Reprographic methods for information distribution, Computer Engineering

Assignment Help:

Reprographic Methods

i) Thermography

ii) Dyeline

jii) Microfiche

iv) Fax

In this unit you have learnt that:

Used for

Methods of reprography are used for the distribution of information. Typewriters are the most commonly used copying machines. They produce written matter on paper in type similar to the printer's type, along with 3 to 4 carbon copies. Standard typewriter, electric typewriter, electronic typewriter and typewriters with special attachments are commonly used.

Duplicating is a process whereby a large number of copies can be obtained from a master copy with the help of a duplicating machine. A duplicating machine is used when the number of copies required is more than the capacity of a typewriter and yet not large enough to justify printing.

Various makes of duplicating machines are available which can produce 200 to 500 legible copies from the same master copy. Some of the important kinds of duplicating machines used are: spirit duplicator, stencil duplicator, offset litho machine.

Thermography is also used for preparing reprographic masters. The choice of method of duplication is made according to the required quality, number of copies and the cost involved.

In present times copying machines are widely popular because they are easy to use, several copies can be obtained within minutes and the original remains intact for further use.

Microfiche can be used for storing large information.

Facsimile or fax is revolutionary for information distribution. The content or illustration on a paper can be transmitted over a telephone line.

 


Related Discussions:- Reprographic methods for information distribution

What is device drivers, A device driver is software interface that manages ...

A device driver is software interface that manages communication with and control of a particular I/O device or type of device. It is task of device driver to convert logical reque

Explain token ring, Explain Token Ring. Token Ring: A token ring is ...

Explain Token Ring. Token Ring: A token ring is a collection of single point -to-point links, which arise from a circle. In a token ring a special bi t pattern, termed as th

State the concept of hierarchy in object oriented, Hierarchy Hierarchy...

Hierarchy Hierarchy is a process of ranking or ordering of abstraction. Hierarchy is decided by the help of 'divide and conquer' principle. Complex objects can be described

Define the object orientation and its analysis, Object Orientation and Anal...

Object Orientation and Analysis An Object is anything that exists within the problem domain that can be recognized by data and/or behaviour. An example of an object is a bike.

What are privileged instructions, What are privileged instructions?  So...

What are privileged instructions?  Some of the machine instructions that might cause harm to a system are designated as privileged instructions. The hardware permits the privil

Array is a pointer to pointer to int, Array is a pointer-to-pointer-to-int:...

Array is a pointer-to-pointer-to-int: at the first level, it points to a block of pointers, one for each row. That first-level pointer is the first one we allocate; it has nrows e

Explain that lost acknowledgement in packet retransmission, Explain that th...

Explain that the lost acknowledgement does not necessarily enforce retransmission of the packet . To guarantee reliable transfer, protocols utilize positive acknowledgement al

How can we send data to external programs, How can we send data to external...

How can we send data to external programs? Using SPA/GPA parameters(SAP memory). Using EXPORT/IMPORT data (ABAP/4 memory)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd