1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
5

Can your digital footprint be destroyed or does it remain active on the internet forever

Computers and Technology
1 answer:
scoundrel [369]3 years ago
4 0
It depends on what your family or power of attorney decides to do when you die.
By contacting Twitter family,or friends can download a copy of your public tweets and close your account.
In Dec 2009, with changes to their privacy policy, Facebook began deciding on your behalf  how comfortable you were about sharing your information and with whom, while your still alove and capable of deciding for yourself. Upon your death you won't only have to worry about Facebook setting up public default settings, you'll also have your family deciding whether they want to deactivate, delete, download or memorialise your account - to  do any of this they will need your username and password.
If MySpace recieve proof of death they will cancel a deceased account.
LinkedIn will do the same.
YouTube allows your heir or power of attorney control of your account and all the content.
Google+ and Gmail will provide account information to family at their discretion.
Ebay and Paypal, after recieving a certificate of death, will delete your account.
Match.com will block the acoount of a user that has died so that it is no longer visable and eHarmony will remain open until a family member or power of attorney contacts the site, at which point eHarmony will close the account.
You might be interested in
What type of maintenance can prevent the computer from breaking?
qwelly [4]
<span>The answer is, "Load anti-virus software".
</span>Anti-virus softwares are used to prevent computer from virus, as it name shows that are anti-virus means they prevent from virus. Anti virus softwares are also known as anti-malware software. These software work in such a way that they <span>prevent, detect and then remove viruses or </span><span>malicious software.</span>
3 0
3 years ago
Read 2 more answers
What are the three parts of a camera
son4ous [18]

Answer: Camera lens, Film or sensors, and body.

Explanation: I researched it.

8 0
2 years ago
why is it useful to learn how to solve and program solutions with a limited set of command in computer science
12345 [234]

Answer:

Give at least one reason why it's useful to learn how to solve and program solutions with a limited set of commands. So that when there is more commands we know how to use the ones we have. parameters help generalize the solution to a specific problem. how are functions with parameters an example of abstraction?

4 0
2 years ago
A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under
Allisa [31]

Answer:

B. DDI

Explanation:

A(n) DDI event is an alert that is produce or invoke when the gossip traffic allow a platform to conclude that an attack or potential attack is under way.

A device driver is a computer program that operates or controls a particular type of device that is attached to a computer system.

A driver provides or supply a software interface to hardware devices which enable the operating systems and other computer programs to access hardware functions without needing to know the exact details in respect of the hardware being used.

DDI means Device Driver Interface

A driver relate or communicate with the device via the computer bus or communications subsystem to which the hardware is connected. Whenever a calling program invokes a routine in the driver, the driver will subsequently transmit commands to the device.

7 0
3 years ago
New friends??? if you want to be my new friend go follow my gram
lord [1]

Answer:

what you need

only friends

4 0
2 years ago
Read 2 more answers
Other questions:
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • Which device on a network performs network address translation?
    8·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • 3.2 lesson practice edhesive ​
    6·1 answer
  • When you open as many links as you want, and still stay in the same browser window instead of cluttering your screen with multip
    5·1 answer
  • Random Walker Collisions In lecture, we saw how to model the behavior of a random walker on a 2D grid using a Monte Carlo simula
    8·1 answer
  • ☢☢☢does anyone know how to do the TYNKER CANNON assignment ( lesson 2 intro to game design) I'll give BRANLIEST(¬‿¬)❤ dont answe
    11·2 answers
  • Which command could you use to change to the /usr directory using a relative pathname?
    8·1 answer
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!