5 - 40
By default, the Thor VM2 is pre-configured for a tethered scanner attached to the COM1 port:
• Power on Pin 9 (page 5-43) is enabled.
• The Data Collection control panel Main (page 5-42) tab is configured for COM1 on Device 2.
Return to Factory Default Settings
After scanning the engine-specific bar code to return the scanner/imager to factory default settings, the next step
is to open the bar code wedge panel on the mobile device collecting the scanned data. Click the OK button to
close the panel. This action will synchronize all scanner formats for your device.
Data Processing Overview
Bar code data processing involves several steps. Some steps may be skipped during the processing depending on
user selections on the Data Options control panels. The steps are presented below in the order they are performed on
the scanned data.
1. Scanned data is tested for a code ID and length (Min/Max). If it matches, it is processed per the rules in place for
that symbology. If the scan does not meet the criteria for that symbology, it is processed based on the settings for
All. If a code ID is not found, the bar code data is processed based on the settings for All.
2. If the symbology is disabled, the scan is rejected.
3. Strip leading data bytes unconditionally.
4. Strip trailing data bytes unconditionally.
5. Parse for, and strip if found, Data Options strings.
6. Replace any control characters with string, as configured.
7. Add prefix string to output buffer.
8. If Code ID is not stripped, add saved code ID from above to output buffer.
9. Add processed data string from above to output buffer.
10. Add suffix string to output buffer.
11. Add a terminating NUL to the output buffer, in case the data is processed as a string.
12. If key output is enabled, start the process to output keys. If control characters are encountered:
• If Translate All is set, key is translated to CTRL + char, and output.
• If Translate All is not set, and key has a valid VK code, key is output.
• Otherwise, key is ignored (not output).
13. If key output is disabled, a windows message is broadcast to notify listening applications that data is available.
The manipulated data is ready to be read by applications.