1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
4 years ago
15

what would happen if a large number of computer users are attempting to access a web site at the same time that you are

Computers and Technology
2 answers:
jasenka [17]4 years ago
6 0
It would slow down the whole network if your on the same one

Virty [35]4 years ago
6 0
If you are using the same internet it sometimes will go really slow or it will stop working aka freeze up
You might be interested in
In this image, which feature did we most likely use to quickly change the background, fonts, and layout?
MAVERICK [17]

Answer: themes

Explanation:

Took the test

3 0
3 years ago
Create and execute a SELECT statement that would provide data for a vendor directory. Display should include vendor number, vend
Luba_88 [7]

Answer:

SELECT vendor_number, vendor_name, CONCAT ('street', ' ' , 'city', ' ' , 'state', ' ' , 'zip code') as adress

FROM vendor_directory

ORDER BY vendor_name ASC;

Explanation:

* Suppose <u>vendor_directory</u> is the name of the table from which you extract the data with the SELECT sentence.

8 0
3 years ago
Why do you think it is important to consider ethical considerations when reviewing technology and assessing the impact of partic
IgorLugansk [536]

Answer:

The correct answer should be: "It is important to reaffirm and test technologies' importance and impact to society in order to reflect upon their benefits or damages to the environment".

Explanation:

Technologies have a major importance in society nowadays, although they also have a great impact in the environment, whether for good or not. The fact is that reviewing and assessing technologies' importance and impact are necessary to test and garantee if they have been developed in an environmental friendly manner or with no worries for natural resources and society. Therefore, any technology must be ethical in terms of improving society with no damages, or as least as possible, to the environment.

(ps: mark as brainliest, please?!)

7 0
3 years ago
Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max
Assoli18 [71]

Answer:

The following code as follows:

Code:

max=name1;   //define variable max that holds name1 variable value.

if (strcmp(name2, max)>0)  //if block.

{

   max=name2;  //assign value to max.

}

if (strcmp(name3,max)>0)   //if block.

{

  max=name3; //assign value to max.

}

Explanation:

In the above code, we define a variable that is max. The data type of max variable is the same as variables "name1, name2, and name3" that is "char". In the max variable, we assign the value of the name1 variable and use if block statement two times. In if block, we use strcmp() function that can be defined as:

  • In first if block we pass two variables in strcmp() function that is "name2 and max" that compare string value. If the name2 variable is greater then max variable value so, the max variable value is change by name2 variable that is "max=name2".
  • In second if block we pass two variables in strcmp() function that is "name3 and max" that compare string value. If the name3 variable is greater then max variable value so, the max variable value is change by name3 variable that is "max=name3".

4 0
3 years ago
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I
Fudgin [204]

Answer:

This is the second question like this I've seen. They aren't the greatest.

Explanation:

The question is not good. The answer would be option a, Transport even though it doesn't make a whole lot of sense when you really go into detail.

It could also be option d, Application but I think they're going for the first.

6 0
2 years ago
Other questions:
  • Jennifer has been hired as a temporary employee at a local college. She is given a username and password to access certain parts
    14·2 answers
  • Computer a sends a packet intended to reach computer f. along its path it arrives at computer
    15·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
    5·1 answer
  • Having a conversation with someone using a cellular phone is an example of _________ transmission. simplex full-duplex half-dupl
    11·1 answer
  • Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the high
    12·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • Select the guidelines you should follow when creating a resume
    12·2 answers
  • Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
    10·1 answer
  • Under which menu would you be able to see the number of continuous track minutes available on each mounted hard drive at the cur
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!