The image above shows the hardware capabilities of a computer using common industry terminology that can be confusing for many people.
The explanations of terminology on this page are very basic and are intended to assist you with understanding my use of technical terms on this site but can be useful in reading other documentation.
If you're looking for a more detailed explanation, try a resource like Wikipedia.
I recommend reading this whole page because much of the terminology is interdependent. By the time you've read the end, all of it should make sense.
The Basic Computer Components
A “computer” includes hardware, an operating system as well as the software that runs on that combination:
- Hardware is the physical components that make up the computer, including the main computer (motherboard, processor, RAM, hard drive, DVD drive, video card, etc.), keyboard, mouse and monitor. It also includes peripherals like the printer, scanner, microphone and speakers. Computer components are defined here.
- Software refers to the programs that run on a computer as well as the Operating System (OS), a special type of software that allows the user to interface with the computer's hardware and programs.
Computers have evolved from the traditional desktop computer (or PC) to laptops, net books, tablets, smart phones and other formats — each running an operating system and software specific to their design.
Computer Systems Evolving
Microsoft's Windows 10 is a mobile-first, cloud-first operating system that has moved away from the traditional desktop that Windows used to be. It now has features like Cortana to compete with Apple's Siri and Google's Assistant.
Computer Systems Interdependent
Computer hardware and software are interdependent — you need newer (and more powerful) hardware to run newer versions of both the operating systems and programs that run on them. You cannot run software on hardware not designed for it, nor on incompatible operating systems.
Count the Bits
Current software and hardware are mostly 64-bit (older systems were 8- 16- and 32-bit). Think of the difference between a two-, four- and eight-lane highway and that will help you to picture the difference in capacity. More on that later.
Computers have become smaller, more compact, more powerful and far more portable. Mobile is becoming so much a part of our lives that there are now more such devices than people on the planet.
Early portable devices required a computer for setup and maintenance, but more recently most are designed to be self-contained via cloud-based storage and wireless printers. That interface is still there, but enhanced.
Windows 10 and current macOS are designed to allow you to move from working with a document on your computer to continue working on that same document with your tablet or phone.
Tablets are portable touch-enabled devices. While not yet as powerful as laptops, they are getting there quickly. Even older devices have enough computing power for generic Web surfing, email and similar tasks.
Wireless technologies like Wi-Fi enabled printers and keyboards can allow many people to replace their computer with a tablet.
Unlike traditional mobile phones, smartphones are powerful Internet-connected devices that can surf the Web, text other devices, read and write documents and spreadsheets, and play games as well as provide telephone services.
Their size makes them extremely portable and newer devices often are as powerful as computers were only a few years ago.
For the most part, software is designed to run on a single operating system although it can be ported (or translated) to run on more than one. Java was a language that was intended to overcome this limitation, but significant vulnerabilities have made this less appealing.
The operating system (sometimes abbreviated as OS) is the main software running on a computer and will dictate a great deal about what hardware will work and what software is available to run on any particular computer or device.
PCs and Laptops
Programming is a valuable skill as well as a fulfilling hobby. The Raspberry Pi, a very basic computer, was developed to reintroduce the challenge of computer programming and experimentation at a very reasonable price ($25) that anyone can afford.
Earlier versions of PCs ran command-line operating systems like DOS which forced people to understand something about programming.
Newer operating systems have been designed to be so user-friendly that it has led to the loss of any real understanding of what is going on in the background for the vast majority of today's users.
Windows still has command-line options using the Command Prompt which differ between Windows versions.
- Command Prompt: What it is and how to use it.
- 10 ways to launch the Command Prompt in Windows
- Windows Commands.
So does Linux.
- 13 Linux network configuration and troubleshooting commands.
- Linux network commands used in network troubleshooting.
Apple has made Swift, a program originating at Stanford University, freely available to develop applications for the Apple operating systems.
Programs generally refers to software applications that can be installed onto a computer, although it can also refer to the utilities that come preinstalled with an operating system like NotePad in Windows.
On mobile devices these are usually referred to as apps (short for applications) downloaded from the device's app store.
Programs Usually Run on Only One Operating System
In most cases a program is designed to run on a single operating system (e.g. it will run on Windows but not on the Mac).
Where there are both Mac and Windows versions you generally have to purchase both the Mac and Windows versions to run them on both systems and the license is seldom transferable between operating systems. One example is the traditional Microsoft Office.
