Answer
Technology can help government handle economic emergencies such as crop and resource shortages.
Explanation
The government can address the concerns of food shortages and water scarcity through embracing new technology interventions to increase farm yields and mitigate the impacts of water shortages. Through crop protection methods, weeds and pest can be controlled. Drip irrigation technology applies water directly to the roots of crops to facilitate high crop production. Other technologies to apply can include organic agriculture and integrated soil fertility management.
Answer:
b. 16
Explanation:
The given PHP code segment consists of 2 statements.
$str="The quick brown fox jumps over the lazy dog";
This defines a variable $str and assigns the given text to it.
echo strpos($str,'fox');
This statement prints the location of 'fox' in the text associated with the variable $str.
Upon execution it will print the value 16 which corresponds to the position of 'fox' in the given sentence.
Answer:
Change request is the type of document which basically contain the adjustment of the system by call and the change request is the essential and important part in the process of change management.
Change request must be declarative as, it state that what should be accomplish, but forget about the change that should be completed. The main elements or parts of the change request are:
- Customer ID
- Abstract change
- The deadline change type
The importance of the change request document is that it is used in various type of SDLC and project management system. It is basically originate from the system request from the users.
Answer:
UTILITY PROGRAM
Explanation:
Utility program are program that perform routine processing function such as sorting and merging. They are often used by auditors to performs a very specific task, usually related to managing system resources. It contain a number of utilities for managing disk drives, printers, and other devices.
Utility program also performs specific task related to the management of computer functions, resources, password protection, memory management, virus protection, and file compression.