The pink tag strategy is a way of utilizing correct arrangement by labeling all unneeded items with conspicuous red tags. It consists of six ways as follows:Move three: Substitute the corrupted system file which has a identified great duplicate on the file. Type the next command, then push ENTER:Then timetable a kickoff – Possibly a “5S day”