Skip to main content

How facebook works

Some people are online social butterflies, deftly managing to interact with hundreds of Facebook friends on a daily basis. To them, there's no challenge in wading through a dozen event invites, wishing a happy birthday to the appropriate people, responding to Wall posts and making the next move in one of the thousands of games permeating the site.

For the rest of us, Facebook can sometimes seem a little overwhelming. If you've got a lot of Facebook friends, you may find it impossible to keep up with everything. And if your friends are the sensitive type, you may give off the impression that you don't care about them. There's nothing quite like finding out a friend is in a tizzy because you didn't respond to an invite on Facebook to go bowling.

Then there are the people who'd rather never get on Facebook at all. As our culture embraces social networking sites and services, people begin to feel the pressure to participate. That might not be a big deal to everyone but some people just aren't that comfortable sharing information with others. How do you balance being a contributing member of society with reluctance to join the online social world?

Learn More

The answer for people who have trouble maintaining a Facebook profile -- or those who wish to avoid it as much as possible -- may be Fakebook. It's a new Facebook application that responds to requests automatically and takes care of the everyday virtual housekeeping your profile needs to avoid drama. For people with a lot of Facebook friends, it takes the pressure out of responding to various invitations and status updates. For the shyer among us, Fakebook can provide the online interaction we're otherwise reluctant to do.

Popular posts from this blog

Hide Files or Folders Using Command Prompt

Hide Files or Folders Using Command Prompt This is my second instructable. This one is totally different from my previous post...
In this esteemed instructable i'll be guiding you to hide a folder by using cmd.. Even the folder option method won't be able to track the hidden folder

You'll need
1. Windows based operating system
Step 1: Run Command Prompt and Basic Text Commands There are several methods to run cmd.. Some of them are listed below

1. Start -> Run -> Cmd
2. Starrt -> Program Files -> Accessories - > Command Prompt

Command Prompt is a newer version of Dos and other os similar to that.. In order to fulfill your needs to hide a folder you must atleast know some basic commands ...

Cd - navigates through a folder
Md - creates a folder
Dir - Directory list
Attrib - provides with various attrib features
Step 2: Hide d targeted folder Alright, it's time to hide the folder

Presuming that I have a folder named Secret in F:\ Drive
Here are the steps to do

First of all n…

Computer Server

Server A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.

Many types of servers exist, including web servers, mail servers, and file servers. Each type runs software specific to the purpose of the server. For example, a Web server may run Apache HTTP Server or Microsoft IIS, which both provide access to websites over the Internet. A mail server may run a program like Exim or iMail, which provides SMTP services for sending and receiving email. A file server might use Samba or the operating system's built-in file sharing services to share files over a network.

While server software is specific to the type of server, the hardware is not as important. In fact, a regular desktop computers can be turned into a server by adding the appropriate software. For example, a computer connected to a home network can be designated as a file server, print server, or …

Difference between 2G and 3G Technology

Second Generation (2G) technology was launched in the year 1991 in Finland. It is based on the technology known as global system for mobile communication or in short we can say GSM. This technology enabled various networks to provide services like text messages, picture messages and MMS. In this technology all text messages are digitally encrypted due to which only the intended receiver receives message. These digital signals consume less battery power, so it helps in saving the battery of mobiles. The technologies used in 2G are either TDMA (Time Division Multiple Access) which divides signal into different time slots or CDMA (Code Division Multiple Access) which allocates a special code to each user so as to communicate over a multiplex physical channel. 3G technology generally refers to the standard of accessibility and speed of mobile devices. It was first used in Japan in the year 2001. The standards of the technology were set by the International Telecommunication Union (ITU). Thi…