too much web traffic can ___________ a web site or even prevent access to it.

Answers

Answer 1

Too much web traffic can overload a website or cause it to become inaccessible.

When a website experiences an overwhelming amount of incoming web traffic, it can lead to various issues, including overloading the server infrastructure and potentially preventing access to the site for legitimate users. This scenario is commonly referred to as a "traffic spike" or "traffic surge."

The excessive web traffic can strain the website's resources, such as bandwidth, processing power, and memory, causing the site to respond slowly or crash altogether. When the server infrastructure is unable to handle the influx of requests, it may become overwhelmed and fail to serve the web pages effectively. As a result, users may experience long loading times, error messages, or complete unavailability of the website.

Various factors can contribute to an increase in web traffic, such as viral content, sudden popularity, distributed denial-of-service (DDoS) attacks, or unexpected events. To mitigate the impact of excessive web traffic, website administrators often employ strategies like load balancing, caching, content delivery networks (CDNs), and scaling their infrastructure to handle increased demand. These measures aim to distribute the traffic efficiently and ensure optimal performance and accessibility of the website, even during periods of high traffic

Learn more about web traffic here:

https://brainly.com/question/32133164

#SPJ11


Related Questions

Which of the following is a term that describes "a widely agreed upon set of rules that standardize
communication between machines"?
Router
E-commerce
Network
Protocol

Answers

Answer:

Protocol General

Explanation:

A widely agreed upon set of rules that standardize communication between machines.

so beautiful picture

Joey wants to buy a $4,000 vehicle with 10 percent down for three years at 12 percent interest. What will his monthly payment be?.

Answers

Joey's monthly payment will be approximately $131.87. For further explanation you can see below.

To calculate Joey's monthly payment, we can use the formula for an amortized loan. An amortized loan is a loan that is repaid in regular, fixed payments that include both principal and interest.

The formula for the monthly payment (M) on an amortized loan is:

M = P [ i(1 + i)^n ] / [ (1 + i)^n – 1]

Where:

P is the principal amount of the loan (the $4,000 purchase price of the vehicle)

i is the monthly interest rate (12% annual interest rate / 12 months per year)

n is the number of payments (3 years x 12 months per year)

First, we need to calculate the down payment, which is 10% of the purchase price.

10% of 4,000 = 400

So, the loan amount will be

4000 - 400 = 3600

Now we will convert the interest rate from annual to monthly.

12% / 12 = 1% or 0.01

Now we have all the values we need to calculate the monthly payment:

M = 3600 [ 0.01(1 + 0.01)^36 ] / [ (1 + 0.01)^36 – 1]

M ≈ 131.87

Therefore, Joey's monthly payment will be approximately $131.87.

Learn more about amortized loan, here https://brainly.com/question/29423025

#SPJ4

After selecting _, you would then choose _ to find a place to save the document on the computer.

The "_" could be anything, such as file or download, but file and download are not the answers.

Answers

After selecting file, you would then choose save as to find a place to save the document on the computer.

What is a command?

A command in computing is a request for a computer program to carry out a certain task.

It could be sent using a command-line interface, such a shell, as input to a network service as part of a network protocol, as an event in a graphical user interface brought on by the user choosing an item from a menu, or as a command sent to a computer over a network.

If you want to create a new document, change the filename, file format, or save the file in a different location on your computer, you must save the current document first.

Use the Ctrl+Shift+S keyboard shortcut. On the menu bar, select File > Save As.

Thus, this way, one can save the file in any particular location.

For more details regarding command, visit:

https://brainly.com/question/14548568

#SPJ1

using keyboard shortcuts, how can users save a document?

Answers

Users can save a document by pressing the Ctrl + S keyboard shortcut.

To save a document using a keyboard shortcut, first make sure the document you want to save is the active window. Then, press the Ctrl key and the S key at the same time.

This will open a dialog box prompting you to name the file and select a folder to save it in. Once you’ve selected a folder, click the “Save” button in the bottom right corner.

Your document will be saved in the folder you specified. The Ctrl + S keyboard shortcut is a useful way to quickly save your work without having to go through the “File” menu.

