can have up to 295 different weapons total. Pocket Tanks is often abbreviated as PTanks. Have Fun! NOTE: FILE NAME IS SCRAMBLED FOR AVOIDING HARD DETECTION & FILE TAKEN DOWN . How to Play: Best with 2 players on the same computer at school or at work. UPDATED LINK https://mirr.re/d/u1Y https://nl26.seedr.cc/ff_get/447027537/ptd16.295.exe?st=lUp-PbRp4YOwToHIOGwStQ&e=1555747979 http://www.uploadmagnet.com/7gfzhbyfe