Card Set Information

2011-12-13 14:33:03

Final questions
Show Answers:

  1. Primary storage is provided by devices call memory?located on the motherboard and on some adaptor cards
  2. The ____ or system timer is dedicated to timing the activities of the chips on the motherboard.
    system clock
  3. In the world of computers, the term ____ refers to the computer’s physical components, such as the monitor, keyboard, motherboard, and hard drive.
  4. To perform a computing task, software uses hardware for four basic functions: ____.
    input, processing, storage, and output
  5. Data and instructions are stored on special ROM (read-only memory) chips on the board and are called the ____.
  6. Most ____ drives consist of a sealed case containing platters or disks that rotate at a high speed.
  7. The printer produces output on paper, often called ____ copy.
  8. Everything in a computer is ____.
  9. SB ____ drives are compact, easy to use, and currently hold up to 64 GB of data.
  10. A ____ bus port can be used by many different input/output devices, such as keyboards, printers, scanners, and digital cameras.
    Univeresal serial
  11. The ____ card, also called a graphics card, provides one or more ports for a monitor
  12. A device that is not installed directly on the motherboard is called a(n) ____ device.

  13. The ____ card provides a port for a network cable to connect the PC to a network.

    The ____ card provides a port for a network cable to connect the PC to a network.

  14. The ____ is a group of microchips on the motherboard that control the flow of data and instructions to and from the processor.
  15. A(n) ____ drive is considered standard equipment on most computer systems today because most software is distributed on CDs or DVDs.
  16. A 1 or 0 in this system is called a ____.
  17. The term ____ refers to the set of instructions that directs the hardware to accomplish a task.
  18. Most input/output devices communicate with components inside the computer case through a wireless connection or through cables attached to the case at a connection called a(n) ____.
  19. A(n) ____ is a set of rule and standards that any two entities use for communication.
  20. The most important component of the computer’s electrical system is the ____, which is usually near the rear of the case.
    power supply
  21. ____ are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem.
    Device drivers

  22. A(n) ____ is software that controls a computer.

    operating system
  23. The ____ dialog box in Windows Vista appears each time a user attempts to perform an action that can be done only with administrative privileges.
    User Account Control
  24. The ____ is usually on the right side of the taskbar and displays open services.
    system tray
  25. Windows identifies file types primarily by the ____.
    file extension
  26. From the ____ window, you can change the read-only, hidden, archive, and indexing attributes of the file.
  27. A ____ interface is an interface that uses graphics as compared to a command-driven interface
    graphical user
  28. An applet has a ____ file extension.
  29. A ____ is one or more characters following the last period in a filename, such as .exe, .txt, or .avi.
    file extension
  30. The OS ____ is responsible for interacting with hardware.
  31. Vista has a new 3D user interface called the ____ user interface.
  32. The ____ interface between the subsystems in user mode and the HAL.
    executive services
  33. A ____ makes it possible to boot a computer into one of two installed OSs.
    dual boot
  34. A(n) ____ is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive.
  35. A ____ is a single task, such as the task of printing a file, that the process requests from the kernel.
  36. In 1986, ____ was introduced and quickly became the most popular OS among IBM computers and IBM-compatible computers using the Intel 8086 processors.
  37. A(n) ____ is the portion of an OS that relates to the user and to applications.
  38. The ____ is normally located at the bottom of the Windows desktop, displaying information about open programs and providing quick access to others.
  39. A(n) ____ is a list of items that is used to speed up a search.
  40. Windows offers two ways to sync files: ____.
    Briefcase and Offline Files

  41. Correct

    The ____ is a measure of resistance to electricity.