For more questions like Keyboard click the link below:

https://brainly.com/question/29385379

#SPJ4

how do you know if you are being audited by the irs

Answers

It is to be noted that if you are being audited by the IRS, you will get a letter in the mail notifying you of the audit.

What is the IRS?

The Internal Revenue Service (IRS) is the United States federal agency in charge of tax collection and the enforcement of tax laws. They are significant because they guarantee that residents and corporations pay their fair amount of taxes, which finance different government programs and services. Without the IRS, the government would struggle to pay itself and provide essential services to its citizens.

In relation to the question, the letter to indicate that you are being audited will include details on the tax year or years being audited as well as the specific concerns being investigated. It will also tell you how to book an appointment with an IRS auditor. In addition, the IRS may contact you by phone or in-person to schedule an audit.

Learn more about the IRS:
https://brainly.com/question/8949559
#SPJ1

which hardware components are controlled by the hypervisor?

Answers

The hypervisor controls and manages the hardware resources of the physical host machine, such as CPU, memory, storage, and network interfaces. It allocates these resources to each VM as needed, and ensures that each VM is isolated from the others, so that one VM cannot affect the performance or stability of another.

A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). These VMs are essentially software-based versions of physical computers that can run their own operating systems and applications.

The hypervisor also provides a virtualized version of the hardware interface to each VM, so that the VM's operating system and applications can interact with the hardware resources as if they were running on a physical machine. This allows multiple VMs to run on a single physical host, increasing the utilization of hardware resources and enabling more efficient use of IT infrastructure.

Learn more about hardware, here https://brainly.com/question/15232088

#SPJ4

5.16 LAB: Array Palindrome

Answers

Palindrome Array Write a program that reads a list of integers from the input and determines whether the list is a palindrome (values are identical from first to last and last to first).

  The entry begins with an integer indicating the length of the list that follows. Assume that the list will always contain fewer than 20 integers. Returns "yes" if the list is a palindrome and "no" otherwise. The output ends with a new line.Given an array, the task is to determine whether an array is a palindrome or not.

Examples:

Input: arr[] = {3, 6, 0, 6, 3}

Output: Palindrome

Input: arr[] = {1, 2, 3, 4, 5}

Output: Not Palindrome

To learn more about Palindrome Array click below:

https://brainly.com/question/18152587

#SPJ4

Given an ifstream object named input1, associate it with a file named winterdata.txt by opening the file for reading.
answer choices
input1. open ("winterdata.txt");
input1.close ("winterdata.txt");

Answers

Answer:

input1. open ("winterdata.txt");

Explanation:

What does it mean to "Prepare" for a problem?
*
A) To research possible solutions and make a plan.
B) To put your plan into action.
C) To ask if your solution worked or not.
D) To create a problem.

Answers

Answer is A, to research possible solutions and make a plan

Any packet-switching network can handle multimedia data.

True or False

Answers

It is true that any packet-switching network can handle multimedia data.

What is packet-switching network?

Packet switching network or commonly called as PSN is the transfer of small amount of data to the various networks. These data “packets” allow for faster and more efficient in data transfer. Sometimes, when a user send a data across a network, it is transferred not in one piece, but in the smaller amount of data packets. For example: the university web server sending their colleague student a webpage over the internet or their student  sending an email to the university.

Learn more about packet-switching network here

https://brainly.com/question/16100876

#SPJ4

using keyboard shortcuts, how can users save a document?

Answers

Using the keyboard shortcut "Ctrl+S" , user can save a document.

Computer systems offer keyboard shortcuts that save users time and effort as they work on their computers. For example, in order to save a document keyboard allows pressing "Ctrl + S". This is a shortcut method to save documents through the keyboard frequently.

Since frequently saving files reduces the chance of users losing data if their computer freezes. So while they work on their document, they can use "Ctrl+S" to save their data after every typed paragraph.

You can learn more about keyboard shortcut  at

https://brainly.com/question/28959274

#SPJ4

cumulative algorithm can only be used with primitive data types: T/F

Answers

The given statement is true because a cumulative algorithm can only be used with primitive data types.

A cumulative algorithm is an algorithm that incrementally accumulates a larger value by repeatedly adding, multiplying,  dividing, etc, and storing the result into a variable over and over again. The key aspect of a cumulative algorithm is a loop, and a variable declared outside the loop, the value of which is modified inside the loop. A cumulative algorithm is only used with primitive data types - which are predefined data types specifing the type and size of values of variables.

