SlideShare a Scribd company logo
Computer Architecture: 
Core Hardware 
Chapter 13 
Printers 
Eric Vanderburg 
Eric Vanderburg – Core Hardware © 2005
Laser Printers 
1. Cleaning – clean electrical charge from 
Eric Vanderburg – Core Hardware © 2005 
drum 
2. Conditioning – applies a uniform charge 
(-600v) on the drum 
3. Writing – Lasers changes the charge on 
the drum (-100v) in places where ink 
should go onto paper. Mirrors sweep the 
beam across the drum to complete a 
scanline. 
4. Developing – Toner is applied to the 
drum. It sticks to areas with -100v 
5. Transferring – Positively charged paper 
grabs toner from the drum 
6. Fusing – Paper is heated and pressed to 
attach the toner to the paper
Laser Printers 
• Print density is adjusted by changing the amount 
of charge on the drum 
• Shake toner cartridge 
• Economode is great! 
Eric Vanderburg – Core Hardware © 2005
Inkjet Printers 
• Print heads pass over the paper 
• Ink is boiled and then sprayed with 
nozzles onto the paper. 
• Printers can have as many as 3000 
nozzles 
Eric Vanderburg – Core Hardware © 2005
InkJet 
• Some InkJet printers have many 
cartridges so you only replace the 
color you are running out of. 
Eric Vanderburg – Core Hardware © 2005
Dot Matrix 
• Loud 
• Impact printer 
• Uses an ink ribbon 
• Pins hit the ribbon 
Eric Vanderburg – Core Hardware © 2005
Other Printers 
• Thermal Printers 
– Heat used to melt wax 
based ink onto paper 
• Solid Ink Printers 
– Uses sticks of ink – 
melted 
– Long warm up time 
– Easy maintenance and 
refill 
Eric Vanderburg – Core Hardware © 2005
Print Drivers 
• PostScript 
– 5 or more PostScript fonts 
– Developed by Adobe for Macintosh 
– If your printer does not contain a font, Courier or 
Helvetica will be used 
• PCL (Printer Command Language) 
– PCL1 in 1984, PCL6 in 1995 
– Developed by HP 
– Provides scalable fonts, font management and storage 
of forms and fonts 
• PJL (Printer Job Language) 
– Printer language switching 
– Job separation 
– Environment commands 
– Status feedback 
– Device attendance 
– File system commands 
Eric Vanderburg – Core Hardware © 2005

More Related Content

Viewers also liked

Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
Frya Lora
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Eric Vanderburg
 
Upgrading the Computer Component
Upgrading the Computer ComponentUpgrading the Computer Component
Upgrading the Computer Component
Perla Pelicano Corpez
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
Perla Pelicano Corpez
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
Frya Lora
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
Alvin Francisco
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
paragatol258
 
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric VanderburgComputer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Eric Vanderburg
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Harold Wong
 
Handtools
HandtoolsHandtools
Handtools
Frya Lora
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
Nicola Cerami
 
Windows Server 2012 r2
Windows Server 2012 r2Windows Server 2012 r2
Windows Server 2012 r2
Khalid Hussain
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 

Viewers also liked (20)

Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
 
Upgrading the Computer Component
Upgrading the Computer ComponentUpgrading the Computer Component
Upgrading the Computer Component
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
 
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric VanderburgComputer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
 
Handtools
HandtoolsHandtools
Handtools
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Windows Server 2012 r2
Windows Server 2012 r2Windows Server 2012 r2
Windows Server 2012 r2
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 

Similar to Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg

A+ cheat sheet
A+ cheat sheetA+ cheat sheet
A+ cheat sheet
abnmi
 
Ink jet and thermal printers
Ink jet and thermal printersInk jet and thermal printers
Ink jet and thermal printers
Harshita Ved
 
Microprocessors
MicroprocessorsMicroprocessors
Microprocessors
HarshitParkar6677
 
Microprocessors
MicroprocessorsMicroprocessors
Microprocessors
HarshitParkar6677
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
Sibghatullah585075
 
Glossary uses in printer cartridges
Glossary uses in printer cartridgesGlossary uses in printer cartridges
Glossary uses in printer cartridges
Abdur Rahman Quadri
 
Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)
Sanyam Singh
 
Chap1 computer basics
Chap1 computer basicsChap1 computer basics
Chap1 computer basics
raksharao
 
Devices that output Hardcopy
Devices that output HardcopyDevices that output Hardcopy
Devices that output Hardcopy
Maryam Fida
 
Output
OutputOutput
SPC Unit 1
SPC Unit 1SPC Unit 1
SPC Unit 1
SIMONTHOMAS S
 
Xerox Nuvera® 200/288/314 EA Perfecting Production System
Xerox Nuvera® 200/288/314 EA  Perfecting Production SystemXerox Nuvera® 200/288/314 EA  Perfecting Production System
Xerox Nuvera® 200/288/314 EA Perfecting Production System
Fuji Xerox Singapore
 