  42. The ____ form factor is a major variation of ATX and addresses some technologies that have emerged since the original development of ATX.
  43. A ____ color or stripe down one side of a cable marks this side of the cable as pin 1.
  44. Older hard drives use a(n) ____-conductor IDE ribbon cable.
  45. A ____ of the house current might cause symptoms of electrical power problems.
  46. Motherboards that support PCI Express and have the 24-pin P1 connector are sometimes called ____ boards
    Enhanced ATX
  47. Some video cards use a(n) ____ that helps to hold the card securely in the slot.
  48. The first ATX power supplies and motherboards used a single power connector called the ____ connector that had 20 pins.
  49. The ____ provides backup power in the event that the AC fails completely.
    uninterruptible power supply
  50. ____ connections inside the computer case can cause a system to appear dead or reboot itself.
    • Loose

  51. A(n) ____ is a general-purpose tool that can measure several characteristics of electricity in a variety of devices

  52. A ____ is an electronic device that can hold an electrical charge for a period of time and can smooth the uneven flow of electricity through a circuit.
  53. A system might have up to ____ types of ribbon cables.
  54. A power ____ is a box inside a computer case that supplies power to the motherboard and other installed devices.
  55. ___ is running a processor, motherboard, or video card at a higher frequency than the manufacturer recommends and is not considered a best practice.
  56. One ____ is the work or energy required to produce one watt of power in one second.

  57. A ____ case sits upright on the floor or a desk and can be as high as two feet and has room for several drives.

  58. A(n) ____ might solve the problem of intermittent errors caused by noise in the power line to the PC.
    line conditioner
  59. For an older motherboard, instead of screws you’ll see ____ that keep the board from resting directly on the bottom of the computer case.
  60. The ____ form factor was designed by Intel in 2003 for flexibility and can be used by everything from large tower systems to those ultrasmall-systems that sit under a monitor.
  61. On the motherboard, the ____ controls power to the motherboard and must be connected for the PC to power up.
    Power SW
  62. Sometimes documentation marks pin 1 as a ____ pin in the diagram, rather than round like the other pins.
  63. For Windows XP, Ntldr is responsible for loading the OS, and is, therefore, called the ____.
    boot loader program
  64. A(n) ____ boot involves turning on the power with the on/off switch.
  65. Earlier Pentiums used a ____ socket, with pins aligned in uniform rows around the socket.
    pin grid array
  66. The ____ have a lever that is used to lift the processor up and out of the socket.
    zero insertion force sockets
  67. Access to a computer can be controlled using a ____ password.
  68. The process of upgrading or refreshing the ROM BIOS chip is called ____ BIOS.
  69. Some cases have ____, also called spacers, which are round plastic or metal pegs that separate the motherboard from the case, so that components on the back of the motherboard do not touch the case.
  70. Throughput is sometimes called ____.
  71. The ____ menu in BIOS setup allows you to configure automatic power-saving features for your system, such as suspend mode or a sleep state.
  72. With any installation, remember the importance of using a ground strap (ground bracelet) to ground yourself when working inside a computer case to protect components against ____.
  73. Most likely when you first install a hard drive or an operating system, you will want to have the BIOS attempt to first boot from a ____.
  74. Later sockets used a ____, with pins staggered over the socket to squeeze more pins into a small space.
    staggered pin grid array
  75. At the beginning of the boot drive (usually drive C) is the OS ____ record.
  76. The ____ and the chipset determine which processors a board can support.
    processor socket
  77. ____ buses have been improved several times; there are currently three major categories and within each category, several variations of the bus.

  78. A ____ is the most complicated component in a computer.

    North Bridge
  79. The slower end of the hub in the Intel i800 chipsets, called the ____, contains the I/O controller hub.
    South Bridge
  80. The most popular method of cooling overclocked processors is a(n) ____.
    liquid cooling system
  81. Laptops use a smaller version of a DIMM called a(n) ____.
  82. Processors can sense their operating temperatures and report that information to ____.

  83. ____ hold counters, data, instructions, and addresses that the ALU is currently processing.

  84. RAM on motherboards today is stored on ____.
  85. Installing more than one processor on a motherboard creates a ____.
    multiprocessor platform
  86. Intel’s current families of processors for the desktop include four major groups: ____.
    the Core, the Pentium, the Celeron, and the Atom families
  87. If you have Rambus memory, what do you put in memory slots that are unused?
  88. Intel’s ____ allows each logical processor within the processor package to handle an individual thread in parallel with other threads being handled by other processors within the package.
  89. The CMOS battery failure can be reported by startup BIOS during the ____.
  90. ____ loses its data rapidly, and the memory controller must refresh it several thousand times a second.
  91. A ____ is a heat sink carrying an electrical charge that causes it to act as an electrical thermal transfer device.

