?
Solved

Using the modem sound card rather than a dedicated sound card

Posted on 2004-04-28
4
Medium Priority
?
401 Views
Last Modified: 2013-11-09
I was working with an old machine and it doesn't have a sound card. The modem card, however, has inputs for microphone and output for speakers. How can I use this modem sound card for all my system audio?
0
Comment
Question by:Richard_Lightner
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 14

Accepted Solution

by:
tmj883 earned 100 total points
ID: 10945376
The manufacturer and model number would help to identify the device. Although some sound/modem cards were made, are you sure it's not just a speakerphone modem?
T
0
 
LVL 7

Expert Comment

by:magus123
ID: 10946521
most modems that i have delt with these extra auxillary holes are not really for sound "soundcard"
they are what is mentioned above speakerphone and etc.

if you know the modem card name and numbers will be glad to look it up.
0
 
LVL 31

Expert Comment

by:rid
ID: 10947451
Many modems allow you to use them as a phone. The connectors are probably only for hooking up a headset. Mono, low power, zilch sound quality - not like a sound card.
/RID
0
 

Author Comment

by:Richard_Lightner
ID: 10948522
It's probably just a speakerphone. I thought there might be some way to "re-route" another audio signal through it, anyway. (Even though it wasn't designed for it.) I just accepted TMJ's answer because he was first.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question