1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
5

Can your digital footprint be destroyed or does it remain active on the internet forever

Computers and Technology
1 answer:
scoundrel [369]3 years ago
4 0
It depends on what your family or power of attorney decides to do when you die.
By contacting Twitter family,or friends can download a copy of your public tweets and close your account.
In Dec 2009, with changes to their privacy policy, Facebook began deciding on your behalf  how comfortable you were about sharing your information and with whom, while your still alove and capable of deciding for yourself. Upon your death you won't only have to worry about Facebook setting up public default settings, you'll also have your family deciding whether they want to deactivate, delete, download or memorialise your account - to  do any of this they will need your username and password.
If MySpace recieve proof of death they will cancel a deceased account.
LinkedIn will do the same.
YouTube allows your heir or power of attorney control of your account and all the content.
Google+ and Gmail will provide account information to family at their discretion.
Ebay and Paypal, after recieving a certificate of death, will delete your account.
Match.com will block the acoount of a user that has died so that it is no longer visable and eHarmony will remain open until a family member or power of attorney contacts the site, at which point eHarmony will close the account.
You might be interested in
Which numbering system is used for some network addresses, to describe colors
FromTheMoon [43]
Hexadecimal it describes locations in memory
5 0
3 years ago
Which is true regarding pseudocode?
bearhunter [10]

Answer:

It uses simple words and symbols to communicate the design of a program

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language. Also, a pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

This ultimately implies that, a pseudocode uses simple words and symbols to communicate the design of a program.

8 0
2 years ago
Read 2 more answers
How might your use of computers and knowledge of technology systems affect your personal and professional success?
RUDIKE [14]
It can help you more be aware of whats going on and what you need to do.
8 0
2 years ago
Explain in brief terms some of the technology and developments that were important in the history and development of the Interne
igomit [66]

Answer: The Internet started in the 1960s as a way for government researchers to share information. ... This eventually led to the formation of the ARPANET (Advanced Research Projects Agency Network), the network that ultimately evolved into what we now know as the Internet.

Have a nice day ahead :)

7 0
2 years ago
_____ is when a person connects their location to photos that are posted online.
Margaret [11]
B) friend tagging is when
4 0
2 years ago
Read 2 more answers
Other questions:
  • One main advantage of CD-ROMs is that..
    7·1 answer
  • Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
    13·1 answer
  • Many companies use software to scan resumes and search for _____________.
    10·1 answer
  • Write a function max arguments. write a program that reads three floating-point numbers, uses the max function, and displays the
    5·1 answer
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • What are the pros and cons of editorial anonymity in Wikipedia
    10·2 answers
  • To give your app users the ability to open your app directly from other apps by clicking a link, you should use:.
    11·1 answer
  • Individual internet users connect to isps through a(n ________.
    11·1 answer
  • The hostel in which you plan to spend the night tonight offers very interesting rates, as long as you do not arrive too late. Ho
    5·1 answer
  • Tasks you can perform online include which of the following?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!