There are exceptions, particularly in software provided online. As people move to having more than one device, solutions like Microsoft's Office 365 allow the user to install the application on more than one device and/or operating system.
Technologies like Java were developed to provide cross-platform compatibility (meaning that software will run on more than one operating system). Unfortunately, the universality of Java combined with security vulnerabilities has led to a recommendation to stop using it.
SaaS (Software as a Service) lets remote servers do the heavy lifting, allowing less powerful devices to handle more difficult computing tasks than they could in the past. Windows 10 and Google's Chromebook are examples of SaaS operating systems, but if you do your taxes online or us Google Docs, you are also using SaaS.
Software is often referred to in generic terms based upon the purpose it fulfills. This avoids the problems with referring to a specific piece of software running on a single operating system when you are speaking in general about a software capability (e.g. word processing) rather than the program itself (e.g. Microsoft Word).
Software falls into different classes such as word processing suites (Microsoft Office and LibreOffice), Internet software (Firefox and Thunderbird), graphics software (Photoshop and Irfanview), utilities (CCleaner and Defraggler) and Security software (security suites like ZoneAlarm).
Moving into the “Cloud”
An emerging trend is storage in the “Cloud” which is the generic term given to any software service located on servers accessed via the Internet. Your ISP's email service is an example of a server in the cloud.
Be Aware of Data Breaches
It is important for you to understand that the Cloud is not as untouchable as it sounds. Many of these services have suffered data breaches and user data has been stolen because the security involved is much less than these companies use for their own data.
Mobile Often Dependant Upon Cloud
The cloud has been an important component in the development of powerful mobile devices.
Cloud-based storage provides interconnectivity to multiple devices wanting to access the same information anywhere.
SaaS is Cloud-based
It has permitted the development programs that run on remote servers rather than on device itself (SaaS). Rather than purchasing and upgrading software on your computer, you pay a company a monthly fee to maintain the program (or are presented with ads to pay for a free service).
Hardware, as noted earlier, is a generic term for the physical aspects of your computer and the devices connected to it (like scanners and printers) as well as the components that make up the computer itself.
32- or 64-bit?
You'll probably run into the terms 32-bit and 64-bit for software (including the operating system) and hardware system requirements.
When referring to 32- or 64-bit software, we are referring to both the operating system as well as the hardware requirements to run that software:
- 64-bit software will only run on a 64-bit operating system installed onto 64-bit hardware.
- Most 32-bit software will run on both 32-bit and 64-bit operating systems.
64-bit operating systems cannot be run on 32-bit hardware nor can 32-bit operating systems support 64-bit programs even if that operating system is installed on 64-bit hardware.
64-bit is Faster
64-bit hardware can utilize larger amounts of RAM (system memory).
Just as larger amounts of traffic can move faster on an 8-lane highway than on a 2-lane roadway, 64-bit hardware allows for more RAM to be utilized and run faster.
- 32-bit systems can only “see” approximately 3.5 GB of the maximum of 4GB that can be installed.
- 64-bit systems can see all 4GB and can use up to 128GB of installed RAM.
The same bottlenecks happen when programs are forced to run in the more restricted 32-bit environment that you see when two lanes of traffic are merged into one.
- Issues with 32-bit software and drivers in 64-bit Windows.
- 32-bit and 64-bit Windows FAQ.
- Wikipedia's 64-bit article covers the history as well as the technical architecture.
We're at the end of a transition period between 32- and 64-bit software and hardware which began over 10 years ago. Just as earlier systems running 4- 8- and 16-bits has been phased out, 32-bit hardware is becoming obsolete.
Because 64-bit systems will run 32-bit software, there wasn't enough pressure to end the dominance of 32-bit software until the majority of users ran 64-bit systems.
Virtually all recent computers come installed with 64-bit operating systems. As the last of the 32-bit systems running Vista (particularly the crippled Vista Basic and Windows 7 Starter editions) are retired, 64-bit software is becoming almost universal.
That transition is also happening for mobile devices.
Web Browsers as an Example
Most web browsers have been available in 64-bit versions for some time, but until recently most people tend to continue to use 32-bit browsers because many plugins (especially Flash) were only available in 32-bit versions.
Since plugins have been phased out in favour of newer browser technologies, this limitation has disappeared and 64-bit browsers are used more frequently because they are faster.
