1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
12

Hi, I have several computer questions. These refer to the history of the internet. I would like to know if everything we look fo

r on our mobile device via internet stays in the router / model history forever or is there a way to eliminate them. I want to know if when we search for something on the internet it stays somewhere besides the device (if the information stays on the device of the internet owner, that is, who pays for it, even if we delete it from our history). I would also like to know if when you delete the history of your cell phone or computer, it stays on the hard drive and who can see it.
P.S. If someone knows a website where other questions I have can be answered, I would appreciate.
Computers and Technology
1 answer:
MaRussiya [10]3 years ago
7 0

<u>Hi dear user! </u>

<u>Hope my answer helps you and solve your queries. </u>

First of all,

ISP which is an acronym of Internet Service Provider, keeps the track of all the activities their users perform through their network.

For eg :-

You have a connection of Airtel, whatever you will access through your Airtel network will always be tracked by your ISP which is Airtel. If you delete your search/download history from your phone/laptop, still it can be seen by Airtel, you cannot delete from there end. Even if you access anything in incognito mode, then your browser does not stores your data but your ISP still can see what all you accessed in incognito mode.

Now coming to your next question,

If you delete your data from your phone or laptop, it is still somewhere saved in the hard drive of that device. The file is deleted from the device but it's hard drive still have that file, and anyone can access to that data by using a certain software but for that, the person will also need your hard drive. There are certain softwares like Disk Drill which is used to recover the hard drive's data.

Hope your queries are resolved !

You might be interested in
g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
ad-work [718]

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

4 0
2 years ago
What is the data rate of a DS0 signal?
djyliett [7]

Answer: 64 Kbps

Explanation:

3 0
2 years ago
Use the Internet to gather information on four filesystems compatible with Linux. For each filesystem, list the situations for w
marta [7]
If fhun gftrfjjtcbjjbsufcghtfghyrssfbkoire crazy ahh young man
7 0
3 years ago
Using more than one array to store related data is called _____________ arrays.
Makovka662 [10]
It is called matrix arrays
6 0
2 years ago
Read 2 more answers
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away
wel

Answer:

access the computer remotely

Explanation:

The best option would be to access the computer remotely. This allows you to remotely view the computer and control it from anywhere in the world. This allows you to take full control, analyze, and fix the problem that the individual is having without having to explain step by step to the user what they have to do. This can be accomplished through a direct IP connection or through a third-party software, which the user will need to have installed on their computer.

5 0
2 years ago
Other questions:
  • Integrated circuits are made up of _____ and carry an electrical current
    14·1 answer
  • Why are cable networks such as mtv and cnn more profitable than the big four broadcast networks?
    8·1 answer
  • WHICH OF THESE IS A TYPE OF ETHERNET <br> 802.11AC <br> 1000BASET <br> 4G
    7·1 answer
  • If you will be giving your presentation to an audience, you can practice your presentation by using View, ___________, to rehear
    14·1 answer
  • What type of memory or storage device is prone to losing data if the power goes out?
    5·1 answer
  • What's the best strategy for avoiding ATM fe
    14·1 answer
  • Can i edit my name on this app?
    7·1 answer
  • Your friend has a great idea for a new app, and she shows you a document that outlines what the app will do. This document is an
    6·1 answer
  • To delete unnecessary files on a hard disk use software
    5·2 answers
  • File names should be limited to 144 characters.<br><br> true or false
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!