1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
7

The Green Revolution innovations in agriculture based on a package of inputs including all of the following except?

Computers and Technology
1 answer:
timofeeve [1]3 years ago
6 0

Answer:

natural fertilizers such as compost, green maure, animal manure

Explanation:

The Green Revolution was a movement whose main goal was to drastically increase the agriculture yields in every location. They accomplished this by using hybrid seeds, irrigation, chemical fertilizers, pesticides, fossil fuels, farm machinery, and high-tech growing and processing systems, all of which greatly contributed towards this goal. Therefore the one thing that was not part of the Green Revolution's innovations was natural fertilizers such as compost, green maure, animal manure, mainly due to the fact that these were the traditional use that would lead to the same agriculture yields.

You might be interested in
Which allows for saving a setting on one device and having the setting synchronize to other devices? Choose two answers.
barxatty [35]

Answer:

Bookmarks

Calendars

Explanation:

In Android devices we could save some information and then share if we use sync, we case save Bookmarks and Calendars, in addition, we could save other data like:

  • History and open tabs
  • Passwords
  • Payment info  
  • Addresses, phone numbers and more
  • Settings and preferences

Also, if you don't want to save any data in your device, you can Turn off Sync everything.

3 0
4 years ago
Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?
patriot [66]

Answer:

Classification.

Explanation:

Classification is the wide field of data mining apps that analyzes data and establishes rules for making a distinction in specified classes.

Data mining is a method that corporations use to transform the raw information into valuable information. Corporations can understand something about their clients through using technology to identify trends in large quantities of info to create more successful marketing campaigns, increase revenue and reduce costs.

6 0
3 years ago
Scientists measure an object’s mass in kilograms and its weight in newtons. If you knowthe amount of mass of an object in kilogr
Phoenix [80]

Answer:

public class WeightCalculator {

   

   private static DecimalFormat df2 = new DecimalFormat("#.##");

   

   public static void main(String args[]){

       //create scanner to receive user input

       Scanner in = new Scanner(System.in);

       //alert user to input mass

       System.out. println("Enter the Mass in Kg");

       //collect the input as a string

       String s = in. nextLine();

       //convert string to double and multiply by 9.8

       Double weight = Double.valueOf(s)* 9.8;

       

       //Print out answer formatted to 2 decimal place

       System.out. println("The Weight is " + df2.format(weight) + "N");

       

       //conditional statement to check if weight is less than 100

       if (weight < 100){

           System.out. println("Oops, it is too light");

       }

       //conditional statement to check if weight is more than 500

       if (weight > 500){

           System.out. println("Oops, it is too heavy");

       }            

   }

}

7 0
4 years ago
The list method reverse reverses the elements in the list. Define a function named reverse that reverses the elements in its lis
Alisiya [41]

Answer:

public class Reverse {

  1.    public static void reverseList(int list [], int n)
  2.    {
  3.        int[] reversedList = new int[n];
  4.        int k = n;
  5.        for (int i = 0; i < n; i++) {
  6.            reversedList[k - 1] = list[i];
  7.            k = k - 1;
  8.        }
  9.        //printing the reversed list
  10.        System.out.println("The Reversed list \n");
  11.        for (int j = 0; j < n; j++) {
  12.            System.out.println(reversedList[j]);
  13.        }
  14.    }

Explanation:

Using Java, An array is implemented to hold a list of items

A method reverseList() is created to accept an array as parameter and using a for statement reverses the elements of the array and prints each element of the list

See below a complete code with a main method that calls this method

<em>public class Reverse {</em>

<em>    public static void main(String[] args) {</em>

<em>        int [] arr = {10, 20, 30, 40, 50};</em>

<em>        reverseList(arr, arr.length);</em>

<em>    }</em>

<em>    public static void reverseList(int list [], int n)</em>

<em>    {</em>

<em>        int[] reversedList = new int[n];</em>

<em>        int k = n;</em>

<em>        for (int i = 0; i < n; i++) {</em>

<em>            reversedList[k - 1] = list[i];</em>

<em>            k = k - 1;</em>

<em>        }</em>

<em>        //printing the reversed list</em>

<em>        System.out.println("The Reversed list \n");</em>

<em>        for (int j = 0; j < n; j++) {</em>

<em>            System.out.println(reversedList[j]);</em>

<em>        }</em>

<em>    }</em>

<em>}</em>

7 0
4 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Other questions:
  • How do i connect wifi direct from pc to phone​
    15·1 answer
  • The process of using a computer to write, design, and assemble documents is called A. desktop publishing. B. scanning. C. consul
    7·1 answer
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • Which statement below is not true of EFS
    7·2 answers
  • This is not homework but how do you fix this I’ve tried everything
    9·1 answer
  • Money from a Coverdell Education Savings Account can be used for:
    11·1 answer
  • A0domain indicates that the computer or DNS name does not exist.
    7·1 answer
  • DNA structure can be described as a twisted ladder. Imagine you are climbing a model of DNA, just as if you were climbing a ladd
    10·2 answers
  • How did transistors revolutionize the world of computers?
    15·1 answer
  • When i add someone to canvas course, do they get an invitation?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!