1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
10

. What may happen if a large number of computer users are attempting to access a Web site at the same

Computers and Technology
2 answers:
MatroZZZ [7]3 years ago
6 0
B. you may be unable to link to the site.
If the site uses cookies, then there might be a site overload. 
dusya [7]3 years ago
4 0

The correct answer is B. You may be unable to link to the site.

Explanation

In general, websites and webpages are accessed by users through specific links. Also, one website can be accessed by many users at the same time, but this depends on the features of the web page, the operating system, and other factors. Indeed, in some cases a large number of users accessing to the same web site or page leads to technical issues, the most common problem, in this case, is that users cannot access the site and they need to wait for the number of users to reduce. Thus, when many users are attempting to access a web site "you may be unable to link to the site."

You might be interested in
If you have a database with birthdates, and you would like to find everyone who was born before June 16, 1967, what would you en
Tcecarenko [31]

Answer:

<June 16,1967

Explanation:

7 0
3 years ago
Read 2 more answers
To share a server folder, access the ____ tab in the folder properties dialog box and click the share button (or from the window
anygoal [31]
Oh lord I have no idea :/ I suck at this yeah idk
5 0
3 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
In statistics the mode of a set of values is the value that occurs most often. Write a program that determines how many pieces o
Feliz [49]

Answer:

  see below

Explanation:

The program of interest is the function "findMode[x, n]" in the attached. It is written the Wolfram Language of Mathematica.

The basic idea is that the data in the array is sorted. The sorted array is partitioned into sets of identical elements, and the number in each of those sets is counted. The maximum of those counts is the mode. The location of the maximum count corresponds to the location of the set having that count. We use that location information to pull out the mode value(s).

If there is more than one mode, all are reported.

__

An example data array is provided, along with the program output.

6 0
3 years ago
Select the correct answer.
Phoenix [80]
Data availability is the one related to the server being down.
4 0
2 years ago
Other questions:
  • For C++ (please make sure it runs properly)
    14·1 answer
  • In Paint, which of the following are ways to use a picture that you have saved on your computer? (Select all that apply.)
    8·1 answer
  • All of the following are forms of verbal communication except
    12·2 answers
  • a user reports that his dot matrix printer is printing dark and clear on the left of the paper but that the print is very light
    6·1 answer
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • URLs are the global ______ of resources on the Internet.
    12·2 answers
  • Explain the computer according to size​
    10·1 answer
  • Mention the usage of crop concept in ms-word​
    13·2 answers
  • What permissions are needed in order to use a work online that is in the public domain?
    8·1 answer
  • What is a database and provide 2 examples of how you are using a database.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!