SlideShare a Scribd company logo
YIK YAK
SHARE YOUR THOUGHTS.
KEEP YOUR PRIVACY.
By: Brittany Blaschke
OVERVIEW
• How Yik Yak began
• What is Yik Yak
• Feature of Yik Yak
• Ground Rules For Yik Yak
• How to download and Use Yik Yak
• Yaking Responsibly
HISTORY BEHIND THE YAKING!
• Yik Yak was created in October 2013 by
Tyler Droll, and Brooks Buffington two
students of Furman University. The
company is based out of Atlanta, Georgia.
• They wanted to create a social media
application that was geared towards
college students so they could
anonymously connect based upon
location. The purpose is for people to be
engaged with others in their community
without reveling their identity.
WHAT IS YIK YAK?
• Yik Yak is a social media application that is described as a local “bulletin board”
where people can post and look at others post based upon location. The difference
with Yik Yak and other posting applications is that Yik Yak is completely
anonymous.
• You can post yaks or just read, reply, or “upvote/downvote” yaks.
• It is based upon a 5 mile radius and you can connect up to 500 Yik Yak users in that
area. If you want to have connection with more users you can pay extra.
THE FEATURES OF YIK YAK
Your Yaks
• Yik Yak Handle- it is a way to sign your yaks
from time to time.
• My recent yaks- you can view your most
recently posted yaks through this feature.
• Recent replies- you have the option to reply to
different yaks and then use the feature to view
all of your recent replies to different yaks.
• My top yaks- a feature to view all of your yaks
that are most popular.
• You can “upvote” or “downvote” a yak. It is
similar to liking a post or favoring a tweet.
Top Yaks
• Access the All-Time Greatest Yaks- you can use
this feature to view all the yaks that have been
the most popular.
• Top Yaks in your area- this feature is used to
view the top yaks in the area where you are
located.
• Other top yaks- when you access this feature it
takes you directly to a google search on “yaks”
and images of real Yaks.
• You can “Peek” at other popular yaks that are
posted as well.
GROUND RULES OF THE HERD
1. You do not bully or specifically target other
yakkers.
2. Zero tolerance policy on posting people’s
phone numbers.
3. Don’t clutter people’s feed with useless or
offensive yaks. If you see a useless or
offensive yak make sure to do your part by
down voting or reporting it.
4. If your yaks continue to be downvoted or
reported, you will be warned and then
suspended.
5. Must be 17 years of age or older to download
the app and use the app.
STEPS ON USING YIK YAK
• You can download it by accessing the
download options at http://yikyakapp.com/
• From there you will click download and will
either have the option of downloading
through the Apple App store or through
Google Play
• Both are free downloads until you decide to
upgrade
NEXT STEP…
• Enabled the location setting and begin
looking at other yaks in your area! You
can view ones that are considered
“Peeks” which are featured yaks
outside of your area.
• You can also view the new yaks being
posted and the ones that are considered
“hot” in your area.
• Notice that there are up and down
arrows. Those are the arrows you can
click to “upvote” or “downvote” a yak.
• You can also see how many replies each
yak has and how long ago it was
posted.
• In order to create or write your own yak
you will click the box in the upper left
hand corner.
START YOUR OWN YIK YAKING!
• Begin creating and posting your own yaks! You can
write whatever you feel at the moment or want people to
know in your area.
• You can attach you “handle name” with your yak or not.
(Dark knight in the picture on the right is the handle
name)
• You can also choose whether or not to show your location
where you are yaking from.
• If you choose you can always upgrade your yak status
then choose how many recipients will be able to view
your “yak”
• Then hit SEND located in the upper right hand corner!
• To go back to the original page of yik yaks click YIK
YAK in the upper left hand corner.
• You can then click on a specific yak and
it will reveal the details of the yak.
• It will show you the location of where
the yak originated from and you have
different options from there
• You can share or report the yak
• Or you can choose to reply to the yak
• Once done you can hit the BACK
button in the upper left hand corner.
YAK RESPONSIBLY
• Once you are ready to yak keep in mind the purpose behind Yik Yak. It is a social
media application that was meant for positive and helpful post to those in the area
that surrounds you.
• Do Not mention any personal names, phone numbers, or any personal information
about yourself or anyone else.
• Remember that it is a place to post helpful not hurtful information.
RESOURCES
• Common Sense Media Inc. (2014, June 19). App Reviews: Yik Yak. Retrieved from
CommonSenseMedia.com: https://www.commonsensemedia.org/app-reviews/yik-yak
• Crook, J. (2014, June 20). Yik Yak Is An Anonymous Messaging App Aimed At College
Campuses. Retrieved from TechCrunh.com: http://techcrunch.com/2014/02/19/yik-yak-is-an-
anonymous-messaging-app-aimed-at-college-campuses/
NOW GO RIDE THE YAK!!

