1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
6

Any four advantage of development plan at local level​

Social Studies
1 answer:
babunello [35]3 years ago
7 0

Explanation:

(a) the design of projects that arise from, and respond to, local needs, priorities and circumstances; (b) the development of a local capacity not only to formulate and evaluate investment projects, but also to manage their ...

You might be interested in
which 5 strategies can you employ to ensure that as a student you will not drop out of university prematurely ​
Marat540 [252]

Answer:

Plan Ahead. Many college students are unable to complete their degrees because of poor planning.

Avoid Unnecessary Debt. There are other ways to finance your college education other than getting into debts and private loans.

Ask for Academic Help.

Manage Your Time Wisely.

Socialize.

Explanation:

(i hope this helps)

7 0
3 years ago
What part of Africa is shown in the green areas?
liq [111]
It's the savanna because it's the only one with the same amount of countries on
4 0
3 years ago
Industrial revolution vs society
zhuklara [117]

Answer:

the industrial revolution is moving all industries to modern one by using AI system and the society want today normal system but the efficiency matter

8 0
2 years ago
The _______ believe that a person who has died is in the underworld.
Tom [10]
The <span>Navajo </span>believe that a person who has died is in the underworld.
7 0
3 years ago
Which of the following is not a social engineering attack: a. Dumpster diving b. Hacking c. Shoulder surfing d. Persuading a rec
OLEGan [10]

Answer:

d. Persuading a receptionist to give you information  

Explanation:

Social engineering attack is used to describe malicious activities accomplished through human interactions, examples are; hacking, dumpster diving, shoulder surfing, phishing, whaling and piggbacking. Soliciting for information from a receptionist is not a social engineering attack.

8 0
3 years ago
Other questions:
  • Who is our President
    10·2 answers
  • A __________ is a concept about males or females that assigns various characteristics to them on the basis of nothing more than
    6·1 answer
  • A satellite is a(n) __________. A. computer program used to combine maps and data about space B. object in orbit around the Eart
    11·1 answer
  • Explain how Charlemagne's empire is an example of cooperation between the Church and European monarchs.
    10·2 answers
  • In the 1990’s Ireland made unemployment benefits less generous. This change would likely have reduced a. both structural unemplo
    8·1 answer
  • What is the role of society in conflict management ?
    10·2 answers
  • Which statement best describes the significance of Susan B. Anthony to the
    7·1 answer
  • Why did the Soviet union in Germany enter the nonaggression pact
    15·1 answer
  • What is the advantages of being creative ??​
    12·2 answers
  • her factors that are needed for development and financial ones. What types of means and resources are called financial resources
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!