Drivers: Software that Talks to Hardware
If your computer is asking for drivers, it is looking for the specialized software that tells hardware how to work on your system.
Automatic Driver Installation
In most cases current computers are smart enough to determine what drivers are required and will download and install the correct version automatically — if they are available.
If Not, You Need to Know More
If not, you'll need to know the specific version of the hardware as well as that of your operating system and whether it is 32- or 64-bit in order to get the correct drivers when visiting a support website to download drivers for your computer's hardware.
You'll need to know:
- the specific model of the device you're trying to install (some are very specific);
- the operating system and version you wish to install it on; and
- whether the computer is running a 32-bit or 64-bit operating system.
Be sure to only use the manufacturer's support website as others may install malware and cause your computer to quit working.
Drivers are designed for a specific piece of hardware (HL-2240D printer) to work with a particular operating system (Mac) at a particular version level (macOS 10.14).
32- or 64-bit Critical
Even though most 32-bit software runs on 64-bit systems, 32-bit drivers will NOT run on 64-bit systems unless the driver's download page tells you that both 32- and 64-bit are supported — one reason that older hardware may not run on newer systems without updated drivers.
Your HP Color LaserJet CP1215 on a 64-bit version of Windows 7 requires a different driver than for a 32-bit version of Windows 7. No CP1215 driver is available for macOS.
Support Excellent for Current Hardware on Current Windows Versions
Support for Windows drivers tends to be excellent — at least for current hardware running on a currently-supported version of Windows.
- You may have difficulty finding support for older hardware for newer Windows versions or for newer hardware on older versions of Windows.
- Because Apple hardware is proprietary you should have fewer problems except when trying to install third-party hardware not specifically designated as Mac-supported.
- Linux support for newer hardware has improved tremendously but you'll want to ensure you can obtain the necessary drivers before purchasing hardware.
New Drivers for Old Hardware Seldom Provided
Manufacturers of some hardware are reluctant to provide drivers for older hardware on newer operating systems, wanting you to upgrade to newer hardware.
While this is understandable from an economic point of view (particularly for very old hardware), it is a poor environmental decision. You might want to support manufacturers that are more likely to provide updates to older hardware for newer operating systems.
Hardware is the physical components of the computer including both the external components you can see (the monitor, mouse, keyboard, printer, etc.) as well as those that you can't see (like the processor, video card, hard drive, RAM, etc.).
Components may be attached to the main computer case (sometimes referred to as the "box") which contains the internal components of your computer or can be integrated (like the laptop's keyboard, touch-pad and screen).
Devices like smart phones and tablets (as well as newer integrated touch devices) are less likely to support external hardware except Bluetooth keyboards and speakers. Support varies by manufacturer and model.
The motherboard (sometimes called the mainboard or logic board) is the main circuit board in a computer or device.
All other devices connect to the motherboard in some fashion. The motherboard is housed within a casing that provides access ports to various external devices. All devices have some sort of motherboard although it is easier to access in desktop computers.
The processor is the “brains” of the unit and is where programs are run. Most computers run Intel or AMD processors.
RAM is the volatile memory that a computer uses. When the computer stops, information in RAM is lost. The capacity is usually specified in megabytes or gigabytes.
The Hard Drive
The hard drive is a magnetic storage device (it works much like a cassette tape but the format is different). Unlike RAM, information stored in a hard drive does not disappear when the computer is turned off.Hard drive capacity is usually specified in gigabytes or terabytes and comes in 3 main formats:
- Hard Disk Drives (HHDs) are cheapest but slower and potentially noisier;
- Solid-State Drives (SSDs) operate like a flash drive and are much faster but tend to cost more, have lower capacity and shorter lifespan; and
- Solid-State Hybrid Drives (SSHDs) which the SSD technology for faster boot times with the greater reliability of HDDs.
SSDs shouldn't be defragmented but can be optimized (a function available in Raxco PerfectDisk — US$29.99 and Defraggler (free)) which helps to maintain them.
Each hard drive format has benefits and risks. See How to choose a storage device: HDD, SSD or SSHD?
The Video Card
The video card displays the output to the monitor and can be onboard (built into the motherboard) or external (a dedicated video card attached via the expansion slots on desktop computers). The capability of the video card determines the resolution and quality of the video display.
