Well, my dear classmates lixud jud di ang blogger but then enjoy xa ryt?.. kuha niyo?

Sabado, Setyembre 10, 2011

hum-final


The Memoir of a Beautiful Yesterday

“A thing of beauty is joy forever. Its loveliness increases; it will never pass into nothingness”. Behind the financial crises and incapabilities that life faced we still live, not as we wish to, but as we can. Not the fact that we love to travel but it’s the memoir that we created as we travel along our different journey. September 03, 2011 was my most tiresome day and night. It was the day of our educational trip to Davao city. Whereas, our experiences where enrich by exposing us to situations that are new to us. Young minds were constantly exposed into travels to boost and uplift our intellectual base and worldview. We are being free of our curiosity as we’ve travelled along our way.  Upon seeing the big establishments, we felt free for a while free as if there were no boundaries. Memory is a way of holding on to the things you love, the things you are, and the things you never want to lose.
As the bus started to bustle, the excitement was all outbursts. Yet, before this excitement was totally exploded we first take a moment of silence to ask God for his mercy. “Yehey, mangadto najud tah sa wakas”, my classmate said. We know that, on that day we will create a momentous event in our lives. Laughs and yells echoed in and outside the bus as the journey begun. “o davao.. davao.. davao..”, Gapa shouted. The noise of my classmates awaked our spirits. It helped us to become more alive. After travelling one and a half hour we finally arrived at Museo Dabawenyo. In this place we garner knowledge about many things. Such as, the Mibuyan or the mythical deity of fertility and of the unborn in which it catches my attention. There was also a trivia that this Museo was started to form in the year 2006 and opened last 2008. Furthermore, we’ve been informed about the 9 tribes of Davao namely: Tagabawa, Guingan, Manobo, Maranao, Sama,Tansag, Kalagan, and the Maguindanao.The seven icons of Davao were the Mt. Apo, Waling2, Durian, Boy sunset, Morning glory, Floral float parade and the Philippine Eagle. However, the thing that I most cherished in that place was when I saw a handsome guy which we’ve take a photo.  We felt too much “kilig” yet, upon leaving we hardly accept that it’s just a dream to have him. Nevertheless, “baon namin ang napakagandang alaala sa kanya” that we won’t forget.
After 60 minutes of relaxing in the NCCC mall we finally feed our hungry stomach at Kuya Eds “eat all you can” restaurant. Take some photo for a while to make it a souvenir. PoncĂ© Suite Hotel was our next destination. It was definitely a terrific place. There we’ve learned that recycled materials were very important. If we treat no waste at all it will result into a great art. Certainly, that was Kublai the owner of the hotel did. Art was his life and all that he made was the history of his life.
It’s a kind of losing energy, yet we must go through to our next destination- to Abreeza Mall and then to SM. Definitely we have lots of reminiscing experience. It’s totally great to have it all. We won't forget that memoir of our beautiful yesterday.”EXPLORE, DISCOVER, LEARN and ENJOY life.



Martes, Agosto 9, 2011

Quiz 9 - Computer Security and Safety, Ethics, and Privacy

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist. 

Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators:

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 

Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.

Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 

Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.

Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism



2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots. 


A computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. 
A worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
A Trojan horse is a program that hides within or looks like a legitimate program. 
A root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer. 
To take precautions against this malware:
1. Do not start a computer with removable media in the drives or ports. 
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source. 
4. Install an antivirus program and a personal firewall. 
5. Stay informed about any new virus alert or virus hoax. 
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.


3. Discuss techniques to prevent unauthorized computer access and use

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or illegal activities. Organizations can take measures such as implementing a written acceptable use policy (AUP), a firewall, intrusion detection software, an access control, and an audit trail. Access controls include a user name and password or passphrase, a CAPTCHA, a possessed object, and a biometric device.

4. Identify safeguards against hardware theft and vandalism 

Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.


5. Explain the ways software manufacturers protect against software piracy. 


Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.


6. Discuss how encryption works, and explain why it is necessary 


Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.


7. Discuss the types of devices available that protect computers from
system failure
A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.


8. Explain the options available for backing up computer resources. 


A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.


9. Identify risks and safeguards associated with wireless communications. 
Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.


10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.
11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing. 



Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.


Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following. 
An electronic profile combines data about an individual's Web use with data from public sources, which then is sold. 
A cookie is a file that a Web server stores on a computer to collect data about the user. 
Spyware is a program placed on a computer that secretly collects information about the user.
Adware is a program that displays an online advertisement in a banner or pop-up window. 
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. 
Phishing is a scam in which a perpetrator attempts to obtain personal or financial information. 
The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web. 

Lunes, Agosto 8, 2011

Quiz 8 - Database Management

1. Define the term, database, and explain how a database interacts with data
and information.
  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports processes requiring this information (for example, finding a hotel with vacancies).2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.

   - Adding records is simply putting information that is needed.
   -Modifying records is to change somewhat the form or qualities
   -Deleting records is the deduction or emission of some words or things that doesn’t merely      give importance in the thought.

If you are validating form data, the techniques you use can vary depending on whether you are using HTML, Flash, or XML forms; for example, different form types have different validation limitations.
3. Discuss the terms character, field, record, and file

A distinctive mark, letter, number or symbol
A field is a named unit of information
A record is a row of data in a database table consisting of a single value from each column of data in the table. The data in the columns in a table are all of the same type of data, whereas the rows represent a given instance.A file is lots of fields or information crammed together
A file tells you lots of information that you need

4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.


Data dictionary –is very important in the database management systems because through it we can easily find references and of course the info that we want.
File retrieves and maintenance -will help to retrieve our files.
Data security -will help us to secure our files, and this will protect our files from the other users.
Back up and recovery- in case our file was deleted or lost we can recover it.


5. Differentiate between a file processing approach and the database
approach.


A database co-ordinate the physical and logical access to data while a file - processing system only co-ordinates physical access to the data




6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
An object-relational database (ORD), or object-relational database management system (ORDBMS), is a database management system (DBMS) similar to a relational database, but with an object-oriented database model: objects, classes and inheritance are directly supported in database schemas and in the query language. Multidimensional structure is defined as “a variation of the relational model that uses multidimensional structures to organize data and express the relationships between data”. The structure is broken into cubes and the cubes are able to store and access data within the confines of each cube
7. Explain how to access Web databases.

Using the Microsoft Visual Web Developer Web development tool, you can create Web pages that work with data from a variety of sources, including databases, XML files, and business objects. This walkthrough shows you how to work with data in a Microsoft Access database. Access databases do not have the same capacity and are not as scalable as other types of databases, such as Microsoft SQL Server. Generally, if you are creating a Web site that will support only light traffic or a limited number of users, an Access database is sufficient. However, if the Web site will support more throughput or a larger number of users, you should consider using SQL Server or another database that is suited for production Web sites.




8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses, cyberextortionist, and cyberterrorist.

Computer security is a branch of computer technology known as Information Security as applied to computers and networks.

Types of perpetrators:

A hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.


Cracker, sometimes white cracker, is a pejorative term for white people.
Script kiddie or skiddie, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks and deface websites
Computer Spies are interested in information, not just computers
Cyberextortionist are criminals increasingly using a method known as Distributed Denial of Service (DDOS) attacks.
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses


9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.
While designing a relational database, it is a good idea to distribute the information in multiple tables. It is not advisable to store all the information in a single table, although it is easier to design. When your database grows in size, the efficiency decreases accordingly, For example, if you are planning to make a simple database of your employees, then you can divide the employees’ information in 3 tables. In one table you can store the contact info, in second you can store the salary and department details and in third table you can store the bonus history of the employees

10. Discuss techniques to prevent unauthorized computer access and use

Through Operating system and software patches and updates, Passwords, Get a hardware or software firewall, Get a hardware or software firewall, Get a hardware or software firewall, Get a hardware or software firewall and Get a hardware or software firewall.

Linggo, Hulyo 24, 2011


QUIZ 7
1. Discuss the components required for successful communications.

Sender, beneficiary, and a atmosphere. That's in the order of the most chief definition of the components of computer network.

2. Identify various sending and receiving devices.
Sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.
·        Microcomputers
·        Minicomputers
·        Mainframes
·        Internet appliances and web enabled handheld computers

3. Describe uses of computer communications.
Computer-mediated communication (CMC) is defined as any communicative transaction that occurs through the use of two or more networked computers.While the term has traditionally referred to those communications that occur via computer-mediated formats (e.g., instant messages, e-mails, chat rooms), it has also been applied to other forms of text-based interaction such as text messaging. Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software.

