Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce
the above copyright notice, this list of
conditions and the following disclaimer in the
documentation and/or other materials
provided with the distribution.
3. Neither the name of the Politecnico di Torino,
CACE Technologies nor the names of its
contributors may be used to endorse or
promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE
COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This product includes software developed by the
University of California, Lawrence Berkeley
Laboratory and its contributors.
This product includes software developed by the
Kungliga Tekniska Hogskolan and its
contributors.
This product includes software developed by Yen
Yen Lim and North Dakota State University.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce
the above copyright notice, this list of
conditions and the following disclaimer in the
documentation and/or other materials
provided with the distribution.
3. All advertising materials mentioning features
or use of this software must display the
following acknowledgement: "This product
includes software developed by the University
of California, Berkeley and its contributors."
4. Neither the name of the University nor the
names of its contributors may be used to
endorse or promote products derived from this
software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE
INSTITUTE AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE
REGENTS OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT
Network Scanner fi-6000NS Getting Started iii
OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms
are permitted provided that the above copyright
notice and this paragraph are duplicated in all such
forms and that any documentation, advertising
materials, and other materials related to such
distribution and use acknowledge that the
software was developed by the University of
California, Berkeley. The name of the University
may not be used to endorse or promote products
derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND
WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT
LIMITATION, THE IMPLIED WARRANTIES
OF MERCHANTIBILITY AND FITNESS FOR
A PARTICULAR PURPOSE.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce
the above copyright notice, this list of
conditions and the following disclaimer in the
documentation and/or other materials
provided with the distribution.
3. All advertising materials mentioning features
or use of this software must display the
following acknowledgement: "This product
includes software developed by the Kungliga
Tekniska Hogskolan and its contributors."
4. Neither the name of the University nor the
names of its contributors may be used to
endorse or promote products derived from this
software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE
INSTITUTE AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE
INSTITUTE OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce
the above copyright notice, this list of
conditions and the following disclaimer in the
documentation and/or other materials
provided with the distribution.
3. All advertising materials mentioning features
or use of this software must display the
following acknowledgement: "This product
includes software developed by Yen Yen Lim
and North Dakota State University"
4. The name of the author may not be used to
endorse or promote products derived from this
software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE
AUTHOR "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL
THE AUTHOR BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS
iv
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Permission to use, copy, modify, and distribute
this software for any purpose with or without fee
is hereby granted, provided that the above
copyright notice and this permission notice appear
in all copies, and that the name of Digital
Equipment Corporation not be used in advertising
or publicity pertaining to distribution of the
document or software without specific, written
prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND
DIGITAL EQUIPMENT CORP. DISCLAIMS
ALL WARRANTIES WITH REGARD TO THIS
SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND
FITNESS. IN NO EVENT SHALL DIGITAL
EQUIPMENT CORPORATION BE LIABLE
FOR ANY SPECIAL, DIRECT, INDIRECT, OR
CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
THIS SOFTWARE IS PROVIDED BY THE
PROJECT AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE
PROJECT OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that: (1) source code distributions retain
the above copyright notice and this paragraph in
its entirety, (2) distributions including binary code
include the above copyright notice and this
paragraph in its entirety in the documentation or
other materials provided with the distribution.
The name of Juniper Networks may not be used to
endorse or promote products derived from this
software without specific prior written permission.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce
the above copyright notice, this list of
conditions and the following disclaimer in the
documentation and/or other materials
provided with the distribution.
3. Neither the name of the project nor the names
of its contributors may be used to endorse or
promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND
WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT
LIMITATION, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
•Redistributions of source code must retain the
above copyright notice, this list of conditions
and the following disclaimer.
•Redistributions in binary form must reproduce
the above copyright notice, this list of conditions
and the following disclaimer in the
documentation and/or other materials provided
with the distribution.
THIS SOFTWARE IS PROVIDED BY THE
COPYRIGHT HOLDERS AND
CONTRIBUTOR "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Portions Copyright 1989 by Carnegie Mellon.
