Sharp DM-4551 DM-3551 DM-4551 Operation Manual Suite - Page 75

Using Convenient Functions 3, Programming, Troubleshooting,

Page 75 highlights

TABLE OF CONTENTS Page F-CODE CONFIDENTIAL TRANSMISSION ..........4-6 qF-CODE CONFIDENTIAL TRANSMISSION ....4-6 qPRINTING A DOCUMENT RECEIVED TO AN F-CODE CONFIDENTIAL MEMORY BOX 4-7 F-CODE RELAY BROADCAST TRANSMISSION .......4-8 qUSING THE F-CODE RELAY BROADCAST FUNCTION (your machine is the relay machine 4-9 qUSING THE F-CODE RELAY REQUEST FUNCTION (your machine requests a relay broadcast) ......4-9 CHAPTER 5 USING CONVENIENT FUNCTIONS 3 CONVENIENT METHODS OF USE STAMPING SCANNED ORIGINALS (VERIFICATION STAMP FUNCTION 5-2 qTURNING ON THE VERIFICATION STAMP FUNCTION 5-2 CONNECTING AN EXTENSION PHONE 5-3 qCONNECTING AN EXTENSION PHONE .......5-3 qSENDING A FAX AFTER TALKING ON THE PHONE (MANUAL TRANSMISSION 5-3 qUSING AN EXTENSION PHONE TO RECEIVE A FAX 5-4 qRECEIVING A FAX AFTER TALKING (MANUAL RECEPTION 5-5 CHAPTER 6 PROGRAMMING PROGRAMMING 6-2 STORING, EDITING, AND DELETING AUTO DIAL KEYS AND PROGRAMS 6-2 qSTORING ONE-TOUCH DIAL KEYS 6-3 qEDITING AND DELETING ONE-TOUCH KEYS .......6-5 qPROGRAMMING A GROUP KEY 6-6 qEDITING AND DELETING GROUP KEYS ......6-7 qSTORING A PROGRAM 6-8 qEDITING AND DELETING PROGRAMS .........6-8 Page STORING A GROUP INDEX 6-9 PROGRAMMING, EDITING, AND DELETING 1 F-CODE MEMORY BOXES 6-10 qPROGRAMMING AN F-CODE MEMORY BOX ......6-10 qSETTING FOR F-CODE POLLING MEMORY BOXES (NUMBER OF TRANSMISSIONS 6-11 qSETTING FOR F-CODE CONFIDENTIALTRANSMISSION 2 MEMORY BOXES (PRINT PIN 6-12 qSETTING FOR F-CODE RELAY BROADCAST MEMORY BOXES (END RECEIVING MACHINES) ....6-13 qEDITING AND DELETING A MEMORY BOX ..... 6-13 PRINTING PROGRAMMED INFORMATION .......6-14 3 ENTERING CHARACTERS 6-15 CHAPTER 7 TROUBLESHOOTING 4 WHEN A TRANSACTION REPORT IS PRINTED ...... 7-2 VIEWING THE COMMUNICATION ACTIVITY REPORT 7-3 5 WHEN AN ALARM SOUNDS AND A WARNING MESSAGE IS DISPLAYED .......7-3 PROBLEMS AND SOLUTIONS 7-4 6 CHAPTER 8 KEY OPERATOR PROGRAMS KEY OPERATOR PROGRAMS 8-2 qKEY OPERATOR PROGRAM LIST 8-2 7 qUSING THE KEY OPERATOR PROGRAMS ...8-2 qSETTING PROGRAMS 8-3 qPRINTING OUT SETTINGS 8-10 CHAPTER 9 8 APPENDIX SPECIFICATIONS 9-2 9 0-3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286

0-3
TABLE OF CONTENTS
1
2
3
4
5
6
7
8
9
F-CODE CONFIDENTIAL TRANSMISSION
..........
4-6
F-CODE CONFIDENTIAL TRANSMISSION
....
4-6
PRINTING A DOCUMENT RECEIVED
TO AN F-CODE CONFIDENTIAL
MEMORY BOX
.................................................
4-7
F-CODE RELAY BROADCAST TRANSMISSION
.......
4-8
USING THE F-CODE RELAY
BROADCAST FUNCTION
(your machine is the relay machine)
.................
4-9
USING THE F-CODE RELAY
REQUEST FUNCTION
(your machine requests a relay broadcast)
......
4-9
CHAPTER 5
USING CONVENIENT FUNCTIONS 3
CONVENIENT METHODS OF USE
STAMPING SCANNED ORIGINALS
(VERIFICATION STAMP FUNCTION)
...................
5-2
TURNING ON THE VERIFICATION
STAMP FUNCTION
..........................................
5-2
CONNECTING AN EXTENSION PHONE
..............
5-3
CONNECTING AN EXTENSION PHONE
.......
5-3
SENDING A FAX AFTER TALKING ON THE
PHONE (MANUAL TRANSMISSION)
..............
5-3
USING AN EXTENSION PHONE
TO RECEIVE A FAX
.........................................
5-4
RECEIVING A FAX AFTER TALKING
(MANUAL RECEPTION)
..................................
5-5
CHAPTER 6
PROGRAMMING
PROGRAMMING
....................................................
6-2
STORING, EDITING, AND DELETING
AUTO DIAL KEYS AND PROGRAMS
....................
6-2
STORING ONE-TOUCH DIAL KEYS
...............
6-3
EDITING AND DELETING ONE-TOUCH KEYS
.......
6-5
PROGRAMMING A GROUP KEY
....................
6-6
EDITING AND DELETING GROUP KEYS
......
6-7
STORING A PROGRAM
..................................
6-8
EDITING AND DELETING PROGRAMS
.........
6-8
Page
STORING A GROUP INDEX
..................................
6-9
PROGRAMMING, EDITING, AND DELETING
F-CODE MEMORY BOXES
..................................
6-10
PROGRAMMING AN F-CODE MEMORY BOX
......
6-10
SETTING FOR F-CODE POLLING MEMORY
BOXES (NUMBER OF TRANSMISSIONS)
...........
6-11
SETTING FOR F-CODE CONFIDENTIAL TRANSMISSION
MEMORY BOXES (PRINT PIN.)
..........................
6-12
SETTING FOR F-CODE RELAY BROADCAST
MEMORY BOXES (END RECEIVING MACHINES)
....
6-13
EDITING AND DELETING A MEMORY BOX
.....
6-13
PRINTING PROGRAMMED INFORMATION
.......
6-14
ENTERING CHARACTERS
..................................
6-15
CHAPTER 7
TROUBLESHOOTING
WHEN A TRANSACTION REPORT IS PRINTED
......
7-2
VIEWING THE COMMUNICATION
ACTIVITY REPORT
................................................
7-3
WHEN AN ALARM SOUNDS
AND A WARNING MESSAGE IS DISPLAYED
.......
7-3
PROBLEMS AND SOLUTIONS
..............................
7-4
CHAPTER 8
KEY OPERATOR PROGRAMS
KEY OPERATOR PROGRAMS
..............................
8-2
KEY OPERATOR PROGRAM LIST
..................
8-2
USING THE KEY OPERATOR PROGRAMS ...8-2
SETTING PROGRAMS
....................................
8-3
PRINTING OUT SETTINGS
...........................
8-10
CHAPTER 9
APPENDIX
SPECIFICATIONS
...................................................
9-2
Page