answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
2 years ago
15

When using preventative insecticides which holiday period should trigger an application?

Computers and Technology
2 answers:
swat322 years ago
8 0

Further explanation

Towards the end of the year especially the 10th month is the time for rice farmers to start a new cycle of planting. As stated by farmers from Lebak Regency, Unang, in their area in October the water had begun to overflow and could irrigate their fields. Rain began to fall regularly.

But the arrival of rain does not necessarily make them happy, because often farmers actually inconvenience because of pest attacks that also come. Starting from stem borer pests, brown plant hopper, mice and others. At most, rats and stem borer routinely come in every rain.

Rat pest control is usually done through tungkreban (similar to gropyokan) or using owls. Often we release snakes. But during the release, our children are asked not to play in the fields, he said.

Especially for brown borer and plant hopper, farmers are accustomed to using pesticides. We spray more often because pesticides dissolve in water. So if we spray it keeps raining, tomorrow we will spray again.

This condition is common in all areas of Indonesian plantations. In fact, Brebes Regency is the highest pesticide user in ASEAN. In one planting season, Brebes can use up to 330 thousand liters of pesticides and in a year the onion center can reach 4 planting seasons.

Learn  More

insecticides: brainly.com/question/9579932

Details

Class: college

Subject: Computer and technology

Keywords : insecticides, control, condition

Savatey [412]2 years ago
4 0
Spring break around Easter I would believe
You might be interested in
In a situation where handicapped person can only input data into the computer using a stylus or light pen, which keyboard config
asambeis [7]
I think the best one is voice recognition keyboards.


Would perfect work there



Mark as brainliest
8 0
2 years ago
Read 2 more answers
Sarah maintains a blog about her soap-making business, and she has hired someone to create a database for this business. She mak
ivann1987 [24]
The database planner would most likely create a table that contains customer contact information since these would be the individuals who placed an order for Sarah's products after visiting her blog. 
4 0
2 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
2 years ago
When onboard and facing the bow of a boat where is the port side
topjm [15]

Answer:

im pretty sure this is common sense

Explanation:

3 0
2 years ago
In order to protect your computer from the newest viruses, which of the following should you do after you’ve installed virus sca
GuDViN [60]
Scan it then check it
3 0
2 years ago
Other questions:
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • Prove that any amount of postage greater than or equal to 64 cents can be obtained using only 5-cent and 17-cent stamps?
    15·1 answer
  • Julie is working on a spreadsheet with data about the company's profits. They will be sharing this data with customers. She chec
    6·2 answers
  • Greg is writing a report on becoming an advertising and promotions manager. Complete the report by correctly filling in the miss
    12·1 answer
  • To gain experience of using and combing different sorting algorithms: election sort, insertion sort, merge sort, and quick sort.
    14·1 answer
  • Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packet
    6·1 answer
  • The process of __________ encourages members to accept responsibility for the outcomes of a group and for changing the style in
    8·1 answer
  • In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain ord
    11·1 answer
  • (Displaying a Sentence with Its Words Reversed) Write an application that inputs a line of text, tokenizes the line with String
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!