Why we use modem, Computer Engineering

Assignment Help:

Q. Why we use Modem?

A Modem is one device which most computer users who have surfed Internet are aware of.  A modem is neededsincehowever most of telecommunications have become digital most telephone connections at user end are still analog POTS (Plain Old Telephone Systems/Sets/Service). But the computer is a digital device and henceforth another device is requiredthat can convert digital signals to analog signals and vice-versa.  Such a device is Modem. Modem signifies Modulator/Demodulator.  Modulation is process that puts digital information on to analog circuit by modifying a constant wave (signal) known as the Carrier.  This is what happens whenever you press a button to connect to Internet or to a web site.  Demodulation is reverse process that derived digital signal from modulated wave. This is what happens when you receive data from a website which then gets displayed by your browser.


Related Discussions:- Why we use modem

What is software and hardware interrupt, What is Software and hardware inte...

What is Software and hardware interrupt The software interrupts are program instructions. These instructions are inserted at desired location in a program. A program formed int

Parallelism based on granularity size-granularity, Parallelism based on G...

Parallelism based on Granularity size Granularity:  Granularity or Grain size is a determine which measure how much computation is devoted in a process.Granularity size is

What is read-only-memory, Q. What is Read-only-Memory? Read only memory...

Q. What is Read-only-Memory? Read only memory is an illustration of a Programmable Logic Device (PLD) it implies that binary information which is stored within a PLD is specifi

Operating system, explain the various types of computer systems

explain the various types of computer systems

How can we set the table spaces and extent sizes, How can we set the table ...

How can we set the table spaces and extent sizes? You can state the extent sizes and the table space (physical storage area in the database) in which a transparent table is to

Show various RISC processors, Q. Show Various RISC Processors? RISC has...

Q. Show Various RISC Processors? RISC has fewer design bugs and its simple instructions decrease design time. Sodue to all the above important reasons RISC processors have beco

Explain ones complement operator, One's Complement Operator: ~ The one'...

One's Complement Operator: ~ The one's complement operator, sometimes called the "bitwise complement" or "bitwise NOT" operator, produces the bitwise one's complement of its op

Describe the external users of system, Q. Describe the External Users of sy...

Q. Describe the External Users of system? External Users: Modern information systems are now reaching beyond the boundaries of traditional business to involve customers and o

Explain the working principle of hard disk, Question : a) Hard disk is ...

Question : a) Hard disk is an important component of a computer. What type of memory is it? b) With the help of a diagram describe its features. c) Explain its working pr

Boundary tag management system, what are the two memory management scehme...

what are the two memory management scehme(boundary tag system,buddy system)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd