Which of the following are the advantages with the communication Networking known as “Integrated Services Digital Network (ISDN)” ? (i) Fast digital connectivity and the capability of providing for the integration of voice, video and other services (ii) It accelerates the flow of information (iii) It provide an opportunity to share hardware and software by several users (iv) It provides the facilities of call waiting, diversion of calls, and conference calls (v) It provide the facility for controlling data base access and other security requirements

Which of the following are the advantages with the communication Networking known as “Integrated Services Digital Network (ISDN)” ? (i) Fast digital connectivity and the capability of providing for the integration of voice, video and other services (ii) It accelerates the flow of information (iii) It provide an opportunity to share hardware and software by several users (iv) It provides the facilities of call waiting, diversion of calls, and conference calls (v) It provide the facility for controlling data base access and other security requirements Correct Answer i, ii, iv are correct

Integrated Services Digital Network(ISDN) is an interconnected set-up arrangement of communication standards for instant digital transmission of speech & data on the same communication line. Voice, video, data & network services can be transferred via ISDN of the public switched telephonic network.

ISDN integrated digital services are:-

  1. Bearer service: Transmission of voice, data and video between the users is facilitated without network manipulated by the bearer network
  2. Teleservice:It includes telephonic service,teletex,videotex,teleconferencing.
  3. Supplementary service: These include reverse charging,call waiting & message handling.

Advantages of ISDN are:

  1. It offers digital services operations through same copper wires.
  2. It accelerates the flow of information
  3. Fast digital connectivity and the capability of providing for the integration of voice, video, and other services
  4. Signal broadcast through telephonic lines.
  5. High data transfer rate.
  6. Allows connectivity of multiple devices over single line.
  7. It provides the facilities of call waiting, diversion of calls, and conference calls

Drawbacks of ISDN are:

  1. It's difficult to set up, mostly outdated in the modern context of Official communication terminologies, the unreliable mode in terms of proofreading and authentication due to the scope of distortion. and it's easy for the system to fail at times thereby paving way for other services like VOIP (Voice over internet protocol) and other similar services to take place of ISDN.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.
The question given below consists of a statement, followed by three arguments I, II and III. You have to decide which of the arguments is/are ‘strong’ arguments is/are ‘weak’ arguments and accordingly choose your answer from the alternatives given below each question. Statement: For users, Facebook's revelation of a data breach that gave attackers access to 50 million accounts raises an important question: What happens next? For the owners of the affected accounts, and of another 40 million that Facebook considered at risk, the first order of business may be a simple one: sign back into the app. Facebook logged everyone out of all 90 million accounts in order to reset digital keys the hackers had stolen - keys normally used to keep users logged in, but which could also give outsiders full control of the compromised accounts.  Which of the following points do not capture the negligence of Facebook in the most appropriate manner? Arguments: I. What Facebook knows so far is that hackers got access to the 50 million accounts by exploiting three distinct bugs in Facebook's code that allowed them to steal those digital keys, technically known as ‘access tokens’. The company says it has fixed the bugs.  II. The hack is the latest setback for Facebook during a tumultuous year of security problems and privacy issues . So far, though, none of these issues have significantly shaken the confidence of the company's 2 billion global users.  III. One of the bugs was more than a year old and affected how the ‘View As’ feature interacted with Facebook's video uploading feature for posting ‘happy birthday’ messages. But it wasn't until mid-September that Facebook noticed an uptick in unusual activity, and not until this week that it learned of the attack.
The question given below consists of a statement, followed by three arguments numbered I, II and III. You have to decide which of the arguments is/are ‘strong’ arguments and which is/are ‘weak’ arguments and accordingly choose your answer from the alternatives given below each question. Statement: In an interview with ETCIO.COM, Kuruvilla Markose, Chief Digital Officer of Titan shares his perspective on how technology is serving the company’s digital vision and the various initiatives that he is spearheading to hone the competitive edge of Titan. He is the first CDO to be appointed by the software conglomerate Tata Group. He is the man who has put the Titan’s digital transformation on fast-track. Which of the following arguments support the fact that Kuruvilla Markose has put Titan’s digital transformation on fast-track? Arguments: I. Markose is a man with a vision. He is the first CDO to be appointed by the software conglomerate Tata Group. He has spent his entire two decade long career in Tata Group. He has been in customer facing roles across different group companies.  II. His CDO role is horizontal and supports Titan’s myriad business lines: watches, jewellery, bags, perfumes wallets, and eye-wear. But the man and his words are grounded. Diny, as he is popularly known, is a man of measured speech and bearing. III. “Digital innovation”, according to Markose, is all about creating value for the customer. To him, customer centricity is the road to longevity in the digital age. Under his stewardship, Titan has launched a panoply of digital initiatives aimed at improving customer centricity.
The question given below consists of a statement, followed by three arguments I, II and III. You have to decide which of the arguments is/are ‘strong’ arguments is/are ‘weak’ arguments and accordingly choose your answer from the alternatives given below each question. Statement: Chat bots and other interfaces are saving employees and HR heads time for more productive activities by providing information and replies to diverse queries or concerns. A few years ago, business communication was driven by multiple faxes in a day and emails were the only quick mode of exchanging information. This information went through the organisation's who's who, while the others were mostly engaged in the daily rut of redundant activities, preventing them from directing their capabilities towards more productive areas. Which of the following arguments brig out the idea that introduction of chat bots and other interfaces is not helping in boosting up the processes? Arguments: I. Using these conversational interfaces, HR departments are successfully aligning themselves with the swiftly-changing organisational processes. These platforms represent people friendly technologies that keep employee experience at the centre, continuously evolving with them.  II. HR technologies are increasingly using advanced machine learning for measuring and analysing workforce engagement. Sentiment analysis is a unique way of gauging an employee's disposition towards the organisation, providing valuable insights essential for improving productivity and predicting attrition rates.  III. The seamless experience chat bots provide makes employees focus on activities that require critical abilities and strategic thinking. Besides enabling HR processes such as generating leave applications and reimbursement forms, the use of chatbots provides quick and smooth access to data from anywhere, anytime.