 4. List advantages of using a network.
-share software
-share information with others on networks
-share peripherals
-speed of sharing software and information files
-cheaper than buying individual software and hardware for each standalone especially -if for a school, network software often offers deals for amount being purchased
-security, files can be copy inhibit mode
-centralized software management- software being loaded onto one computer but also -this loads software to entire network at one time
-electronic mail(e-mail) between network users, ideal for office memos
-flexible access- access you files from any computer on the network unlike standalone -which would mean only being able to access your data from the one computer youuploaded data onto


 5. Differentiate among client/server, peer-to-peer, and P2P networks.

Client/server-describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.
Peer-to-peer (P2P)-computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.



6. Describe the various network communications standards.
Networks may be classified according to a wide variety of characteristics such as medium used to transport the data, communications protocol used, scale, topology, organizational scope.

7. Explain the purpose of communications software.
Communication software is used to provide remote access to systems and is also used to exchange messages in text, audio and video format for the purpose of communication.

8. Describe various types of lines for communications over the telephone network.
Telex, Fax and dial-up Internet communication.

9. Describe commonly used communications devices.
Radios are communication systems that send and/or receive electromagnetic waves and consist of a transmitter, receiver, and antenna. Pagers are electronic communications devices that are used to notify or alert a user. Other types of communication devices include navigation systems, such as global positioning systems (GPS) instruments and radar systemsGPS communication devices receive satellite communications and use it to provide position information. Radar communication devices use synchronized transmitters and receivers to send radio waves and detect their reflections from objects, surfaces and sub-surface structures.

10. Discuss different ways to set up a home network.
Home Network Overview


11. Identify various physical and wireless transmission media.
Transmission media - Enables computers to send and receive signals to one another





Miyerkules, Hulyo 20, 2011

Quiz 6

1. Define system software and identify the two types of system software.

System software is computer software designed to operate the computer hardware and to provide a platform for running application software.

Types of system software programs

 Operating system

Computer system.


2. Briefly describe various server operating systems: Windows Server, Linux, Solaris, and NetWare.

Windows Server is a brand name for a group of server operating systems released by Microsoft Corporation. All are part of Microsoft Servers.

Linux refers to the family of Unix-like computer operating systems using the Linux kernel.
Solaris is a Unix operating system originally developed by Sun Microsystems.
Oracle Solaris, as it is now known, has been owned by Oracle Corporation since Oracle's acquisition of Sun in January 2010
NetWare is a network operating system ,initially used cooperative multitasking to run various services on a personal computer, with network protocols based on the archetypal Xerox Network Systems stack.

3. Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.
Microsoft Windows CE  is an operating system developed by Microsoft for embedded systems. Windows CE is a distinct operating system and kernel, rather than a trimmed-down version of desktop Windows.
Windows Mobile is a mobile operating system developed by Microsoft that was used in smartphones and mobile devices, but by 2011 was rarely supplied on new phones.
Palm OS (also known as Garnet OS) is a mobile operating system initially designed for ease of use with a touchscreen-based graphical user interface smartphones.
iPhone it has since been extended to support other Apple devices such as the iPod touch, iPad and Apple TV.
BlackBerry is a line of mobile e-mail and smartphone devices developed and designed by Research In Motion (RIM).
Android is a software stack for mobile devices that includes an operating system, middleware and key applications.
 Embedded Linux is the use of Linux in embedded computer systems such as mobile phones, personal digital assistants, media players, set-top boxes, and other consumer electronics devices, networking equipment, machine control, industrial automation, navigation equipment and medical instruments.
Symbian is a mobile operating system (OS) and computing platform designed for smartphones and currently maintained by Nokia.

4. Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup and restore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.
A file manager or file browser is a computer program that provides a user interface to work with file systems.
A web search engine is designed to search for information on the World Wide Web and FTP servers.
An image viewer or image browser is a computer program that can display stored graphical image; it can often handle various graphics file formats.
An uninstaller, also called a deinstaller, is a utility software designed to remove other software or parts of it from a computer. It is the opposite of an installer.
Disk Cleanup is a computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive.
defragmentation is a process that reduces the amount of fragmentation in file systems it does by physically organizing the contents of the mass storage device to store files in a contiguous region if possible, or in the smallest possible number of regions (fragments) if not.
 backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.
A screensaver is a type of computer program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors by blanking the screen or filling it with moving images or patterns when the computer is not in use.
A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware.
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge.
data compression, source coding or bit-rate reduction is the process of encoding information using fewer bits than the original representation would use.
Content-control software, also known as censorware or web filtering software is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web.
Media player is a term typically used to describe computer software for playing back multimedia files.
Optical disc authoring is the process of assembling source material—video, audio or other data—into the proper logical volume format to then be recorded ("burned") onto an optical disc (typically a compact disc or DVD).
Computer maintenance is the practice of keeping computers in a good state of repair.













