Home > Toshiba > Communications System > Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Toshiba Stratagy 4/6/24 Installation And Maintenance Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 566 Toshiba manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TABLE OF CONTENTS 
    Chapter 5 - Special Greeting User ID Mailboxes 
    PARAGRAPH 
    1 
    2 
    3 
    3.1 
    3.2 
    3.3 
    4 
    4.1 
    4.2 
    4.3 
    5 
    5.1 
    5.2 
    5.3 
    SUBJECT PAGE 
    Introduction ________________________________________----------------------------------------------------------------- 5-t 
    Recording Mailbox Greetings ________________________________________--------------------- --- ------_--------__- 5-l 
    The Initial Greeting Mailboxes ________________________________________----------------------------------------- 5-I 
    Recording and Customizing the Company Greeting ________________________________________---------- 5-2 
    Recording and Customizing Caller Instructions ________________________________________---------------- 5-2 
    Sample Initial Greetings ________________________________________---------------------------------------~------ 
    5-2 
    Employee Directory Instructions ------------------- ____________________--------------------------------------- 
    5-2 
    How Stratagy Maintains the Directory ------ ______________________________r_________---------------------- 
    5-2 
    Recording Employee Directory Instructions -- ____________________--------------------------------------- 
    5-3 
    Sample Employee Directory Instructions -- __________-____-____------------------------------------------ 
    5-3 
    Operator Mailbox Greeting ________________________________________--------------------------------------------- 5-3 
    Recording the Operator Mailbox Greeting ____________________------------------------------------------- 
    5-3 
    Customizing the Operator Mailbox ________________________________________-------------------------------- 5-3 
    Sample Operator Greeting ________________________________________---------------------- --- --_-__---------__- 5-3 
    5-i  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    CHAPTER 5 
    SPECIAL GREETING USER ID 
    MAILBOXES 
    1 INTRODUCTION 
    Stratagy contains four special greeting User ID 
    mailboxes. These are: 
    Company greeting - The salutation that lets the caller 
    know which company he called. Default is User ID 
    990. 
    Caller instructions - Give the caller options for reaching 
    departments or information. Default is User ID 991. 
    Employee directory instructions - The caller enters 
    the first few letters of the name of the person he 
    wants to contact. Stratagy plays the corresponding 
    User ID’s “name and extension” recording. Default is 
    User ID 411. 
    Operator mailbox greeting - For an after hours caller 
    who is unable to direct his own call 
    the extension of the person he 
    Default is User ID 0. 
    When initially setting up the system, 
    define each of the special greeting 
    includes: 
    n Recording the greetings 
    w Customizing the User ID mailbox 
    Auto Menu to schedule greetings) or does not know 
    wants to reach. 
    you will need to 
    mailboxes. This 
    (e.g., using the 
    You can modify these greetings and customizations as 
    needed. 
    This chapter discusses: 
    H Recording mailbox greetings 
    H Initial greeting mailboxes (company greeting and 
    caller instructions) 
    n Employee directory instructions 
    n Operator mailbox greeting 
    Use the forms in Appendix A as an aid in defining each of 
    the special greeting mailboxes. For detailed information 
    about customization, see Chapter 4. For customization 
    examples, see Appendix B. 
    2 RECORDING MAILBOX 
    GREETINGS 
    The step-by-step procedure for recording greetings is as 
    follows. See the User Guide for details. 1. 
    2. 
    3. 
    4. 
    5. 
    6. Access the User ID mailbox from your telephone. 
    a. Call Stratagy by dialing its extension. 
    b. After Stratagy answers, press * to enter User 
    mode. 
    c. Enter the User ID mailbox number: 
    user id + # 
    d. Enter the security code: 
    security code + # 
    The User Main Menu plays. Press 2 (Change your 
    greeting). 
    The Select Greeting Menu plays. Press the 
    greeting number. 
    The Record Greeting Menu plays. Press 2 to 
    record your greeting. 
    Record the greeting. As soon as you finish, press # . 
    The Record Greeting Menu plays. Press 1 to 
    review the recording. 
