FGL Programming Guide

Total Page:16

File Type:pdf, Size:1020Kb

FGL Programming Guide FGL Programming Guide Lemur models FGL46 / FGL26 Ghostwriter models FGL46 / FGL26; FGL44 / FGL24; FGL42 / FGL22 Revision 12 (Feb 18th, 2020) Updated by TLS - Boca Systems, Mar 27th, 2020 Friendly Ghost Language (FGL) is Boca’s industry standard language that allows the user to print data, graphics, boxes and bar codes anywhere on the ticket in virtually any orientation. Great care has been taken to make this language user friendly without sacrificing any of the features and flexibility required by both future and existing customers. FGL has been structured in such a way to easily accommodate adding new functions in the future. FGL46 is the latest version of the Friendly Ghost Language. Unless stated otherwise, all references in the programming guide to Lemur, FGL26/46 &FGL24/44 are the same. FGL22, 24 and 26 are subsets of FGL42, 44 and 46, respectively. They contain most of the same features as FGL42/44/46. Features unavailable in the FGL22/24/26 code will be identified, when appropriate, throughout the programming guide. For simplicity, all references to FGL46 should be interpreted as valid for all FGL printers, except as noted. Please note that the features identified in this manual represent those features available in the latest version of the firmware. Older revisions of FGL42/44/46 firmware may not contain all of the features discussed in this document. We hope you enjoy your new Lemur family printer. The FGL46 language represents the latest enhancements to the FGL language. FGL46 contains many new features (PDF-417, Data Matrix, QR and Aztec 2D barcodes, BMP graphics, Text Centering, etc.) while retaining all of the commonly used FGL features. Some of the new FGL46 features are available in older FGL44 printers using special firmware version '44G' and above. Note: Downloading of FGL Bitmapped fonts is no longer allowed in order to eliminate potential conflicts with some of the new FGL features. While the use of FGL provides the programmer with the most efficient means of communicating with the printer, printing through a printer driver (Windows, Mac or Linux) is probably the fastest way to get your printer running. To work with a driver, follow the instructions on the applicable printer driver page of our website. Copyright c 1989-2020 by Boca Systems, Inc. 1 www.tls-bocasystems.com TABLE OF CONTENTS GENERAL DESCRIPTION - READ THIS FIRST .............................................................................................. 5 COMMAND SEQUENCES .............................................................................................................................. 11 STATUS COMMANDS ................................................................................................................................. 19 FILE COMMANDS ...................................................................................................................................... 21 PRINT COMMANDS .................................................................................................................................... 21 SPECIAL COMMANDS................................................................................................................................ 22 DRIVER COMMANDS (implemented November 2007 on new 26/46 printers) .......................................... 23 STANDARD INTERFACE PINOUTS .............................................................................................................. 24 SERIAL RJ12 ............................................................................................................................................... 24 USB .............................................................................................................................................................. 24 Ethernet (optional) ........................................................................................................................................ 24 WiFi (optional) .............................................................................................................................................. 24 Bluetooth (optional) ...................................................................................................................................... 24 BAR CODE SUPPLEMENT............................................................................................................................. 25 UPC supplement .......................................................................................................................................... 25 EAN8 supplement ........................................................................................................................................ 25 INTERLEAVED 2OF5 supplement .............................................................................................................. 26 EAN13 supplement ...................................................................................................................................... 26 CODE 39 supplement ................................................................................................................................. 26 USS-CODABAR supplement ....................................................................................................................... 27 CODE 128 supplement ............................................................................................................................... 27 SOFTSTRIP BAR CODE supplement ......................................................................................................... 27 TWO DIMENSIONAL BAR CODE SUPPLEMENT ......................................................................................... 28 FGL Features Minimum Firmware and Fonts Version ................................................................................. 28 FGL Font file contents SB00 to SB09 .......................................................................................................... 28 PDF-417 2D Bar Code ................................................................................................................................. 30 Data Matrix 2D Bar Code ............................................................................................................................. 