Contents
Before use .................................................... 5
Overview ........................................................................... 5
Network security .............................................................. 5
1-1-1.
1-1-2.
1-1-3.
1-1-4.
1-1-5.
1-1-6.
1-1-7.
Cut transition ...................................................... 8
1-2. Wipe .......................................................................... 9
1-2-1.
1-2-2.
1-2-3.
1-2-4.
1-2-5.
1-2-6.
1-3. Key ........................................................................... 14
1-3-1.
1-3-2.
1-3-3.
1-3-4.
Key preview ...................................................... 18
1-3-5.
1-3-6.
1-3-7.
1-3-8.
1-3-9.
Flying key ......................................................... 27
1-4-1.
1-4-2.
1-4-3.
1-4-4.
PinP preview .................................................... 29
1-4-5.
1-4-6.
1-4-7.
1-4-8.
1-4-9.
1-5-1.
1-5-2.
1-5-3.
1-5-4.
DSK preview..................................................... 36
1-5-5.
1-5-6.
1-5-7.
1-6. Key Link .................................................................. 39
1-8-1.
1-8-2.
1-9-1.
1-9-2.
1-9-3.
transition . .......................................................... 44
1-10. Memory ................................................................... 45
1-10-3. Recalling the operations stored in the memory
(Recall) . ............................................................ 47
(Delete) ............................................................ 49
(shot memory) . ................................................. 51
3