USB ports provide a “smart” hardware interface for the connection of many external hardware devices to your computer such as mice, printers, external hard drives, flash drives and more.
Unlike many earlier connections, the device tells the computer what it is and the requirements to run it so that the necessary drivers can be installed.
The computer can also contain specialized ports for external SATA hard drives, VGA or SVGA or HDMI video connections.
It can also have built-in capabilities for wireless technologies like Bluetooth, infrared and Wi-Fi or support for alternative storage mediums such as Blu-ray or the SD cards used by your digital camera.
A network is a collection of computers connected either via network cables (a LAN) or via wireless signals (a WLAN). The security is generally better on workplace networks than in home networks.
The Internet (notice the capital “I”) is also a network, one connecting many different types of computers, servers and devices all around the world.
The network adapter is a the computer's interface to the network via the modem or router and provides for Internet and local area network (LAN) access.
Desktop computers generally have built-in LAN while laptops generally have both LAN and WLAN connections.
A WLAN adapter provides wireless access if a wired connection is inconvenient or impossible.
Modems & Routers
The modem is the device that connects your computer to the Internet.
In earlier days people used a low-speed telephone modem to dial-up a temporary connection.
Today's always-on high speed Internet connections are provided via either a cable modem (where a cable TV vendor is the provider) or ADSL modem (where a telephone company is the provider).
Routers provide hardware firewall protection as well as allowing you to connect more than one computer to a modem using either a wired or wireless (Wi-Fi) connection. They are generally connected between your modem and your computer(s).
Most ISPs now offer a combination high-speed modem/router which serves as both the connection to the Internet and the access to other computers connected to it via either network cables or wireless. You don't need to worry about the Internet Connection (B in the diagram above).
Change Security Settings
During set up, the router/modem must be wired to at least one of the computers. After that, all network and Internet access can be done wirelessly, although the wired connections are generally much faster and more secure.
Change Default Router Passwords
It is strongly recommended that you change the default passwords on your router. These default settings (usually simply “admin”) are easily obtained from support sites and can be used to hack into your home or business network.
Logging into your router via a router manufacturer's website (e.g. http://router.asus.com) is not recommended, particularly since the connection is unsecured. You want to use local access (e.g. https://192.168.50.1) instead (the http://192.168.1.1 listed in the manual is incorrect).
You should also disable the WPS (a push-button setup for connecting wireless devices).
While convenient, WPS makes your router more vulnerable to being hacked. For several seconds after you press the WPS button, WPS opens your network to outside access without the protection of your password.
When you buy a program or a hardware device it will usually have a set of specifications that indicate what operating system it is designed for as well as the minimum hardware requirements (and optimally, the recommended hardware requirements).
Higher Capabilities = Higher Satisfaction
Your satisfaction with your purchase will improve the more you exceed the minimum requirements — which is why the recommended requirements are so useful.
If you have a different version of the operating system or if your hardware is not at least as good as the system requirements then you should not buy the program.
If you purchase a device without consulting the manufacturer for suitability ensure that the vendor guarantees it will work (accepting the product back for full refund if it does not). Opened software is seldom returnable.
Windows Experience Rating
Microsoft included a "Windows Experience" rating in Windows Vista, 7 and 8. This evaluates your hardware and tells you how well your computer will perform certain tasks.
The higher the score the better, but anything less than 3.0 will mean you will have a less than satisfactory experience with even basic tasks such as in the example below with a base rating of 1.0:
|Component:||What's Rated:||Experience Rating:|
|Processor:||Calculations per second||3.9|
|Memory (RAM):||Memory operations per second||3.9|
|Graphics:||Desktop performance for Windows Aero||1.9|
|Gaming graphics:||3D business and gaming graphics performance||1.0|
|Primary hard disk:||Disk data transfer rate||5.9|
This sort of rating was typical of the Vista Basic systems sold by manufacturers to move existing hardware that was unsuitable for Vista when support for Windows XP ended.
Needless to say, the lifespan of these systems was very short and consumers were shortchanged.
While the poor video rating could be improved with a new add-in video card, you would be better off looking for a newer, more powerful computer to begin with, such as the following:
Because Apple bundles its operating system with proprietary hardware, this is less of an issue until your computer begins to age (Apple may not allow updates even though the hardware supports it).
That said, Apple computers often last for 10 years and are therefore a better value than they appear to be when you realize they cost more than most Windows machines.