31 Quick Response 2D Bar Code ..................................................................................................................... 32 Quick Response Bar Code Versions - <QRV2>, <QRV7>, <QRV11> and <QRV15> ................................ 33 Aztec 2D Bar Code ...................................................................................................................................... 34 DOWNLOADING FILE SUPPLEMENT ........................................................................................................... 35 DOWNLOADING LOGO SUPPLEMENT ........................................................................................................ 37 FGL IMAGE FORMAT ................................................................................................................................. 37 DOWNLOADING BMP & PCX SUPPLEMENT ............................................................................................... 39 FGL TEXT LOGO (MACRO) SUPPLEMENT .................................................................................................. 40 DOWNLOADING FONTS SUPPLEMENT ...................................................................................................... 41 SOFT FONT DOWNLOADING .................................................................................................................... 41 TRANSLATION TABLE................................................................................................................................ 41 TRUETYPE FONTS SUPPLEMENT ............................................................................................................... 43 TrueType Font Selection Commands - <TTF#> .......................................................................................... 43 UPDATING FIRMWARE, FONTS and FEATURES ........................................................................................ 44 2 www.tls-bocasystems.com BOX AND LINE SUPPLEMENT ...................................................................................................................... 45 HOST TO PRINTER COMMUNICATION SUPPLEMENT .............................................................................. 46 DIAGNOSTIC MODE SUPPLEMENT ............................................................................................................. 47 ORIENTAL CHARACTER SETS ..................................................................................................................... 48 Sample Basic Program ................................................................................................................................ 49 Sample Ticket Rows 1-7 of KANJI Font ....................................................................................................... 49 DUAL PRINTER SUPPLEMENT ..................................................................................................................... 50 Commands which have been modified in relation to dual mode. ................................................................ 50 Brief comparison of the different dual modes. ............................................................................................. 50 Miscellaneous Comments
Recommended publications
  • Cumberland Tech Ref.Book
    Forms Printer 258x/259x Technical Reference DRAFT document - Monday, August 11, 2008 1:59 pm Please note that this is a DRAFT document. More information will be added and a final version will be released at a later date. August 2008 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries. © 2008 Lexmark International, Inc. All rights reserved. 740 West New Circle Road Lexington, Kentucky 40550 Draft document Edition: August 2008 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL, INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any time. Comments about this publication may be addressed to Lexmark International, Inc., Department F95/032-2, 740 West New Circle Road, Lexington, Kentucky 40550, U.S.A. In the United Kingdom and Eire, send to Lexmark International Ltd., Marketing and Services Department, Westhorpe House, Westhorpe, Marlow Bucks SL7 3RQ. Lexmark may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
    [Show full text]
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • Types and Programming Languages by Benjamin C
    < Free Open Study > . .Types and Programming Languages by Benjamin C. Pierce ISBN:0262162091 The MIT Press © 2002 (623 pages) This thorough type-systems reference examines theory, pragmatics, implementation, and more Table of Contents Types and Programming Languages Preface Chapter 1 - Introduction Chapter 2 - Mathematical Preliminaries Part I - Untyped Systems Chapter 3 - Untyped Arithmetic Expressions Chapter 4 - An ML Implementation of Arithmetic Expressions Chapter 5 - The Untyped Lambda-Calculus Chapter 6 - Nameless Representation of Terms Chapter 7 - An ML Implementation of the Lambda-Calculus Part II - Simple Types Chapter 8 - Typed Arithmetic Expressions Chapter 9 - Simply Typed Lambda-Calculus Chapter 10 - An ML Implementation of Simple Types Chapter 11 - Simple Extensions Chapter 12 - Normalization Chapter 13 - References Chapter 14 - Exceptions Part III - Subtyping Chapter 15 - Subtyping Chapter 16 - Metatheory of Subtyping Chapter 17 - An ML Implementation of Subtyping Chapter 18 - Case Study: Imperative Objects Chapter 19 - Case Study: Featherweight Java Part IV - Recursive Types Chapter 20 - Recursive Types Chapter 21 - Metatheory of Recursive Types Part V - Polymorphism Chapter 22 - Type Reconstruction Chapter 23 - Universal Types Chapter 24 - Existential Types Chapter 25 - An ML Implementation of System F Chapter 26 - Bounded Quantification Chapter 27 - Case Study: Imperative Objects, Redux Chapter 28 - Metatheory of Bounded Quantification Part VI - Higher-Order Systems Chapter 29 - Type Operators and Kinding Chapter 30 - Higher-Order Polymorphism Chapter 31 - Higher-Order Subtyping Chapter 32 - Case Study: Purely Functional Objects Part VII - Appendices Appendix A - Solutions to Selected Exercises Appendix B - Notational Conventions References Index List of Figures < Free Open Study > < Free Open Study > Back Cover A type system is a syntactic method for automatically checking the absence of certain erroneous behaviors by classifying program phrases according to the kinds of values they compute.
