Collaborative Filtering for Orkut Communities: Discovery of User Latent Behavior

Total Page:16

File Type:pdf, Size:1020Kb

Collaborative Filtering for Orkut Communities: Discovery of User Latent Behavior Collaborative Filtering for Orkut Communities: Discovery of User Latent Behavior Wen-Yen Chen∗ Jon-Chyuan Chu∗ Junyi Luan∗ University of California MIT Peking University Santa Barbara, CA 93106 Cambridge, MA 02139 Beijing 100084, China [email protected] [email protected] [email protected] Hongjie Bai Yi Wang Edward Y. Chang Google Research Google Research Google Research Beijing 100084, China Beijing 100084, China Beijing 100084, China [email protected] [email protected] [email protected] ABSTRACT General Terms Users of social networking services can connect with each Algorithms, Experimentation other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows Keywords over time, users have even greater need for effective commu- nity recommendations in order to meet more users. In this Recommender systems, collaborative filtering, association paper, we investigate two algorithms from very different do- rule mining, latent topic models, data mining mains and evaluate their effectiveness for personalized com- munity recommendation. First is association rule mining 1. INTRODUCTION (ARM), which discovers associations between sets of com- munities that are shared across many users. Second is latent Much information is readily accessible online, yet we as Dirichlet allocation (LDA), which models user-community humans have no means of processing all of it. To help users co-occurrences using latent aspects. In comparing LDA with overcome the information overload problem and sift through ARM, we are interested in discovering whether modeling huge amounts of information efficiently, recommender sys- low-rank latent structure is more effective for recommen- tems have been developed to generate suggestions based on dations than directly mining rules from the observed data. user preferences. In general, recommender systems can be We experiment on an Orkut data set consisting of 492; 104 classified into two categories: content-based filtering and col- users and 118; 002 communities. Our empirical comparisons laborative filtering. Content-based filtering analyzes the as- using the top-k recommendations metric show that LDA sociation between user profiles and the descriptions of items. performs consistently better than ARM for the community To recommend new items to a user, the content-based filter- recommendation task when recommending a list of 4 or more ing approach matches the new items' descriptions to those communities. However, for recommendation lists of up to 3 items known to be of interest to the user. On the other communities, ARM is still a bit better. We analyze exam- hand, the collaborative filtering (CF) approach does not ples of the latent information learned by LDA to explain need content information to make recommendations. The this finding. To efficiently handle the large-scale data set, operative assumption underlying CF is that users who had we parallelize LDA on distributed computers [1] and demon- similar preferences in the past are likely to have similar pref- strate our parallel implementation's scalability with varying erences in the future. As such, CF uses information about numbers of machines. similar users' behaviors to make recommendations. Besides avoiding the need for collecting extensive information about items and users, CF requires no domain knowledge and can be easily adopted across different recommender systems. Categories and Subject Descriptors In this paper, we focus on applying CF to community rec- H.2.8 [Database Management]: Database Applications| ommendation. To investigate which notions of similarity are Data Mining; H.3.3 [Information Storage and Retrieval]: most useful for this task, we examine two approaches from Information Search and Retrieval|Information Filtering; different fields. First, association rule mining (ARM) [2] is a H.3.4 [Information Storage and Retrieval]: Systems data mining algorithm that finds association rules based on and Software|Distributed Systems frequently co-occurring sets of communities and then makes recommendations based on the rules. For example, if users ∗ in the community \New York Yankees" usually join the com- Work done while the first three authors were interns at munity \MLB" (for Major League Baseball), then ARM will Google Research, Beijing. discover a rule connecting communities \New York Yankees" and \MLB." If you join \New York Yankees," you can be rec- Copyright is held by the International World Wide Web Conference Com- mittee (IW3C2). Distribution of these papers is limited to classroom use, ommended \MLB." Generally speaking, ARM can discover and personal use by others. explicit relations between communities based on their co- WWW 2009, April 20–24, 2009, Madrid, Spain. occurrences across multiple users. ACM 978-1-60558-487-4/09/04. Second, latent Dirichlet allocation (LDA) [5] is a machine- • We apply both algorithms to an Orkut data set con- learning algorithm that models user-community co-occurrences