  92. If a power-on password has been forgotten, you can use the BIOS ____ to reset the password

    jumper group
  93. Intel and AMD both recommend a ____ air guide as part of the case design.
  94. ____ is used for a memory cache and is contained within the processor housing
  95. The cooler sits on top of the processor and consists of a fan and a heat ____, which are fins that draw heat away from the processor.
  96. Using the ____ technology, the Intel processor, chipset, and wireless network adapter are all interconnected as a unit, which improves laptop performance.
  97. The current set of standards that is used by BIOS, hardware, and the OS to manage power is ____.
    Advanced Configuration and Power Interface
  98. The temperature inside the case should not exceed ____ degrees C.

  99. A Rambus memory module is called a(n) ____.

  100. Each side, or surface, of one hard drive platter is called a
  101. The first sector on the disk, called the boot sector or ____ record, contains the information about how the disk is organized and the file system used.
  102. The ____-conductor IDE cable has half the number of pins as it has wires.
  103. With ____, two hard drives are configured as a single volume.
  104. When using an 80-conductor cable-select cable, the drive nearest the motherboard is the ____.

  105. A technology that configures two or more hard drives to work together as an array of drives is called ____.

  106. During the ____ formatting process, you specify the size of the partition and what file system it will use.
  107. ____ on a circuit board inside the drive housing is responsible for writing and reading data to these tracks and sectors and for keeping track of where everything is stored on the drive.
  108. ____ is a system BIOS feature that monitors hard drive performance, disk spin up time, temperature, distance between the head and the disk, and other mechanical activities of the drive in order to predict when the drive is likely to fail.
  109. If you are mounting a hard drive into a bay that is too large, a ____ kit can help you securely fit the drive into the bay.
    universal bay

  110. A ____ drive has one, two, or more platters, or disks, that stack together and spin in unison inside a sealed metal housing that contains firmware to control reading and writing data to the drive and to communicate with the motherboard.

    magnetic hard
  111. A drive ____ is a duplication of everything written to a hard drive.
  112. ____ transfers data directly from the drive to memory without involving the CPU.

  113. With ____, you can connect and disconnect a drive while the system is running.

  114. The total number of ____ on the drive determines the drive capacity.
  115. The ATA interface standards are developed by Technical Committee T13 and published by
  116. External ____ is up to six times faster than USB or FireWire.
  117. ____ is a standard for communication between a subsystem of peripheral devices and the system bus.
  118. Windows Vista technology that supports a hybrid drive is called ____.
  119. The top and bottom of each disk of a magnetic hard drive have a(n) ____ that moves across the disk surface as all the disks rotate on a spindle.
    read/write head
  120. Chips sometimes loosen because of temperature changes; this condition is called ____.
    chip creep
  121. IEEE 1394 uses ____ data transfer, meaning that data is transferred continuously without breaks.
  122. Devices and their device drivers are managed using ____.
    Device Manager
  123. If you are trained to open a monitor case to replace a fuse, unplug the monitor and wait at least ____ minutes before opening the case so that capacitors have completely discharged.
  124. Problems with a device can sometimes be solved by updating the ____ or firmware.
    Device Driver
  125. A ____ device is an input device that inputs biological data about a person, which can be input data to identify a person’s fingerprints, handprints, face, voice, eye, and handwritten signature.
  126. ____ systems and peripherals have the U.S. Green Star, indicating that they satisfy certain energy-conserving standards of the U.S. Environmental Protection Agency (EPA).
    Energy Star
  127. To protect the data on a USB storage device while removing it, double-click the ____ icon in the notification area before removing the device.
    Safely Remove Hardware
  128. Ports on the motherboard can be disabled or enabled in ____ setup
  129. ____ supports speeds up to 400 Mbps and is sometimes called FireWire 400.
    IEEE 1394a
  130. ____ can use cables up to 100 meters (328 feet), and uses a 9-pin rectangular connector.
  131. If you have an available eSATA external port, you can use a protective hard drive ____ that will house and protect a hard drive outside the computer case.
  132. A(n) ____ monitor (also called a progressive monitor) draws the entire screen in one pass.
  133. A ____ plug is a tool used to test a serial, parallel, USB, network, or other port.
  134. A serial port is provided by the motherboard or might be provided by an adapter card called a(n) ____ card.
    I/O controller
  135. FireWire and i.Link are common names for another peripheral bus officially named ____.
    IEEE 1394
  136. BIOS manages ____ lines that are used by a device to hail the CPU asking for data to be processed.

