1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
9

Why does world of tanks keep downloading when I'm not even at the computer

Computers and Technology
1 answer:
Lynna [10]3 years ago
8 0
Its the option, auto update on
You can turn it off in the launcher (before you get into the login screen)
You might be interested in
What is the purpose of HTML?
Basile [38]
You can style and structure with it so it’s either one of those
3 0
3 years ago
Determine the hexadecimal value of a mask that can be used to complement the values of thefirst and third bits of f1ag and leave
Makovka662 [10]

Answer:

Let our mask be 1010000...000. Notice that, if we apply XOR operation to any number with this mask, the first and third bits will be complemented and all other bits will be unchanged. Since for each individual bit, XOR with 0 does not change the value of bit and XOR with 1 changes the value of bit.

Explanation:

To give a hexadecimal number, we should know the number of bits in representation of number.

8 0
4 years ago
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces
tatiyna

The phase of access control that one can say that Ed is more concerned about is called Accountability.

<h3>What is accountability?</h3>

Accountability is known to be one that removes the time and effort you that is used on distracting activities and a lot of unproductive behavior and it makes one to be more focused.

Hence, The phase of access control that one can say that Ed is more concerned about is called Accountability.

Learn more about Accountability from

brainly.com/question/27958508

#SPJ1

7 0
2 years ago
Communication between a computer and a keyboard involves ______________ transmission.
4vir4ik [10]

Answer:

Simplex transmission

Explanation:

Communication between computer and keyboard involves which transmission? Answer: Simplex transmission requires communicating between a computer and a keyboard. The simple transmission & communication channel allows data from only one direction.

8 0
2 years ago
Write a Comparator that compares String objects by the number of words they contain. Consider any nonwhitespace string of charac
Readme [11.4K]

Answer:

import java.util.Scanner;

public class num12 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter the first String");

       String word1 = in.nextLine();

       System.out.println("Enter the second String");

       String word2 = in.nextLine();

       System.out.println("Enter the third String");

       String word3 = in.nextLine();

       //Remove all white spaces

        String cword1 = word1.replace(" ","");

       String cword2 = word2.replace(" ","");

       String cword3 = word3.replace(" ","");

       //Comparing the string by their lengths

       if(cword1.length()>cword2.length()&&cword1.length()>cword3.length()){

           System.out.println(word1+" Is the longest");

       }

       else if(cword2.length()>cword1.length()&&cword2.length()>cword3.length()){

           System.out.println(word2+" Is the longest");

       }

       else{

           System.out.println(cword3+" Is the longest");

       }

   }

}

Explanation:

Using Java Programming Language

Use the Scanner Class to obtain the String values from the user

Save them in different variables

Use the replace() method in java to remove white space from any of the string entered

Using if and else statements compare the lengths of the strings (word.length()) returns the length of the word.

Print out the word that is longest

NOTE I have compared three Strings, comparing two would have been more straigth forward

8 0
4 years ago
Other questions:
  • create a new Java application called "CheckString" (without the quotation marks) according to the following guidelines.** Each m
    7·1 answer
  • A _____________ is a set of instructions used to perform calculations in a cell.
    14·1 answer
  • What directory under / contains the log files and spools for a linux system?â?
    13·1 answer
  • The idea of supply and demand is based on the development of
    10·2 answers
  • Which of the selection below does not represent a workable IP address?
    9·1 answer
  • When circuit switching is used, what is the maximum number of circuit-switched users that can be supported?
    7·1 answer
  • The processor has a five-stage pipeline F D O E M S; that is, instruction fetch, instruction decode, operand fetch, execute, mem
    13·1 answer
  • How many tables are needed to implement an REA data model that has five distinct entity-sets, two many-to-many relationships and
    6·1 answer
  • Assume that two students are trying to register for a course in which there is only one open seat. What component of a database
    12·2 answers
  • A ____________ is a collection of infected IT devices that an attacker or attack group controls.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!