1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
14

Explain three applications of data mining

Computers and Technology
1 answer:
maria [59]3 years ago
5 0

Answer:

Future Healthcare

Manufacturing Engineering

Corporate Surveillance

Explanation:

You might be interested in
Which of the following is true of the poka-yoke approach used for mistake-proofing processes?
Svetradugi [14.3K]

Answer:  b)It helps to engage workers in continuous improvement activities.

Explanation: Poke-yoke method was the technique to eliminate the mistakes that happen in a manufacturing process. It helps in avoiding the issues in the product and correcting those errors.

Mistake proofing is the mechanism of this methods that ensures about the product manufactured is safe from any failure and defects.It alerts the workers to improve the product through their working.

Other options are incorrect because it was developed by Shigeo Shingo , they had easy mechanism and feedback system did not told the workers about defects.Thus, the correct option is option(b).

7 0
2 years ago
Read 2 more answers
Complete the body of the decrement static method using only the NaturalNumberKernel methods (multiplyBy10, divideBy10, and isZer
Ivan

Answer:true

Explanation:mark as brainliest

6 0
3 years ago
PlZZZZZZZ help will give Brainliest
dalvyx [7]

Answer:

Phone

Explanation:

3 0
2 years ago
Read 2 more answers
The means by which an operating system or any other program interacts with the user is called th
natulia [17]
Networking capabilities of a computer
7 0
3 years ago
When you schedule an appointment, Outlook adds the appointment to the ____ folder by default.
fomenos
C. schedule.

Outlook adds your appointment to your schedule folder.
6 0
3 years ago
Other questions:
  • Which of the given original work is protected by the copyright law
    9·1 answer
  • Which of the following is an advantage of batch processing?
    8·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • The used of PPE in the shop includes the following, except:
    10·2 answers
  • Question 6 of 10
    11·1 answer
  • How to deactivate the brainly account?​
    13·1 answer
  • Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes
    6·1 answer
  • sing the drop-down menu, identify the flowchart symbols. The oval represents the . The rectangle represents the . The diamond re
    9·2 answers
  • In a relational database application, a(n) ________ key is used to link one table with another.
    12·1 answer
  • After Daniel performed poorly on a test, his teacher advised him to do some self-reflection to figure out how he could get a bet
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!