More Related Content

Similar to Yik yakbrittanyblaschke

Facebook hints and tips
Facebook hints and tipsFacebook hints and tips
Facebook hints and tips
Phil Bradley
 
Designing for the Social Web
Designing for the Social WebDesigning for the Social Web
Designing for the Social Web
Justin Seeley
 
Tedesco591 01interactivepowerpt -searching on the internet
Tedesco591 01interactivepowerpt -searching on the internetTedesco591 01interactivepowerpt -searching on the internet
Tedesco591 01interactivepowerpt -searching on the internet
Joe Tedesco
 
Create, Curate & Disseminate: Telling your GEAR UP Story with Social Media
Create, Curate & Disseminate: Telling your GEAR UP Story with Social MediaCreate, Curate & Disseminate: Telling your GEAR UP Story with Social Media
Create, Curate & Disseminate: Telling your GEAR UP Story with Social Media
National Council for Community and Education Partnerships (NCCEP)
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Your Project Needs a Code Of Conduct, OR ELSE
Your Project Needs a Code Of Conduct, OR ELSEYour Project Needs a Code Of Conduct, OR ELSE
Your Project Needs a Code Of Conduct, OR ELSE
Paul Jones
 
Making your content social
Making your content socialMaking your content social
Making your content social
Anastacia Baird
 
Twitter As A Writing Space
Twitter As A Writing SpaceTwitter As A Writing Space
Twitter As A Writing Space
Sarper Erel
 
How to use Dubbler
How to use DubblerHow to use Dubbler
How to use Dubbler
Appsurdity, Inc
 
Presentation on Social Media and Aftermath
Presentation on Social Media and AftermathPresentation on Social Media and Aftermath
Presentation on Social Media and Aftermath
Kazi Rafsun Shaanto
 
Class 1 0111 2014 - about the class
Class 1   0111 2014 - about the classClass 1   0111 2014 - about the class
Class 1 0111 2014 - about the class
JournovationSU
 
Be Web Smart presentation for Sanborn PTO
Be Web Smart presentation for Sanborn PTOBe Web Smart presentation for Sanborn PTO
Be Web Smart presentation for Sanborn PTOBeWebSmart
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
Dorothea Salo
 
Drinkaware: Going mobile at Drinkaware
Drinkaware: Going mobile at DrinkawareDrinkaware: Going mobile at Drinkaware
Drinkaware: Going mobile at Drinkaware
CharityComms
 
Seminar 2 social networks
Seminar 2 social networksSeminar 2 social networks
Seminar 2 social networks
Bryan Hunt
 
Sxsw Team Presentation April14 Slideshare
Sxsw Team Presentation April14 SlideshareSxsw Team Presentation April14 Slideshare
Sxsw Team Presentation April14 Slideshare
Magdalena Wszelaki
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015Linda Beres
 