    To re-record the greeting, press 2 (step 4 above). 
    To save the greeting recording, press 9. Press 9 
    again to return to the Select Greeting Menu. You 
    can record another greeting or return to the User 
    Main Menu. 
    3 THE INITIAL GREETING 
    MAILBOXES 
    The initial greeting mailboxes are the company greeting 
    and caller instructions. Stratagy ships with these defined 
    as User ID 990 and User ID 991, respectively. 
    When a caller first reaches Stratagy, Stratagy plays the 
    company greeting. Typically this is a salutation which lets 
    the caller know which company he has called. For 
    example, 
    “Thank you for calling.. .” 
    By default, Stratagy then plays the caller instructions. In 
    addition, Stratagy plays the caller instructions whenever 
    it has nowhere else defined to continue processing. 
    Typically, caller instructions give the caller options for 
    reaching departments or information. For example: 
    “To reach the person you are calling, enter their 
    extension number. To reach the operator, press 0 
    or stay on the line.” 
    You can schedule different initial greetings to play 
    different times of the day, different days of the week, or 
    even a specific day of the year. 
    For details about how Stratagy processes incoming calls, 
    see Chapter 2, “How Stratagy Operates.” If you need to 
    change the initial greeting *defaults for specific channel 
    ports, use the Stratagy Configuration Utility. See Chapter 
    3, “Configuring and Backing Up Stratagy” in the 
    Installation section for details. 
    5-l  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    3.1 RECORDING AND CUSTOMIZING THE 
    COMPANY GREET1 NC 
    3.1 .I RECORDING THE COMPANY GREETING 
    You can record up to seven greetings that you can 
    schedule to play as needed. To record the company 
    greeting, access Stratagy as the company greeting User 
    ID. Follow the steps outlined in “Recording Mailbox 
    Greetings.” The default values are: 
    User ID: 990 
    Security Code: 990 
    Change the value for the security code as soon as 
    possible. 
    To customize the company greeting User ID mailbox  3.1.2 CUSTOMIZING THE COMPANY GREETING 
    MAILBOX 
    (991), access the User ID through the Users Menu. Note: 
    n Company greeting User ID mailbox 990 chains to 
    caller instructions User ID mailbox 991 
    n Use the Auto Menu to schedule the greetings to play 
    as needed 
    For detailed information about customization, see 
    Chapter 4, “Customizing User ID Mailboxes” and 
    Appendix B, ‘Customization Examples.” 
    3.2 RECORDING AND CUSTOMIZING 
    CALLER INSTRUCTIONS 
    3.2.1 RECORDING THE CALLER INSTRUCTIONS 
    Since the caller instructions are the default when 
    Stratagy continues to process a call, it is important that 
    the instructions start with something like “To reach the 
    person you are calling, enter their extension number.” 
    You can record up to seven greetings (caller instructions) 
    that you can schedule to play as needed. 
    To record the caller instructions, access Stratagy as the 
    Caller Instructions User ID. Follow the steps outlined in 
    “Recording Mailbox Greetings.” The default values are: 
    User ID: 991 
    Security Code: 991 
    Change the value for the security code as soon as 
    possible. 
    3.2.2 CUSTOMIZING THE CALLER INSTRUCTIONS 
    MAILBOX 
    To customize the caller instructions User ID mailbox 
    (991), access the User ID through the Users Menu. Use 
    the Auto Menu to schedule the greetings to play as 
    needed. For detailed information about customization, see Chapter 4, “Customizing User ID Mailboxes” and 
    Appendix B, “Customization Examples.” - 
    3.3 SAMPLE INITIAL GREETINGS 
    The following sample initial greetings play as a result of 
    chaining the company greeting User ID mailbox (990) to 
    the caller instructions User ID mailbox (991). 
    Example 1 
    990: Thank you for calling (company name). 
    991: To reach the person you are calling, enter his 
    extension. For information about our company 
    products and services, press 1. For customer 
    support, press 2. For sales, press 3. To access the 
    employee directory, enter 411. To reach the operator, 
    press 0 or stay on the line. 
