wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

WHAT IS TWITTER AND HOW DOES IT WORK

profile
Runali Parsekar
Jun 21, 2022
0 Likes
0 Discussions
170 Reads

Twitter is an online news and social networking site where people communicate in short messages called tweets. Tweeting is posting short messages for anyone who follows you on Twitter, with the hope that your words are useful and interesting to someone in your audience

Why Twitter Is So Popular?

Twitter's big appeal is how scan-friendly it is. You can track hundreds of engaging Twitter users and read their content with a glance, which is ideal for our modern attention-deficit world.

How Twitter Works?

Twitter is easy to use as either broadcaster or a receiver. You join with a free account and Twitter name. Then you send broadcasts daily, hourly, or as frequently as you like. Go to the What's Happening box next to your profile image, type 280 or fewer characters, and click Tweet. People who follow you, potentially others who don't, will see your tweet. Encourage people you know to follow you and receive your tweets in their Twitter feeds. Let your friends know you are on Twitter to build up a following slowly. When people follow you, Twitter calls for you to follow them back.To receive Twitter feeds, find someone interesting (celebrities included) and press Follow to subscribe to their tweets. If their tweets aren't as interesting as you hoped, you can always unfollow them. Go too your account at Twitter.com day or night to read your Twitter feed, which is continually changing as people post. Check out Trending topics to see what's going on in the world.

How do I delete my Twitter account?

To deactivate a Twitter profile, go to More > Settings and Privacy > Your Account > Deactivate your account. You can reactivate Twitter within 30 days. After 30 days, your account is deleted.

How do I make my Twitter private?

To hide your tweets from the general public, go to More > Settings and Privacy > Your Account > Account Information > Protected Tweets > Protect My Tweets. To prevent a specific person from viewing your tweets, you can block users on Twitter.


Comments ()


Sign in

Read Next

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Data Science & AI

Blog banner

Mumbai Metro 3

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Components of GIS

Blog banner

MEMORY MANAGEMENT

Blog banner

IT service level agreement

Blog banner

Facebook marketing

Blog banner

Session Hijacking

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Music

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Deadlock

Blog banner

Drawing tips for a beginner

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Memory management

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

File management

Blog banner

TRELLO

Blog banner

OS assignment 3

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Threads

Blog banner

Use case of K-means clustering

Blog banner

Modern operating system

Blog banner

Models of Information Security.

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Consumer to consumer business mode

Blog banner

Save Environment

Blog banner

Deadlock

Blog banner

Raid

Blog banner

evolution of operating system - Disha Parekh

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Self managing devices

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner