1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
4 years ago
5

Can your digital footprint be destroyed or does it remain active on the internet forever

Computers and Technology
1 answer:
scoundrel [369]4 years ago
4 0
It depends on what your family or power of attorney decides to do when you die.
By contacting Twitter family,or friends can download a copy of your public tweets and close your account.
In Dec 2009, with changes to their privacy policy, Facebook began deciding on your behalf  how comfortable you were about sharing your information and with whom, while your still alove and capable of deciding for yourself. Upon your death you won't only have to worry about Facebook setting up public default settings, you'll also have your family deciding whether they want to deactivate, delete, download or memorialise your account - to  do any of this they will need your username and password.
If MySpace recieve proof of death they will cancel a deceased account.
LinkedIn will do the same.
YouTube allows your heir or power of attorney control of your account and all the content.
Google+ and Gmail will provide account information to family at their discretion.
Ebay and Paypal, after recieving a certificate of death, will delete your account.
Match.com will block the acoount of a user that has died so that it is no longer visable and eHarmony will remain open until a family member or power of attorney contacts the site, at which point eHarmony will close the account.
You might be interested in
Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT
nirvana33 [79]

Answer:

True

Explanation:

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals is a true statement.

7 0
3 years ago
Dustin is editing a SmartArt graphic. He wants all three shapes to be different colors.
lilavasa [31]

Answer:

click on Design tab → select associated shape → adjust color

Explanation:

I think it is that but i'm not positive. I will know in a little bit since I am taking the test right now.

6 0
4 years ago
Wright a 3 paragraph 5 sentences per graph story bout computers or the internet
boyakko [2]

Ah yes, technology.

Firsly, let's start at the begining. Because we can't have internet without computers. Think of it from the old quote, "Which came first? The chicken or the egg?"

Computers, or the very first programmable one was created by German Konrad Zuse. A man with too much free time, invented a computer in his parents' living room. And yes, it was considered  to be the very first electromechanical binary programmable PC. He called it the "Z1". There's actually no right answer to this to be quite frank, considering the many different classifications you'd call a computer back then.

Why was the computer invented? Why, where would we be without it? Certainly not here (hence brainly and you asking this question). Computers were created for the sole purpose of a repetitive calculation to perform more quick and accurately information.

5 0
3 years ago
HTTP https CSS JavaScript and HTML are types of coding and formatting behind web pages true or false?
sveticcg [70]

Answer:

True

Explanation:

In order to be able to run a webpage successfully, there are various coding and formatting that are required and can considered necessary.

They are:

a) Hypertext Transfer Protocol(HTTP): This is a protocol that is made use of on webpages. It is used to determine the information or data that is collected and transmitted through webpages. The commands that are programmed on webpages are modified by this protocol. The data or information that can be transmitted using HTTP includes: Pictures, Video or Audio recordings e.t.c.

b) Hypertext Transfer Protocol Secure(HTTPS) : This is an advanced or modified form of HTTP. The difference between them is HTTPS is more secure than HTTP. HTTPS is defined as a more secured protocol thorough which data or information can be transmitted from one webpage to another. HTTPS make used of an encrypted type of security during data transmission.

c) Cascading Style (CSS): It is a computer language technology that helps to define and modify the way a webpage looks like. Cascading Style can be defined as a formatting style that deal with the fonts, colour , layout of a webpage.

d) JavaScript :This is a programming language that is used on webpages. It is a set of coding that has commands embedded insided that is written to make webpages more interactive and fun for the users of the Internet.

e)Hypertext Markup Language (HTML): This is what is used to create webpages on the internet. Hypertext Markup Language defines what a webpage actually looks like which involves, the written document on the webpage

7 0
3 years ago
6.5 Code Practice
o-na [289]

Answer: tried using stack over flow and GitHub. The have most of the codes for everything

Explanation:

4 0
3 years ago
Other questions:
  • Which function of a web page relies on responsive web design
    14·1 answer
  • A 5.5 g sample of a substance contains only carbon and oxygen. Carbon makes up 35% of the mass of the substance. The rest is mad
    8·1 answer
  • When does a kernel panic occur? A)when the incorrect serial number is entered during software installation when Dynamic-Ling Lib
    11·2 answers
  • Given the network 192.168.100.0/24, we are going to segment this network into two subnets, Subnet A and Subnet B. The hosts requ
    10·1 answer
  • Adam has decided to add a table in a Word doc to organize the information better.
    10·1 answer
  • How would you compare and contrast the impact of the printing press with the impact of the internet?
    15·1 answer
  • What are some specific ways that businesses use the internet?
    6·2 answers
  • (Shuffle rows) Write a method that shuffles the rows in a two-dimensional int array using the following header: public static vo
    12·1 answer
  • Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photog
    15·2 answers
  • Assume the data link protocol used by NDAS has the following associated characteristics:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!