Professional Documents
Culture Documents
What type of device translates between digital computer signals and analog
telephone signals? Explain the mechanism for transmitting and receiving
signals.
Modem
Modem worrks mainly in two modes ATOA (Analog to Analog) and ATOD (Analog to
digital). And data mode and signal mode. It converts incoming analog signal to digital which
can be understand by computer and in reverse it converts computers digital signal to analog
which can transmitted using telephone network.
As we know that the computers cant understand our language. Computers understand the
language of 0s and 1s i.e. digital form. The modem will modulate the signal into a sine wave.
So, this modulated digital signal can easily run over the telephone lines. Then the signal will
reach the IP hub. After this the demodulation of the signal will take place into digital form. Then
you will be connected to the internet. All these processes are performed by modem at extremely
high speeds. The speed of the modem depends upon the number of the available access lines
and the technology of the modem.
Todays the modems are of very high speeds. But some people are still using the slow speed
modems
having
speed
nearly
56kbps.
The features of modem are discussed below:
1. The speed of the modem is measured in bps means bits per second. Data transfer speed can
be increased by using the technique of data compression.
2. If we are using a modem having auto answering facility. Then our modem will be able to attend
calls even in our absence.
3. Modems work basically in two modes. One is voice mode and other is data mode. In voice
mode modem acts like a simple telephone. But in data mode modem acts as a Simple modem.
These types of modems have a switch which is helpful in changing the mode i.e. from voice
mode to data mode and from data mode to voice mode. For voice communication, loudspeaker
and a microphone is implemented in the modem.
4. Some modems have the ability to compress data. These modems compress data before
sending to improve the data transfer rates. But there must be a similar technology modem to
decompress the data at the receiver end.
Mike receives an email claiming to be from his bank requiring him to confirm
his online banking credentials by clicking on an embedded link. Several days
after Mike clicked on the link and entered his details, his bank account is
emptied. What type of attack is this? Explain why a firewall would be
ineffective against this type of attack. (2 Marks)
Phishing
Newer models of the iPhone use a fingerprint scanner. What type of
authentication is this? Give another example of such authentication.
Biometrics identificartion
Easy recovery
Flexible
BPR
Bookverse was a small chain of book stores that specialised in sciFfi books
and comics. After organisation change, Bookverse became a purely onFline
store that makes its money by providing an extensive online catalogue of rare
sciFfi products that are sold by thousands of small vendors all around the
world. Customers can buy a product from Bookverse but it is dispatched
directly from the thirdFparty vendor (Bookverse doesn't keep any stock of its
own). Is this change BPR or a paradigm shift? Justify your answer.