Contents
3
Directories of abbreviated numbers . . . . . . . . . . . . . . . . . . . 40
Programming a personal abbreviated number . . . . . . . . . . . . . . . . . . 40
Modifying or deleting a personal abbreviated number . . . . . . . . . . . . 41
Calling a personal abbreviated number . . . . . . . . . . . . . . . . . . . . . . . 41
Dialling a common abbreviated number
. . . . . . . . . . . . . . . . . . . . . . 42
Inbound call log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Viewing the incoming call log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Calling a party from the inbound call log . . . . . . . . . . . . . . . . . . . . . . . 44
Storing the name and/or number in the private directory . . . . . . . . . . 44
Deleting a record from the inbound call log . . . . . . . . . . . . . . . . . . . . . 45
Deleting all records from the inbound call log . . . . . . . . . . . . . . . . . . . 45
Information directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Internal names directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Checking the internal names directory . . . . . . . . . . . . . . . . . . . . . . . . 49
Calling an internal party . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
External names directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Checking the external names directory . . . . . . . . . . . . . . . . . . . . . . . . 51
Calling an external party . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Programmable keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Programming a key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Deleting, modifying and exiting the programming . . . . . . . . . . . . . . . . 56
Identifying the programmed keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57