Do you have a question about the Ricoh Aficio MP 4001 and is the answer not in the manual?
power source | 120V/60Hz/12A |
---|---|
warm-up time | 22 seconds |
recovery time | 10 seconds (from Auto Off) |
system memory | 768 MB RAM (std./max.) |
---|---|
hard disk drive | 40 GB Standard |
copy resolution | 600 x 600 dpi |
print speed | 40 ppm |
---|---|
cpu | RM7035C-533 MHz |
print resolution | Up to 600 dpi |
scanning speed BW | 61 ipm (@200 dpi) |
---|---|
scanning resolution | Up to 600 dpi |
scan area | Up to 11"x 17" |
weight | 213.8 lbs. |
---|---|
dimensions | 26.4" (W) x 35.8" (H) x 26.6" (D) |
power source | 120V/60Hz/12A |
---|---|
warm-up time | 22 seconds |
recovery time | 10 seconds (from Auto Off) |
system memory | 768 MB RAM (std./max.) |
---|---|
hard disk drive | 40 GB Standard |
copy resolution | 600 x 600 dpi |
print speed | 50 ppm |
---|---|
cpu | RM7035C-533 MHz |
print resolution | Up to 600 dpi |
scanning speed BW | 61 ipm (@200 dpi) |
---|---|
scanning resolution | Up to 600 dpi |
scan area | Up to 11"x 17" |
weight | 213.8 lbs. |
---|---|
dimensions | 26.4" (W) x 35.8" (H) x 26.6" (D) |
Identifies the Security Target document: title, version, date, and author.
Lists specific product names, software/hardware versions, and FCU names constituting the TOE.
Defines TOE type, usage, major security features, and operational environment.
Details physical boundaries, guidance, user roles, logical boundaries, and protected assets.
Describes roles like administrators, supervisors, and general users for TOE operation.
Identifies threats, organisational policies, and assumptions related to TOE security.
States security goals the TOE must achieve to address threats and policies.
Explains how the security objectives address the defined security problems and assumptions.
Lists specific security functions the TOE must implement to meet its objectives.
Specifies the evaluation assurance level (EAL3) and associated assurance components.
Justifies how the security requirements fulfill the defined security objectives.
Summarizes TOE security functions and their mapping to functional requirements.
Provides definitions for key terms and acronyms used throughout the document.
Lists all external documents referenced within this Security Target.