2 sim, 10 c, 11 c – Verykool R25 User Manual
Page 3: 12 u, 13 n, 14 s, 15 c

CONTENT
INTRODUCTION..................................................................I
SECURITY AND PERFORMANCE....................................1
1START USING..................................................................3
1.1 B
ATTERY
.............................................................3
1.2 SIM
CARD
..........................................................3
1.3 P
LUG
AND
UNPLUG
THE
M
EMORY
CARD
.......................4
1.4 P
LUG
AND
UNPLUG
THE
EARPHONE
.............................4
1.5 S
TATUS
BAR
AND
CONTENT
.......................................4
1.6 K
EYS
.................................................................5
2DIAL AND ANSWER THE CALL.....................................7
1.7 M
AKING
A
CALL
....................................................7
1.8 A
NSWERING
A
CALL
...............................................7
1.9 E
MERGENCY
CALL
..................................................8
3MAIN MENU STRUCTURE..............................................8
4FUN & GAMES.................................................................8
5PHONEBOOK...................................................................9
6CALL CENTER.................................................................9
1.10 C
ALL
HISTORY
.....................................................9
1.11 C
ALL
SETTINGS
...................................................9
1.11.1 SIM1/SIM2 call se.ngs.......................9
1.11.2 Advanced se.ngs...............................10
7SNS.................................................................................10
8MESSAGING...................................................................10
9SERVICES.......................................................................11
10 ORGANIZER................................................................11
11 MULTIMEDIA...............................................................12
12 SETTINGS....................................................................13
1.12 U
SER
PROFILES
................................................13
1.13 N
ETWORK
SETTINGS
...........................................13
1.14 S
ECURITY
SETTINGS
............................................13
1.15 C
ONNECTIVITY
..................................................15
I