  137. The ____ assignments refer to the system resources a parallel port will use to manage a print job.


  138. A ____ is an input device that uses a monitor or LCD panel as the backdrop for input options.

    touch screen
  139. For laptops, you can adjust the brightness of the display using ____ keys.

  140. A double-sided, double-layer DVD can hold ______ GB of data.

  141. Computers store data digitally and ultimately as a stream of only two numbers: ____.
    • 0 and 1
  142. A video ____ card lets you capture this video input and save it to a file on your hard drive.
  143. For EIDE, there are four choices for drive installations:
    primary master, primary slave, secondary master, and secondary slave
  144. When burning a CD, DVD or BD, the hard drive needs some temporary holding space for the write process and should have at least ____ of free space.
    1 GB

  145. A ____ card can turn your computer into a television

    TV tuner
  146. ____ is a set of standards that are used to represent music in digital form.
  147. ____ drives are a great method of keeping backups of data stored on your hard drive.
    External hard
  148. A ____ provides slots for memory cards and can be an internal or external device.
    media reader
  149. ____ are recessed areas on the surface of an optical disc.
  150. When installing an optical drive, for a PATA interface set the jumper on the ____ of the drive.
  151. If a disc gets stuck in the drive, use the ____ to remove it.
    emergency eject hole
  152. To prevent a CD, DVD, or BD from automatically playing when AutoPlay is enabled, hold down the ____ key when inserting a disc.
  153. n order to read each sector on the spiral of a CD at a constant ____, the disc spins faster when the read-write head is near the center of the disc.
    linear velocity
  154. MP3 sound files have a(n) ____ file extension.
  155. ____ are smooth and level areas on an optical disc.
  156. After the sound is recorded and digitized, many sound cards convert and compress the digitized sound to ____ format.

  157. A CD can hold about ____ of data

    700 MB
  158. ____ is a common compression standard for storing photos.

  159. A single-sided, single-layer DVD can hold ______ GB of data

  160. To keep boot sector viruses at bay, in ____ you can disable the ability to write to the boot sector of the hard drive.
    BIOS setup
  161. As you solve computer problems, always keep in mind that you don’t want to make things worse, so you should use the ____ invasive solution.
  162. To dispose of ____ do physical damage to the device then put in the trash.
    Storage media such as hard drives, CDs, DVDs and BDs
  163. To find out what to do if you are accidentally exposed to a dangerous solution, look on the instructions printed on the can or check out the material ____ sheet.
    safety data
  164. ____ are intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software.
  165. A ____ explains how to properly handle substances such as chemical solvents
    Material Safety Data Sheet

