answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
2 years ago
15

When using preventative insecticides which holiday period should trigger an application?

Computers and Technology
2 answers:
swat322 years ago
8 0

Further explanation

Towards the end of the year especially the 10th month is the time for rice farmers to start a new cycle of planting. As stated by farmers from Lebak Regency, Unang, in their area in October the water had begun to overflow and could irrigate their fields. Rain began to fall regularly.

But the arrival of rain does not necessarily make them happy, because often farmers actually inconvenience because of pest attacks that also come. Starting from stem borer pests, brown plant hopper, mice and others. At most, rats and stem borer routinely come in every rain.

Rat pest control is usually done through tungkreban (similar to gropyokan) or using owls. Often we release snakes. But during the release, our children are asked not to play in the fields, he said.

Especially for brown borer and plant hopper, farmers are accustomed to using pesticides. We spray more often because pesticides dissolve in water. So if we spray it keeps raining, tomorrow we will spray again.

This condition is common in all areas of Indonesian plantations. In fact, Brebes Regency is the highest pesticide user in ASEAN. In one planting season, Brebes can use up to 330 thousand liters of pesticides and in a year the onion center can reach 4 planting seasons.

Learn  More

insecticides: brainly.com/question/9579932

Details

Class: college

Subject: Computer and technology

Keywords : insecticides, control, condition

Savatey [412]2 years ago
4 0
Spring break around Easter I would believe
You might be interested in
FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
Sholpan [36]

Answer:

Transmission Control Protocol (TCP)

Explanation:

FTP: FTP stand for File Transfer Protocol. It is an internet protocol for transferring files between computers on a computer network over TCP/IP connections. It is based on client server architecture in which a client asks for a file and the server (local or remote) sends it. FTP uses TCP to ensure all the data packets are transmitted correctly to the proper destination.

Transmission Control Protocol: It is a protocol used in the Transport Layer of the TCP/IP model. The basic role of this layer is to ensure end-to-end delivery of data from the source to the destination. TCP is a connection oriented protocol that works with the Internet Protocol and provides ordered, guaranteed and error free delivery of data from source to destination. This is how application programs communicate and exchange data through an IP network. It is connection oriented protocol means connection between client and server is setup before data transmission. At source host TCP divides streams of bytes in segments. Then it allocates sequence number to each segment. At destination end it reorders the delivered segments. Then it sends an acknowledgment  to sender as a signal that the correct segments have been received. TCP also employs error detection that ensure reliability. TCP also manages flow control and congestion control to avoid data packets loss or delay and to ensure that a sender does not send packets faster than the receiver can receive.

4 0
2 years ago
In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
Anni [7]

Answer:

Internet Protocol refers to a set of rules that govern how data packets are transmitted over a network. Internet protocol describes how data packets move through a network. Its important to have agreed upon protocols because Computers make use of protocols as well, to enable them to communicate. Devices need to communicate. When two devices want to successfully communicate, they must agree to follow some rules about the way they will do it.

8 0
1 year ago
Writing a program in a language such as c or java is known as _____ the program.
Angelina_Jolie [31]
<span>Writing a program in a language such as c or java is known as coding the program</span>
8 0
2 years ago
When you examine a computer chip under a microscope, what will you see?
ELEN [110]
<span>When you examine a computer chip under a microscope,  you will see </span>integrated circuits.
5 0
2 years ago
The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the C
Snowcat [4.5K]

Answer:

INSERT INTO Movie(Title,Rating,ReleaseDate)

VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),

("The Godfaher",'R',DATE '1972-03-24'),

("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');

Explanation:

The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.

3 0
1 year ago
Other questions:
  • The overall purpose of CSS is to modify the way web pages look without modifying the underlying HTML code. way tables render in
    12·2 answers
  • Discuss how the user-designer communications gap can cause a good project to go bad.
    8·1 answer
  • A company operates on two types of servers: 2 large servers (L) and 4 smaller servers (S), with a combined total of 64GB RAM. Th
    9·1 answer
  • As you are planning your informative speech on the prevalence of Internet memes in pop culture and you wonder if your audience w
    14·1 answer
  • Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste
    7·1 answer
  • // This pseudocode is intended to determine whether students have
    5·1 answer
  • Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the
    5·1 answer
  • Ld' is the instruction with the longest latency on the CPU from Section 4.4 (in RISC-V text). If we modified ld and sd so that t
    15·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • In this code, identify the repeated pattern and replace it with a function called month_days, that receives the name of the mont
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!