SlideShare a Scribd company logo
Using Social networking sites Facebook MySpace Twitter Focus on Facebook
Social Networking advantages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Meet new people ,[object Object],[object Object],[object Object],[object Object]
Advertisements ,[object Object],[object Object],[object Object],[object Object],http://www.googlelivesearch.com/2009/09/15/facebook-has-nearly-same-amount-of-people-as-us/
Social networking disadvantages ,[object Object],[object Object],[object Object],[object Object],[object Object]
Over accessibility ,[object Object],[object Object],[object Object],[object Object],[object Object]
Over accessibility ,[object Object],The American School Board Journal  v. 195 no12 (December 2008) p. 14-17  Journal Code:  Am Sch Board J
Over accessibility  ,[object Object],[object Object],[object Object],http://www.seattlepi.com/business/265153_facebook03.html Minding MySpace: Balancing the Benefits and Risks of Students’ Online Social Networks  Educ Dig 73 no2 O 2007
Connectivity ,[object Object],[object Object],http://www.flickr.com/search/?w=all&q=social+networking&m=text
Planning and joining social groups ,[object Object],[object Object],[object Object]
Instant Communication ,[object Object],[object Object],[object Object],[object Object]
Easy privatization ,[object Object],[object Object],[object Object]
Ensure privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.allfacebook.com/2009/02/facebook-privacy/
Friends Lists ,[object Object],[object Object],[object Object]
Search results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Photo/ Video tagging ,[object Object],[object Object],[object Object],http://www.flickr.com/photos/basykes/563807635/
Newsfeed ,[object Object],[object Object],http://www.flickr.com/photos/jakecaptive/313478981/
Published Application stories ,[object Object],[object Object],http://www.allfacebook.com/2009/02/facebook-privacy
Privatize contact Information ,[object Object],[object Object],[object Object],[object Object]
Avoid embarrassing wall posts ,[object Object],[object Object],[object Object],[object Object]
Private friendships ,[object Object],[object Object],[object Object],[object Object],[object Object]
Your Done ,[object Object]

More Related Content

What's hot

To roulette facebook-events
To roulette facebook-eventsTo roulette facebook-events
To roulette facebook-events
gueste4066bf
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social Media
Zain Abid
 
Deconstructing an undergraduate social media fundamentals class
Deconstructing an undergraduate social media fundamentals classDeconstructing an undergraduate social media fundamentals class
Deconstructing an undergraduate social media fundamentals class
Mike Berta
 
Web 2.0: the Top 10 Technologies
Web 2.0: the Top 10 TechnologiesWeb 2.0: the Top 10 Technologies
Web 2.0: the Top 10 Technologies
2thinknow & Co.
 
Public Health And Web 2.0, Michigan Public Health Technology Conference 2009
Public Health And Web 2.0, Michigan Public Health Technology Conference 2009Public Health And Web 2.0, Michigan Public Health Technology Conference 2009
Public Health And Web 2.0, Michigan Public Health Technology Conference 2009
University of Michigan Taubman Health Sciences Library
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
Bryan Fendley
 
Bankruptcy2.0
Bankruptcy2.0Bankruptcy2.0
Bankruptcy2.0
sla421
 
Shashi Bellamkonda - Social Media at the DC Chamber of Commerce
Shashi Bellamkonda - Social Media  at the DC Chamber of CommerceShashi Bellamkonda - Social Media  at the DC Chamber of Commerce
Shashi Bellamkonda - Social Media at the DC Chamber of Commerce
Shashi Bellamkonda
 
Socializing Your Volunteer Program
Socializing Your Volunteer ProgramSocializing Your Volunteer Program
Socializing Your Volunteer Program
guest8d6d60
 
Using Social Media in the Classroom - IU Presentation
Using Social Media in the Classroom - IU PresentationUsing Social Media in the Classroom - IU Presentation
Using Social Media in the Classroom - IU Presentation
Cindy Royal
 
Personal learning network..
Personal learning network..Personal learning network..
Personal learning network..
Karla Interiano
 
The Newest Way To Screen Job Applicants
The Newest Way To Screen Job ApplicantsThe Newest Way To Screen Job Applicants
The Newest Way To Screen Job Applicants
sew28
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
Bryan Fendley
 
Information and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaInformation and Knowledge Policy - Social Media
Information and Knowledge Policy - Social Media
Leandro Cianconi
 
Pcc sep 2011 social media
Pcc sep 2011 social mediaPcc sep 2011 social media
Pcc sep 2011 social media
tanyarael
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
Typeset
 
Social media-for-crisis
Social media-for-crisisSocial media-for-crisis
Social media-for-crisis
Victoria Edwards
 
The Importance of an Online Presence
The Importance of an Online PresenceThe Importance of an Online Presence
The Importance of an Online Presence
Career Development Group
 
Social Networking For Educators
Social Networking For EducatorsSocial Networking For Educators
Social Networking For Educators
Samantha Morra
 
Midwifery: isn't there an app for that?
Midwifery: isn't there an app for that?Midwifery: isn't there an app for that?
Midwifery: isn't there an app for that?
Sarah Stewart
 

What's hot (20)

To roulette facebook-events
To roulette facebook-eventsTo roulette facebook-events
To roulette facebook-events
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social Media
 
