0% found this document useful (0 votes)
17 views2 pages

Information Sheet 1 Installing Printer, Scanner Drivers: LO5. Configuring and Peripheral Service

The document provides guidance on installing printer and scanner drivers, emphasizing the importance of proper installation and network settings. It also discusses naming conventions for network devices to ensure easy recognition and compliance with standards, as well as the necessity of configuring access and security permissions for peripherals. This ensures efficient use and protection of confidential data while maintaining peripheral functionality.

Uploaded by

keyeron3531
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

Information Sheet 1 Installing Printer, Scanner Drivers: LO5. Configuring and Peripheral Service

The document provides guidance on installing printer and scanner drivers, emphasizing the importance of proper installation and network settings. It also discusses naming conventions for network devices to ensure easy recognition and compliance with standards, as well as the necessity of configuring access and security permissions for peripherals. This ensures efficient use and protection of confidential data while maintaining peripheral functionality.

Uploaded by

keyeron3531
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

LO5.

Configuring and peripheral service


 Information sheet 1 Installing Printer, Scanner Drivers

• Drivers are software that work with the operating system and are supplied with peripheral
hardware.
• Drivers can be updated from the vendor's website if misplaced or upgraded to a new operating
system.
• Installation is typically straightforward and fully automatic, especially with plug-and-play operating systems.
• Network settings may be more complicated but easy to follow.
• For instance, when printing from a workstation to a printer, the printer drivers need to be
installed on the user's workstation.
• Once the peripheral drivers are installed, the user may need to access the peripheral through an
application.
• Non-standard applications may have difficulty accessing the peripheral and drivers, and special
programming requirements may be needed for internally written applications.
Information sheet 2 Naming conventions
• Importance of easy recognition of all network devices and peripherals.
• Use of naming system for hardware, software, and services.
• Compliance with network standards for printer installation and configuration.
• Importance of easy identification of peripherals for efficient use.
• Naming conventions reflect peripheral function and location in large offices or global
enterprises.
• Example: 15-character peripheral name.
Characters
1–4,5–7,8–10,11–15
City or town Type
Of Workplace
Uniqueness of device,
Attributes
Peripheral
Location
Usually number sequence
Reflected
 Information sheet 2 Access and security
 It is not always the case that all users should have access to a peripheral just because it is
made available on the network.
 Permissions can be granted to users or groups after drives are shared.
 Typically, every other peripheral will offer a way to limit access.
 Maintaining peripheral functionality can be facilitated by configuring security access and
permissions.
 For instance, a high-speed, low-quality laser printer might consistently create bills for
thousands of customers or big label runs.
 Letters and papers can be printed by a laser printer at a slower pace but better quality. This
makes use of both benefits without putting the slower machine under unnecessary strain.
Confidential data or activities can also be protected by establishing security access and
permissions.

You might also like