1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
2 years ago
9

1. Would it be possible for two people to have the same email address? Explain.

Computers and Technology
2 answers:
Talja [164]2 years ago
7 0

Answer:

no

Explanation:

because  if i email you then the computer would not know which one to send it to so the answer is no  

Goshia [24]2 years ago
6 0

Answer: No

Explanation:

For the same reason that two people cannot have the same address, it's just a virtual address.

You might be interested in
What type of e-mail typically lures users to sites or asks for sensitive information?
Evgen [1.6K]

The  type of e-mail typically lures users to sites or asks for sensitive information is phishing.

<h3>What is a phishing email?</h3>

Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.

This criminals usually send an email link mimicking the company .

The aim of the email is to get sensitive information in order to access your funds or private information.

learn more on phishing email here: brainly.com/question/14954901

#SPJ11

8 0
1 year ago
Keyboards and printers are two examples of _________ devices.
galben [10]
Input device your welcome
8 0
3 years ago
How does voting help in a social news site?
Inessa05 [86]
It helps spread the word about certain candidates in an upcoming election.
6 0
3 years ago
In the SQL environment, a _____________ is a logical group of database objects – such as tables and indexes – that are related t
Paha777 [63]

Answer:Schema

Explanation: A schema is the group that contains objects of databases with views, index, triggers, tables etc features. The specific user can access schema who persist a certain username.The user is considered as the owner of the database and its element.

Schema is usually bound to have only single database.There are some schema that are already present in the system as the in-built schema .E.g.- sys, guest etc.

5 0
3 years ago
What may happen if a large number of computer users are attempting to access a web site at the same time that you are?
Andrews [41]
D (you may be unable to link to the site). The site cannot handle the large load of requests and are queued therefore, the response will be slowed down immensely. <span> </span>
5 0
3 years ago
Other questions:
  • What is the role of programmers in an organization?
    6·1 answer
  • We have written a method called sum with an int[] parameter nums. We want our sum method to compute the sum of nums, but our cod
    5·1 answer
  • Which domain indicates that a website is sponsored by a university or college?
    12·1 answer
  • How many questions have you seen so far other than this one?
    10·2 answers
  • Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
    9·2 answers
  • Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
    10·1 answer
  • How do you do 1.17.5, invert colors, on codehs?
    10·1 answer
  • Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
    6·1 answer
  • Which of the following is true of lossy and lossless compression techniques?
    13·1 answer
  • How do I fix when it hits the second session it skips scanf.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!