Browse Definitions :
Quiz

Are you Twitter Literate?

How much do you know about Twitter-related terms and technology?

1. What character prefaces usernames on Twitter?
Answer

2. What's the term for services like Twitter that allow subscribers to broadcast short messages?
Answer

3. What do you call a post on Twitter?
Answer

4. Why are messages on Twitter limited to 140 characters?
Answer (Scroll to the third paragraph.)

5. Many people use bit.ly or is.gd when they post. What do those applications do?
Answer

6. What is a hashtag and why would you include one in a message?
Answer

7. How could you use a bookmarklet to help you post to Twitter without visiting the site or using a Twitter client?
Answer

8. If you reply to a message on Twitter, is your response private?
Answer

9. What does RT stand for?
Answer

10. If you use a certain application and tag a Twitter post with #fb, where will it show up?
Answer

How did you do? Let us know!

 

More resources: 

Alex Howard wrote about regulatory concerns about Twitter security.

See our post about using Twitter for business.

Michael Cobb explains the need for caution using Twitter in the workplace.

See Lessons learned from the Twitter attack.

Check out our glossary of Twitter and messaging abbreviations.

This was last updated in May 2010

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

  • Australian Assistance and Access Bill

    The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close