Any post sent to Twitter is known as a ________

A) twitterer B) tweet C) tweeter D) hashtag


B

Computer Science & Information Technology

You might also like to view...

What must you do after you install Hyper-V to ensure that it is secure?

A. block all incoming ports B. configure updates C. require biometric authentication D. use IPsec with all VMs

Computer Science & Information Technology

When viewing a webpage, Full Screen mode hides the title bar, the address bar, the tab row, and the command bar, creating additional vertical screen space

Indicate whether the statement is true or false

Computer Science & Information Technology

Colored borders and shading of cells indicate that they are included in the chart.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When cases go to trial, you as a forensics examiner can play one of ____ roles.

A. 2 B. 3 C. 4 D. 5

Computer Science & Information Technology