Table of content
Name three types of printers and describe their advantages and disadvantages.
The dot-matrix printer is an ____________ printer. Name at least one advantage of this type of printer. Name at least one disadvantage.
What are the six steps of laser printing?
Which components are usually included in a laser printer's replaceable toner cartridge? Why?
What causes black spots to appear on a document that has been printed on a laser printer? How can this problem be resolved?
What is the IEEE 1284 standard?
What kinds of signals do telephones use? What kinds of signals do computers use?
What is the purpose of a modem?
Which AT command is used to take the phone off the hook?
What is the difference between baud and bps?
What is the name of the chip that converts data from parallel to serial?
Name three transfer protocols.
What is Zmodem? What are its advantages over other protocols?
What are AT commands and how can a computer technician use them?
Explain the difference between half-duplex and full-duplex. What makes them different? Where or when is each used?
What is the difference between synchronous and asynchronous communication?
Why are fax standards different from modem standards?
Describe a null-modem cable.
In addition to the cost of the printer, what other costs should be considered when purchasing a printer?
What does bps stand for?
Identify as many cables and connectors as you can.
What type of connector is used for a parallel port on the computer?
What type of connector is used for a parallel port on the printer?
Table of content
Microsoft Corporation - A+ Certification Training Kit
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Storing Connection Strings
Navigating Between Parent and Child Records Using a DataRelation
Creating Constraints, PrimaryKeys, Relationships Based on Multiple Columns
Determining the Length of Columns in a SQL Server Table
MySQL Stored Procedure Programming
Missing SQL:2003 Features
SQL Statements for Managing Stored Programs
Getting Information About Stored Programs
Date and Time Functions
Stored Programs and Code Injection
Certified Ethical Hacker Exam Prep
Picking the Right Platform
Trojans and Backdoors
Viruses and Worms
Cryptographic Attacks and Defenses
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
IDS and IPS Architecture
Cisco Secure IDS
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
Relationships in the Supply Chain
Fashion Logistics and Quick Response
Logistics in Tesco: Past, Present and Future
Transforming Technologies: Retail Exchanges and RFID
Extending and Embedding PHP
Working with Instances
Appendix D. Additional Resources
flylib.com © 2008-2017.
If you may any questions please contact us: email@example.com
to find out more.