MagTek MICRSafe99875466 User Manual
Page 7
vii
FIGURES and TABLES
Figure 1-1. MICRSafe with 3-Track MSR ...................................................................................................viii
Table 1-1. Specifications .............................................................................................................................. 3
Figure 3-1. Check Orientation ....................................................................................................................... 7
Table 3-1. LED indicators ............................................................................................................................. 8
Table 4-2. SWB Command......................................................................................................................... 11
Table 4-3. Control Characters .................................................................................................................... 12
Table 4-4. Error and Status Codes ............................................................................................................. 13
Table 4-5. SWC Command ........................................................................................................................ 14
Table 4-6. HW Command ........................................................................................................................... 17
Table B-1. CMC-7 Nonnumeric Characters ................................................................................................ 50
Figure B-1. Personal Checks ...................................................................................................................... 50
Figure B-2. Business Checks ..................................................................................................................... 51
Figure C-1. Sensor Location ....................................................................................................................... 59
Table E-1. Keyboard/Keypad ...................................................................................................................... 63
Table F-1. Modifier Byte .............................................................................................................................. 71