  166. If you want to recover lost data on a hard drive, don’t ____ the drive.

    write anything to
  167. The ____ was designed in part to protect software copyrights by requiring that only legally obtained copies of software be used.
    Federal Copyright Act of 1976
  168. When someone purchases software from a software vendor, that person has only purchased a ____ for the software, which is the right to use it.
  169. The rule ____ is the most powerful.
    divide and conquer
  170. Proper ____ is essential to keeping a system cool.
    air circulation
  171. Dispose of ____ in the regular trash.
    Alkaline batteries, including AAA, AA, A, C, D, and 9-volt
  172. User manuals and ____ for a device or software often list symptoms of problems with possible solutions and troubleshooting tips.
    installation manuals
  173. ____, caused by lifting heavy objects, is one of the most common injuries that happen at work
    Back injury
  174. Most CRT monitors today are designed to discharge after sitting unplugged for ____ minutes.
    60 minutes
  175. Good ____ helps you take what you learned into the next troubleshooting situation, train others, develop effective preventive maintenance plans, and satisfy any audits or customer or employer queries about your work.
  176. ____ from cigarettes can accumulate on fans, causing them to jam, which in turn will cause the system to overheat
  177. Dispose of ____ by returning them to the original dealer or by taking them to a recycling center.
    Button batteries used in digital cameras
  178. Good ____ help(s) you think more clearly.
  179. The right to copy the work, called a ____, belongs to the creator of the work or others to whom the creator transfers this right.
  180. The ____ command creates a subdirectory under a directory.
  181. When a hard drive is first sensed by Windows, it is assigned the ____ disk status.
  182. The ____ command is used to copy the information from the old computer to a server or removable media.
  183. To make sure the drive is healthy, you need to search for and repair file system errors using the Windows ____ utility.
  184. A Windows domain is a type of ____ network, which is a network where resources are managed by a centralized computer.
  185. Besides backing up user data or system files, you can also back up the entire hard drive using Windows Vista ____.
    Complete PC Backup
  186. When you back up the system state, the registry is also backed up to the folder ____.
  187. To convert a FAT32 volume to an NTFS volume, first back up all important data on the drive and then use this command at a command prompt: ____, where D: is the drive to be converted.
    convert D: /FS:NTFS
  188. Upgrading to a better edition of Vista can easily be accomplished by using the ____ feature.
    Windows Anytime Upgrade
  189. If you are having problems with a hard drive, volume, or mounted drive, check ____ for events about the drive that might have been recorded there.
    Event Viewer
  190. A ____ computer is software that simulates the hardware of a physical computer.
  191. A Windows ____ is a logical group of computers and users that share resources, where administration, resources, and security on a workstation are controlled by that workstation.
  192. During a normal Windows XP installation, setup causes the system to reboot ____ times.
  193. ____ creates restore points at regular intervals and just before you install software or hardware.
    System Protection
  194. A(n) ____ server is used to hold the setup files on a Windows CD or DVD on the network and then at each PC, you can execute the Setup program on the server.
  195. A ____ is a copy of the entire volume on which Windows is installed to another bootable media such as CDs or USB drive.
    drive image
  196. The user folder for an account contains a group of subfolders called the user ____.
    profile namespace
  197. A snapshot of the system settings and configuration is called a ____.
    restore point
  198. The Windows utility ____ is used to remove configuration settings, such as the computer name that uniquely identifies the PC.

  199. A dynamic disk requires ____ MB of storage for the disk management database.

  200. After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive.
    SFC, Chkdsk, and Defrag
  201. Use the ____ command to repair the file system and recover data from bad sectors.
    chkdsk C: /r
  202. Use the Windows Vista ____ tool to deal with an immediate hardware or software problem.
    Problem Reports and Solutions
  203. You can use the Windows RE command prompt window to restore registry files using those saved in the ____ folder
  204. The ____ tool can be used to direct information about drivers to a file, including information about digital signatures.
    Driver Query
  205. The key that loads services and drivers can be found in the ____ location.

  206. You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the ____ tool.

    Vista Memory Diagnostics
  207. n the Recovery Console, the command ____ deletes a directory.
  208. For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by
    the computer manufacturer
  209. Use the ____ tool to test memory.
    Memory Diagnostics
  210. For essential hardware devices, use the ____ to verify and replace system files
    System File Checker
  211. When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded.
    Windows kernel
  212. The ____ is used when Windows 2000/XP does not start properly or hangs during the load.
    Recovery Console
  213. During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder.
  214. Press ____ at startup to display the Advanced Boot Options menu.
  215. The Vista Advanced Boot Options menu appears when a user presses ____ as Vista is loading.
  216. The ____ Configuration is updated after you log on normally to Vista
    Last Known Good
  217. The error ____ is caused by a driver or service making an illegal access to memory.

  218. The command ____ searches for and replaces corrupted system files.

    sfc /scannow
  219. Enter the command ____ to see a list of all services currently installed, which includes device drivers.
  220. Apple Computer calls 802.11b ____.

