SlideShare a Scribd company logo
Receiving Documents -

Scans
Scans Received - Location
 When documents are scanned, they are placed within
  the “Scan” folder of the recipient.

 Note: There is no notification confirming a scan was
  correctly received.

 The “Scans Folder” is located in: (Pathway Below)
     My Computer
     Select your U: Drive identified with your user
       name (Bmillion in the below example) from one of
       two locations
        Left Panel or Right Side Window
          Both are circled in below example
Scans Received - Location
Scans Received - Location

 Once inside your U: Drive

   Select the folder titled “Scans”
   You may select this folder from:
     The Left panel or
     The Right side window
     Both of these are circled in the below
      screenshot.
Scans Received - Location
Scans Received - Location
 Scans will populate inside the folder with randomly
  generated string of numbers

 To help search and work with scanned files, renaming the
  file is suggested.
   Right click on the file and select “Rename”
   Title the scan with any desired title
   Click else where in the screen and the name will be
     saved.

 Circled below is a scan that hasn’t been renamed yet.
   Other files in the folder have been renamed and can be
    searched and selected with more ease.
Scans Received - Location
Scans Received - Advantages

1) Documents can be quickly sent to
   Yourself
   Another employee in a different geographic area
   Multiple employees at once
2) Scans rely only on network connections for
   transmission
   No busy signals as seen with Faxes
   Can be sent to employees who don’t have fax
    numbers
Scans Received - Disadvantages
1) No notification of proper transmission
   A scan could be received by you, without you
    knowing it.
   Random checking of your scan folder is required
2) No receipt for transmission
   A scan doesn’t have a “From” section.
3) An email message or phone call would be advised
   You would still receive an email or phone call asking
    if the file was received and/or notifying you to check
    for a scan.

More Related Content

Viewers also liked

introduction to marketing & crm
 introduction to marketing & crm  introduction to marketing & crm
introduction to marketing & crm Aarti Beniwal
 
Виды памяти на компьютере
Виды памяти на компьютереВиды памяти на компьютере
Виды памяти на компьютереSaa-Kaya
 
Usb флеш-накопитель
Usb флеш-накопительUsb флеш-накопитель
Usb флеш-накопительSaa-Kaya
 
Powerpoint steinway sons
Powerpoint steinway sonsPowerpoint steinway sons
Powerpoint steinway sonskatharina1994
 

Viewers also liked (6)

introduction to marketing & crm
 introduction to marketing & crm  introduction to marketing & crm
introduction to marketing & crm
 
Abdominal trauma
Abdominal traumaAbdominal trauma
Abdominal trauma
 
Виды памяти на компьютере
Виды памяти на компьютереВиды памяти на компьютере
Виды памяти на компьютере
 
Usb флеш-накопитель
Usb флеш-накопительUsb флеш-накопитель
Usb флеш-накопитель
 
Teks ucapan
Teks ucapanTeks ucapan
Teks ucapan
 
Powerpoint steinway sons
Powerpoint steinway sonsPowerpoint steinway sons
Powerpoint steinway sons
 

Similar to Scans received

Examine Evidence PartitionsAnalysis of four small partitions ext.docx
Examine Evidence PartitionsAnalysis of four small partitions ext.docxExamine Evidence PartitionsAnalysis of four small partitions ext.docx
Examine Evidence PartitionsAnalysis of four small partitions ext.docx
cravennichole326
 
Decatur File Clean Up Guide
Decatur File Clean Up GuideDecatur File Clean Up Guide
Decatur File Clean Up Guidestevenslena
 
U albany nolij-web-redacted-copy
U albany nolij-web-redacted-copyU albany nolij-web-redacted-copy
U albany nolij-web-redacted-copy
Julia Sheehy
 
Technology Troubleshooting
Technology TroubleshootingTechnology Troubleshooting
Technology Troubleshooting
Donia Teagle
 
Comodo presentation
Comodo presentationComodo presentation
Comodo presentation
Jon Gargulinski
 
Positive and Informative Online Review of a Satisfactory Product •.docx
Positive and Informative Online Review of a Satisfactory Product •.docxPositive and Informative Online Review of a Satisfactory Product •.docx
Positive and Informative Online Review of a Satisfactory Product •.docx
ChantellPantoja184
 
WORKING WITH WINDOWS
WORKING WITH WINDOWSWORKING WITH WINDOWS
Power Point Lesson 10 Part1
Power Point  Lesson 10  Part1Power Point  Lesson 10  Part1
Power Point Lesson 10 Part1Nasir Jumani
 