Deconstructing an undergraduate social media fundamentals class
Deconstructing an undergraduate social media fundamentals classDeconstructing an undergraduate social media fundamentals class
Deconstructing an undergraduate social media fundamentals class
 
Web 2.0: the Top 10 Technologies
Web 2.0: the Top 10 TechnologiesWeb 2.0: the Top 10 Technologies
Web 2.0: the Top 10 Technologies
 
Public Health And Web 2.0, Michigan Public Health Technology Conference 2009
Public Health And Web 2.0, Michigan Public Health Technology Conference 2009Public Health And Web 2.0, Michigan Public Health Technology Conference 2009
Public Health And Web 2.0, Michigan Public Health Technology Conference 2009
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
 
Bankruptcy2.0
Bankruptcy2.0Bankruptcy2.0
Bankruptcy2.0
 
Shashi Bellamkonda - Social Media at the DC Chamber of Commerce
Shashi Bellamkonda - Social Media  at the DC Chamber of CommerceShashi Bellamkonda - Social Media  at the DC Chamber of Commerce
Shashi Bellamkonda - Social Media at the DC Chamber of Commerce
 
Socializing Your Volunteer Program
Socializing Your Volunteer ProgramSocializing Your Volunteer Program
Socializing Your Volunteer Program
 
Using Social Media in the Classroom - IU Presentation
Using Social Media in the Classroom - IU PresentationUsing Social Media in the Classroom - IU Presentation
Using Social Media in the Classroom - IU Presentation
 
Personal learning network..
Personal learning network..Personal learning network..
Personal learning network..
 
The Newest Way To Screen Job Applicants
The Newest Way To Screen Job ApplicantsThe Newest Way To Screen Job Applicants
The Newest Way To Screen Job Applicants
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
 
Information and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaInformation and Knowledge Policy - Social Media
Information and Knowledge Policy - Social Media
 
Pcc sep 2011 social media
Pcc sep 2011 social mediaPcc sep 2011 social media
Pcc sep 2011 social media
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Social media-for-crisis
Social media-for-crisisSocial media-for-crisis
Social media-for-crisis
 
The Importance of an Online Presence
The Importance of an Online PresenceThe Importance of an Online Presence
The Importance of an Online Presence
 
Social Networking For Educators
Social Networking For EducatorsSocial Networking For Educators
Social Networking For Educators
 
Midwifery: isn't there an app for that?
Midwifery: isn't there an app for that?Midwifery: isn't there an app for that?
Midwifery: isn't there an app for that?
 

Similar to Using Social Networking Sites On Profcast

Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Facebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacyFacebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacy
Ash Laura
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network Sites
TechnoArmor Consulting
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
bulgarej
 
Social media security
Social media securitySocial media security
Social media security
Sbs DB
 
Facebook Privacy and Security Guide
Facebook Privacy and Security GuideFacebook Privacy and Security Guide
Facebook Privacy and Security Guide
- Mark - Fullbright
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
Liberteks
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
Daniel Ilunga
 
549 458-465
549 458-465549 458-465
549 458-465
idescitation
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
STO STRATEGY
 
Social Media and Extension
Social Media and ExtensionSocial Media and Extension
Social Media and Extension
Anne Adrian
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
Naval OPSEC
 
Facebook Mobile Smart Card
Facebook Mobile Smart CardFacebook Mobile Smart Card
Facebook Mobile Smart Card
Alpha Company, AFNORTH Battalion SFRG
 
Social networking
Social networkingSocial networking
Social networking
athiya salagram
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
STO STRATEGY
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
ingridkreidler
 
CfS Social Networking MS
CfS Social Networking MSCfS Social Networking MS
CfS Social Networking MS
matthewross
 
A lesson plan on virtual reality
A lesson plan on virtual realityA lesson plan on virtual reality
A lesson plan on virtual reality
Comenius Projects in Paderewski
 
Facebook Smart Card
Facebook Smart CardFacebook Smart Card

Similar to Using Social Networking Sites On Profcast (20)

Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Facebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacyFacebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacy
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network Sites
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Social media security
Social media securitySocial media security
Social media security
 
Facebook Privacy and Security Guide
Facebook Privacy and Security GuideFacebook Privacy and Security Guide
Facebook Privacy and Security Guide
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
 
549 458-465
549 458-465549 458-465
549 458-465
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Social Media and Extension
Social Media and ExtensionSocial Media and Extension
Social Media and Extension
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Facebook Mobile Smart Card
Facebook Mobile Smart CardFacebook Mobile Smart Card
Facebook Mobile Smart Card
 
Social networking
Social networkingSocial networking
Social networking
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
CfS Social Networking MS
CfS Social Networking MSCfS Social Networking MS
CfS Social Networking MS
 
A lesson plan on virtual reality
A lesson plan on virtual realityA lesson plan on virtual reality
A lesson plan on virtual reality
 
Facebook Smart Card
Facebook Smart CardFacebook Smart Card
Facebook Smart Card
 

Recently uploaded

GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 

Recently uploaded (20)

GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 

Using Social Networking Sites On Profcast

  • 1. Using Social networking sites Facebook MySpace Twitter Focus on Facebook
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.