1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
9

Which of the following is true of the poka-yoke approach used for mistake-proofing processes?

Computers and Technology
2 answers:
Svetradugi [14.3K]3 years ago
7 0

Answer:  b)It helps to engage workers in continuous improvement activities.

Explanation: Poke-yoke method was the technique to eliminate the mistakes that happen in a manufacturing process. It helps in avoiding the issues in the product and correcting those errors.

Mistake proofing is the mechanism of this methods that ensures about the product manufactured is safe from any failure and defects.It alerts the workers to improve the product through their working.

Other options are incorrect because it was developed by Shigeo Shingo , they had easy mechanism and feedback system did not told the workers about defects.Thus, the correct option is option(b).

melisa1 [442]3 years ago
7 0

Answer:

b. It helps to engage workers in continuous improvement activities is the correct answer.

Explanation:

The Poka-Yoka approach or technique is a term originated in Japan aroun 1960 by an industrial engineer called Shigeo Shingo. It is an approach that helps develop techniques to correct possible defects and to prevent them. In other words, it is a useful technique for workers that are involved in the continuous process of improving activities.

You might be interested in
Question #2
Otrada [13]

Answer:

print debugging

Explanation:

6 0
3 years ago
You are designing a wireless network for a client. your client needs the network to support a data rate of at least 54 mbps. in
vitfil [10]
Um... that is hard to explain Idk
5 0
4 years ago
What are the functions of information technology?
Gekata [30.6K]

There are six basic functions of IT.

1. Capture: Compiling detailed records of activities.

2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.

3. Generation: Organizing information into a useful form.

4. Storage: Retaining information for further use.

5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.

6. Transmission: Distributing information over a communication network.

3 0
2 years ago
Analyze the given word pattern and choose the correct option.
frozen [14]

Answer:

The code for DOOR would be <u>3775</u>.

Explanation:

WORD - 9753

W - 9

O - 7

R - 5

D - 3

DOOR: 3775

5 0
2 years ago
What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
olga_2 [115]

Answer:

Enter time 1 HH:MM:SS8:5:22                                                                                                    

Enter time 2 HH:MM:SS7:24:37                                                                                                  

0:40:45

Explanation:

The program for above in Python is:

from datetime import datetime

s1 = input("Enter time 1 HH:MM:SS")

s2 = input("Enter time 2 HH:MM:SS")

Format1 = '%H:%M:%S'

tdiff = datetime.strptime(s1, Format1) - datetime.strptime(s2, Format1)

print(tdiff)

We are using the datetime class in datetime module for using strptime to find the difference between the two times.

3 0
4 years ago
Other questions:
  • Jeff is preparing for a presentation on effective communication skills. He has to face an audience of over 50 people. Which stra
    9·2 answers
  • Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
    7·1 answer
  • Write a program that reads in investment amount, annual interest rate, and number of years, and displays the future investment v
    5·1 answer
  • What is Deep learning
    9·1 answer
  • Need help!! Write an interactive program that reads lines of input from the user and converts each line into "Pig Latin." Pig La
    9·1 answer
  • Why is the technology so effective in tracking contacts
    7·1 answer
  • Write passage on computer virus​
    10·2 answers
  • Lol WAKE UP!!! and get ready to answer my questions.
    12·1 answer
  • Im a beginner programmer. what languages should i learn and how do i get better
    13·1 answer
  • You are asked to analyze events in a firewall log that occurred six months ago. when you analyze the log file, you notice events
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!