1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
13

Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R

oot course 4. Fact finding
Computers and Technology
1 answer:
pishuonlain [190]3 years ago
8 0

Answer: 2)Fishbone/lshikawa

Explanation: Fishbone diagrams are those diagrams which help in the identification of the problem causing factors and reasons behind.This diagrams find the roots of the problem to solve it. Fishbone diagram is also known as the Ishikawa diagram.

The other given options are incorrect because they are not any technique for finding the roots of the problem.Thus, the correct option is option(2).

You might be interested in
You are working on a project and need to be able to access the content from home and share the files with other team members. Th
inn [45]
Local server so you can all you use if you guys are near
5 0
3 years ago
Read 2 more answers
What do you mean by algorithm​
Snowcat [4.5K]

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7 0
3 years ago
Read 2 more answers
Which is an aspect of structural-level design?
DENIUS [597]
I think it’s D. Sorry if it’s wrong
5 0
3 years ago
Read 2 more answers
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
nika2105 [10]

Answer:

Users who do not follow secure computing practices and procedures

Explanation:

Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.

4 0
3 years ago
Describe two benefits of the community of replacing the printed copy with an online version.
DiKsa [7]

Answer:

less costs

Explanation:

saves more money

easy to use for everyone

6 0
3 years ago
Other questions:
  • Does anybody know how to use these showers?
    11·2 answers
  • Wich type of operating system is usually used in personal computers
    6·2 answers
  • When numbers are changed in cells that are involved in formula is the formulas are automatically
    14·1 answer
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • In order to consolidate your theoretical knowledge into technique and skills with practical and applicational value, you will us
    8·1 answer
  • Why might you complete a 1040 instead of a <br> 1040ez
    11·2 answers
  • A.
    14·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • A ___________ variable is used to add up a set of values. fill in the blank
    8·1 answer
  • 6. You and your friends take an awesome selfie, and you add your name and addresses to the picture. It is a good idea to share t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!