You can learn more about cumulative algorithm at

https://brainly.com/question/30089039

#SPJ4

A table has been created in Word, to make it more visually appealing you want to change colors of the cells in the rows/columns. Which option would you choose to do this? : Insert Table, Table Properties/Table Tools, Table Layout, Table Convert

Answers

Select Fill by clicking the arrow next to it under Table Styles on the Tables menu. Simply select Fill Effects from the Fill menu. The desired color can then be selected by clicking the Solid tab. Simply select the Gradient tab.

How can I make Word's columns and rows shaded?

When adding shade to a table, first choose the desired cells. Click the Shading menu on the Table Tools Design tab (in OneNote, this is the Table Tools Layout tab).

How may the options for table styles be used to make a table more appealing?

To an existing table, apply a table style. Choose any cell from the table. Pick Design. Pick the table style you want to use from the gallery of table styles. Note: Click Design to get rid of a table style.

To know more about table style visit :-

https://brainly.com/question/18257861

#SPJ1

What are the symptoms of memory errors? How do you troubleshoot memory problems?

Answers

Ensure that your machine has the appropriate memory component. You can check up the part number on the website of the manufacturer. Verify that the RAM is setup properly. Install the module again. Module switching

What does troubleshooting entail by memory failure?

One of three things is typically to blame when you experience memory issues: Incorrect Configuration: Either the correct component is not in your machine, or the configuration guidelines were not followed. Improper Installation: The socket may be faulty, dirty, or the memory may not be properly set in it.

What causes issues with computer memory?

The most frequent reason for memory issues is a weak, malfunctioning, or overloaded power supply. Overheating of the system is the second most likely reason.

To know more about memory errors visit:-

https://brainly.com/question/14661353

#SPJ4

file plans must be updated annually or more frequently if necessary.

Answers

True. File plans, also known as records retention schedules, are documents that outline how long different types of records should be kept and when they should be disposed of.

These plans must be reviewed and updated on a regular basis to ensure that they are current and aligned with the organization's needs and legal requirements. The frequency of updates may vary depending on the type of organization, but annual updates are a common practice. Additionally, if there are significant changes to laws, regulations, or the organization's operations that would affect the retention schedule, the plan should be updated more frequently.

The missing part in the question is shown below.

File plans must be updated annually or more frequently if necessary. True/False.

Learn more about file plans, here https://brainly.com/question/4339331

#SPJ4

HTTP is a stateless protocol, which defines ____________

A. client opens a program on user computer
B. server runs a code and saves it on its drive
C. information is formatted before floating it over the network
D. URL is sent back to the client

Answers

Since HTTP is a stateless protocol, each time a client requests a webpage from a web server, a new connection must be established with the web server.

Why is HTTP a stateless protocol?

HTTP is said to as a stateless protocol since each request is handled separately from those that came before it. As a result, when a transaction is finished, the browser and server's connection is also severed.

What is the HTTP protocol's mode of operation?

The HTTP protocol can be used to retrieve resources such as HTML documents. It is a client-server protocol, which implies that the recipient, who is typically the Web browser, initiates all requests for data transmission over the Internet.

To know more about HTTP visit:-

https://brainly.com/question/13152961

#SPJ1

How to Find an IP Address in Command Prompt

Answers

First, click on your Start Menu and type cmd in the search box and press enter. A black and white window will open where you will type ipconfig /all and press enter. There is a space between the command ipconfig and the switch of /all. Your IP address will be the IPv4 address.

Definition of IP Addresses

Internet Protocol address (or abbreviated IP address) is a numeric label assigned to each device connected to a computer network that uses Internet Protocol for communication. An IP address has two main functions: host or network interface identification and location addressing.

Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, due to the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for IP addresses, was standardized in 1998. IPv6 deployments have been ongoing since the mid-2000s.

IP addresses are written and displayed in human-readable notation, such as 172.16.254.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The address routing prefix size is specified in CIDR notation by suffixing the address with a significant number of bits, eg, 192.168.1.15/24, which is equivalent to the historically used subnet mask 255.255.255.0.

