Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate Diffrent types of modems?
There are four different types of modems: half-duplex, full-duplex, synchronous, and asynchronous.With half-duplex modems data can be transmitted in only one direction at a time. Full- duplex modems transmit data in both directions at the same time; one modem is designated as the originating modem and the other as the answering modem, while transmitting and receiving data are done at different frequencies. Asynchronous modems are low-data-rate modems transmitting serial data at a rate of about 1800 bits per second (bps). Synchronous modems are high-data-rate modems transmitting serial data at a rate of about 10,800 bps.
Modems can also be classified as voice-band or wide-band modems. Voice-bandmodems are low-to-high speedmodems designed for use on dial-up, voice-grade, standard telephone lines up to a rate of about 10,800 bps.Microprocessor-controlledmodems are known as smart modems, such as the Hayes modem, manufactured by Hayes Microcomputer Products. The portable acoustic- coupler device, which is a different type of voice-band modem, is a low-speed modem with a rate of about 600 bps that is connected acoustically to a standard telephone. Wide-band modems are very high-speed modems with rates of 19,200 bps and above, designed for use with dedicated telephone lines. These are currently used mostly on private communications systems.
What are privileged instructions? Some of the machine instructions that might cause harm to a system are designated as privileged instructions. The hardware permits the privil
Data is to be transmitted using a modem at 9600 bps. Determine the minimum bandwidth of the system with the following modulation methods (a) FSK (b) ASK. Use the excess bandwidth f
Hashed strings can often be deciphered by 'brute forcing'. Bad news, eh? Yes, and particularly if your encrypted passwords/usernames are floating around in an unprotected file some
Q. Writing down your own Interrupt Service Routines? Here are a few rules which should be kept in mind while writing down your own Interrupt Service Routines: 1. Use Int 21
Explain the working of Interpreter? The Interpreter is a program that executes instructions written in a high-level language. There are two manners to run programs written in a
Q. Define critical mass and critical volume? The minimum size in which at least one neutron is available for further fission reaction. The throng of the fissile material at the
Explain the meaning of LISTEN socket primitive The listen Primitive: After identifying a protocol port a server should instruct the operating system to place a socket
E-commerce is one of the most significant aspects of the internet. Having emerged recently and growing at a steady state, it becomes essential to look at the advantages and disadva
Three firm capabilities that are critical for superior firm performance in e-commerce are:- 1. Information technology capability, 2. Strategic flexibility, and 3. Tr
what is the work of pin daigram in 8086 microprocessor in assembly
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd