Safety Precautions...............................................................................................1
Toner Safety........................................................................................................................................2
About Toner..........................................................................................................................................2
Handling Adhered Toner........................................................................................................................2
illustrations........................................................................................................................................... 5
1. Product Lineup.................................................................................................6
2. Host Machine..................................................................................................12
Symbols............................................................................................................................................. 13
Checking before Installation.............................................................................................................. 14
Checking the Power Supply................................................................................................................. 14
Installation Procedure........................................................................................................................17
Unpacking.......................................................................................................................................... 17
Checking the Contents........................................................................................................................ 22
Installing the Scanner ......................................................................................................................... 24
and EUR)........................................................................................................................................ 33
Securing the Host Machine.................................................................................................................. 69
Contents
i
Contents