    Example 2 
    990: Good afternoon. Thank you for calling (‘company 
    name). 
    991: If you know the extension of the person you are 
    calling, you may enter it now. Otherwise, press 0 or 
    stay on the line for operator assistance. 
    Example 3 
    990: Thank you for calling (company name). 
    991: Sorry, our offices are closed. To leave a message in 
    our operator’s mailbox, press 0. Or call during 
    regular business hours - 8:00 to 5:00 Monday 
    through Friday. 
    Example 4 
    990: Thank you for calling (company name). 
    991: Our offices are closed July 4th to celebrate 
    Independence Day. Please call back during regular 
    business hours. 
    4 EMPLOYEE DIRECTORY 
    INSTRUCTIONS 
    Stratagy ships with User ID 411 predefined as the access 
    box for the employee directory. When a caller uses the 
    directory, he enters the first few letters of the name of the 
    person he wants to contact. When Stratagy makes a 
    match, it plays the User ID “name and extension” 
    recording. The caller enters the extension number to 
    reach the person. 
    4.1 HOW STRATACY MAINTAINS THE 
    DIRECTORY 
    Stratagy automatically maintains the directory using: 
    I 
    n The names you create using the Users Menu 
    Directory Name 7 and Directory Name 2 fields. To 
    avoid having a User ID appear in the 411 directory, 
    5-2  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    leave these fields blank. For details, see Chapter 4, 
    “Customizing User ID Mailboxes.” 
    H Recordings users make of their names and 
    extensions via telephones using Stratagy’s User 
    mode. See the User Guide for details. 
    For example, Mary would translate to 6279 for access 
    after a caller enters 411, while Jo Ann translates to 
    56266. When Stratagy matches a directory name after 
    accessing 411, it plays that User ID’s “name and 
    extension” recording. Therefore, it is important that users 
    record their “name and extension,” e.g., “Donna Smith, 
    extension 112.” If a user has not recorded a “name and 
    extension,” Stratagy plays the User ID number. If there 
    are several matches, Stratagy plays all of them. 
    4.2 RECORDING EMPLOYEE DIRECTORY 
    INSTRUCTIONS 
    The recording you make should be consistent with your 
    customization of User IDS. Note the following: 
    H Since the letters Q and Z do not appear on the 
    telephone keypad, you will need to provide special 
    directions to the caller. Stratagy translates Q to 7 and 
    zto9. 
    n Stratagy ignores spaces and punctuation in a name. 
    To record the employee directory instructions, access 
    Stratagy as the Employee Directory Instructions User ID. 
    Follow the steps outlined in “Recording Mailbox 
    Greetings.” The default values are: 
    User ID: 411 
    Security Code: 411 
    Change the value for the security code as soon as 
    possible. 
    4.3 SAMPLE EMPLOYEE DIRECTORY 
    INSTRUCTIONS 
    A typical 411 directory recording is: 
    “Please enter the first few letters of the first or 
    last name of the person you are calling. For the 
    letter Q, use 7; and for the letter Z, use 9.” 
    The initial 411 directory recording that comes with 
    Stratagy is: 
    “Enter the first few letters of the first or last name 
    of the person you wish to reach.” mailbox for after hour callers who are unable to direct 
    their own calls (rotary dial phone) or do not know the 
    extension of the party they want to reach. When a caller 
    accesses the operator mailbox, Stratagy plays its 
    greeting which advises the caller on how the call will be 
    handled. The caller can then leave a message in the 
    mailbox (which the operator usually forwards on the next 
    business day). 
    5.1 RECORDING THE OPERATOR MAILBOX 
    GREETING 
    The operator mailbox greeting advises callers on how 
    their messages will be handled. The greeting should 
    cover the following information: 
    n Inform the caller that he has reached the operator 
    mailbox 
    n Remind the caller to leave his own name 
    H Remind the caller to state who the message is for 
    n State that the message will be delivered to the proper 
    person 
    You can record up to seven greetings that you can 
    schedule to play as needed. 
