Mention any four major threats to the population of tiger ? -SST 10th

1 Answer

Answer :

(i) Poaching for trade (ii) Shrinking habitat (iii) Depletion of prey base species (iv) Growing human population (v) The trade of tiger skins and the use of their bones in transitional medicines, especially in the Asian countries left the tiger population on the verge of extinction. Efforts made by the government to protect them are as under : (i) Project Tiger, one of the well-publicised wildlife campaigns in the world, was launched in 1973. (ii) There are 42 tiger reserves in India covering an area of 37,761 sq km. (iii) Tiger conservation had been viewed not only as an effort to save an endangered species, but with equal importance as a means of preserving bio types of sizeable magnitude. (iv) Some of the tiger reserves of India are Corbett National Park in Uttarakhand, Sunderbans National Park in West Bengal etc.

Related questions

Description : What is ‘Project Tiger’ ? When was it launched ? Mention any four tiger reserves of India. -SST 10th

Last Answer : Project Tiger was a wildlife conservation project initiated in India in 1973 to protect the Bengal Tiger. There are more than 42 tiger reserves in India covering an area of about 37,761 sq. km. Four ... - West Bengal (iii) The Manas Tiger Reserve - Assam (iv) The Periyar Tiger Reserve - Kerala

Description : Mention the threats of hero-worship in Indian politics.

Last Answer : Mention the threats of hero-worship in Indian politics.

Description : Mention any four major values which are reflected by federalism in India. -SST 10th

Last Answer : (i) Formation of linguistic states has made the country more united. (ii) While framing the language policy Indian federal system has shown the flexibility. Our Constitution has not given the status ... . (iv) One third seats of all positions are reserved for women leading to women empowerment.

Description : Mention four effects of a rapidly growing population on development. -Geography

Last Answer : 1. Fast growing population has its own implications because it nullifies all achievements in economic and social spheres and is largely responsible for environmental degradation. 2. It is ... suffers from hunger, starvation and malnutrition and does not have access to proper healthcare.

Description : Make a list of four strategies that were planned for Mission Tiger Hill.

Last Answer : Make a list of four strategies that were planned for Mission Tiger Hill.

Description : Enlist any four facts which made the capturing of Tiger Hill a national challenge.

Last Answer : Enlist any four facts which made the capturing of Tiger Hill a national challenge.

Description : Can you help enlighten me about terrorism threats to the US from Afghanistan?

Last Answer : War mongering hype/false news/ scare tactic. Makes it sound like a flotilla of C-5 aircraft loaded with jeeps and trucks ready to drop onto Missouri and parade into Kansas City Most of the articles ... ISIS and the Taliban don't necessarily get along well in the sandbox, to use a kindergarten image.

Description : How can I deal with the stress of constant street harassment and threats from men?

Last Answer : Get a car or use public transport, instead of walking alone down the street. Another option is to take self-defence lessons.

Description : Comunicating threats via facebook in South Carolina?

Last Answer : Call the police immediately. Print the posts so you have proof before he deletes them. Also report this to Face Book.

Description : Manipulative suicide threats?

Last Answer : answer:What gives you the right to monitor your brother's private online correspondences? Have some respect for his privacy. No wonder he's so aggressive and angry all the time. That said, you should ... himself tonight, you'll be able to deal with that now, too. Stop snooping on your brother.

Description : How long will the twin threats to the political system (Trump & Sanders) be tolerated?

Last Answer : answer:I think that people are taking the whole election process far too seriously this early. It’s August 2015 – thinks don’t even begin to make sense until March or April, and the conventions aren’t until next summer. It’s too early to worry about Trump and Sanders yet. Let the clowns play.

Description : If some other nation had clandestine organizations working US soil to capture or eliminate citizens or legal foreign nations on belief they were criminals or security threats, would the US view this organization as criminal or terrorist?

Last Answer : answer:First, this isn't an IF' question. It almost assuredly is truly happening today. Second, I think that the underlying question is how and what the are doing. Terror is generally described as activities ... nowadays in the name of national security'. We do not live in a moral or fair world.

Description : Thoughts on North Korea's newest threats against the U.S.?

Last Answer : Empty chest pounding is what it is.

Description : Does anyone follow-up on these types of social media smears or threats?

Last Answer : The Secret Service does monitor the Internet for such threats.

Description : Can I press charges against someone for communicating threats via facebook?

Last Answer : Yes, you can. It does not matter how or through what medium the threat is communicated.

Description : Raw/Vegan Foodies: What changes have you made with threats of radiation/GMOs/E. Coli in regards to your diet?

Last Answer : I am not a vegan but this same issue is one reason I have a huge garden this summer! Even organic farming labels do not guarantee chemical, bug or disease free.

Description : How should security be handled with juvenile death threats in the school community?

Last Answer : If they’re not concerned, why should you be?

Description : Handling death threats - Who will pay for the extra protection Terry Jones (who burned a Quran) might need?

Last Answer : Why would he need extra protection if he has God on his side?

Description : How does someone disappear, permanently, because of DV and threats?

Last Answer : answer:First thing to do is report the threats to the police. They might not act on them but if you have every threat documented with them it will come in handy later. After that there are ... people in your situation and are able to provide shelter. This website provides details that may be useful.

Description : Does anybody think that what's happening off the coast of North Korea, with the resulting threats from China, is scary in any way?

Last Answer : Scary in ALL ways. It’s the kind of scenario for nuclear confrontation that’s always been most likely. And anyone who thinks we’re safe because it might happen on the other side of the globe needs to come out of their cave and smell the radiation.

Description : What are the threats of the internet as you see it?

