beautypg.com

Metrohm 746 VA Trace Analyzer User Manual

Page 207

background image

5.4 Storages

746 VA Trace Analyzer / 747 VA Stand

5-56

Softkeys

Meaning

Modify

column

Modify parameters column-by-column

Secured files (

*

) must first be unsecured with

before they

can be modified.

Modify

line

Modify parameters line-by-line

Secured files (

*

) must first be unsecured with

before they

can be modified.

Delete

file(s)

Delete selected files

The files marked by an arrow

–>

(if no files are marked, the file se-

lected with the cursor) are deleted after confirmation with

y

.

Secured files (

*

) must first be unsecured with

before they

can be modified.

Copy

to

Copy selected files to selected destination

The files marked by an arrow

–>

(if no files are marked, the file se-

lected with the cursor) are copied to the selected destination. The
following destinations are available:

Working

storage

Working storage (only the file selected with the cursor is copied).
The following files can be copied:

XXXXXXXX.mth

Method files (the loaded method will be over-
written)

XXXXXXXX.dtm

Determination files (the loaded determination
and the method will be overwritten)

XXXXXXXX.smp

Sample data files (the sample data table on the
"SAMPLES" page will be overwritten)

XXXXXXXX.aut

Rack data files (the rack data table on the sub-
page

Rack definition

of the "STAND" page

will be overwritten)

Method

storage

Method storage "METHODS" (only the method files with the extension

.mth

can be copied; an unsecured method with the same name will

be overwritten)

Determ.

storage

Determination storage "DETERMINATIONS" (only the determination
files with the extension

.dtm

can be copied; an unsecured determi-

nation with the same name will be overwritten)

Data

card

Data card (a new name must be entered for the copied file)

RS232

Ifc.1

RS232 interface 1, i.e. the PC connected to it

RS232

Ifc.2

RS232 interface 2, i.e. the PC connected to it

Copy

from

Copy files from selected source

The files are copied from the selected source to the data card. The
following sources can be selected:

Working

method

Method from the working memory (an unsecured method with the
same name will be overwritten)