    To record the operator mailbox greeting, access Stratagy 
    as the operator mailbox User ID. Follow the steps 
    outlined in “Recording Mailbox Greetings.” The default 
    values are: 
    User ID: 0 
    Security Code: 0 
    Change the value for the security code as soon as 
    possible. 
    5.2 CUSTOMIZING THE OPERATOR 
    MAILBOX 
    To customize the operator greeting User ID mailbox (0), 
    access the User ID through the Users Menu. Use the 
    Auto Menu to schedule greetings to play as needed. For 
    detailed information about customization, see Chapter 4, 
    “Customizing User ID Mailboxes” and Appendix B, 
    “Customization Examples.” 
    5.3 SAMPLE OPERATOR GREETING 
    A typical operator mailbox greeting is: 
    “You have reached the operator mailbox. Please 
    leave a message at the tone. Your message will 
    be forwarded on the next business morning.” 
    5 OPERATOR MAILBOX 
    GREETING 
    The default for the operator or general mailbox is User ID 
    mailbox 0. Stratagy provides the operator User ID 
    5-3  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    PROGRAMMING SECTION 
    CHAPTER 6 
    TOKEN PROGRAMMING LANGUAGE  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TABLE OF CONTENTS 
    Chapter 6 
    - Token Programming Language 
    PARAGRAPH 
    SUBJECT PAGE 
    1 Introduction ________________________________________----------------------------------------------------------------- 
    6-j 
    2 Using the Token Programming Language ________________________________________-------------------------- 6-1 
    3 The Programming Tokens ________________________________________---------------------------------------------- 6-l 
    TABLE LIST 
    TABLE TITLE PAGE 
    6-1 Summary of Token Programming Language Tokens __________________-------------------- --- -------_ -- 
    6-2 
    6-2 Token Programming Language Tokens ________________________________________----------------- - --------__- 6-3 
    6-i  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    CHAPTER 6 
    TOKEN PROGRAMMING 
    LANGUAGE 
    1 INTRODUCTION 
    Stratagy’s Token Programming Language consists of 
    commands, or tokens, that instruct Stratagy what actions 
    to perform. The tokens that are generally used are simple 
    and perform standard expected actions such as dialing 
    an extension. 
    The Token Programming Language gives the system 
    versatility. Its capabilities include, but are not limited to: 
    w Fax back 
    q Confirming digits entered by a caller 
    n Relaying messages to digital pagers 
    n Controlling message waiting lights 
    This chapter discusses: 
    n Using the Token Programming Language 
    n The programming tokens 
    2 USING THE TOKEN 
    PROGRAMMING LANGUAGE 
    The Token Programming Language may be used in the 
    following fields: 
    Users’ Extension field - Typically the Users Menu’s 
    Extension field contains the actual telephone 
    station/extension number for the corresponding User 
    ID. It may contain tokens. Or, it may be empty. 
    Auto’s Extension field - The default value for the Auto 
    record’s Extension field is the value in the Users’ 
    Extension field. However, it may contain tokens. 
    When the Auto record is active, Stratagy uses this 
    Extension field rather than the Users Menu’s 
    Extension field. 
    Notify’s Method field - The Notify record’s Method field 
    must always be defined for Stratagy to perform the 
    proper type of notification. To program the Extension or Method fields, enter a series 
    of commands, or tokens, that instruct Stratagy what 
    actions to perform. A field would, therefore, contain 
    TokenTokenToken... Token, where Token defines how to 
    perform the actions. 
    All tokens are available for the Stratagy 24. Fax tokens 
    are not available for the Stratagy 4 and 6. Serial port 
    tokens are not available for the Stratagy 4. 
    Stratagy provides reserved User ID mailboxes that have 
    common features pre-programmed, including future 
    delivery, guest defaults, and fax tone detect. In addition, 
    User IDS 7000 - 7014 provide pre-programmed fax 
    features that can be copied and used for defining User ID 
    records. Notify contains templates (e.g., message waiting 
    light control and pagers) you can use for defining User ID 
    Notify records. 
    For examples on how to use the Token Programming 
    Language, see Appendix B. 
