Peripherals Supported for SCIS Flashcards

1
Q

Supported Peripherals for SCIS

A

Main Device (Windows or IOS Ipad)
Receipt Printers
Barcode Scanners
Cash Drawers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Supported Receipt Printers

A
AirPrint
Star LAN
Star WLAN
Star Bluetooth
Epson Bluetooth
Epson LAN
HP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This feature supports two or more printers of the same brand and model per location only for Star and Epson network printers that have a static IP or a domain name assigned.

A

Advanced Cash Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Supported Barcode Scanners

A

Socket Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supported Cash Drawers

A

Birch/Firich
APG: Vasario Series
MMF: Advantage Series
Value line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SCIS renders printed receipts using what Netsuite Feature

A

Advanced HTML/PDF Template feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Location to set up printing for SCIS

A

Customization > Lists, Records & Fields > Record Types > SCIS Settings > Printing

Note: Ensure that Printing Technology is properly set on the SCIS Mobile Device record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What mode is required for using barcode scanners with SCIS

A

Serial Port Profile (SPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SuiteCommerce InStore for iOS supports the scanner in what modes

A

iOS or SPP Mode only. HID mode is not supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(True or False) The SCIS for Windows application must be installed after completing barcode scanner setup

A

False. The SCIS for Windows application must be installed BEFORE completing barcode scanner setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCIS does not require the use of any insecure services or protocols. The only protocol required are

A

HTTPS and TLS 1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Guidelines when ensuring the physical security of your peripheral devices

A

Protect device from unauthorized attachments
Maintain a device inventory
Prevent unauthorized logical device access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly