Solved

Canon i960 has 80KB; HP 7760 has 16MB.  Can there be that much of a difference???

Posted on 2004-08-28
4
200 Views
Last Modified: 2010-04-26
The difference in RAM is staggarring.  Am I missing something?  Thanks!!
0
Comment
Question by:KingDumbNo
  • 2
  • 2
4 Comments
 
LVL 69

Accepted Solution

by:
Callandor earned 500 total points
ID: 11924120
I would not base a decision solely on memory.  Picture quality is very important, and the Canon is pretty fast, too.  It also has those six separate color reservoirs, and one of the smallest droplet sizes: 2 picoliter.

A review of the Canon: http://www.steves-digicams.com/2003_reviews/canon_i960.html
4800x1200 dpi is nothing to sneeze at.

The HP7960 is reviewed at the same site: http://www.steves-digicams.com/2003_reviews/hp7960.html
It also produces nice images.
0
 
LVL 6

Author Comment

by:KingDumbNo
ID: 11928277
I understand Canon i960 is one of the fastest on the market, but I just don't understand the 1/2 percent memory verses the HP model.

There are a lot of good reviews on the Canon i960, plus I very much like the six separate color cartridges.  I'm getting the i960.  The one reservation that I will hold onto is that the HP model has a better rating for B&W, of which I am kind of fond.

Thanks for the reply, Callandor.  I'm leaving this open for a couple days, hoping for a personal experience response.
0
 
LVL 6

Author Comment

by:KingDumbNo
ID: 11944911
Thanks Callandor.  Wish I could have received more input from others.  I may resubmit the question worded a little differently.  If you recognize it as my question, please don't post so others will see that it has not been attempted an answer.  Thanks.
0
 
LVL 69

Expert Comment

by:Callandor
ID: 11948510
Ok, will do.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question