    [Show full text]
  • Printer Driver Switching in Windows Operating Systems
    Europaisches Patentamt (19) J European Patent Office Office europeen des brevets (11) EP 0 864 964 A2 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: (51) |nt. CI.6: G06F 3/1 2 16.09.1998 Bulletin 1998/38 (21) Application number: 97116646.7 (22) Date of filing: 24.09.1997 (84) Designated Contracting States: (72) Inventor: Snyders, Lawrence M. AT BE CH DE DK ES Fl FR GB GR IE IT LI LU MC Boise, Idaho 83702 (US) NL PT SE Designated Extension States: (74) Representative: AL LT LV RO SI Schoppe, Fritz, Dipl.-lng. Schoppe & Zimmermann (30) Priority: 13.03.1997 US 816978 Patentanwalte Postfach 71 08 67 (71) Applicant: 81458 Munchen (DE) Hewlett-Packard Company Palo Alto, California 94304 (US) (54) Printer driver switching in windows operating systems (57) An information distributing apparatus for oper- ating within a computer network environment (12). The CSTART OF SYSTEMS > s; information distributing apparatus includes a computer (10) having an operating system and is configured to operate within the computer network environment (12). APPLICATION PRINTS -S2 The apparatus has an application (36) configured for running on the computer (10) via the operating system, S4 the application (36) configured to generate a source job GDI GENERATES DATA IN INTERMEDIATE DRAWING ORIGINAL PRINTER DRIVER (28) in the form of an intermediate file format comprising INSTRUCTIONS (ENHANCED PROVIDE DEVICE META FILE) INFORMATION an output instruction file (42). The apparatus includes a print processor (50) in the form of an intermediate exe- SJ cutable code for operating on the output instruction file The also includes at least ENHANCED META (42).
    [Show full text]
  • UNIX Workshop Series: Quick-Start Objectives
    Part I UNIX Workshop Series: Quick-Start Objectives Overview – Connecting with ssh Command Window Anatomy Command Structure Command Examples Getting Help Files and Directories Wildcards, Redirection and Pipe Create and edit files Overview Connecting with ssh Open a Terminal program Mac: Applications > Utilities > Terminal ssh –Y [email protected] Linux: In local shell ssh –Y [email protected] Windows: Start Xming and PuTTY Create a saved session for the remote host name centos.css.udel.edu using username Connecting with ssh First time you connect Unix Basics Multi-user Case-sensitive Bash shell, command-line Commands Command Window Anatomy Title bar Click in the title bar to bring the window to the front and make it active. Command Window Anatomy Login banner Appears as the first line of a login shell. Command Window Anatomy Prompts Appears at the beginning of a line and usually ends in $. Command Window Anatomy Command input Place to type commands, which may have options and/or arguments. Command Window Anatomy Command output Place for command response, which may be many lines long. Command Window Anatomy Input cursor Typed text will appear at the cursor location. Command Window Anatomy Scroll Bar Will appear as needed when there are more lines than fit in the window. Command Window Anatomy Resize Handle Use the mouse to change the window size from the default 80x24. Command Structure command [arguments] Commands are made up of the actual command and its arguments. command -options [arguments] The arguments are further broken down into the command options which are single letters prefixed by a “-” and other arguments that identify data for the command.