    3 THE PROGRAMMING TOKENS 
    The Token Programming Language uses three types of 
    tokens: singular, defined, and replaced. 
    Singular tokens are single character commands that 
    perform a single action that cannot be modified. For 
    example, the token 1 performs the action of playing 
    DTMF 1. 
    Defined tokens are expressed with left and right 
    parentheses surrounding one or more options that 
    define how the token should work. For example, the 
    Goto token G( ) takes one option and causes Stratagy 
    to immediately continue processing at the User ID 
    specified. For (G123), Stratagy continues processing 
    at User ID 123. 
    Replaced, or variable, tokens are specified with a 
    preceding % sign and cause Stratagy to replace the 
    token given with the value associated with the token. 
    For example, The token %M would be replaced with 
    the current number of messages for the current User 
    ID being accessed. 
    Table 6-l summarizes the singular, defined, and replaced 
    tokens. For a detailed description of each token, see 
    Table 6-2. I 
    6-1  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    JNGULAR TOKENS 
    @ Suppress normal process. 
    1 - 9, 0, 
    l , #, A - D Play DTMF tone. 
    -, , Pause. 
    -, E Recall. 
    F Hook-flash. 
    X, Y, 2 Message waiting light 
    control. 
    IEFINED TOKENS 
    G(uid) Go to User ID. 
    H(uid) Hang-up process. 
    I(string,re/ationship, If conditional. 
    string, uid) 
    J(fi/e, “string”) Receive fax. 
    J( fi/e, ” ‘I, “tokens ‘3 
    L(langusge-file) Switch system language. 
    M(Gn,count,de/sy) Audiotext menu. 
    O(tenths) Timed on-hook. 
    Prepeat(item) Play (say) specific 
    information. 
    Q(Gn,...) Question and answer. 
    R(Gn,%Sm,delay) Read DTMF from caller. 
    S(port, “S’:%Sn, Serial port access. 
    “termination “Jength, 
    timeout) 
    T(fi/e,“sfring’j Transmit fax. 
    T( file, ” “, “tokens ‘) 
    V(file,field,item,%Sn) Search for value. 
    W(n) Wait (pause) for event. 
    WW) 
    WhT) 
    W(n,V) DEFINED TOKENS (conti 
    +(%Sn,item) wed) 
    Addition. 
    =(%Sn, “item’? 
    =(%Sn, “item”,start, 
    end) Assignment. 
    ?( item, file, uid) Exists in file. 
    c( “string ‘3 
    >( “fi/e’? Start incremental fax. 
    Add incremental fax. 
    Append variables to file. 
    Read %S variables state. 
    Write %S variables state. 
    Change port volume.  I( file) 
    [(file) 
    ]( file) 
    44 
    {file) Input file. 
    REPLACED TOKENS 
    %Bl - %B6 Board serial number. 
    Disk space remaining. 
    Extension field. 
    %M Messages. 
    %N New Messages. 
    %P Previous. 
    %R Relay page. 
    Store value.  %SO - %S9 
    %T 
    %U 
    %V 
    %Y 
    %Z 
    LEN[%Sn] Connect time. 
    User ID. 
    Variable. 
    Current date. 
    Current time. 
    Length. 
    Table 6-1 
    Summary of Token Programming Language Tokens 
    6-2  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    1 FUNCTION 1 DEFINITION 
    Singular Tokens 
    8 Suppress normal Syntax: @ 
    process. 
    Description: Prevents Stratagy from normally processing an Extension or 
    Method field. 
    Table 6-2 1 DTMF 1. 
    2 DTMF2. 
    3 DTMF3. 
    4 DTMF4. 
    5 DTMF5. 
    6 DTMF6. 
    7 DTMF7. 
    8 DTMF8. 
    9 DTMF9. 
    0 DTMFO. 
    * DTMF JC. 
    # DTMF#. 
    A DTMFA. 
    B DTMF B. 
    C DTMFC. 
