Glossary, Twain, Unc path – Dell B1265dnf Mono Laser Printer MFP User Manual

Page 229: Watermark

Advertising
background image

Glossary

229

Glossary

TWAIN

An industry standard for scanners and software. By using a TWAIN-compliant

scanner with a TWAIN-compliant program, a scan can be initiated from within

the program. It is an image capture API for Microsoft Windows and Apple

Macintosh operating systems.

UNC Path

Uniform Naming Convention (UNC) is a standard way to access network shares

in Window NT and other Microsoft products. The format of a UNC path is:

\\<servername>\<sharename>\<Additional directory>

URL

Uniform Resource Locator (URL) is the global address of documents and

resources on the Internet. The first part of the address indicates what protocol to

use, the second part specifies the IP address or the domain name where the

resource is located.

USB

Universal Serial Bus (USB) is a standard that was developed by the USB

Implementers Forum, Inc., to connect computers and peripherals. Unlike the

parallel port, USB is designed to concurrently connect a single computer USB

port to multiple peripherals.

Watermark

A watermark is a recognizable image or pattern in paper that appears lighter

when viewed by transmitted light. Watermarks were first introduced in Bologna,

Italy in 1282; they have been used by papermakers to identify their product, and

also on postage stamps, currency, and other government documents to

discourage counterfeiting.

WEP

Wired Equivalent Privacy (WEP) is a security protocol specified in IEEE 802.11 to

provide the same level of security as that of a wired LAN. WEP provides security

by encrypting data over radio so that it is protected as it is transmitted from one

end point to another.

WIA

Windows Imaging Architecture (WIA) is an imaging architecture that is originally

introduced in Windows Me and Windows XP. A scan can be initiated from within

these operating systems by using a WIA-compliant scanner.

WPA

Wi-Fi Protected Access (WPA) is a class of systems to secure wireless (Wi-Fi)

computer networks, which was created to improve upon the security features of

WEP.

Advertising