Answer: b)It helps to engage workers in continuous improvement activities.
Explanation: Poke-yoke method was the technique to eliminate the mistakes that happen in a manufacturing process. It helps in avoiding the issues in the product and correcting those errors.
Mistake proofing is the mechanism of this methods that ensures about the product manufactured is safe from any failure and defects.It alerts the workers to improve the product through their working.
Other options are incorrect because it was developed by Shigeo Shingo , they had easy mechanism and feedback system did not told the workers about defects.Thus, the correct option is option(b).
The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a cluster of processors is known as <u>parallel computing.</u>
<u></u>
<h3>What is Parallel Computing?</h3>
Parallel computing refers to the process of breaking down larger problems into smaller, independent, often similar parts that can be executed simultaneously by multiple processors communicating via shared memory, the results of which are combined upon completion as part of an overall algorithm. The primary goal of parallel computing is to increase available computation power for faster application processing and problem solving.
<h3>Types of parallel computing</h3>
There are generally four types of parallel computing, available from both proprietary and open source parallel computing vendors:
- Bit-level parallelism: increases processor word size, which reduces the quantity of instructions the processor must execute in order to perform an operation on variables greater than the length of the word.
- Instruction-level parallelism: the hardware approach works upon dynamic parallelism, in which the processor decides at run-time which instructions to execute in parallel; the software approach works upon static parallelism, in which the compiler decides which instructions to execute in parallel.
- Task parallelism: a form of parallelization of computer code across multiple processors that runs several different tasks at the same time on the same data.
- Superword-level parallelism: a vectorization technique that can exploit parallelism of inline code.
Learn more about parallel computing
brainly.com/question/13266117
#SPJ4
Answer:
Swapping two numbers means exchange the values of two variables with each other.
AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.
<h3>
Artificial intelligence, machine learning, and malware</h3>
Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.
Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.
Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.
Learn more about malware here:
brainly.com/question/399317