1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
2 years ago
6

What can I do If my Texas Instrument TI-84 calculator is not giving accurate answers?

Computers and Technology
1 answer:
zlopas [31]2 years ago
4 0

Answer:

replace the batteries possibly

Explanation:

You might be interested in
How many degrees of freedom does any unconstrained object have in 3-D modeling?
Free_Kalibri [48]
I think its 6 degrees

3 0
3 years ago
The first step in the information systems planning process is to ___________.
Basile [38]

Answer: Analyze the organization's strategic plan

Explanation:

 The initial step in the information system is to first analyze the strategic plan of the organization so that we can easily identify the main objective and challenge.

It is basically archived by enlisting the particular objective and function in the planning of information system in the organization.

All the remining option are involve in the remaining step of the information system planning not in the initial step.

Therefore, analyze the organization's strategic plan is correct as it is the first step of the information system planning.  

7 0
3 years ago
Web-based applications are application software which operate and can be accessed through _____________. The World Wide Web Stor
bearhunter [10]

a web browser i think

4 0
4 years ago
Read 2 more answers
Please help me i dont know
rodikova [14]
There is something wrong with your photo you should try and re-post it again
4 0
3 years ago
Which of these protects against the most common attacks on the internet via a database of signatures, but at the same time actua
BartSMP [9]

Answer:

Antivirus Software

Explanation:

The software that the question is describing is known as an Antivirus Software. Like mentioned, this is a computer program that is used with the main goal of preventing, detecting, and removing malicious files on the computer known as computer viruses. They also act as a shield to prevent these malicious files from entering the computer through the internet, but like any other software these Antivirus Softwares can be exploited by hackers to gain access into a system.

5 0
3 years ago
Other questions:
  • Carmina wants to move a paragraph to the right margin of the document she is working in. She moves her cursor to
    8·2 answers
  • What is a browser? Give one example
    8·2 answers
  • What is the main difference between a literacy society and a digital Society
    9·1 answer
  • A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device
    8·1 answer
  • Which precaution should be taken when working inside computer systems??
    9·1 answer
  • Fill in the blanks with given words:{system unit / desktop / laptop / tablet / smartphone}1. A _____ can be as powerful as a des
    11·1 answer
  • What should be used to keep a tablet dry?
    13·1 answer
  • According to Caroline Heldman, what product was pulled from Abercrombie and Fitch stores based on protests through a blog
    11·1 answer
  • You are starting a small web hosting business and
    11·1 answer
  • I need help NOW with my java script!! 1. What will the code below output to the console and why? const person = {
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!