CAB Unit I.pptx
CAB Unit I.pptxCAB Unit I.pptx
CAB Unit I.pptx
Dr T.Sivakami
 
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
evonnehoggarth79783
 
Move files to OneDrive.pptx
Move files to OneDrive.pptxMove files to OneDrive.pptx
Move files to OneDrive.pptx
ARYAN552812
 
When using some Sounds and Audio Devices functions you see a message.pdf
When using some Sounds and Audio Devices functions you see a message.pdfWhen using some Sounds and Audio Devices functions you see a message.pdf
When using some Sounds and Audio Devices functions you see a message.pdf
arasanmobiles
 
ITFT - Window explorer
ITFT - Window explorerITFT - Window explorer
ITFT - Window explorer
Blossom Sood
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
RajAmbere1
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
LaticiaGrissomzz
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
 
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docxDigital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
lynettearnold46882
 

Similar to Scans received (18)

Examine Evidence PartitionsAnalysis of four small partitions ext.docx
Examine Evidence PartitionsAnalysis of four small partitions ext.docxExamine Evidence PartitionsAnalysis of four small partitions ext.docx
Examine Evidence PartitionsAnalysis of four small partitions ext.docx
 
Decatur File Clean Up Guide
Decatur File Clean Up GuideDecatur File Clean Up Guide
Decatur File Clean Up Guide
 
U albany nolij-web-redacted-copy
U albany nolij-web-redacted-copyU albany nolij-web-redacted-copy
U albany nolij-web-redacted-copy
 
Technology Troubleshooting
Technology TroubleshootingTechnology Troubleshooting
Technology Troubleshooting
 
Comodo presentation
Comodo presentationComodo presentation
Comodo presentation
 
Positive and Informative Online Review of a Satisfactory Product •.docx
Positive and Informative Online Review of a Satisfactory Product •.docxPositive and Informative Online Review of a Satisfactory Product •.docx
Positive and Informative Online Review of a Satisfactory Product •.docx
 
WORKING WITH WINDOWS
WORKING WITH WINDOWSWORKING WITH WINDOWS
WORKING WITH WINDOWS
 
Power Point Lesson 10 Part1
Power Point  Lesson 10  Part1Power Point  Lesson 10  Part1
Power Point Lesson 10 Part1
 
CAB Unit I.pptx
CAB Unit I.pptxCAB Unit I.pptx
CAB Unit I.pptx
 
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
 
Move files to OneDrive.pptx
Move files to OneDrive.pptxMove files to OneDrive.pptx
Move files to OneDrive.pptx
 
When using some Sounds and Audio Devices functions you see a message.pdf
When using some Sounds and Audio Devices functions you see a message.pdfWhen using some Sounds and Audio Devices functions you see a message.pdf
When using some Sounds and Audio Devices functions you see a message.pdf
 
Mac User Group Marina Dzougoutov
Mac User Group Marina DzougoutovMac User Group Marina Dzougoutov
Mac User Group Marina Dzougoutov
 
ITFT - Window explorer
ITFT - Window explorerITFT - Window explorer
ITFT - Window explorer
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docxDigital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Scans received

  • 2. Scans Received - Location  When documents are scanned, they are placed within the “Scan” folder of the recipient.  Note: There is no notification confirming a scan was correctly received.  The “Scans Folder” is located in: (Pathway Below)  My Computer  Select your U: Drive identified with your user name (Bmillion in the below example) from one of two locations  Left Panel or Right Side Window  Both are circled in below example
  • 3. Scans Received - Location
  • 4. Scans Received - Location  Once inside your U: Drive  Select the folder titled “Scans”  You may select this folder from:  The Left panel or  The Right side window  Both of these are circled in the below screenshot.
  • 5. Scans Received - Location
  • 6. Scans Received - Location  Scans will populate inside the folder with randomly generated string of numbers  To help search and work with scanned files, renaming the file is suggested.  Right click on the file and select “Rename”  Title the scan with any desired title  Click else where in the screen and the name will be saved.  Circled below is a scan that hasn’t been renamed yet.  Other files in the folder have been renamed and can be searched and selected with more ease.
  • 7. Scans Received - Location
  • 8. Scans Received - Advantages 1) Documents can be quickly sent to  Yourself  Another employee in a different geographic area  Multiple employees at once 2) Scans rely only on network connections for transmission  No busy signals as seen with Faxes  Can be sent to employees who don’t have fax numbers
  • 9. Scans Received - Disadvantages 1) No notification of proper transmission  A scan could be received by you, without you knowing it.  Random checking of your scan folder is required 2) No receipt for transmission  A scan doesn’t have a “From” section. 3) An email message or phone call would be advised  You would still receive an email or phone call asking if the file was received and/or notifying you to check for a scan.