1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
13

what may happen if a large number of computer users are attempting to access a web site at the smae time that you are

Computers and Technology
1 answer:
Mariulka [41]3 years ago
4 0
Sadly and frustratingly, the server will not be able to handle all the web traffic. The site will freeze.
You might be interested in
Which layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive t
Yuliya22 [10]

Answer:

The correct answer to the following question will be "Physical Layer".

Explanation:

  • The lowest layer of the OSI reference model is the physical layer. It's in charge of having to send bits from one desktop to the next.
  • This layer isn't acquainted with the interpretation of the parts and is concerned with setting up a physical wireless connection and sending and receiving signals.
  • This layer relies on aspects of the hardware, such as wires, transmitters, and network interface tokens.

Therefore, it will be the right answer.

4 0
3 years ago
When computer network are joined together they form a bigger network called the​
Airida [17]

Answer:

A WAN can be one large network or can consist of two or more lans connected together. The Internet is the world's largest wan.

Explanation:

8 0
2 years ago
What has abstraction enabled users to do?
Sindrei [870]

Answer:

c, understand what a computer does

8 0
2 years ago
Read 2 more answers
Whos really watching this guys bruh​
Ivahew [28]

Answer:

Me no

Explanation:

4 0
2 years ago
Read 2 more answers
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
2 years ago
Other questions:
  • Hardy doesn't have access to a work template, which is on the network server. What should he do?
    14·1 answer
  • End-user development: the process by which an organization's non-it specialists create software applications.
    8·1 answer
  • Ethan wants to change the font in his document. He should _____.
    8·2 answers
  • What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
    13·1 answer
  • Crashing almost always accelerates the schedule while increasing project risk, whereas fast tracking almost always accelerates t
    10·1 answer
  • if you're using the paintbrush tool and want to change the color of the paint being used what should you change
    9·2 answers
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • Which shot is not the best for a widescreen image
    11·2 answers
  • A company database needs to store information about employees (identified by ssn, with salary and phone as attributes), departme
    7·1 answer
  • Alfred works in the human resources department, and he uses a management information system to find applicants' résumés on the w
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!