wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

WHAT IS TWITTER AND HOW DOES IT WORK

profile
Runali Parsekar
Jun 21, 2022
0 Likes
0 Discussions
170 Reads

Twitter is an online news and social networking site where people communicate in short messages called tweets. Tweeting is posting short messages for anyone who follows you on Twitter, with the hope that your words are useful and interesting to someone in your audience

Why Twitter Is So Popular?

Twitter's big appeal is how scan-friendly it is. You can track hundreds of engaging Twitter users and read their content with a glance, which is ideal for our modern attention-deficit world.

How Twitter Works?

Twitter is easy to use as either broadcaster or a receiver. You join with a free account and Twitter name. Then you send broadcasts daily, hourly, or as frequently as you like. Go to the What's Happening box next to your profile image, type 280 or fewer characters, and click Tweet. People who follow you, potentially others who don't, will see your tweet. Encourage people you know to follow you and receive your tweets in their Twitter feeds. Let your friends know you are on Twitter to build up a following slowly. When people follow you, Twitter calls for you to follow them back.To receive Twitter feeds, find someone interesting (celebrities included) and press Follow to subscribe to their tweets. If their tweets aren't as interesting as you hoped, you can always unfollow them. Go too your account at Twitter.com day or night to read your Twitter feed, which is continually changing as people post. Check out Trending topics to see what's going on in the world.

How do I delete my Twitter account?

To deactivate a Twitter profile, go to More > Settings and Privacy > Your Account > Deactivate your account. You can reactivate Twitter within 30 days. After 30 days, your account is deleted.

How do I make my Twitter private?

To hide your tweets from the general public, go to More > Settings and Privacy > Your Account > Account Information > Protected Tweets > Protect My Tweets. To prevent a specific person from viewing your tweets, you can block users on Twitter.


Comments ()


Sign in

Read Next

Social engineering in cyber security

Blog banner

Making Money through Instagram

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

38_Exploring The Honeynet Project

Blog banner

security requirements for safe e-payment

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

SECURITY TOOLS

Blog banner

Why Data Security Is Important

Blog banner

Harsh Rathod

Blog banner

Different types of scam Fraud

Blog banner

What is Spyware?

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Puri Jagannath temple

Blog banner

Heart Fulness Meditation

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Operating system and overviews

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

CONCURRENCY

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Flipkart

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

10 Interesting facts you should know!!!

Blog banner

Deadlock and starvation

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

The Sunny Side of Instagram

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

OS Assignment 3

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

How social media affect

Blog banner

Os Virtual Memory

Blog banner

LiquidPlanner

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

12 Principles of Animation

Blog banner

I/O Buffering

Blog banner

Starvation

Blog banner

Modern operating systems (OS)

Blog banner

Traditional UNIX Scheduling

Blog banner

Facebook marketing

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

IT security management

Blog banner