Preview

221 - Use office equipment

Powerful Essays
Open Document
Open Document
2807 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
221 - Use office equipment
221 - Use office equipment

There are many different variations of equipment in my work area. One of these include the fax machine, this is mainly used for sending documents instantly to another fax machine through a standard telephone line. Most fax machines can also be used to make copies of documents and some can also be used as a computer, printer and scanner. Within my office the other types of office equipment are, telephone, printer, computer, laminator and photocopier.

The features of the fax machine include speed; fax machines can transit a documents data at various rates of speed. This ranges from 4,800 bps to 28,800 bps. It takes a 9,600 bps machine about 10 to 20 seconds to send one page. It also includes a printer. Early fax machines generally used direct thermal printers, but over the past ten years inkjet printers have also become popular. Colour fax machines can only transmit to machines that are made by the same manufacturer. If the fax machine uses rolls of thermal paper it should come with a paper cutter. Most models come with some form of paper feed so you can transmit multiple page documents without having to feed each page into the machine one by one. Also most fax machines come with a wide variety of dialling features. Some of them let you send the fax at a specific time of the day when the telephone rates are lower. There are many other time saving and easy to use features on fax machines such as redialling, caller ID, speed dial, contrast settings, distinctive ringing, fax forwarding, size reduction and resolution settings. I just use this to fax patient’s information to their local doctors and just do a copy of something that doesn’t need to be copied by a big industrial photocopier.

The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access

You May Also Find These Documents Helpful

  • Good Essays

    Hsm/220 Week 3

    • 491 Words
    • 2 Pages

    • Equipment/Supplies: include office supplies, postage, copier supplies, telephone, fax, computer supplies, equipment repair and maintenance, laboratory consumables, etc.…

    • 491 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, each workstation, whether desktop or laptop, must have antivirus and malware protection installed on them. Laptops are vulnerable to loss and theft, so laptops should have an encrypted hard drive so that if stolen, the data contained on them is not compromised.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    First and foremost all files need to be encrypted and password protected. The Playstation Network was taken down easily because routers were left unprotected and the data belonging to users was not encrypted. Everything needs to be locked down digitally. Riordan conducts business in many places and hackers are everywhere. Finance and accounting use outdated systems and manually enter information. Integration of the systems through a secure pipeline will decrease the security risks but the files still need to be encrypted to secure ensure that all security holes are no longer open.…

    • 893 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A printer produces a hard copy fired Fraud gets you this An operating-system tells the computer what to do Reboot before you call help desk A fax might become obsolete A network allows sharing between computers EHR Electronic health record HITECH Grant money that paid for this class Answer key (not in order)…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    There are many different types of equipment I use within the office some of which are computers, telephones, printers , scanners etc.…

    • 1920 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Mia Casa Network

    • 294 Words
    • 2 Pages

    Securing individual machines can be done with firewalled routers which protect an entire network. Individual machines therefore could use software firewalls and/or install the secure browser. Administrators can also configure firewalls to stop certain traffic that does not meet specifications. Cleaning the machines by removing un-needed programs and software, and not knowing administrators credentials is a plus.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Com 140 Exercise 13

    • 326 Words
    • 2 Pages

    3. Now computers and fax machines make working at home a possibility, these machines connect workers to the company offices.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In my business, I require email, text, telephone and fax on a day to day basis. In order for my company to reach me and for me to complete transactions, I need these tools. So the role that they play is a very important one, because I would not be able to get my business transactions completed without any one of them.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Usability Plan

    • 2428 Words
    • 10 Pages

    This information was developed by Usability & Technical Documentation, Xerox Corporation, and was compiled for the UPA Conference, July 1995 Page 1…

    • 2428 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    How a Fax Machine Works

    • 747 Words
    • 3 Pages

    It is very typical and practical in an office to have a fax machine. Every time you walk in to an office, you may see one of these machines but have you ever wondered how they work? Have you ever thought, how can a machine transfer information from one phone to another without really sending the original document? Some people might think it’s magic but it is actually not. It is science in use, technology. All of this may sound to high-tech but the first fax machine was actually invented in 1843 by Alexander Bain. Know how they work in the following paragraphs.…

    • 747 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Business Plan

    • 724 Words
    • 3 Pages

    The office equipment needed First are computers for recording, keeping and back-up of files and records. Second Telephones and Faxes for communication with the clients. Third are printers for printing of records and files. Fourth are photocopying machines for copying of files and lastly are air cons to make people comfortable.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    global security policy

    • 411 Words
    • 1 Page

    One of the issues that companies face today is making sure that the data on the computers are secured. This come to be more and more challenging that companies face when having offices in multiple locations. One of the greatest challenges to keep data secured is to utter size the information you store and carry. Most of these companies carry the history of the company, contacts, and the current documents of the company on their laptops or on their mobile devices, but little do they know that information that is kept on laptops and mobile devices it can be stolen or copied. Maintaining a secured environment can be hard work. One would have to change passwords, habits, and the software that is being used on the main computer or device. The only scenario that the company would run into is constantly thinking about if the company is leaking confidential information or using unsafe practices. On the other hand one might require you to continue unsafe digital security practices even after one have been explained the harmful things it can cause. Let’s just say one of your work colleagues might want you to continue to open email attachments from them, knowing that attackers can get into it and send malware. One of the things that you could do is put all valuable data and communication on a more secured computer, but only use the machine when you need to. Doing that it will limit the threats or the malware that may cause your or ones computer to shut down.…

    • 411 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Patient Information System

    • 2170 Words
    • 9 Pages

    We people can not deny that computers make our work easy at less time compared to manual processing using papers and pen. Imagine office without a single unit of computer? Retrieving information can give you how many hours to find and how can office protect their files in dust, fire, leaking ceiling or even termites. Store files in a volt without back up? What if you accidentally lost it? That’s why commercialized computerized system is being developed at the present time.…

    • 2170 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    information systems

    • 370 Words
    • 2 Pages

    2. Technology systems used: voice mail, fax, videoconferencing and electronic data interchange. 3. Hardware systems used: computers, Internet access, video cameras, speakers, microphones, scanners and fax machines.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays

Related Topics