sisting of 492; 104 users and 118; 002 communities. Our using latent aspects and makes recommendations based on empirical comparisons using the top-k recommenda- the learned model parameters. Unlike ARM, LDA models tions metric show a surprisingly intuitive finding: that the implicit relations between communities through the set LDA performs consistently better than ARM for the of latent aspects. Following the previous example, suppose community recommendation task when recommending we have another community called \New York Mets" that a list of 4 or more communities. However, for rec- shares many users in common with \MLB" but not with ommending up to 3 communities, ARM is still a bit \New York Yankees." If you are a user joining \New York better. Mets," you would not receive recommendations from ARM for \New York Yankees," because there are not enough \New • We further analyze the latent information learned by York Mets"-\New York Yankees" co-occurrences to support LDA to help explain this finding. such a rule. This is the problem of sparseness in explicit co-occurrence. On the other hand, LDA can possibly rec- • We parallelize LDA to take advantage of the distributed ommend \New York Yankees" because of there may exist an computing infrastructure of modern data centers. Our implicit relation (semantically, \baseball") among the three scalability study on the same Orkut data set shows communities. However, implicit co-occurrence is not always that our parallelization can reduce the training time inferred correctly. Suppose the community \Boston Red from 8 hours to less than 46 minutes using up to 32 ma- Sox" occurs frequently with \MLB" but not \New York Yan- chines (We have made parallel LDA open-source [1]). kees." With LDA, if you were to join \Boston Red Sox," you might receive a recommendation for \New York Yankees," The remainder of this paper is organized as follows: In which is a bad recommendation as the two teams have a Section 2, we briefly introduce ARM and LDA and works longstanding rivalry. This is the problem of noise in inferred related to them. In Section 3, we show how ARM and LDA implicit co-occurrence. can be adapted for the community recommendation task. Explicit relations suffer from the problem of sparseness, We present our parallelization framework of LDA in Sec- but are usually quite accurate. Modeling implicit relations tion 4 and an empirical study on our Orkut data set in Sec- can overcome the sparseness problem; however, doing so may tion 5. Finally, we offer our concluding remarks in Section 6. introduce noise. In what scenarios does each type of relation manifest its strengths and weaknesses? In particular, how 2. RELATED WORK do membership size (the number of communities joined by Association rule mining (ARM) is a well researched algo- a given user) and community size (the number of users in rithm for discovering of correlations between sets of items. a given community) affect sparseness of explicit relations It was originally motivated by analysis of supermarket trans- mined using ARM? action data to discover which itemsets are often purchased • Membership size: Would explicit relations be more together. For example, the rule X ) Y means customers effective at recommendations for active users, ones who who purchased X would likely also purchase Y . To select in- have joined many communities? teresting rules from the set of all possible rules, support and confidence are used as constraints. The support of an item- • Community size: Would implicit relations be more set X, supp(X), is defined as the number of transactions in effective at recommending new or niche communities the data set that contain the itemset. A frequent itemset is with few members? one whose support value exceeds a predefined threshold. An association rule is of the form X ) Y , where X and Y are Similarly, how do membership spread (the diversity among itemsets. The support of a rule is defined as supp(X ) Y ) the communities that a user joins) and community spread = supp(X [ Y ), and the confidence of a rule is defined as (the diversity among the users of a particular community) conf(X ) Y ) = supp(X [ Y )/supp(X). Association rule affect noise in the implicit relations inferred by a latent topic mining is the process of finding all rules whose support and model such as LDA? confidence exceed specified thresholds. Since ARM was first introduced in [2], various algorithms • Membership spread: Would explicit relations be have been designed to mine frequent itemsets efficiently. more effective at recommendations for a diverse user, In [3] and [18], a fast algorithm called Apriori was proposed one who is involved in a miscellaneous set of commu- to exploit the monotonicity property of the support of item- nities? sets and the confidence of association rules. Subsequently, • Community spread: Would implicit relations be FP-growth [9] employed depth-first search for mining fre- more effective at recommending umbrella communi- quent itemsets and has been shown to outperform Apriori ties, those composed of many smaller, tighter sub- in most cases. ARM has been applied to several CF tasks.
