Any post sent to Twitter is known as a ________
A) twitterer B) tweet C) tweeter D) hashtag
B
Computer Science & Information Technology
You might also like to view...
What must you do after you install Hyper-V to ensure that it is secure?
A. block all incoming ports B. configure updates C. require biometric authentication D. use IPsec with all VMs
Computer Science & Information Technology
When viewing a webpage, Full Screen mode hides the title bar, the address bar, the tab row, and the command bar, creating additional vertical screen space
Indicate whether the statement is true or false
Computer Science & Information Technology
Colored borders and shading of cells indicate that they are included in the chart.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When cases go to trial, you as a forensics examiner can play one of ____ roles.
A. 2 B. 3 C. 4 D. 5
Computer Science & Information Technology