1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aev [14]
3 years ago
9

Give reasons why local efforts are required to conserve biodiversity​

Computers and Technology
1 answer:
mario62 [17]3 years ago
3 0
The most obvious reason for conservation is to protect wildlife and promote biodiversity. Protecting wildlife and preserving it for future generations also means that the animals we love don't become a distant memory. And we can maintain a healthy and functional ecosystem.
You might be interested in
ystem, the design of which was developed using customary structured methods. To manage the intricacy of the application developm
Soloha48 [4]

Answer:

Organized plan is utilized to change the auxiliary examination (for example modules and their interrelation) into a straightforward graphical structure. It is essentially done in two stages:  

1. Transform Analysis  

2. Transaction Analysis  

For showing control stream in organized investigation we use Flow diagrams, But for indicated choice in organized examination, we frequently use choice tree. In choice tree we use hover for current state. An example decision tree is attached with the appropriate response, benevolently allude the equivalent.

4 0
3 years ago
How are computers classified into different types? Explain ​
zloy xaker [14]

Answer:

On the basis of size there are four types of computer. They are minicomputer, micro computer, mainframe computer and super computer. Super computer is the fastest, most expensive, big in size, and most powerful computer that can perform multiple tasks within no second.

3 0
3 years ago
Discuss five domains of Instructional technology​
Effectus [21]

Answer:

Design, Development, Utilization, Management, and Evaluation.

7 0
3 years ago
__________ is the backbone of a computer, connecting all of its components including the central processing unit (CPU) and prima
Tems11 [23]
It’s D. The microprocessor
5 0
4 years ago
What is one difference between using Telnet or SSH to connect to a network device for management purposes?
Gnom [1K]

Answer:

The correct answer to the following question will be "Telnet provides a piece of login information in simple text, while this type of information is encrypted by SSH".

Explanation:

If you're using a distribution of Linux for a long period and maybe you're no longer a newbie on Linux, you might also have come through words such as telnet or SSH.

  • Today SSH is just the main application for Access to the internet between connected devices and repositories.
  • Telnet was the shared abbreviation of networking and communications and is the most well-known networking application for the UNIX framework.

So, it's the right answer.

7 0
3 years ago
Other questions:
  • Video-sharing sites allow videos to be uploaded in which file format? A. .avi B. .svg C. .tiff D. .xls
    5·1 answer
  • Keisha wants to change the font color on the 1st and 3rd bullet items on slide 6 of her allied health presentation. what is the
    14·1 answer
  • Do you think you would share hardware or software resources in a LAN and why?
    14·1 answer
  • Which of the actions below will not create more room on your hard drive?
    13·1 answer
  • What is the most significant issue that needs to be addressed when ensuring the proper functioning of a computer?
    7·1 answer
  • A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
    15·1 answer
  • How many questions do you have to answer before you can use direct messages on Brainly?
    13·2 answers
  • How to resize an image in photoshop without losing quality.
    11·1 answer
  • Your teacher want to store 12 videos she wants to store on the school network .The average size of each file is 4.8 gigabytes .H
    5·1 answer
  • Which of the following security policies can be implemented to prevent removable media from automatically launching potentially
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!