When Your Computer Slows Down
All computers and software become slower as they get older because of technological advances and the software that takes advantage of newer technology requires more advanced and powerful hardware.
Upgrades can be made to your computer to improve performance but at some point it becomes physically impossible or simply uneconomical and you'll need to purchase a newer computer.
The boot environment is the hardware initialization that precedes the loading of the operating system. It configures the hardware recognition. The boot process may be obscured by a full-screen logo on your computer monitor.
Traditionally, BIOS was used to configure the boot environment for personal computers (PCs) dating back to the early IBM-PC. It provided an environment for configuring hardware separate from the operating system.
- BIOS loads before the operating system and determines how hardware like memory, USB and video are configured (although much of this is now automatic).
- Wikipedia's BIOS Wiki has more detailed information.
UEFI provides a more modern approach to this boot environment and adds hardware-based security. See the Wikipedia UEFI Wiki for details.
Windows 7 or earlier does NOT support UEFI technology so if you enable the security options on a UEFI system, Windows will not boot.
Some computers can boot using resources on the LAN rather than what is contained on the computer's own storage devices but network boot is seldom available outside commercial environments.
Networking refers to the technology interconnecting computers grouped together using wired or wireless connections.
Networking is also part of the technology connecting you to the Internet (a global network rather than a local network).
Some terminology that is commonly used:
- The Internet or the Web (notice that both are capitalized) is the huge world-wide network (World Wide Web) of connected computers and devices.
- Your Internet Service Provider or ISP is the company that provides your access to the Internet. ISP can also refer to a company that provides an email account that is not part of your Internet access service.
- Your browser is the software used to view websites and to navigate the Web.
The internet is both the road and the destination. Search engines like Yahoo, Google, Bing and DuckDuckGo are the compass and the map. Facebook (or Twitter or YouTube or Instagram)…are also websites: places you visit on the web.The browser is the car that gets you everywhere. — Mozilla Blog
Firefox is a browser — one built specifically for people, not profit. If it's not your browser, maybe it should be? — Mozilla Blog
- A LAN refers to a local area network, a group of computers connected via CAT5 or CAT6 network cables (CAT6 is faster).
- WLAN refers to a similar network but is connected wirelessly (via Wi-Fi) rather than with network cables.
- Most networks today are comprised of both LAN and WLAN elements.
- A server can refer to a remote external computer accessed via the Internet (such as the email server for your ISP or the one hosting a website). It can also refer to a specialized computer that runs and manages a LAN in an office environment.
Not all of the Internet is open to the public.
- The dark web is that part of the Internet that is purposely hidden unless you know exactly where to look.
- A botnet is a network of compromised computers (or Internet-connected devices) that are controlled by a third party without the owners' permission. Most botnets are a result of a malware infection.
- Related is deep web which is the very large part of the Internet that is unavailable to the general public such as contents of your email or Dropbox.
When configuring an email client you'll run into several terms that might not make sense to you. You don't need to know the specifics but do need to understand the differences.
- An email server can refer to the email server for your ISP or to a specialized computer that runs and manages email on an office LAN.
- An email client is an standalone email program on a computer or mobile device that can send and retrieve email messages.
- A webmail client is a server-based email service stored on an external server (remote computer) that allows you to manage your email remotely using a web browser.
If you're using an email client supported by your ISP, then they'll indicate the settings and where to enter them. Otherwise, you'll need to configure your email program from the generic settings provided by your ISP. You many require help determining what goes where.
Email Login Information
Most configurations begin with the following login settings:
- The name allows you to set up how you'll refer to yourself (e.g. Joe Smith, Manager or simply Joe). It is flexible and does not form part of the security protection for your email account.
- The user name (usually referred to as the username) is the name assigned to you by your ISP. It is usually the full email address (firstname.lastname@example.org) but may only be the first part (joesmith) or an account designation (A4dc1245).
- The password is the secret character string that protects your email address. Remember, this is probably the only non-public piece of information of the three, especially if your email address is your user name).
Each username-password combination is unique to the particular account and should be kept secret to protect your email account from being hacked. Since your email account is accessed via the Internet, it is accessible to anyone that has or can guess your password. Learn more about passwords and security precautions.
Once you've setup the login details, you need to tell the email program how your email is to be handle and what protocols are to be used.