    [Show full text]
  • Dot at Command Firmware Release 4.0.0 Release 3.3.5
    Product Change Notification Software Release Notes Dot AT Command Firmware Release 4.0.0 Release 3.3.5 MultiTech xDot® MultiTech mDot™ Date: March 30, 2021 Contents Product Change Notification (PCN) Number PCN 03302021-001 (Dot) I. Overview II. Suggested Action Plan I. Overview MultiTech announces the availability of new AT Command III. Release 4.0.0 Overview Firmware for use on MultiTech® Long Range LoRa® Modules: MultiTech xDot® (MTXDOT Series) IV. Release 3.3.5 Overview MultiTech mDot™ (MTDOT Series) V. Schedule New versions are currently available for download and VI. Flashing mDot Firmware evaluation: VII. Part Numbers Impacted Release 4.0.0 (shipping in June 2021) Release 3.3.5 VIII. Mbed OS Overview IX. xDot Overview Release 4.0.0 will released into standard MultiTech product starting in June 2021. Currently, product ships with X. mDot Overview Release 3.2.1 XI. xDot Micro Developer Kit II. Suggested Action Plan XII. Additional Information Customers Review the information in this PCN and forward to Attachments others within your organization who are actively Identifying Firmware Version involved with the development of IoT applications using the MultiTech xDot and MultiTech mDot. Identifying Date of Manufacture Consider downloading the firmware available on MultiTech or Mbed websites to check compatibility mPower & mLinux Software with existing deployments. PCN 03302021-001 (Dot) Page 1 of 12 https://support.multitech.com Review the release schedule for the upcoming firmware release and understand the effect on your manufacturing and deployment schedules. Distributors Forward this announcement to others within your organization who are actively involved in the sale or support of LoRa-enabled sensors.
    [Show full text]
  • Netcat and Trojans/Backdoors
    Netcat and Trojans/Backdoors ECE4883 – Internetwork Security 1 Agenda Overview • Netcat • Trojans/Backdoors ECE 4883 - Internetwork Security 2 Agenda Netcat • Netcat ! Overview ! Major Features ! Installation and Configuration ! Possible Uses • Netcat Defenses • Summary ECE 4883 - Internetwork Security 3 Netcat – TCP/IP Swiss Army Knife • Reads and Writes data across the network using TCP/UDP connections • Feature-rich network debugging and exploration tool • Part of the Red Hat Power Tools collection and comes standard on SuSE Linux, Debian Linux, NetBSD and OpenBSD distributions. • UNIX and Windows versions available at: http://www.atstake.com/research/tools/network_utilities/ ECE 4883 - Internetwork Security 4 Netcat • Designed to be a reliable “back-end” tool – to be used directly or easily driven by other programs/scripts • Very powerful in combination with scripting languages (eg. Perl) “If you were on a desert island, Netcat would be your tool of choice!” - Ed Skoudis ECE 4883 - Internetwork Security 5 Netcat – Major Features • Outbound or inbound connections • TCP or UDP, to or from any ports • Full DNS forward/reverse checking, with appropriate warnings • Ability to use any local source port • Ability to use any locally-configured network source address • Built-in port-scanning capabilities, with randomizer ECE 4883 - Internetwork Security 6 Netcat – Major Features (contd) • Built-in loose source-routing capability • Can read command line arguments from standard input • Slow-send mode, one line every N seconds • Hex dump of transmitted and received data • Optional ability to let another program service established connections • Optional telnet-options responder ECE 4883 - Internetwork Security 7 Netcat (called ‘nc’) • Can run in client/server mode • Default mode – client • Same executable for both modes • client mode nc [dest] [port_no_to_connect_to] • listen mode (-l option) nc –l –p [port_no_to_connect_to] ECE 4883 - Internetwork Security 8 Netcat – Client mode Computer with netcat in Client mode 1.
    [Show full text]
  • Dell EMC Powerstore CLI Guide
    Dell EMC PowerStore CLI Guide May 2020 Rev. A01 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Contents Additional Resources.......................................................................................................................4 Chapter 1: Introduction................................................................................................................... 5 Overview.................................................................................................................................................................................5 Use PowerStore CLI in scripts.......................................................................................................................................5 Set up the PowerStore CLI client........................................................................................................................................5 Install the PowerStore CLI client..................................................................................................................................
