Contents
Table 5.27 | Action code | |
Table 5.28 WRITE SAME | ||
Table 5.29 ERROR RECOVERY CONTROL | ||
Table 5.30 FEATURE CONTROL COMMAND | ||
Table 5.31 SCT DATA TABLE | ||
Table 5.32 HAD Temperature | ||
Table 5.33 DEVICE CONFIGURATION IDENTIFY data structure | ||
Table 5.34 Information to be read by IDENTIFY DEVICE command |
| |
Table 5.35 | Features field values and settable modes | |
Table 5.36 | ||
Table 5.37 Contents of SECURITY SET PASSWORD data | ||
Table 5.38 | Relationship between combination of Identifier and Security |
|
| level, and operation of the lock function | |
Table 5.39 | Contents of security password | |
Table 5.40 Data format of Read Log Ext log page 10h | ||
Table 5.41 | Tag field information | |
Table 5.42 Data format of Read Log Ext log page 11h | ||
Table 5.43 | Counter Identifier information | |
Table 5.44 Command code and parameters |
xviii |