what is modem and what use of in networking ?
Answer Posted / pradeep bisht
modem is modulator demodulator
modulator converts bits transfered into electrical pulses
demodulator converts electrical pulses into bits
It is very useful in networking when we r using internet
| Is This Answer Correct ? | 15 Yes | 5 No |
Post New Answer View All Answers
What is a minimum data size of an Ethernet frame ?
Define Wireless Networks
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
Question What is datagram, datagram packets and datagram sockets?
what are the major componets of client server application?
What is OSPF
What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.
Explain the following ARQ techniques in detail 1. Stop and wait ARQ 2. Selective repeat ARQ
1.Explain the main purpose of IP address? 2.List two purposes for a web browser? 3.Explain an advantage and a disadvantage of multiple search engines? 4.Describe two roles of Internet Services Providers (ISPs)?
what is piggy backing?
I am using vm ware In my system and I am using 2003server in vm ware ( my o.s is XP ) Now I would like to install .zip in my 2003server machine .how can I do this
Discuss Shannon’s capacity. What implications does it have ?
which are the institutes in mumbai for CCNA training & how much is the cost of teaching and the exam fees?
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
How do cryptography-based keys ensure the validity of data transferred across the network?