1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
5

Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in

identifying a problem. Which of these is NOT a technique that you can use to help you in identifying a problem?
Question 1 options:


Why-Why Diagram



Fish Diagram



Consensus Building



Venn Diagram
Computers and Technology
1 answer:
erica [24]3 years ago
8 0
Consensus Building is NOT a technique that you can use to help you in identifying a problem.
You might be interested in
Select the correct answer.
ale4655 [162]

Answer:

I think it's B

Explanation:

6 0
3 years ago
Read 2 more answers
In the SQL environment, a _____________ is a logical group of database objects – such as tables and indexes – that are related t
Paha777 [63]

Answer:Schema

Explanation: A schema is the group that contains objects of databases with views, index, triggers, tables etc features. The specific user can access schema who persist a certain username.The user is considered as the owner of the database and its element.

Schema is usually bound to have only single database.There are some schema that are already present in the system as the in-built schema .E.g.- sys, guest etc.

5 0
3 years ago
A company with a large number of hosts creates three subdomains under a main domain. For easier management of the host records,
REY [17]

Answer:

4

Explanation:

For easier management of the host records of the company 4 zones should be used because

subdomain is part of a larger domain and the main domain which is the primary domain is the name which the company have decide to use which will represent the company website address and in a situation where the company

have different domain names in which they had registered, they will need to choose one among the domain which will inturn be their main domain.

Therefore for easier , efficient and effective management of the host records 4 zones will be the best zones to be used.

Example of sub domain is north.example.com

4 0
4 years ago
List and briefly explain five activities for which a purchasing department normally has responsibility
melamori03 [73]
<span>Five activities for which a purchasing department normally has responsibility include: issuing their own purchase orders, meeting with different sales representatives, maintaining their own purchase records in accordance with state and federal law, administering contracts with sellers, and coming to a resolution regarding any purchasing problems that might arise.</span>
5 0
4 years ago
which dual-stack architecture allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack
Archy [21]

The dual-layer-IP allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack.

<h3>What is the dual IP layer?</h3>

The word dual-stack is a word that connote a full or total duplication of all stages in the protocol stack ranging from its applications to the network layer.

Note that the dual-layer-IP method often gives room for a computer to run IPv4 and IPv6 simultaneously  at the network layer, and all of the IP stack can access a different TCP/UDP stack.

Learn more about  architecture  from

brainly.com/question/9760486

6 0
2 years ago
Other questions:
  • Which of the following is a reason why the comments tool within PDF documents could be helpful? (Select all that apply.)
    5·1 answer
  • In which situation will file compression be required to complete the task
    15·1 answer
  • When you are printing handouts, which of these can you do? A. Save paper by placing more than one slide per page. B. Check the f
    7·1 answer
  • What is the Matlab command to create a vector of the even whole numbers between 29 and 73?
    11·1 answer
  • What is the theory of trouble shooting
    10·2 answers
  • A folder has been shared with other users and set to read-only. What does this mean for users?
    12·2 answers
  • Which one of the following items is an example of software?
    5·1 answer
  • How do I keep my computer and data safe and secure while using the Internet?
    14·2 answers
  • How many of these imformation have you shared​
    14·1 answer
  • Usually it is a rectangular box placeed or underneath your desk​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!