The Science of Sharing - SXSW 2015
The Science of Sharing - SXSW 2015The Science of Sharing - SXSW 2015
The Science of Sharing - SXSW 2015
James LaPorte
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
Whitney Moore
 
Social Communications 101 for Volunteers
Social Communications 101 for VolunteersSocial Communications 101 for Volunteers
Social Communications 101 for Volunteers
guest1c57ab
 

Similar to Yik yakbrittanyblaschke (20)

Facebook hints and tips
Facebook hints and tipsFacebook hints and tips
Facebook hints and tips
 
Designing for the Social Web
Designing for the Social WebDesigning for the Social Web
Designing for the Social Web
 
Tedesco591 01interactivepowerpt -searching on the internet
Tedesco591 01interactivepowerpt -searching on the internetTedesco591 01interactivepowerpt -searching on the internet
Tedesco591 01interactivepowerpt -searching on the internet
 
Create, Curate & Disseminate: Telling your GEAR UP Story with Social Media
Create, Curate & Disseminate: Telling your GEAR UP Story with Social MediaCreate, Curate & Disseminate: Telling your GEAR UP Story with Social Media
Create, Curate & Disseminate: Telling your GEAR UP Story with Social Media
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Your Project Needs a Code Of Conduct, OR ELSE
Your Project Needs a Code Of Conduct, OR ELSEYour Project Needs a Code Of Conduct, OR ELSE
Your Project Needs a Code Of Conduct, OR ELSE
 
Making your content social
Making your content socialMaking your content social
Making your content social
 
Twitter As A Writing Space
Twitter As A Writing SpaceTwitter As A Writing Space
Twitter As A Writing Space
 
How to use Dubbler
How to use DubblerHow to use Dubbler
How to use Dubbler
 
Presentation on Social Media and Aftermath
Presentation on Social Media and AftermathPresentation on Social Media and Aftermath
Presentation on Social Media and Aftermath
 
Class 1 0111 2014 - about the class
Class 1   0111 2014 - about the classClass 1   0111 2014 - about the class
Class 1 0111 2014 - about the class
 
Be Web Smart presentation for Sanborn PTO
Be Web Smart presentation for Sanborn PTOBe Web Smart presentation for Sanborn PTO
Be Web Smart presentation for Sanborn PTO
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
Drinkaware: Going mobile at Drinkaware
Drinkaware: Going mobile at DrinkawareDrinkaware: Going mobile at Drinkaware
Drinkaware: Going mobile at Drinkaware
 
Seminar 2 social networks
Seminar 2 social networksSeminar 2 social networks
Seminar 2 social networks
 
Sxsw Team Presentation April14 Slideshare
Sxsw Team Presentation April14 SlideshareSxsw Team Presentation April14 Slideshare
Sxsw Team Presentation April14 Slideshare
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015
 
The Science of Sharing - SXSW 2015
The Science of Sharing - SXSW 2015The Science of Sharing - SXSW 2015
The Science of Sharing - SXSW 2015
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
Social Communications 101 for Volunteers
Social Communications 101 for VolunteersSocial Communications 101 for Volunteers
Social Communications 101 for Volunteers
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Yik yakbrittanyblaschke