IMAP, POP and SMTP are email protocols used when configuring email retrieval. Once setup, email will be managed transparently if the settings are correct and you have entered the right password.
IMAP allows you to maintain the same mail on multiple email programs, computers or devices simultaneously, each mirroring what is on the server. Deleting messages with IMAP on any of the connected devices will remove them from both the server and ALL devices connected to that account with IMAP.
POP3 retrieves mail from the server, generally deleting it following successful retrieval. You can opt to leave it on the server for a period of time or permanently.
SMTP is a protocol for transmitting email messages to the server from which they are distributed to the intended recipients.
Because people are often primarily using mobile devices and shifting between them, POP/SMTP protocols and their documentation is disappearing from ISP websites and IMAP has become the default configuration regardless of its shortcomings.
Choosing the Right Protocol
Either POP/SMTP or IMAP will work on your desktop, laptop, tablet or smartphone provided you've set them up correctly and your ISP supports the protocols. However, your experience in syncing and storage of messages may differ:
|Sync Received Email||Maybe1||Yes|
|Sync Sent Email||No||Yes|
|Store Mail Locally||Yes||No2|
1Ensuring all your devices retrieve all messages sent to your email account requires special settings (discussed below) and has certain drawbacks.
2IMAP mirrors the server on all devices. When you delete a message on any device or the server, it is deleted everywhere. This makes IMAP unsuitable for storing important messages like receipts for tax preparation or important documents.
Neither of these protocols will sync either your contacts or your calendar natively. Microsoft Exchange can do this and Apple currently supports the syncing between iOS and macOS devices.
POP3 combined with SMTP works fine where the emails are being sent and retrieved by a single email client on a single computer, allowing for mail to be saved (archived) on the computer before being deleted on the server by that email program.
However, when used on multiple email clients or devices for the same account, it has limitations.
- To allow for all devices to download new messages, you'd need to leave the messages on the server until all devices have retrieved them.
- One device or computer can be set to automatically remove messages after a period of time (such as 15 days), but because messages aren't being deleted from the server right away, unwanted messages would download to all devices unless the user logged into the ISP's webmail interface to manually delete any unwanted messages as they were delivered.
- If more than one program or device is deleting messages after retrieval (or after the designated wait period) then there is the potential for having no device or program with all the messages.
- Sent messages would be stored ONLY on the computer or device from which they are created unless you BCC: yourself.
If a mobile device is used only when away from your computer but needed access to incoming messages but you didn't need to have all your emails on the device, this might not be an issue for you provided you BCC'd (blind-carbon-copied) any important sent messages to yourself to be downloaded to the computer hosting the primary email records.
IMAP resolved this issue by mirroring the same information on the server and on all connected email clients and devices, including sent, received and archived messages. Unfortunately, IMAP has its own limitations.
- Deleting messages with IMAP on any of the connected devices or the server will remove it from both the server and ALL devices connected to that IMAP account.
- Most email accounts have limits on how much you can store on their servers. Once you pass that limit the ISP may simply delete the oldest messages or “bounce” incoming messages (often arbitrarily and without warning).
- You can purchase extras storage, but some ISPs limit the amount of space you can purchase even though the cost of providing that storage has greatly decreased.
Remember, there are no copies of messages except what is on the server. Once all the devices have synced a deleted message, it is gone forever.
In addition to the protocols there are other settings, some of which are dependent upon how your ISP configures its servers and partly on whether the connection is secure or not.
- POP defaults to port 110, IMAP to port 995 and SMTP to 587 but may be set to something else depending upon the security settings.
- Security is generally one of Regular, Secure to regular port (STARTTLS) or Secure to dedicated port (TLS). Older email programs may not support secure connections.
For example, Gmail settings as indicated by Google Support:
There is more about the various protocols involved on Wikipedia, if you're interested.
Searching for Answers
Typing in a phrase will help you to find what you're looking for (e.g. HP color laserjet cp1215 Windows 7 drivers).
- The more specific you are the more likely you are to find what you need.
- Google and other search engines will usually offer suggestions as you begin to type in your search terms.
Avoid downloading from the “sponsored” results and stick to the offerings from the original vendor where possible.
In my example search (“HP color laserjet cp1215 Windows 7 drivers”) the result from support.hp.com is more promising. The printerdriverforwindows.com or userdrivers.com listings may install unwanted additional software (PUPs — see Installation Hints) or even malware.