Recommended publications
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Chazen Society Fellow Interest Paper Orkut V. Facebook: the Battle for Brazil
    Chazen Society Fellow Interest Paper Orkut v. Facebook: The Battle for Brazil LAUREN FRASCA MBA ’10 When it comes to stereotypes about Brazilians – that they are a fun-loving people who love to dance samba, wear tiny bathing suits, and raise their pro soccer players to the levels of demi-gods – only one, the idea that they hold human connection in high esteem, seems to be born out by concrete data. Brazilians are among the savviest social networkers in the world, by almost all engagement measures. Nearly 80 percent of Internet users in Brazil (a group itself expected to grow by almost 50 percent over the next three years1) are engaged in social networking – a global high. And these users are highly active, logging an average of 6.3 hours on social networks and 1,220 page views per month per Internet user – a rate second only to Russia, and almost double the worldwide average of 3.7 hours.2 It is precisely this broad, highly engaged audience that makes Brazil the hotly contested ground it is today, with the dominant social networking Web site, Google’s Orkut, facing stiff competition from Facebook, the leading aggregate Web site worldwide. Social Network Services Though social networking Web sites would appear to be tools born of the 21st century, they have existed since even the earliest days of Internet-enabled home computing. Starting with bulletin board services in the early 1980s (accessed over a phone line with a modem), users and creators of these Web sites grew increasingly sophisticated, launching communities such as The WELL (1985), Geocities (1994), and Tripod (1995).
    [Show full text]
  • International Students' Use of Social Network Sites For
    INTERNATIONAL STUDENTS’ USE OF SOCIAL NETWORK SITES FOR COLLEGE CHOICE ACTIVITIES AND DECISION MAKING Natalia Rekhter Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the School of Education Indiana University June 2017 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Doctoral Dissertation Committee _______________________________________________________________ Committee Chairperson, Robin Hughes, Ph.D. _______________________________________________________________ Committee Member, Donald Hossler, Ph.D. _______________________________________________________________ Committee Member, Gary Pike, Ph.D. _______________________________________________________________ Committee Member, James Scheurich, Ph.D. _______________________________________________________________ Committee Member, Eric Wright, Ph.D. Date of Defense March 9, 2017 ii I dedicate this dissertation to my husband, Mark Rekhter, M.D., Ph.D. Thank you for always encouraging me to persist, believing in me, listening to my endless self-doubts, always finding words of reassurance, and for being by my side all the way. I also dedicate this dissertation to my sons Ilya and Misha, who inspired me by their own successes, intelligence, and dedication. iii Acknowledgements I was able to complete this dissertation research only because of the encouragement, guidance, support and care of my dissertation research advisor Dr. Donald Hossler. Dr. Hossler, thank you for your infinite patience, for challenging my views, for always inspiring me to do better and reach higher, for your suggestions, your guidance, your feedback and your trust in me. An opportunity to work with you and learn from you made a profound impact on me as a person and as a researcher.
    [Show full text]
  • Social Networking: a Guide to Strengthening Civil Society Through Social Media
    Social Networking: A Guide to Strengthening Civil Society Through Social Media DISCLAIMER: The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. Counterpart International would like to acknowledge and thank all who were involved in the creation of Social Networking: A Guide to Strengthening Civil Society through Social Media. This guide is a result of collaboration and input from a great team and group of advisors. Our deepest appreciation to Tina Yesayan, primary author of the guide; and Kulsoom Rizvi, who created a dynamic visual layout. Alex Sardar and Ray Short provided guidance and sound technical expertise, for which we’re grateful. The Civil Society and Media Team at the U.S. Agency for International Development (USAID) was the ideal partner in the process of co-creating this guide, which benefited immensely from that team’s insights and thoughtful contributions. The case studies in the annexes of this guide speak to the capacity and vision of the featured civil society organizations and their leaders, whose work and commitment is inspiring. This guide was produced with funding under the Global Civil Society Leader with Associates Award, a Cooperative Agreement funded by USAID for the implementation of civil society, media development and program design and learning activities around the world. Counterpart International’s mission is to partner with local organizations - formal and informal - to build inclusive, sustainable communities in which their people thrive. We hope this manual will be an essential tool for civil society organizations to more effectively and purposefully pursue their missions in service of their communities.
