
Data Processing Overview
Bar code data processing involves several steps. Some steps may be skipped during the processing depending on user
selections on the Data Options control panels. The steps are presented below in the order they are performed on the scanned
data.
1. Scanned data is tested for a
code ID
and length (Min/Max). If it matches, it is processed per the rules in place for that
symbology. If the scan does not meet the criteria for that symbology, it is processed based on the settings for All. If a
code ID is not found, the bar code data is processed based on the settings for All.
2. If the symbology is
disabled
, the scan is rejected.
3. Strip
leading
data bytes unconditionally.
4. Strip
trailing
data bytes unconditionally.
5. Parse for, and strip if found,
Data Options
strings.
6. Replace any
control characters
with string, as configured.
7. Add
prefix
string to output buffer.
8. If
Code ID
is
not
stripped, add saved
code ID
from above to output buffer.
9. Add processed
data string
from above to output buffer.
10. Add
suffix string
to output buffer.
11. Add a terminating
NUL
to the output buffer, in case the data is processed as a string.
12. If key output is enabled, start the process to output keys. If control characters are encountered:
l
If Translate All is set, key is translated to CTRL + char, and output.
l
If Translate All is not set, and key has a valid VK code, key is output.
l
Otherwise, key is ignored (not output).
13. If key output is disabled, a windows message is broadcast to notify listening applications that data is available.
The manipulated data is ready to be read by applications.
3-76
Summary of Contents for THOR VM1
Page 17: ...Components Front View 1 Power Button 2 Speakers 3 Ambient Light Sensor 4 Microphone 1 3 ...
Page 43: ...IBM 3270 Overlay 2 25 ...
Page 162: ...Hat Encoding 3 100 ...
Page 163: ...3 101 ...
Page 175: ...About This tab displays information on the Gobi 2000 radio installed in the Thor VM1 3 113 ...
Page 179: ...3 117 ...
Page 199: ...Enter user name password and domain to be used when logging into network resources 3 137 ...
Page 206: ...3 144 ...
Page 220: ...3 158 ...
Page 228: ...4 8 ...
Page 301: ...Click the Request a certificate link Click on the advanced certificate request link 6 45 ...
Page 302: ...Click on the Create and submit a request to this CA link 6 46 ...
Page 312: ...7 4 ...
Page 318: ... Shift 9 Shift 0 8 6 ...