Lunes, Hulyo 18, 2011

Quiz 5

Quiz 5

1. Differentiate between storage devices and storage media.
Storage device refers to the apparatus for recording computer data. Examples are the RAM, floppy drives, ZIP drives, and other disks drives. While, storage media are the materials on which data are written and stored. Examples are the floppy disks, optical discs, hard disks, etc.

2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.
Duct tape, or duck tape, is cloth- or scrim-backed pressure sensitive tape often sealed with polyethylene. It is very similar to gaffer tape but differs in that gaffer tape was designed to be cleanly removed, while duct tape is not.
magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by physical contact and swiping past a magnetic reading head.
smart cardchip card, or integrated circuit card (ICC), is any pocket-sized card with embedded integrated circuits.

3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.

solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data with the intention of providing access in the same manner of a traditional block i/o hard disk drive.
memory card or flash card is an electronic flash memory data storage device used for storing digital information.
USB (Universal Serial Bus) is an industry standard developed in the mid-1990s that defines the cables, connectors and protocols used for connection, communication and power supply between computers and electronic devices.
USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface.


4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.
Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CD-RW).
Picture CD is a product by Kodak, following on from the earlier Photo CD product. It holds photos from a single roll of color film, stored at 1024×1536 resolution using JPEG compression.
DVD is an optical disc storage media format, invented and developed by PhilipsSonyToshiba, and Panasonic in 1995. DVDs offer higher storage capacity than compact discs while having the same dimensions.
Blu-ray Disc (official abbreviation BD) is an optical disc storage medium designed to supersede the DVD format.

5. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers
An inkjet printer is a type of computer printer that creates a digital image by propelling droplets of ink onto paper.
A laser printer is a common type of computer printer that rapidly produces high quality text and graphics on plain paper.
An MFP (Multi Function Product/ Printer/ Peripheral), multifunctional, all-in-one (AIO), or Multifunction Device (MFD), is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or
small business setting or to provide centralized document management/distribution/production in a large-office setting.

Function
Having a photo printer is great, but if you need more than just plain pictures from your printer, there are full size photo printers, and even all in ones. If you only need photos, an ordinary photo inkjet printer is fine. But if you need more than just that, you should look for a photo printer with more functions like scanning, copying, and faxing.

Portability
Some photographers and photography enthusiasts love producing printed photos right on the spot.
Borderless printing
Most photos are printed without borders, and to get the same effect, most photo printers offer borderless printing.

Connectivity- PictBridge camera compatibility and memory card slots are very useful when it comes to printing photos, especially without using a computer.
Price-Everything you buy needs to have a budget. There are hundreds of different models of photo printers on the market, so you’ll definitely find one that meets both your needs and your budget allocations.
Conclusion
These seven simple but very helpful tips will definitely help you find that perfect photo printer that you’re looking for. Just keep this list handy while you’re shopping or browsing the web, and you’ll be astounded by the many models that match all your photo printing needs.
 printer is a peripheral which produces a text and/or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies.
A thermal printer (or direct thermal printer) produces a printed image by selectively heating coated thermochromic paper, or thermal paper as it is commonly known, when the paper passes over the thermal print head. The coating turns black in the areas where it is heated, producing an image.
A postage meter is a mechanical device used to create and apply physical evidence of postage (or franking) to mailed matter.
Mobile Imaging and Printing Consortium is a non-profit industry association formed to promote the usage of mobile devices with digital cameras, particularly camera phones, and the printing of photographs taken with them.
A plotter is a computer printing device for printing vector graphics. In the past, plotters were widely used in applications such as computer-aided design, though they have generally been replaced with wide-format conventional printers, and it is now commonplace to refer to such wide-format printers as "plotters," even though they technically aren't.
Wide-format printers (contrast to vector-rendering "plotters") are generally accepted to be any printer with a print width between 17" and 100". Printers over the 100" mark may be called Super-Wide or Grand format.