    [Show full text]
  • Social CRM in Higher Education Introduction Many Colleges And
    Social CRM in Higher Education Introduction Many colleges and universities employ sophisticated CRM (customer relationship management) tools to manage relationships with their constituents. Campuses use CRM to help recruit high- quality students, communicate with parents, manage relationships with current students, promote events, and keep in contact with alumni. The growing popularity of Web 2.0 social network tools creates a new challenge for colleges. Many of their most important constituents, late-teen and early twenty-year olds, are abandoning traditional CRM media such as print, email, and telephones in favor of social media. Having invested heavily in CRM during the past decade campuses must now retool their communication strategies to incorporate social media. The integration of social networking sites into CRM systems is known as “Social CRM.” Social networking sites include blogs, wikis, social bookmarking, consumer reviews, and video sharing. Table 1 provides a list of Web 2.0 tools and the names of popular web sites that provide these tools. The popularity of social software sites has increased dramatically in recent years. Four of the top ten most popular web sites in April 2012 are social software sites (Alexa.com, 2012). Social software is very popular with college students. A 2007 survey of 31,500 first-year college students found that 94-percent used social networking sites at least weekly (Higher Education Research Institute, 2007). RateMyProfessors.com, a social networking site that allows anonymous ratings of professors, is visited by approximately 3 million college students each month. It claims to publish over 10 million student-generated ratings of more than one million professors (RateMyProfessors.com, 2010).
    [Show full text]
  • 'Social-Network' Infrastructure to Improve Peer-To-Peer Overlay
    Leveraging ‘Social-Network’ Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut Zahid Anwar†‡ William Yurcik‡ Vivek Pandey† Asim Shankar† Indranil Gupta† Roy H. Campbell† † Department of Computer Science ‡ National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign USA {anwar,byurcik}@ncsa.uiuc.edu {pandey1,shankar}@uiuc.edu {indy,rhc}@cs.uiuc.edu Abstract directly. This adds value to the edges of a network where the information is being collected and used. Application-level peer-to-peer (P2P) network Gnutella – a popular file sharing application, overlays are an emerging paradigm that facilitates broadcasts messages to all the peers in the path of the decentralization and flexibility in the scalable query. A querying peer sends the query to all of its deployment of applications such as group peers, who in turn send the query to all of their peers communication, content delivery, and data sharing. until the query reaches a peer that produces a hit However the construction of the overlay graph topology matching the query. This peer sends back a reply optimized for low latency, low link and node stress and containing its address, the size of the file, speed of lookup performance is still an open problem. We present transfer, etc. The reply traverses the same path but in a design of an overlay constructed on top of a social reverse order back to the querying peer. This passing of network and show that it gives a sizable improvement in messages generates much traffic in the network, often lookups, average round-trip delay and scalability as leading to congestion and slow responses.