The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registrars (RIR) who are responsible in designated areas for assignment to local Internet registries, such as Internet service providers, and other end users. IPv4 addresses were distributed by IANA to RIRs in blocks of approximately 16.8 million addresses each, but have exhausted at IANA's level since 2011. Only one of the RIRs still has a supply for local assignments in Africa. Some IPv4 addresses are reserved for private networks and are not globally unique.

Learn more about IP address at https://brainly.com/question/16011753.

#SPJ4

A main reason careers in information technology are growing faster than average is the government has provided funding to boost educational programs. It has a large customer base of people, businesses, and organizations. Large corporations have turned to computers to handle their business. The internet has become available to all communities around the world equally.

Answers

A main reason careers in information technology are growing faster than average is that large corporations have turned to computers to handle their business. As technology continues to evolve, businesses of all sizes are turning to computers and software to manage their operations, process data, and make decisions.

This has led to an increased demand for skilled professionals in the field of information technology, including programmers, developers, network administrators, and cybersecurity experts. Additionally, many organizations are also investing in digital transformation initiatives, which further drives the need for IT professionals to help design, build, and maintain the systems and infrastructure necessary to support these changes. This increased demand for IT professionals in the business sector is one of the main reasons why careers in information technology are growing faster than average.

Learn more about technology, here https://brainly.com/question/30198395

#SPJ4

Answer:

C

Explanation:

What order does a computer work in?
*
A) Output, Processing, Storage, Input
B) Processing, Output, Storage, Input
C) Input, Storage, Processing, Output
D) Output, Input, Storage, Processing

Answers

Answer:

C

Explanation:

Input, Storage, Processing, Output

Task Summary Actions you were required to perform: Reconfigure the DHCP server with 192.168.0.5 as the default gateway Verify that the Support workstation can communicate with the Internet Verify that the Office2 workstation can communicate

Answers

Verify the computer's internet and local network connections as Using a Cat5e Ethernet cable, join the PC to the cable modem.

How can two computers on different networks connect with one another?

Step 1: Use an Ethernet wire to connect two computers. Step 2: Open the Network and Sharing Center by selecting Start > Control Panel > Network and Internet. Step 3: In the upper-left corner of the window, select the option Change Advanced Sharing Settings. Turn on file sharing in step four.

How do I communicate with two different devices?

Bluetooth Sockets can be used to connect to them via Bluetooth. The documentation on the Android developer website is pretty decent. You can also utilize standard sockets if you'd prefer (and both devices are connected to the internet).

To know more about local network visit:-
https://brainly.com/question/15227700

#SPJ4

how should you label removable media used in a scif?

Answers

Answer: With the maximum classification, date of creation, point of contact, and Change Management (CM) Control Number.

When labeling removable media used in a Sensitive Compartmented Information Facility (SCIF), The guideline that should be followed is  Classification, Unique Identifier.

The label on the removable media should typically include the following information:

1) Classification: Indicate the appropriate security classification level of the information stored on the media, such as "Top Secret," "Secret," or "Confidential." This helps identify the sensitivity of the data and ensures proper handling.

2) Unique Identifier: Assign a unique identifier or label to the media, such as a serial number or barcode, for tracking and accountability purposes. This allows for easy identification and management of the removable media within the SCIF.

Therefore, When labeling removable media used in a Sensitive Compartmented Information Facility (SCIF), The guideline that should be followed is  Classification, Unique Identifier.

To know more about the SCIF:

https://brainly.com/question/30160551

#SPJ4

Sonia is buying a new mobile phone for her grandmother so she can call her every day. Sonia needs to find a phone that has a simple user interface. Which type of operating system will work best for sonia's grandmother?.

Answers

Answer:

DOS (disk operating system)

A set of instructions or actions in order meaning that each action follows a previous action.


A programming structure that repeats a sequence of instructions as long as a specific condition is true.


This involves a choice (IF-THEN-ELSE).

1.
Sequence

2.
Selection

3.
Iteration (looping)

Answers

Answer:3. Iteration (looping)

Explanation:

location-based sync has two categories: abstract and relative.

Answers

The correct answer is Relative location. A place's relative position describes how it relates to other locations. For instance, the distance between Washington, D.C.'s Empire State Building and America's White House is 227 miles or 365 kilometres.