Output devices Computer Computer Application in Business
Output devices Computer Computer Application in BusinessOutput devices Computer Computer Application in Business
Output devices Computer Computer Application in Business
Nethan P
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
Syed Iftikhar Ali Shah
 
computer Fundamental Slides
computer Fundamental Slidescomputer Fundamental Slides
computer Fundamental Slides
Mayur Goel
 
Fundamentals.pptx
Fundamentals.pptxFundamentals.pptx
Fundamentals.pptx
dhivyak49
 
ITFT_Peripheral devices
ITFT_Peripheral devices ITFT_Peripheral devices
ITFT_Peripheral devices
Swati Aggarwal
 
care for NW.pptx
care for NW.pptxcare for NW.pptx
care for NW.pptx
aytenewbelay1
 
Computer & Network technology
Computer & Network technologyComputer & Network technology
Computer & Network technology
JanakiGanesan1
 
Chapter 9.0
Chapter 9.0Chapter 9.0
Chapter 9.0
Adebisi Tolulope
 

Similar to Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg (20)

A+ cheat sheet
A+ cheat sheetA+ cheat sheet
A+ cheat sheet
 
Ink jet and thermal printers
Ink jet and thermal printersInk jet and thermal printers
Ink jet and thermal printers
 
Microprocessors
MicroprocessorsMicroprocessors
Microprocessors
 
Microprocessors
MicroprocessorsMicroprocessors
Microprocessors
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
 
Glossary uses in printer cartridges
Glossary uses in printer cartridgesGlossary uses in printer cartridges
Glossary uses in printer cartridges
 
Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)
 
Chap1 computer basics
Chap1 computer basicsChap1 computer basics
Chap1 computer basics
 
Devices that output Hardcopy
Devices that output HardcopyDevices that output Hardcopy
Devices that output Hardcopy
 
Output
OutputOutput
Output
 
SPC Unit 1
SPC Unit 1SPC Unit 1
SPC Unit 1
 
Xerox Nuvera® 200/288/314 EA Perfecting Production System
Xerox Nuvera® 200/288/314 EA  Perfecting Production SystemXerox Nuvera® 200/288/314 EA  Perfecting Production System
Xerox Nuvera® 200/288/314 EA Perfecting Production System
 
Output devices Computer Computer Application in Business
Output devices Computer Computer Application in BusinessOutput devices Computer Computer Application in Business
Output devices Computer Computer Application in Business
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
computer Fundamental Slides
computer Fundamental Slidescomputer Fundamental Slides
computer Fundamental Slides
 
Fundamentals.pptx
Fundamentals.pptxFundamentals.pptx
Fundamentals.pptx
 
ITFT_Peripheral devices
ITFT_Peripheral devices ITFT_Peripheral devices
ITFT_Peripheral devices
 
care for NW.pptx
care for NW.pptxcare for NW.pptx
care for NW.pptx
 
Computer & Network technology
Computer & Network technologyComputer & Network technology
Computer & Network technology
 
Chapter 9.0
Chapter 9.0Chapter 9.0
Chapter 9.0
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 

Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg

  • 1. Computer Architecture: Core Hardware Chapter 13 Printers Eric Vanderburg Eric Vanderburg – Core Hardware © 2005
  • 2. Laser Printers 1. Cleaning – clean electrical charge from Eric Vanderburg – Core Hardware © 2005 drum 2. Conditioning – applies a uniform charge (-600v) on the drum 3. Writing – Lasers changes the charge on the drum (-100v) in places where ink should go onto paper. Mirrors sweep the beam across the drum to complete a scanline. 4. Developing – Toner is applied to the drum. It sticks to areas with -100v 5. Transferring – Positively charged paper grabs toner from the drum 6. Fusing – Paper is heated and pressed to attach the toner to the paper
  • 3. Laser Printers • Print density is adjusted by changing the amount of charge on the drum • Shake toner cartridge • Economode is great! Eric Vanderburg – Core Hardware © 2005
  • 4. Inkjet Printers • Print heads pass over the paper • Ink is boiled and then sprayed with nozzles onto the paper. • Printers can have as many as 3000 nozzles Eric Vanderburg – Core Hardware © 2005
  • 5. InkJet • Some InkJet printers have many cartridges so you only replace the color you are running out of. Eric Vanderburg – Core Hardware © 2005
  • 6. Dot Matrix • Loud • Impact printer • Uses an ink ribbon • Pins hit the ribbon Eric Vanderburg – Core Hardware © 2005
  • 7. Other Printers • Thermal Printers – Heat used to melt wax based ink onto paper • Solid Ink Printers – Uses sticks of ink – melted – Long warm up time – Easy maintenance and refill Eric Vanderburg – Core Hardware © 2005
  • 8. Print Drivers • PostScript – 5 or more PostScript fonts – Developed by Adobe for Macintosh – If your printer does not contain a font, Courier or Helvetica will be used • PCL (Printer Command Language) – PCL1 in 1984, PCL6 in 1995 – Developed by HP – Provides scalable fonts, font management and storage of forms and fonts • PJL (Printer Job Language) – Printer language switching – Job separation – Environment commands – Status feedback – Device attendance – File system commands Eric Vanderburg – Core Hardware © 2005