    [Show full text]
  • Centrespread Centrespread 15 MAY 28-JUNE 03, 2017 MAY 28-JUNE 03, 2017
    14 centrespread centrespread 15 MAY 28-JUNE 03, 2017 MAY 28-JUNE 03, 2017 Friendster Google+ LAUNCHED: June 2011 FOUNDER: Jonathan Abrams, PRESENT STATUS: Active Peter Chin Smarting from its failed attempts in LAUNCHED: March 2002 social networking through Orkut and Buzz, PRESENT STATUS: Shifted to online gaming Google decided to take Facebook head-on with in 2011 and shut down in June 2015 Google+. Integrated into Gmail, Google+ tried a Within a year of its launch, Friendster had three slightly different approach to social networking million users but soon had to contend with the Orkut than Facebook, offering users the option of cat- likes of MySpace and Facebook. It was sold to egorising their friends into "circles". But users FOUNDER: Orkut Buyukkokten a Malaysian internet company in 2009 LAUNCHED: January 2004 were not too kicked about it and it reportedly for $100 million. PRESENT STATUS: Shut in September 2014 has remained a mere afterthought in At the time of the sale, Friendster had Started by Buyukkokten, a Turkish engineer social media, despite a redesign around 75 million users in Asia. Friendster at Google, Orkut was the result of the search giant's in late 2015 turned into an online gaming platform failure to buy Friendster. Orkut, while not much of a in 2011 and was disabled four success in the US, proved big in Brazil and India, its years later two key markets. But in September 2010, Facebook, which debuted two weeks after Orkut's launch, went past Orkut in terms of number of users in India, and a year later, did the same in Brazil.
    [Show full text]
  • Facebook Clinches Top Spot in India: Research 26 August 2010, by Neha Lall
    Facebook clinches top spot in India: research 26 August 2010, by Neha Lall "Even though Orkut belongs to Google it is not as cool as the rest of Google, it feels like Orkut is always trying to play catch up in terms of features and functionality," said leading Indian blogger Kiruba Shankar. According to comScore India is the seventh largest social networking market, with the audience up 43 percent in the past year. The firm estimated that there were 945 million unique users of social networking sites in July worldwide, with the United States, China and A survey showed that Facebook has become the number one social networking site in India, toppling Germany the biggest markets. Google-owned Orkut in one of the few major markets the site had a leadership position. Internet use is much higher in Indian cities where infrastructure is more complete and where more people have access to computers. Facebook has become the number one social In a nation of more than a billion, only around networking site in India, toppling Google-owned seven million people are broadband Internet Orkut in one of the few major markets the site had subscribers, according to a recent report by a leadership position, a survey showed Thursday. consultancy Booz and Company. US-based global research firm comScore said Many analysts hope the advent of new high-speed Facebook had moved into the top spot in July, third-generation mobile phone networks will greatly backing up separate research by Indian online increase Internet usage in the country because far monitor ViziSense which showed a similar trend.
    [Show full text]
  • Scalable Affiliation Recommendation Using Auxiliary Networks
    Scalable Affiliation Recommendation using Auxiliary Networks VISHVAS VASUKI NAGARAJAN NATARAJAN ZHENGDONG LU BERKANT SAVAS and INDERJIT DHILLON University of Texas at Austin Social network analysis has attracted increasing attention in recent years. In many social net- works, besides friendship links amongst users, the phenomenon of users associating themselves with groups or communities is common. Thus, two networks exist simultaneously: the friend- ship network among users, and the affiliation network between users and groups. In this paper, we tackle the affiliation recommendation problem, where the task is to predict or suggest new affiliations between users and communities, given the current state of the friendship and affili- ation networks. More generally, affiliations need not be community affiliations—they can be a user’s taste, so affiliation recommendation algorithms have applications beyond community rec- ommendation. In this paper, we show that information from the friendship network can indeed be fruitfully exploited in making affiliation recommendations. Using a simple way of combining these networks, we suggest two models of user-community affinity for the purpose of making affili- ation recommendations: one based on graph proximity, and another using latent factors to model users and communities. We explore the affiliation recommendation algorithms suggested by these models and evaluate these algorithms on two real world networks—Orkut and Youtube. In doing so, we motivate and propose a way of evaluating recommenders, by measuring how good the top 50 recommendations are for the average user, and demonstrate the importance of choosing the right evaluation strategy. The algorithms suggested by the graph proximity model turn out to be the most effective.