ReWire is a software technology developed by Propellerhead Software that enables two standalone audio apps to collaborate. This technology enables the programme to route numerous audio channels internally into the Pro Tools mixer. MTC (MIDI Time Code) is a timing sync that conveys to MIDI slave devices the precise time in hours, minutes, seconds, and frames at any given instant on the MIDI master device through a sequence of MIDI messages. a specific kind of MIDI message that is stored in a MIDI sequencer or synchronizer that instructs a connected device how many 16th notes have passed since the song's start.

To learn more about Relative location click the link below:

brainly.com/question/29099421

#SPJ4

5. What does it mean to "Reflect" on your solution to a problem.
*
A) To explain what the problem is.
B) To attempt to solve the problem with your plan.
C) To ask if your solution worked or not.
D) To research possible solutions and make a plan.

Answers

To "Reflect" on your solution to research possible solutions and make a plan. (Option D)

What is research?

"Creative and methodical activity performed to improve the reservoir of knowledge" is what research is. It entails gathering, organizing, and analyzing information to get a better knowledge of a subject, with a special focus on mitigating sources of bias and inaccuracy.

The act of describing a problem, discovering the origin of the problem, finding, prioritizing, and selecting alternatives for a solution, and executing a solution is known as problem-solving.

Learn more about problem-solving;
https://brainly.com/question/3418829
#SPJ1

Which information does a traditional stateful firewall maintain? Select all that apply.
Packet route
Network port
MAC address
Source and destination IP address
Data content

Answers

A stateful firewall monitors all incoming and outgoing traffic and assesses it in comparison to a set of predetermined rules. The flow of traffic is stopped if it violates the regulations.

What data does a conventional stateful firewall keep?

A stateful firewall is one that keeps track of every aspect of active network connections. In order to get access to a network, stateful firewalls constantly examine the entire context of traffic and data packets as opposed to discrete traffic and data packets in isolation.

What are the stateful firewalling's two primary characteristics?

Stateful firewalls have a high degree of proficiency in identifying unauthorized attempts or fake messages. The robust memory keeps important network connection characteristics. For proper communication, these firewalls only require a few ports to be open.

To know more about firewall visits :-

https://brainly.com/question/13098598

#SPJ4

Which is the most time efficient algorithm?

Answers

Independent of the size of n, algorithms with constant time complexity run in a constant amount of time. Since their run-time is constant independent of the input data, they are the fastest algorithms currently in use.

What algorithm is the most effective?

Quicksort. One of the most popular sorting algorithms is quicksort since it is also one of the most effective. The pivot number should be chosen first. With smaller numbers to its left and larger numbers to its right, this number will split the data.

Which time complexity is the most effective?

When an algorithm must sequentially read all of its inputs, linear time is the best feasible time complexity.

To know more about efficient algorithm visit:-

https://brainly.com/question/30051816

#SPJ4

You want to add together the contents of three cells in your spreadsheet: B1,
C3, and D5. Which three formulas could you use?
A. SUM(B1:C3:D5)
B. B1+C3+D5
C. B1*C3*D5
D. SUM(B1+C3+D5)

Answers

Answer:

B. B1+C3+D5

D. SUM(B1+C3+D5)

E. =B1+C3+D5

Explanation:

You need to customize how Windows Update checks for and installs updates on the ITAdmin desktop system in your organization.

Answers

When updating Windows, instal updates for other Microsoft products, Allow quality updates to be delayed by 30 days, and allow the installation of feature updates to be delayed by 60 days. Windows can be set up to automatically download manufacturer software and unique device icons.

In Windows 10, how do I configure Windows Update?

To keep your computer operating efficiently and securely, Windows 10 lets you choose when and how to get the most recent updates. Select Check for Windows updates to manage your settings and view the updates that are available.

What will the operating system's newly installed devices automatically configure?

A device driver must be installed in order to use a hardware component that has been installed on Windows 10 by the operating system. following configuration.