    [Show full text]
  • EZ-SCREEN LP Instruction Manual
    EZ-SCREEN® LP Low-Profile Safety Light Screen Instruction Manual Original Instructions 140044 Rev. G 27 April 2018 © Banner Engineering Corp. All rights reserved 140044 EZ-SCREEN® LP Low-Profile Safety Light Screen Contents 1 About This Document .............................................................................................................................................5 1.1 Important . Read This Before Proceeding! .....................................................................................................................5 1.2 Use of Warnings and Cautions ...........................................................................................................................................5 1.3 EU Declaration of Conformity (DoC) ..................................................................................................................................5 1.4 Banner Engineering Corp Limited Warranty ......................................................................................................................6 1.5 Contact Us ......................................................................................................................................................................... 6 2 Introduction ............................................................................................................................................................ 8 2.1 Features .............................................................................................................................................................................8
    [Show full text]
  • Banner 8 Student System
    BANNER STUDENT Viewing Student Information Department: Student Information Management Email:[email protected] Phone: 646-7383 Last Update: March 1, 2010 Banner Student Confidential Business Information This documentation is proprietary information of New Mexico State University (NMSU) and is not to be copied, reproduced, lent or disposed of, nor used for any purpose other than that for which it is specifically provided without the written permission of NMSU. Prepared For: Release 8.x Prepared By: New Mexico State University P.O. Box 30001 Las Cruces, New Mexico 88003 United States of America Issued: October 2012 In preparing and providing this publication, NMSU is not rendering legal, accounting, or other similar professional services. NMSU makes no claims that an institution’s use of this publication or the software for which it is provided will insure compliance with applicable federal or state laws, rules, or regulations. Each organization should seek legal, accounting and other similar professional services from competent providers of the organization’s own choosing. © 2010 Regents of New Mexico State University. SunGard or its subsidiaries in the U.S. and other countries is the owner of numerous marks, including “SunGard,” the SunGard logo, “Banner,” “PowerCAMPUS,” “Advance,” “Luminis”, "fsaATLAS," "DegreeWorks," "SEVIS Connection," "SmartCall," “UDC,” and “Unified Digital Campus.” Other names and marks used in this material are owned by third parties. Use of this material is solely for the support of SunGard HE Banner products and NMSU. © SunGard 2006. All rights reserved. The unauthorized possession, use, reproduction, distribution, display or disclosure of this material or the information contained herein is prohibited.
    [Show full text]
  • Shell Variables
    Shell Using the command line Orna Agmon ladypine at vipe.technion.ac.il Haifux Shell – p. 1/55 TOC Various shells Customizing the shell getting help and information Combining simple and useful commands output redirection lists of commands job control environment variables Remote shell textual editors textual clients references Shell – p. 2/55 What is the shell? The shell is the wrapper around the system: a communication means between the user and the system The shell is the manner in which the user can interact with the system through the terminal. The shell is also a script interpreter. The simplest script is a bunch of shell commands. Shell scripts are used in order to boot the system. The user can also write and execute shell scripts. Shell – p. 3/55 Shell - which shell? There are several kinds of shells. For example, bash (Bourne Again Shell), csh, tcsh, zsh, ksh (Korn Shell). The most important shell is bash, since it is available on almost every free Unix system. The Linux system scripts use bash. The default shell for the user is set in the /etc/passwd file. Here is a line out of this file for example: dana:x:500:500:Dana,,,:/home/dana:/bin/bash This line means that user dana uses bash (located on the system at /bin/bash) as her default shell. Shell – p. 4/55 Starting to work in another shell If Dana wishes to temporarily use another shell, she can simply call this shell from the command line: [dana@granada ˜]$ bash dana@granada:˜$ #In bash now dana@granada:˜$ exit [dana@granada ˜]$ bash dana@granada:˜$ #In bash now, going to hit ctrl D dana@granada:˜$ exit [dana@granada ˜]$ #In original shell now Shell – p.
    [Show full text]
  • Netcat Starter
    www.allitebooks.com Instant Netcat Starter Learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and Security Toolkits to this day K.C. Yerrid BIRMINGHAM - MUMBAI www.allitebooks.com Instant Netcat Starter Copyright © 2013 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: January 2013 Production Reference: 1170113 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-84951-996-0 www.packtpub.com www.allitebooks.com Credits Author Project Coordinators K.C. "K0nsp1racy" Yerrid Shraddha Bagadia Esha Thakker Reviewer Jonathan Craton Proofreader Kelly Hutchison IT Content and Commissioning Editor Graphics Grant Mizen Aditi Gajjar Commissioning Editor Production Coordinator Priyanka Shah Melwyn D'sa Technical Editor Cover Work Ameya Sawant Melwyn D'sa Copy Editor Cover Image Alfida Paiva Conidon Miranda www.allitebooks.com About the author K.C.
    [Show full text]