Permission to use, copy, modify, and distribute
this program for any purpose and without fee is
hereby granted, provided that this copyright and
permission notice appear on all copies and
supporting documentation, the name of Carnegie
Mellon not be used in advertising or publicity
pertaining to distribution of the program without
specific prior permission, and notice be given in
supporting documentation that copying and
distribution is by permission of Carnegie Mellon
and Stanford University. Carnegie Mellon makes
no representations about the suitability of this
software for any purpose. It is provided "as is"
without express or implied warranty.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce
the above copyright notice, this list of
conditions and the following disclaimer in the
documentation and/or other materials
provided with the distribution.
3. Neither the name of the Politecnico di Torino,
CACE Technologies nor the names of its
contributors may be used to endorse or
promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE
COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This product includes software developed by the
University of California, Lawrence Berkeley
Laboratory and its contributors.
vi
Introduction
Thank you for purchasing the Network Scanner
fi-6000NS.
This easy-to-operate network scanner may be used to
scan documents for further use.
This guide provides useful and detailed information on
setting up, connecting, and caring for your scanner.
The "Network Scanner fi-6000NS Operator's Guide"
contains further information about scanner settings,
scanner administration, and scanner operations, and may
be used as a general reference.
Please also read the Operator’s Guide for your
reference.
■ Regulatory Information
FCC Declaration
This equipment has been tested and found to
comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable
protection against harmful interference in a
residential installation. This equipment generates,
uses, and can radiate radio frequency energy and,
if not installed and used in accordance with the
instruction manual, may cause harmful
interference to radio communications. However,
there is no guarantee that interference will not
occur in a particular installation. If this equipment
does cause harmful interference to radio or
television reception, which can be determined by
turning the equipment off and on, the user is
encouraged to try to correct the interference by
one or more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment
and receiver.
•Connect the equipment into an outlet on a circuit
different from that to which the receiver is
located.
•Consult your dealer or an experienced radio/TV
technician.
FCC warning: Changes or modifications not
expressly approved by the party responsible for
compliance could void the user’s authority to
operate the equipment.
ATTENTION
The use of a shielded interface cable is
required to comply with the Class B limits
of Part 15 of FCC rules.
The length of the AC cable must be 2
meters (6.6 feet) or less.
Canadian DOC Regulations
This digital apparatus does not exceed the Class B
limit for radio noise emissions from digital
apparatus set out in the Radio interference
Regulations of the Canadian Department of
Communications.
This Class B digital apparatus complies with
Canadian ICES-003.
Le présent appareil numérique n'émet pas de
parasites radioélectriques dépassant les limites
applicables aux appareils numériques de la classe
B et prescrites dans le Règlement sur le brouillage
radioélectrique dictées par le Ministère des
Communications du Canada.
Cet appareil numérique de la classe B est
conforme _ la norme NMB-003 du Canada.
Bescheimigung des Herstellers /
Importeurs
Für den fi-6000NS wird folgendes bescheinigt:
•In ÅEereinsstimmung mit den Bestimmungen
der EN45014(CE) funkentstört
•Maschinenlärminformationsverordnung 3.
GPSGV: Der höchste Schalldruckpegel beträgt
70 dB (A) oder weniger, gemäß EN ISO 7779.
■ Note of Liability
BEFORE USING THIS PRODUCT, PLEASE
READ THIS MANUAL CAREFULLY. IF THIS
PRODUCT IS NOT USED CORRECTLY,
UNEXPECTED INJURY CAN OCCUR TO
USERS OR BYSTANDERS.
Keep this manual in a safe place so that it can be
easily referred to during use of this product.
While all efforts have been made to ensure the
accuracy of all information in this manual, PFU
assumes no liability to any party for any damage
caused by errors or omissions or by statements of
any kind in this manual, its updates or
supplements, whether such errors are omissions or
statements resulting from negligence, accidents,
or any other cause. PFU further assumes no
liability arising from the application or use of any
product or system described herein; nor any
liability for incidental or consequential damages
arising from the use of this manual. PFU
disclaims all warranties regarding the information
contained herein, whether expressed, implied, or
statutory.