To know more about Windows visit :-

https://brainly.com/question/13502522

#SPJ4

this code is not working like i expect — how do i fix it?

resultWorkerErr := make(chan error)
defer close(resultWorkerErr)
go func() {
defer cancel()
resultWorkerErr <- b.resultWorker(ctx)
}()

err := b.worker(ctx)
cancel()
if err == nil {
return <-resultWorkerErr
}
return multierror.Append(err, <-resultWorkerErr)

Answers

Answer:

Try to work at it a lil more and make sure to use test beds. Check the code for any typos and try to correct them. what is your code for?

The example of the code that can be working in the given condition is in explanation part.

What is programming?

Computer programming is the process of writing code that instructs a computer, application, or software program on how to perform specific actions.

Here's an example:

var wg sync.WaitGroup

wg.Add(2)

var workerErr, resultWorkerErr error

go func() {

   defer wg.Done()

   resultWorkerErr = b.resultWorker(ctx)

}()

go func() {

   defer wg.Done()

   workerErr = b.worker(ctx)

}()

wg.Wait()

if workerErr != nil {

   return multierror.Append(workerErr, resultWorkerErr)

}

return resultWorkerErr

Thus, this code starts two goroutines to run b.resultWorker(ctx) and b.worker(ctx) concurrently

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Other Questions
Electrons are emitted when a metal is illuminated by light with a wavelength less than 386 nm but for no greater wavelength. Part A What is the metal's work function? Compared with nonaggressive children, reactive aggressors are more likely to a. believe that they can enhance their self-esteem by dominating other children b. have high levels of self-confidence c. believe that other people are adversaries and, thus, are quick to attribute hostile intent to them d. all of these For all MOSFET's assume: VT-1 V, (W/L)"k, :: 2 mA/V2, VA- . R1 5V Vout Vin 0 0 0 1. Determine the value of R1 to yield ac voltage gain Vout/Vin- 5 V/V; 2. Estimate the output voltage swing. A power plant uses a 1,029 kelvin boiler and a river at 314 kelvin for cooling. what is the heat engine efficiency (in percent) of this power plant? use exact numbers; do not estimate. How many grams of NH4HCO3 are equivalent to 2. 8 moles of NH4HCO3? A baker used a total of 15.5 pounds of flour to make cakes and cookies. Each cake requires 0.5pound of flour, and each batch of cookies requires 0.25 pound of flour. The baker made 12 cakesand c batches of cookies.Enter an equation that models the situation with c, the number of batches of cookies made by thebaker. What's the gist of chapter 15 of a mighty long way Which of the following tools can be used to obfuscate malware code? a. PEID b. UPX c. Nmap d. NASM True/False: inventory plays a dual role in organizations. inventory impacts the cost of goods sold as well as supporting the balance sheet, a new concept only recently receiving attention. Write each of the following events as a set and compute its probabilityThe event that the sum of the numbers showing face up is at least 9. a gear with a radius of 4 centimeters is turning at 11 radians/sec. what is the linear speed at a point on the outer edge of the gear? Find the value of the line integral. F dr C (Hint: If F is conservative, the integration may be easier on an alternative path.) F(x,y) = yexyi + xexyj (a) r1(t) = ti (t 4)j, 0 t 4 (b) the closed path consisting of line segments from (0, 4) to (0, 0), from (0, 0) to (4, 0), and then from (4, 0) to (0, 4) if the student is impatient while measuring the temperature when the water and unknown material are combined and records a value while it is still rising, then How is sedimentary rock part of the cycling of Earth's materials over time? the marine food chain begins with plankton, which are prey to other creatures such as ________, "the power food of the antarctic." the skin depth of a certain nonmagnetic conducting (good conductor) material is 3 m at 2 ghz. determine the phase velocity in this material. Use the following sets to answer the question.A={1,2,3,4,5}B={5,6,7,8}Which answer shows the union of sets A and B?{5}{1,2,3,4,6,7,8,9}{1,2,3,4,5,6,7,8}{2,4,8} When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. O a. True O b. False It is possible to use NETCONF/YANG to configure multiple devices O a. True Ob False Distance vector routing algorithms send routing information to all routers in the network O a. True O b. False two carts move in the same direction along a frictionless air track, each acted on by the same constant force for a time interval t. cart 2 has twice the mass of cart 1. which one of the following statements is true? 1) Utility theory holds that rational consumers will allocate their limited incomes so as to maximize their happiness. True or False?