Dell 1135N User Guide - Page 137

TCP/IP, Toner Cartridge, Toner, TWAIN, UNC Path, Watermark

Page 137 highlights

network address and which part is the host address. TCP/IP The Transmission Control Protocol (TCP) and the Internet Protocol (IP); the set of communications protocols that implement the protocol stack on which the Internet and most commercial networks run. TCR Transmission Confirmation Report (TCR) provides details of each transmission such as job status, transmission result and number of pages sent. This report can be set to print after each job or only after failed transmissions. TIFF Tagged Image File Format (TIFF) is a variable-resolution bitmapped image format. TIFF describes image data that typically come from scanners. TIFF images make use of tags, keywords defining the characteristics of the image that is included in the file. This flexible and platform-independent format can be used for pictures that have been made by various image processing applications. Toner Cartridge A container for the toner. Toner Toner is a powder used in laser printers and photocopiers, which forms the text and images on the printed paper. Toner can be melted by the heat of the fuser, causing it to bind to the fibers in the paper. TWAIN An industry standard for scanners and scanner software. By using a TWAIN-compliant scanner with a TWAINcompliant software program, a scan can be initiated from within the program.; an image capture API for Microsoft Windows and Apple Macintosh operating systems. UNC Path Uniform Naming Convention (UNC) is a standard way to access network shares in Windows NT and other Microsoft products. The format of a UNC path is: \\\\ URL Uniform Resource Locator (URL) is the global address of documents and resources on the Internet. The first part of the address indicates what protocol to use, the second part specifies the IP address or the domain name where the resource is located. USB Universal Serial Bus (USB) is a standard that was developed by the USB Implementers Forum, Inc. to connect computers and peripherals. Unlike the parallel port, USB is designed to concurrently connect a single computer USB port to multiple peripherals. Watermark A watermark is a recognizable background image or pattern that is lighter than the printed text. WEP Wired Equivalent Privacy (WEP) is a security protocol specified in IEEE 802.11 to provide the same level of security as that of a wired LAN. WEP provides security by encrypting data over radio so that it is protected as it is transmitted from one end point to another. WIA Windows Imaging Architecture (WIA) is an imaging architecture that was originally introduced in Windows XP. A scan can be initiated from within these operating systems by using a WIA-compliant scanner. WPA Wi-Fi Protected Access (WPA) is a class of systems to secure wireless (Wi-Fi) computer networks, which was created to improve upon the security features of WEP.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

network address and which part is the host address.
TCP/IP
The Transmission Control Protocol (TCP) and the Internet Protocol (IP); the set of communications protocols that
implement the protocol stack on which the Internet and most commercial networks run.
TCR
Transmission Confirmation Report (TCR) provides details of each transmission such as job status, transmission
result and number of pages sent. This report can be set to print after each job or only after failed transmissions.
TIFF
Tagged Image File Format (TIFF) is a variable-resolution bitmapped image format. TIFF describes image data that
typically come from scanners. TIFF images make use of tags, keywords defining the characteristics of the image
that is included in the file. This flexible and platform-independent format can be used for pictures that have been
made by various image processing applications.
Toner Cartridge
A container for the toner.
Toner
Toner is a powder used in laser printers and photocopiers, which forms the text and images on the printed paper.
Toner can be melted by the heat of the fuser, causing it to bind to the fibers in the paper.
TWAIN
An industry standard for scanners and scanner software. By using a TWAIN-compliant scanner with a TWAIN-
compliant software program, a scan can be initiated from within the program.; an image capture API for Microsoft
Windows and Apple Macintosh operating systems.
UNC Path
Uniform Naming Convention (UNC) is a standard way to access network shares in Windows NT and other Microsoft
products. The format of a UNC path is: \\<servername>\<sharename>\<Additional directory>
URL
Uniform Resource Locator (URL) is the global address of documents and resources on the Internet. The first part
of the address indicates what protocol to use, the second part specifies the IP address or the domain name where
the resource is located.
USB
Universal Serial Bus (USB) is a standard that was developed by the USB Implementers Forum, Inc. to connect
computers and peripherals. Unlike the parallel port, USB is designed to concurrently connect a single computer
USB port to multiple peripherals.
Watermark
A watermark is a recognizable background image or pattern that is lighter than the printed text.
WEP
Wired Equivalent Privacy (WEP) is a security protocol specified in IEEE 802.11 to provide the same level of
security as that of a wired LAN. WEP provides security by encrypting data over radio so that it is protected as it is
transmitted from one end point to another.
WIA
Windows Imaging Architecture (WIA) is an imaging architecture that was originally introduced in Windows XP. A
scan can be initiated from within these operating systems by using a WIA-compliant scanner.
WPA
Wi-Fi Protected Access (WPA) is a class of systems to secure wireless (Wi-Fi) computer networks, which was
created to improve upon the security features of WEP.