    [Show full text]
  • Google/Orkut Input
    Orkut is Google's online social network. It is particularly popular in Brazil and India. Google takes the safety of our users on orkut very seriously, and we have gone to great lengths to help protect them. Unlike many other social network sites, orkut requires users to be 18 years old to use the service. Google places a session cookie on a registrant's browser to help prevent age falsification when a user registers for orkut. Therefore, many of the issues related to the safety of young people under 18 on social networking sites do not generally apply to orkut. Google/orkut focuses its safety efforts on combating inappropriate content on orkut. We have a cross- functional team of product managers, engineers, legal and customer support employees across three continents who are dedicated to developing abuse-prevention tools for orkut. This team has a three- pronged approach to detecting and preventing abuse on the website: • Identifying and removing illegal content • Empowering users to detect and prevent abuse • Cooperating with law enforcement Identifying and Removing Illegal Content: Orkut uses cutting edge technology and manual content reviews in response to user "flags" to qualify "manual content reviews" to identify and eliminate illegal and inappropriate content from orkut. From a technological perspective Google uses the following tools: • Image scanning technology: This year we launched image scanning technology which aims to detect images of pornography (including child pornography) at the time of upload to the website, followed quickly by removal. A team of U.S. engineers worked on development of this scanning technology for more than a year, and we are very pleased with the results of the tool's detection capabilities thus far.
    [Show full text]
  • Global Social Media Directory a Resource Guide
    PNNL-23805 Rev. 1 Global Social Media Directory A Resource Guide October 2015 CF Noonan AW Piatt PNNL-23805 Rev. 1 Global Social Media Directory CF Noonan AW Piatt October 2015 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 Abstract Social media platforms are internet-based applications focused on broadcasting user-generated content. While primarily web-based, these services are increasingly available on mobile platforms. Communities and individuals share information, photos, music, videos, provide commentary and ratings/reviews, and more. In essence, social media is about sharing information, consuming information, and repurposing content. Social media technologies identified in this report are centered on social networking services, media sharing, blogging and microblogging. The purpose of this Resource Guide is to provide baseline information about use and application of social media platforms around the globe. It is not intended to be comprehensive as social media evolves on an almost daily basis. The long-term goal of this work is to identify social media information about all geographic regions and nations. The primary objective is that of understanding the evolution and spread of social networking and user-generated content technologies internationally. iii Periodic Updates This document is dynamic and will be updated periodically as funding permits. Social media changes rapidly. Due to the nature of technological change and human fancy, content in this Directory is viewed as informational. As such, the authors provide no guarantees for accuracy of the data. Revision Information Revision Number Topic Areas Updated Notes Revision 1 issued, Brazil updated; Added Updated Figure 1 and Table 1.
    [Show full text]
  • Internet Service
    Chapter 2 Internet Service A. Multiple choice questions: 1. Which among the following is a search engine? a. Wikipedia b. Eblogger c. Bing d. Rediffmail Ans. c. Bing 2. Which keyword is used to get the meaning or definition of a word in google? a. Meaning b. Dictionary c. Define d. All of these Ans. c. Define 3. Name the boolean operators used in searching using Google. a. AND b. OR c. NOT d. All of these Ans. d. All of these 4. Pick the odd one out: a. Facebook b. Myspace c. Orkut d. Gmail Ans. d. Gmail 5. Which of the following is used to send a file in an email? a. Inbox b. Outbox c. Attachment d. Subject Ans. c. Attachment 6. Which among the following is not a part of a Blog? a. Journal b. Calendar c. Archive d. Outbox Ans. d. Outbox 7. Which among the following is a Video Conferencing Software? a. Gmail b. Skype c. EBlogger d. RediffMail Ans. b. Skype 8. Talking in real time using textual messages is called __________________. a. chatting b. video conferencing c. social networking d. none of these Ans. a. chatting 9. Which of the following statements is true for ‘BCC’ of Mail Box? a. You want the email address to be visible to ‘To’ and ‘Cc’. b. You want the email address to be visible to ‘To’ but invisible to ‘Cc’. c. You want the email address to be visible to ‘To’ but invisible to ‘Cc’. d. You want the email address to be invisible to both ‘To’ and ‘Cc’.
    [Show full text]