1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
5

During the Inspect and Adapt event, how are reflection, data collection, problem solving, and identification of improvement acti

ons used?
Computers and Technology
1 answer:
madreJ [45]3 years ago
4 0

Hello. This question is incomplete. The full question is:

During the Inspect and Adapt event, how are a reflection, data collection, problem-solving, and identification of improvement actions used?

a. To help the team bond and work more efficiently together

b. To enhance and improve the innovation and planning processes

c. To evalutate better implementation steps

d. To increase the quality and reliability of the next PI

Answer:

d. To increase the quality and reliability of the next PI

Explanation:

During the event Inspect and adapt, reflection, data collection, problem solving and identification of improvement actions are used to increase the quality and reliability of the next IP. This allows the organization and establishment of a high quality IP with considerable efficiency that will allow a good functioning of the system and the optimization of its reliability, because it allows possible problems to be located and resolved quickly, leaving the exit free and functional.

You might be interested in
PLZ HELP WITH SPEED i need the answer<br><br> WILL GIVE BRAINLIEST
jeka57 [31]

Explanation:

1. register-true

2. line spacing

3. before text

4. first line

8 0
3 years ago
Consider the given choices and determine which one establishes a conceptual framework for network connectivity.
Snezhnost [94]

Of the given choices, the option that establishes a conceptual framework for network connectivity is OSI model.

<h3>What is network connectivity?</h3>

Network connectivity is a term that tells more about the process of connecting different areas of a network to each other.

Conclusively, the OSI Model often called Open Systems Interconnection Model is known to be the conceptual framework that tells the functions or duties of a networking system.

Learn more about  network connectivity from

brainly.com/question/26956118

5 0
2 years ago
A manufacturer wants to estimate the proportion of defective items that are produced by a certain machine. A random sample of 50
Nimfa-mama [501]

Answer:

The correct answer to the following question will be "STDEV".

Explanation:

  • The method Excel STDEV generates the standard data variance describing a variable or to estimate or measure the standard deviation in a test, this method will be used.
  • To find a population's standard deviation will be using the STDEV. P function in and later on throughout Excel. Either use STDEVA or STDEVPA unless you include rational or document values in the computation.

The manufacturer must, therefore, use the STDEV function, because of this.

5 0
3 years ago
Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.
Dimas [21]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.

  1. She connected her microphone to her computer.
  2. She selected the record option in her DAW.
  3. She added effects to her audio composition.
  4. She saved the audio composition in an appropriate file format.
  5. She saved her audio composition on an optical drive.
3 0
3 years ago
Which of these actions would NOT help you organize data efficiently?
Ilya [14]
The answer is Storing files on your desktop so that you can locate them easily
Hope this helps! :)
3 0
3 years ago
Other questions:
  • Jason is computer professional who has access to sensitive information. He shares this information with another organization in
    7·2 answers
  • Google Apps are an example of​ ________. A. platform as a service​ (PaaS) B. software as a product​ (SaaP) C. platform as a prod
    7·1 answer
  • Define a model or version that is used to test an idea is called a _______.
    7·1 answer
  • The mathematical order of operations is used in Excel when formulas are evaluated. This order of operations states the order to
    14·2 answers
  • Employees don't have to comply with PPE requirements if they feel the PPE isn't necessary for the particular task they performed
    14·2 answers
  • Write the definition of a function half which recieves a variable containing an integer as a parameter, and returns another vari
    15·1 answer
  • Which is the correct attribute syntax
    9·1 answer
  • Which of the following statements is TRUE of business intelligence (BI) systems? Business intelligence systems are primarily use
    7·1 answer
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
  • What are the features of boot sector virus​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!