Explaining database system of facebook and google

Assignment Help Basic Computer Science
Reference no: EM1349304

Q1) Does Facebook and Google use same database system? Facebook seems to run with the android platform using gmail address to retain information for user such as phone numbers and contacts. I wonder if Google and Facebook is collaborating in database systems to intertwine with each other. Since FB isn't revealing there secret, and there are some similarities with Google and FB, would it make sense for the to be using similar database system?

Reference no: EM1349304

Questions Cloud

Explain found meaningful and whether they personally felt : including the types of rewards that they found meaningful and whether they personally felt that if they worked hard
How much time do they have to run to safety : A child loses his balloon, which rises slowly into the sky. If the balloon is 23 cm in diameter as the child loses it, what is its diameter at the following altitudes? Assume that the balloon is very flexible and so surface tension could be neglec..
Online professors response to: organizational change : Explain what contributed to the ineffectiveness of the change? What would have made the change more effective?
Compute the bank discount rate : Compute the bank discount rate (DR) attached to a 60-day, $1 million CD selling in the secondary market for $990,000.
Explaining database system of facebook and google : Does Facebook and Google use same database system? Facebook seems to run with the android platform using gmail address to retain information for user such as phone numbers and contacts.
Program evaluation type and conducting a program evaluation : Select the above program evaluation type and conduct a program evaluation on the program you designed.
Determine the cash flows : Assume Guillermo invested in high end office furniture's. How would you determine the cost of the project? How would you estimate the cash flows from project?
Elucidate how much the last input added to the total amount : Elucidate how much the last input added to the total amount of revenue. Elucidate how much the last input added to the total amount of production.
Identify an organization in need of change : What are the key challenges and dilemmas in the change situation? What key traits should the change leader have?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prepare business income statement for the period

With growing importance of computerised accounting systems, which inventory system (perpetual or periodic) has become more popular?  Explain why

  Rbocs in mfj to retain control of yellow pages

One way to provide additional revenues for the RBOCs in the MFJ was to retain control of the Yellow Pages.

  Benefits of measures used to protect operating systems

Describe relative benefits and disadvantages of at least three different measures used to protect operating systems.

  Explaining physical material on which computer keeps data

Storage is the physical material on which a computer keeps data, instructions, and information?

  Actions against company security camera

Joe the janitor is recorded on the company security camera one night taking pictures with his cell phone of the office of the CEO after he is done cleaning it. What will you do and what is your justification for your actions?

  Finding vertices of polygon stored in array-clockwise order

Assume that n ≥ 3 and the n vertices of P are stored in an array in clockwise order around P. Describe how to determine efficiently whether exactly one of the points q and r falls within P. Analyze the time for your algorithm.

  Performing swot analysis on viability of upgrading server

Carry out a SWOT analysis on the viability of upgrading to Server 2008.

  Condition to resume sending messages related to application

Give an example that illustrates why P must not be allowed to do so and state a condition that defines when P may resume sending messages related to application.

  Managing cyber crime to protect business

Provide a scenario of a cyber crime by way of example that will demonstrate to your business a situation that might occur.

  Explaining vulnerability in novice programmer-s code

You have found vulnerability in novice programmer's code and have recommended sweeping changes in your organization to address issues.

  The authentication process in a synchronous token system

Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation Explain..

  Corporate goal for scr new training activity

We require corporate goal for SCR which refers to new training activity. Create a draft to show Jesse. Draft project scope statement for TIMS system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd