1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
9

What may happen if a large number of computer users are attempting to access a web site at the same time that you are

Computers and Technology
2 answers:
Nitella [24]3 years ago
6 0
It will most likely begin to crash and eventually just freeze , i'm guessing  
Scilla [17]3 years ago
4 0
The website can freeze and crash.  An example is when Kylie Jenner restocked her lip kits so many people were on the website it crashed.
You might be interested in
Define types of hacker ?plz help me with this question​
denis-greek [22]

Answer:

the types of hacker attacks and techniques. White Hat Hackers. Black Hat Hackers. Gray Hat Hackers. Script Kiddies.

Explanation:

i don't know if this can help you

8 0
3 years ago
Read 2 more answers
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate progr
Natasha2012 [34]

Answer:

Usurpation

Explanation:

In context of CIBS-210 it is known as Usurpation

6 0
3 years ago
What can geographers map with remotely sensed data?
horsena [70]
Geographers can map for example the topography of the earth's surface using aerial photographs taken from a plane flying on regular flight paths at known altitudes. A topographic map with regular contour intervals and also showing infrastructure like roads and buildings can be created from this. Also, the LIDAR system can show features not observable on the ground by 'seeing' into the subsurface and detecting buried escarpments, trenches etc. 
7 0
4 years ago
Explain three applications of computers and information systems in the daily life of a college student.
Savatey [412]

Answer:

Drawing tools, spreadsheets, Audio, Video lectures, and PowerPoint presentations, etc.

5 0
2 years ago
Which device hold data and instructions when it is not in use?
Lilit [14]
Secondary Storage.
I hope this helps! XD
4 0
4 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • How do smart watches affect the business and its position in the global marketplace?
    12·2 answers
  • How many seconds are required to make a left turn and join traffic?​
    11·2 answers
  • Describe the Pros and Cons Associated with Cloud Computing Cloud Computing was introduced in 1999 by a company named "Salesforce
    12·1 answer
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • What is a neuromorphic chip?
    10·1 answer
  • Look at the following function prototype. double mynewFunction(int); What is the data type of the function’s return variable?
    11·1 answer
  • I got enough points and enough brainliests how do I move on to my next rank?
    6·2 answers
  • Which option is the default when creating appointments and meetings in a user’s own calendar as it relates to Free/Busy informat
    8·1 answer
  • 14 Copy a picture of a crane on the next page. Do not trace them. Make a freehand sketch. (2) 2 Look at the placed where the Mar
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!