Last Answer : Lonely women being “wooed” over the internet, then scammed out of their dinero.

Description : What does it say about society that this teen has gotten multiple death threats?

Last Answer : I'd say death threats are pretty overwrought and criminal in this situation, though I'm not entirely certain as to what this kid's motivations are - admittedly I haven't read anything but ... act on their immediate feeling of misunderstanding and confusion - which can translate into fear and anger.

Description : Where are the liberal peacenik demonstrators that should be marching the streets of London, Paris, Berlin, DC, NYC regarding the atrocities taking place in Iran and threats posed by the likes of N. Korea?

Last Answer : Playing Call of Duty 4 and other games.

Description : Why on earth did the judge in florida let that 20 year old out after making threats to duplicate the virgina tech incident out?

Last Answer : Do you have any links to this story? I missed it and am in disbelief of how this could even happen.

Description : which of the following countermeasures can help reduce technology-associated insider threats -General Knowledge

Last Answer : Inventory your technology holdings; use strong passwords, prevent unauthorized access, and watch for behavioral indicators are countermeasures that can help reduce technology-associated insider threats.

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Last Answer : own On Confident Be. Anything Broke down Read on No. God willing On Trust Keep it , 5 times Prayers Read. Remember Keep the fear Win To do Is. You Own On All Time Confident Without Because ... His Against Arrangement Take it Need Accordingly , unnecessary Fear Will get No. Myself Brave By Pick up.

Description : Hello, before the coronation of the pandemic, I met a friend (16th like me) of my friend and we got along well. I haven't heard from her since, until she wrote to me. We had a normal time, and after a ... to help her, but I don't know what to do and who to call if she has suicidal tendencies ....

Last Answer : After that, she calmed down and was mentally ill for a while, but then she probably seemed fine (or just trying to be).

Description : Threats to biodiversity come from

Last Answer : Threats to biodiversity come from A. Habitat loss B. Over exploitation C. Intensive agriculture D. All of the above

Description : The threats to the cherry sapling were –

Last Answer : The threats to the cherry sapling were –

Description : What threats to Romeo and Juliet love already exists in act one romeo and Juliet's love already exist in act 1?

Last Answer : Need answer

Description : What threats to Romeo and Juliet and Love already exist in Act 1 how do you Think Romeo and Juliet will react to these threats?

Last Answer : Need answer

Description : Who led the sons of liberty effort to correspond with the other colonies about threats to bostons liberty?

Last Answer : Samuel Adams

Description : What types of threats can virus protection protect against?

Last Answer : Virus protection software can protect against viruses that are known. New viruses that haven't been updated in the system yet may still slip through the software. To prevent this update your protection frequently and get software that can eliminate viruses as well.

Description : Which of the following is not a component of ‘SWOT Analysis’ ? (A) Threats (B) Strengths (C) Weaknesses (D) Options

Last Answer : Answer: Options

Description : The main aim of a project risk management process should be to: a. identify project risks and then manage them appropriately. b. identify all project risks and transfer them immediately. c ... are threats or opportunities on a project. d. satisfy the organization's project management process.

Last Answer : a. identify project risks and then manage them appropriately.

Description : Project risk management is best described as: a. managing responses to threats. b. identifying and acknowledging threats and opportunities. c. planning responses to threats. d. minimising threats and maximising opportunities.

Last Answer : d. minimising threats and maximising opportunities.

Description : All of the following statements are true regarding risk events except which one?  Choose the least correct answer. A. Project risks are uncertain events.  B. If risks occur, they can ... that have more perceived rewards to the organization than the consequences of  the risk should be accepted.

Last Answer : C. Unknown risks are threats to the project objectives, and nothing can be done to  plan for them.

Description : All of the following statements are true regarding risks except for which one? Choose the least correct answer.  A. Risks might be threats to the objectives of the project.  B. Risks are ... Risks might be opportunities to the objectives of the project.  D. Risks have causes and consequences.

Last Answer : B. Risks are certain events that may be threats or opportunities to the objectives of  the project

Description : The main aim of a project risk management process should be to:  a. identifies project risks and then manage them appropriately.  b. identify all project risks and transfer them immediately.  ... are threats or opportunities on a project.  d. satisfy the organisation's project management process.

Last Answer : a. identifies project risks and then manage them appropriately.

Description : Project risk management is best described as:  a. managing responses to threats.  b. identifying and acknowledging threats and opportunities.  c. planning responses to threats.  d. minimising threats and maximising opportunities.

Last Answer : d. minimising threats and maximising opportunities.

Description : SWOT analysis is a strategic planning technique used to identify strengths, weaknesses,  opportunities, and (A) timing (B) tenure (C) totality (D) threats

Last Answer : (D) threats

Description : Intimidation threat a. Is not a threat to independence. b. Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or ... or opinion to the point that objectivity may, or may be perceived to be, compromised.

Last Answer : Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or perceived, from the directors, officers or employees of an assurance client.

Description : Safeguards that may eliminate or reduce threats to independence to an acceptable level fall in the following categories except: a. Safeguards created by the profession, legislation or regulation b. Firm-wide safeguards c. Engagement specific safeguards d. Safeguards created by the client

Last Answer : Safeguards created by the client

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The acronym SWOT stands for A. Special Weapons for Operations Timeliness B. Services, Worldwide Optimization, and Transport C. Strengths Worldwide Overcome Threats D. Strengths, Weaknesses, Opportunities, and Threats

Last Answer : Strengths, Weaknesses, Opportunities, and Threats

Description : Within an Industry, an Environment can present Opportunities to one Organization and pose Threats to another

Last Answer : True