Network Scanner fi-6000NS Getting Started vii
Use in High-safety Applications
Replacing Batteries
This product has been designed and manufactured
on the assumption that it will be used in office,
personal, domestic, regular industrial, and
general-purpose applications. It has not been
designed and manufactured for use in applications
(simply called "high-safety applications" from
here on) that directly involve danger to life and
health when a high degree of safety is required,
for example, in the control of nuclear reactions at
nuclear power facilities, automatic flight control
of aircraft, air traffic control, operation control in
mass-transport systems, medical equipment for
sustaining life, and missile firing control in
weapons systems, and when provisionally the
safety in question is not ensured. The user should
use this product with adopting measures for
ensuring safety in such high-safety applications.
PFU LIMITED assumes no liability whatsoever
for damages arising from use of this product by
the user in high-safety applications, and for any
claims or compensation for damages by the user
or a third party.
About the Use of Mercury
Lamp(s) inside this product contain
mercury and must be recycled or
g
H
To avoid unexpected injuries:
•Do not lick or consume the substance contained
in the lamp.
•Do not breathe the chemical liquid contained in
the scanner lamps.
•Do not incinerate, crush, or shred the lamps or
scanner parts.
disposed of according to local, state, or
federal laws.
This product has a battery (CMOS RAM battery)
on board to retain data such as
•Warn in g
• Do not replace the battery yourself, as
there is a risk of explosion if the wrong
type is used. Please contact your
maintenance engineer in charge when
the battery runs low.
• Do not touch the battery. Never install
or remove the battery by yourself.
Doing so may cause electric shock or
static electricity which can damage the
device.
Trademarks
Microsoft and Windows are registered trademarks
of Microsoft Corporation in the United States and/
or other countries.
Adobe, the Adobe logo, and Acrobat are either
registered trademarks of Adobe Systems
Incorporated in the United States and/or other
countries.
TM
ABBYY
Software House 2005.
OCR by ABBYY Software House. All rights
reserved.
ABBYY, FineReader are trademarks of ABBYY
Software House.
Other product names are the trademarks or
registered trademarks of the respective companies.
• Despite the advanced technologies used
to produce the devices TFT color
LCD's, the large number of pixels
involved means that an occasional
(always-on) bright dot or (always-off)
dark dot may be visible.
• The characteristics of the LCD mean
that there may be some variation in hue
and intensity of colors across the screen.
viii
References to operating systems (OS) and
applications are indicated as follows:
Windows
All the descriptions in this manual assume the
usage of Adobe Acrobat bundled with this
product. However, Adobe Acrobat may be
upgraded without notice. If the descriptions differ
from the screens actually displayed, refer to the
Acrobat’s “Help”.
Windows® operating system
Manufacturer
R
PFU LIMITED
International Sales Dept., Imaging Business
Division, Products Group
Solid Square East Tower, 580 Horikawa-cho,
Saiwai-ku, Kawasaki-shi Kanagawa 212-8563,
Japan
Phone : (81-44) 540-4538
This symbol alerts operators to particularly
important information. Be sure to read this
information.
This symbol alerts operators to helpful
advice regarding operation.
The user must not perform repairs on this scanner.
Contact your FUJITSU scanner dealer or an
authorized FUJITSU scanner service provider for
repairs to this product.
Warning Indications Used in This
Manual
This indication alerts operators
WARNING
CAUTION
to an operation that, if not strictly
observed, may result in severe
injury or death.
This indication alerts operators to
an operation that, if not strictly
observed, may result in safety
hazards to personnel or damage
to equipment.
A TRIANGLE symbol indicates that special
care and attention is required.
The drawing inside the triangle shows the
specific caution.
A CIRCLE with a diagonal line inside
shows action which users may not perform.
The drawing inside or under the circle
shows the specific action that is not
allowed.
Outline characters on a colored
background show instructions users should
follow.
It may also include the drawing that shows
the specific instruction.
Warning Label
The glass scanner windows inside the ADF
can become hot when the scanner is used.
Be careful not to touch the surface of the
glass scanner windows.
ATTENTION
Do NOT remove from the scanner, stain or
scratch the warning labels.
Screen Examples in This Manual
The screen examples in this manual are subject to
change without notice in the interest of product
improvement. If the actual displayed screen
differs from the screen examples in this manual,
operate by following the actual displayed screen
while referring to the User's Manual of the scanner
application you are using.
Network Scanner fi-6000NS Getting Started ix
Loading...
+ 24 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.