- 43 -
especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold
for this to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros
and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless
of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library
will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the
terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are
linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the
Library to produce a work containing portions of the Library, and distribute that work under terms of your choice,
provided that the terms permit modification of the work for the customer's own use and reverse engineering for
debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the Library and
its use are covered by this License. You must supply a copy of this License. If the work during execution
displays copyright notices, you must include the copyright notice for the Library among them, as well as a
reference directing the user to the copy of this License. Also, you must do one of these things:
•
a) Accompany the work with the complete corresponding machine-readable source code for the
Library including whatever changes were used in the work (which must be distributed under Sections 1
and 2 above); and, if the work is an executable linked with the Library, with the complete
machine-readable "work that uses the Library", as object code and/or source code, so that the user
can modify the Library and then relink to produce a modified executable containing the modified
Library. (It is understood that the user who changes the contents of definitions files in the Library will
not necessarily be able to recompile the application to use the modified definitions.)
•
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one
that (1) uses at run time a copy of the library already present on the user's computer system, rather
than copying library functions into the executable, and (2) will operate properly with a modified version
of the library, if the user installs one, as long as the modified version is interface-compatible with the
version that the work was made with.
•
c) Accompany the work with a written offer, valid for at least three years, to give the same user the
materials specified in Subsection 6a, above, for a charge no more than the cost of performing this
distribution.
•
d) If distribution of the work is made by offering access to copy from a designated place, offer
equivalent access to copy the above specified materials from the same place.
•
e) Verify that the user has already received a copy of these materials or that you have already sent this
user a copy.
Summary of Contents for LBP312 SERIES
Page 1: ...LBP312x User s Guide USRMA 1622 00 2017 01 en Copyright CANON INC 2016 ...
Page 51: ...LINKS Paper P 558 Basic Operations 45 ...
Page 58: ...4 on 1 Postcard Insert the postcard with the upper end toward the machine Basic Operations 52 ...
Page 78: ...Printing a Document 72 ...
Page 93: ...LINKS Basic Printing Operations P 73 Printing a Document 87 ...
Page 97: ...LINKS Basic Printing Operations P 73 Enlarging or Reducing P 82 Printing a Document 91 ...
Page 106: ...LINKS Basic Printing Operations P 73 Printing a Document 100 ...
Page 158: ...LINKS Printing without Opening a File Direct Print P 142 Printing a Document 152 ...
Page 188: ...LINKS Connecting to a Network P 179 Network 182 ...
Page 240: ...LINKS Entering Sleep Mode P 63 Network 234 ...
Page 280: ...Printing a Document Stored in the Machine Stored Job Print P 133 Security 274 ...
Page 286: ... Functions of the Keys Operation Panel P 24 Security 280 ...
Page 324: ...Using TLS for Encrypted Communications P 287 Configuring IPSec Settings P 291 Security 318 ...
Page 334: ...Using Remote UI 328 ...
Page 347: ...LINKS Remote UI Screens P 329 Using Remote UI 341 ...
Page 350: ...LINKS Remote UI Screens P 329 Using Remote UI 344 ...
Page 374: ...Paper Source 167A 05E See Select Feeder Menu P 450 Setting Menu List 368 ...
Page 465: ...Troubleshooting 459 ...
Page 550: ...Third Party Software 167A 07F Appendix 544 ...
Page 559: ...For more information about this function see Collating Printouts by Page P 86 Appendix 553 ...
Page 611: ...Scalable Fonts PCL Appendix 605 ...
Page 612: ...Appendix 606 ...
Page 613: ...Appendix 607 ...
Page 614: ...OCR Code Scalable Fonts PCL Bitmapped Fonts PCL Appendix 608 ...
Page 637: ... 17 MD4 RSA Data Security Inc MD4 Message Digest Algorithm ...
Page 651: ... 31 Department s Table of Denial Orders ...
Page 667: ... 47 signature of Ty Coon 1 April 1990 Ty Coon President of Vice That s all there is to it ...
Page 688: ...Search Enter keyword s here 1 ...
Page 691: ...Procedure Necessary Steps Reference Page Start the MEAP applications from SMS 2 ...
Page 701: ...12 ...
Page 707: ...3 Click Delivered Update 4 Click Apply Firmware 5 Confirm the firmware to apply click Yes 5 ...
Page 709: ...3 Click Delivered Update 4 Click Delete Firmware 7 ...
Page 728: ...Search Enter keyword s here 1 ...
Page 749: ...Starting MEAP Applications Stopping MEAP Applications Starting Stopping MEAP Applications 10 ...
Page 757: ...4 Click License Management 18 ...
Page 760: ...4 Click License Management 21 ...
Page 761: ...5 Click Disable 6 Click Yes The license file is disabled 22 ...
Page 763: ...4 Click License Management 24 ...
Page 766: ...4 Click License Management 27 ...
Page 767: ...5 Click Delete 6 Click Yes The license file is deleted 28 ...
Page 768: ...29 ...
Page 770: ...4 Click Authentication Information Settings 31 ...
Page 772: ...IMPORTANT When cancelling authentication information Click Delete 33 ...
Page 777: ...5 ...
Page 786: ...14 ...
Page 789: ...17 ...
Page 795: ...4 Click Yes The setting information of the application is deleted 23 ...