  221. A ____ is a device that manages traffic between two networks.

  222. A ____ is the gateway a computer uses to access another network if it does not have a better option.
    default gateway
  223. ____ is a standard for short-range wireless communication and data synchronization between devices.
  224. If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network.
  225. Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ____ clamp attached.
  226. When a Remote ____ session is opened, all local users are logged off.
  227. When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____.
    VoIP provider
  228. Networking happens in ____.

  229. A ____ IP address is assigned for the current connection only.

  230. ____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN.
  231. Remote ____ can help you support users and their computers from a distance.
  232. To connect to the Internet, a network first connects to an ____.
    Internet Service Provider
  233. To find out what your DNS server knows about the domain name, use the ____ command.
  234. The ____ for a cellular network is a fixed transceiver and antenna.
    base station
  235. The ____ command can display TCP/IP configuration information and refresh the IP address.
  236. A(n) ____ is a group of four dotted decimal numbers such as that tells TCP/IP if a computer’s IP address is on the same or a different network.
    subnet mask
  237. Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet.
  238. The solution for securing private data traveling over a public network is a ____.
    virtual private network
  239. The command to flush the DNS cache kept on the computer is ____.
    ipconfig /flushdns

  240. A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.


  241. ____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.

  242. Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password
  243. A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
  244. A $ at the end of the folder name creates a(n) ____ share.
  245. The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.

  246. A network ____ map is one of the most powerful and versatile methods of communicating over a network.

  247. You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or ____.
    Network Service
  248. A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

  249. A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.


  250. A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

  251. The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
    ISO 17799 and ISO 27002

  252. A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.

    digital certificate
  253. Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
  254. ____ is any annoying and unwanted program that might or might not mean you harm.
  255. To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
    Effective Permissions
  256. The term ____ applies to a kit or set of tools used originally on UNIX computers.
  257. Certificates are managed using the ____ console.
    Certificate Manager
  258. If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.
  259. The best way to change inherited permissions is to change the permissions of the ____.
    parent object
  260. When you print to the Microsoft XPS Document Writer printer, it creates a(n) ____ file.
  261. Printer ____ is updated by replacing the printer’s DIMM that contains the code or by downloading the update from the manufacturer’s Web site.
  262. Do not use less than ____-LB paper in any type of printer, unless the printer documentation specifically says that a lower weight is satisfactory.

  263. Check ____ for recorded events that have to do with the printer or the port it is using.

    Event Viewer
  264. A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology called ____.
  265. A ____ printer connects directly to a computer by way of a USB port, parallel port, serial port, wireless connection (Bluetooth, infrared, or Wi-Fi), IEEE 1394 (FireWire) port, SCSI port, PC Card, or ExpressCard connection.

  266. Automatically printing on both sides of the page is called ____ printing.


  267. In a laser printer, the fuser should last for about ____ pages

  268. ___ printers work by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning.
  269. Manufacturers of high-end printers provide ____ kits, which include specific printer components, step-by-step instructions for performing maintenance, and any special tools or equipment you need to do maintenance.
    printer maintenance

  270. A dedicated device or computer called a print ____ can control several printers connected to a network


  271. A printer ____ page generally prints some text, some graphics, and some information about the printer, such as the printer resolution and how much memory is installed.

  272. A(n) ____ printer uses solid dyes embedded on different transparent films.
  273. ____ is a language used to communicate how a page is to print and was developed by Adobe Systems.

  274. Correct

    ____ printers tend to smudge on inexpensive paper, and they are slower than laser printers.

  275. Several print jobs can accumulate in the queue, which you can view in the Vista Printers window or the XP Printers and Faxes window in a process called ____.

  276. ____ printers use wax-based ink that is heated by heat pins that melt the ink onto paper. The print head containing these heat pins is as wide as the paper.

  277. To know the IP address of a network printer, direct the printer to print a ____ page.
  278. To find out how many pages a printer has printed so that you know if you need to do the maintenance, you need to have the printer give you the ____ count since the last maintenance.
  279. When cleaning a printer, to prevent the inkjet nozzles from drying out, don’t leave the ink cartridges out of their cradle for longer than ____ minutes.