    D DTMFD. H Normally when Stratagy evaluates an Extension field, Stratagy plays 
    the “Please hold...” prompt to the caller, puts the caller on transfer hold, 
    and then evaluates the tokens in the field. If the first character in the 
    field is the @ token, however, Stratagy immediately begins processing 
    the next token without pet-forming the transfer procedure. 
    W In the case of the Illlethod field, Stratagy will not attempt to access a 
    pot-t for an outbound notification call. 
    Syntax: 1 
    Description: Plays DTMF tone 1. 
    Syntax: 2 
    Description: Plays DTMF tone 2. 
    Syntax: 3 
    Description: Plays DTMF tone 3. 
    Syntax: 4 
    Description: Plays DTMF tone 4. 
    . 
    Syntax: 5 
    Description: Plays DTMF tone 5. 
    Syntax: 6 
    Description: Plays DTMF tone 6. 
    Syntax: 7 
    Description: Plays DTMF tone 7. 
    Syntax: 8 
    Description: Plays DTMF tone 8. 
    Syntax: 9 
    Description: Plays DTMF tone 9. 
    Syntax: 0 
    Description: Plays DTMF tone 0. 
    Syntax: * 
    Description: Plays DTMF tone -k. 
    Syntax: # 
    Description: Plays DTMF tone #. 
    Syntax: A 
    Description: Plays DTMF tone A. 
    Syntax: B 
    Description: Plays DTMF tone B. 
    Syntax: C 
    Description: Plays DTMF tone C. 
    Syntax: D 
    Description: Plays DTMF tone D. , 
    BTlO”.,NSFm6YU 
    Token Programming Language Tokens 
    6-3  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    ‘ 
    TOKEN FUNCTION 1 DEFINITION 
    Singular Tokens (continued) 
    - Short pause. Syntax: - 
    (dash) Description: 
    Pauses for 0.5 (one-half) second. 
    , 
    Long pause. 
    Syntax: 7 
    (comma) Description: 
    Pauses for 2 seconds. 
    - Timed break recall. 
    Syntax: - 
    Description: 
    Pulse dials the digit 1 to effect a timed break recall. 
    E Earth recall. Syntax: E 
    Description: 
    Performs an earth recall. This is used in place of the hook- 
    flash (the 
    F token) on some switches. 
    F Hook-flash. Syntax: F 
    Description: 
    Performs a hook-flash. The length of the hook-flash is 
    specified in the telephone system dial codes section of the Stratagy 
    Configuration Utility (see the Installation section). 
    X Remember event 
    - Syntax: X 
    message waiting 
    light control. Description: Creates the file LIGHT.ON in the User ID’s directory. This is 
    used with the Y and 2 tokens to control Stratagy’s processing of tokens, - 
    particularly in situations where Stratagy should perform an action once 
    regardless of the number of times the tokens are attempted. 
    Example: A message waiting light that uses the same codes to turn on 
    the light as it does to turn off the light; i.e., a toggle. For details, see 
    Appendix 6, “Customizing User ID Mailboxes - Examples.” 
    Y Forget exent - 
    Syntax: Y 
    message waiting 
    light control. Description: Deletes the LIGHT.ON file in the User ID’s directory. 
    Example: A message waiting light that uses a different code to turn off the 
    light than to turn on the light. For details, see Appendix B, “Customizing 
    User ID Mailboxes - Examples.” 
    Z Test event - 
    Syntax: Z 
    message waiting 
    light control. Description: Tests for the existence of the LIGHT.ON file in the User ID’s 
    directory. If the file is there, immediately stops processing the rest of the 
    tokens for this User ID. 
    Defined Tokens 
    G( 
    ) Go to User ID. Syntax: G(uid) 
    Where: 
    uid Any valid User ID. 
    Description: Immediately continues processing at the User ID specified. 
    Stratagy continues standard processing at the User ID per the User ID 
    mailbox processing diagram (Chapter 2, “How Stratagy Operates”). 
    Example: G(299) Go to User ID 299. 
    ETRC” lNrn.M I 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-4  
    						
    All Toshiba manuals Comments (0)

    Related Manuals for Toshiba Stratagy 4/6/24 Installation And Maintenance Manual