  • 1. YIK YAK SHARE YOUR THOUGHTS. KEEP YOUR PRIVACY. By: Brittany Blaschke
  • 2. OVERVIEW • How Yik Yak began • What is Yik Yak • Feature of Yik Yak • Ground Rules For Yik Yak • How to download and Use Yik Yak • Yaking Responsibly
  • 3. HISTORY BEHIND THE YAKING! • Yik Yak was created in October 2013 by Tyler Droll, and Brooks Buffington two students of Furman University. The company is based out of Atlanta, Georgia. • They wanted to create a social media application that was geared towards college students so they could anonymously connect based upon location. The purpose is for people to be engaged with others in their community without reveling their identity.
  • 4. WHAT IS YIK YAK? • Yik Yak is a social media application that is described as a local “bulletin board” where people can post and look at others post based upon location. The difference with Yik Yak and other posting applications is that Yik Yak is completely anonymous. • You can post yaks or just read, reply, or “upvote/downvote” yaks. • It is based upon a 5 mile radius and you can connect up to 500 Yik Yak users in that area. If you want to have connection with more users you can pay extra.
  • 5. THE FEATURES OF YIK YAK Your Yaks • Yik Yak Handle- it is a way to sign your yaks from time to time. • My recent yaks- you can view your most recently posted yaks through this feature. • Recent replies- you have the option to reply to different yaks and then use the feature to view all of your recent replies to different yaks. • My top yaks- a feature to view all of your yaks that are most popular. • You can “upvote” or “downvote” a yak. It is similar to liking a post or favoring a tweet. Top Yaks • Access the All-Time Greatest Yaks- you can use this feature to view all the yaks that have been the most popular. • Top Yaks in your area- this feature is used to view the top yaks in the area where you are located. • Other top yaks- when you access this feature it takes you directly to a google search on “yaks” and images of real Yaks. • You can “Peek” at other popular yaks that are posted as well.
  • 6. GROUND RULES OF THE HERD 1. You do not bully or specifically target other yakkers. 2. Zero tolerance policy on posting people’s phone numbers. 3. Don’t clutter people’s feed with useless or offensive yaks. If you see a useless or offensive yak make sure to do your part by down voting or reporting it. 4. If your yaks continue to be downvoted or reported, you will be warned and then suspended. 5. Must be 17 years of age or older to download the app and use the app.
  • 7. STEPS ON USING YIK YAK • You can download it by accessing the download options at http://yikyakapp.com/ • From there you will click download and will either have the option of downloading through the Apple App store or through Google Play • Both are free downloads until you decide to upgrade
  • 8. NEXT STEP… • Enabled the location setting and begin looking at other yaks in your area! You can view ones that are considered “Peeks” which are featured yaks outside of your area. • You can also view the new yaks being posted and the ones that are considered “hot” in your area.
  • 9. • Notice that there are up and down arrows. Those are the arrows you can click to “upvote” or “downvote” a yak. • You can also see how many replies each yak has and how long ago it was posted. • In order to create or write your own yak you will click the box in the upper left hand corner.
  • 10. START YOUR OWN YIK YAKING! • Begin creating and posting your own yaks! You can write whatever you feel at the moment or want people to know in your area. • You can attach you “handle name” with your yak or not. (Dark knight in the picture on the right is the handle name) • You can also choose whether or not to show your location where you are yaking from. • If you choose you can always upgrade your yak status then choose how many recipients will be able to view your “yak” • Then hit SEND located in the upper right hand corner! • To go back to the original page of yik yaks click YIK YAK in the upper left hand corner.
  • 11. • You can then click on a specific yak and it will reveal the details of the yak. • It will show you the location of where the yak originated from and you have different options from there • You can share or report the yak • Or you can choose to reply to the yak • Once done you can hit the BACK button in the upper left hand corner.
  • 12. YAK RESPONSIBLY • Once you are ready to yak keep in mind the purpose behind Yik Yak. It is a social media application that was meant for positive and helpful post to those in the area that surrounds you. • Do Not mention any personal names, phone numbers, or any personal information about yourself or anyone else. • Remember that it is a place to post helpful not hurtful information.
  • 13. RESOURCES • Common Sense Media Inc. (2014, June 19). App Reviews: Yik Yak. Retrieved from CommonSenseMedia.com: https://www.commonsensemedia.org/app-reviews/yik-yak • Crook, J. (2014, June 20). Yik Yak Is An Anonymous Messaging App Aimed At College Campuses. Retrieved from TechCrunh.com: http://techcrunch.com/2014/02/19/yik-yak-is-an- anonymous-messaging-app-aimed-at-college-campuses/
  • 14. NOW GO RIDE THE YAK!!