Answer:
A.
Explanation:
A Joystick is a control device that is connected to the computer to play games. A joystick is similar in structure to a control stick used by pilots in airplanes and got its name from the same. A joystick contains a stick, base, extra buttons, auto switch fire, trigger, throttle, POV hat, and a suction cup. A joystick also serves the purpose of assistive technology.
The device which can not be used in MS Office is a joystick. Therefore, option A is correct.
<em><u>Answer</u></em>
5 hours
<em><u>Explanation</u></em>
The two working together can finish a job in

Also, working alone, one machine would take one hour longer than the other to complete the same job.
Let the slower machine working alone take x hours. Then the faster machine takes x-1 hours to complete the same task working alone.
Their combined rate in terms of x is

This should be equal to 20/9 hours.

Multiply through by;





Factor to get:


It is not feasible for the slower machine to complete the work alone in 4/9 hours if the two will finish in 20/9 hours.
Therefore the slower finish in 5 hours.
Answer:
A project is successful when it achieves its objectives and meets or exceeds the expectations of the stakeholders. But who are the stakeholders? Stakeholders are individuals who either care about or have a vested interest in your project. They are the people who are actively involved with the work of the project or have something to either gain or lose as a result of the project. When you manage a project to add lanes to a highway, motorists are stakeholders who are positively affected. However, you negatively affect residents who live near the highway during your project (with construction noise) and after your project with far-reaching implications (increased traffic noise and pollution).
Explanation:
Security/Insider threats.
As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.
Cyber-attacks.
Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.
Answer:
Answer to the following question is Dot plot
Explanation:
A dot chart is also called the dot plot it is the type of a simple histogram like chart that is used in the statistic for relatively the small data set where the values fall into the number of a discrete bin.
To draw the dot plots, count the numbers of data points falling in each of the bins and draw the stacks of dot that numbers high for each of the bins.